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"], 0x0) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000004c0)=[&(0x7f0000000480)='posix_acl_accessk-\x00'], &(0x7f0000000740)=[&(0x7f0000000500)='/+,selinuxvboxnet0-\x00', &(0x7f0000000540)='-vmnet0+\x05\x00', &(0x7f0000000580)='keyring\x00', &(0x7f00000005c0)=']}em0[\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='posix_acl_access\x00', &(0x7f0000000680)=')[*%\x00', &(0x7f00000006c0)='md5sum%{user&ppp1mime_type#&,*vmnet0\x00', &(0x7f0000000700)='$)proc\x00']) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(0xffffffffffffffff, 0x40045731, &(0x7f0000000940)=0x763) getrandom(&(0x7f0000000840)=""/212, 0xd4, 0x1) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000007c0)) r0 = socket(0x11, 0x800000003, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$KVM_IRQ_LINE(r2, 0x4008ae61, &(0x7f0000000800)={0x4, 0x80000000}) [ 3086.284278] audit: type=1400 audit(2000002778.490:82008): avc: denied { map } for pid=19584 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3086.434788] audit: type=1400 audit(2000002778.550:82009): avc: denied { map } for pid=19584 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3086.434813] audit: type=1400 audit(2000002778.560:82010): avc: denied { map } for pid=19584 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:19:40 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000103004e22000800000010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) 04:19:40 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000105004e22000800000010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) 04:19:40 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000108004e22000800000010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) 04:19:41 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff0200000000000000000000000000010d004e22000800000010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) 04:19:41 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000128004e22000800000010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) 04:19:41 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000130004e22000800000010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3088.365053] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 3088.400728] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 04:19:41 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newlink={0x54, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x10, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc}]}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x54}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0xc000000, {0x0, 0x0, 0x0, r4}}, 0x20}}, 0x0) 04:19:41 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x3ee0, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) 04:19:42 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='nfs\x00', 0x801040, &(0x7f000000a000)) 04:19:42 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x6000}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) 04:19:42 executing program 5: close(0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in=@empty}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) ppoll(&(0x7f0000000000)=[{r0, 0x8}, {r1, 0x404}], 0x2, &(0x7f0000000100)={r2, r3+10000000}, &(0x7f0000000180)={[0x7ff0000]}, 0x8) 04:19:42 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000160004e22000800000010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3089.160568] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 04:19:42 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010800000000084) r1 = socket(0x11, 0x800000003, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nfc_llcp(r3, &(0x7f00000005c0)={&(0x7f0000000080)={0x27, 0x1, 0x2, 0x5, 0x97, 0x3, "fa1360586095684e3b03b062e3fd389235d5a6c5c51e7149066f1b07f55f078c42df11d07624d056260004f9f075b512171e468529a73fa995771ab9114149", 0x7}, 0x60, &(0x7f0000000480)=[{&(0x7f0000000100)="471ce1c791e4b7acd660cb659c74a8616fbfb134e643e29b01c28a70247241f49fcb05ce2a1e162a5cca5f769061f3df3b0544673ca09762cd6c057e74a3a9c6fd0343a8cbaaedb6f959d2fded0293609ffbc54582a846773421d6b8b67cd4e011", 0x61}, {&(0x7f0000000180)="bf0d79e9b3cd9bd444efb44b73201297eb20662617555f66c7c73eb1bdc94fb435da07dd2c354db75c2b006a89b185d99626ff893f2d463f9d3032290c4bf861547edbb6bd994a85849110360a2a06add4ba5a5b74e7b9bdeb8d75a77b198c838ca10978771102bdc5a803ca14837715eaf9917844c115fd32ec4a9f2f70d6b27ff2e3670bac22b04ecb66257fd39a83bcdd204af61df15933b2fac2ea69efae492e1623f4d09518950d3ace399577a4e883028bbd4024", 0xb7}, {&(0x7f0000000000)="e59ff351347caf458bc318908579b7408d8d75e0e9acd750", 0x18}, {&(0x7f0000000240)="271e977ce2dab0eb", 0x8}, {&(0x7f0000000340)="d2879ad41dec44a9c78b9192af614bd68bc7308c62f9564b418cf8f3f6d90f1a2e3366a770491bc4ae963a5c42cc240cf259f0db45e0ba2fc2146196c09a692b4777088e57f209b573181af72899d5f01a2e020f8bab79f542ae3300d213c46a4efca2f411718517a18eb1c2369a7f42a1ecb57c17a3b0c48d1f5398d804840a696733d78ada3641cec6b32683", 0x8d}, {&(0x7f0000000400)="435d185d8ed7a9938ef9eb77ddec499f588cb03da3a23dd2297d873eef3ec98b40f5b6532a6a12a1e75b951cbbb9851cde2f988f11510dea5a3994455d9e81eac1a98776b95c1ed01c456f1ecb7127ad798e49c8a92e892a", 0x58}], 0x6, &(0x7f0000000500)={0x90, 0x1, 0xffffc169, "bb397d032bf300ca1dd5b29448d0b40f979becf135a21a6f204c3fd9aa5bf7f0a9edd8ae9129ddbb437406ec2d5ff2bfeaed67b2a80ef65d11ce6769fab93f37ef8ada27489a4f2a09834da5a4574b90b5f39c9b0502a6ccdfdad5fb5c707d591cdf17fb6b42a19a08e5fb685da866f7d50ed2fc975946129573"}, 0x90, 0x20040000}, 0x44044080) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000280)={0x0, @in, 0x0, 0x0, 0xfffffffe, 0x0, 0x11}, 0x98) sendmmsg$inet6(r0, &(0x7f0000001680)=[{{&(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x8}, 0x1c, &(0x7f0000002a80)=[{&(0x7f0000002880)='*', 0x34000}], 0x1}}], 0x1, 0x20000040) [ 3089.638012] netlink: 'syz-executor.1': attribute type 5 has an invalid length. 04:19:43 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x6558}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) [ 3089.999878] kauditd_printk_skb: 109 callbacks suppressed [ 3089.999896] audit: type=1400 audit(2000002783.200:82120): avc: denied { map } for pid=19761 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:19:43 executing program 3: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2, 0x11, r1, 0x0) ioctl$VHOST_RESET_OWNER(0xffffffffffffffff, 0xaf02, 0x0) r2 = socket(0x11, 0x800000003, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r1) ioctl$DRM_IOCTL_MODE_DIRTYFB(r4, 0xc01864b1, &(0x7f0000000180)={0x8020000, 0x3, 0x9, 0x1, &(0x7f0000000140)=[{0x7, 0x4bbb, 0x6, 0xd5a}]}) close(r0) r5 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') pipe(&(0x7f0000000000)={0xffffffffffffffff}) bind$xdp(r5, &(0x7f00000000c0)={0x2c, 0x8, 0x0, 0x1, r6}, 0x10) r7 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r8 = creat(&(0x7f0000000100)='./bus\x00', 0x10) r9 = socket(0x11, 0x800000003, 0x0) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r9, 0x0, r10) setsockopt$pppl2tp_PPPOL2TP_SO_DEBUG(r9, 0x111, 0x1, 0x4, 0x4) ftruncate(r8, 0x208200) sendfile(r0, r7, 0x0, 0x8000fffffffe) 04:19:43 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x3ee4, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) [ 3090.103127] audit: type=1400 audit(2000002783.270:82121): avc: denied { map } for pid=19761 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3090.132023] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 04:19:43 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff020000000000000000000000000001f0004e22000800000010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3090.264534] audit: type=1400 audit(2000002783.270:82122): avc: denied { map } for pid=19761 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3090.435217] audit: type=1400 audit(2000002783.290:82123): avc: denied { map } for pid=19761 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:19:43 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newlink={0x54, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x10, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc}]}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x54}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0xe000000, {0x0, 0x0, 0x0, r4}}, 0x20}}, 0x0) [ 3090.542137] audit: type=1400 audit(2000002783.300:82124): avc: denied { map } for pid=19761 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3090.648925] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 3090.681923] audit: type=1400 audit(2000002783.600:82125): avc: denied { map } for pid=19769 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3090.821906] audit: type=1400 audit(2000002783.600:82126): avc: denied { map } for pid=19769 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:19:44 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x6800}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) 04:19:44 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) splice(r0, 0x0, r1, 0x0, 0x100000002, 0x0) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000400)={0x101, 0x0, 0x4, 0x40, 0x5, {0x77359400}, {0x5, 0x1, 0x5, 0xfe, 0xc5, 0x40, "d7004659"}, 0x6, 0x1, @fd=r0, 0x5}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) r10 = socket$nl_route(0x10, 0x3, 0x0) r11 = socket$netlink(0x10, 0x3, 0x0) r12 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r12, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r12, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r11, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000640)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r13, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b200000000008cae6525c5fbe7a1de68a96e03be094b5dd3a217667da12a6d56ce0f3196b138bd560e546247924c400362bfb13db1f3a3039b57c2c77d8046334b65113c055c1b38bbab"], 0x48}}, 0x0) sendmsg$nl_route_sched(r10, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r13, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=@newtfilter={0x44, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r13, {}, {}, {0x8, 0xfff1}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14}]}}]}, 0x44}}, 0x0) sendmsg$nl_route_sched(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=ANY=[@ANYBLOB="240000002e000100000000000000000700000000", @ANYRES32=r13, @ANYBLOB="0000f0ff000000000000f1ff"], 0x24}}, 0x4) sendmsg$nl_route_sched(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000500)=@deltclass={0x54, 0x29, 0x400, 0x70bd27, 0x25dfdbfc, {0x0, 0x0, 0x0, r13, {0x7, 0xc}, {0x10, 0xb}, {0xfff1, 0xfff1}}, [@TCA_RATE={0x6, 0x5, {0x20, 0x40}}, @tclass_kind_options=@c_cbq={{0x8, 0x1, 'cbq\x00'}, {0x14, 0x2, [@TCA_CBQ_FOPT={0x10, 0x3, {{0xdf4a248689dff03f, 0xf}, 0x1, 0x1}}]}}, @tclass_kind_options=@c_taprio={0xb, 0x1, 'taprio\x00'}]}, 0x54}, 0x1, 0x0, 0x0, 0x14}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000480)=ANY=[@ANYBLOB="240000002e000100000000000000000700000000", @ANYRES32=r7, @ANYBLOB="0000f0ff000000000100f1cc08cfbfb3e0d302842a278d3b1371ff"], 0x24}}, 0x4) r14 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r14, &(0x7f0000000000)={0xa, 0x10000000004e20, 0x0, @mcast2, 0x6}, 0x1c) recvmmsg(r14, &(0x7f0000007bc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10002, 0x0) setsockopt$SO_BINDTODEVICE(r14, 0x1, 0x19, 0x0, 0x0) r15 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r15, &(0x7f0000000040)={0xa, 0x4e22, 0x1ff, @dev, 0x6}, 0x1c) r16 = accept(r15, &(0x7f0000000040)=@ipx, &(0x7f00000000c0)=0x80) syz_open_dev$usbmon(0x0, 0x0, 0x40) syz_open_procfs(0x0, &(0x7f0000000140)='net/nf_conntrack\x00') socket$inet6(0xa, 0x2, 0x0) r17 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x20730, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61d7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001080), 0x8}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$rxrpc(0x21, 0x2, 0xa) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r17, 0x402c5342, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000000)={&(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000002000/0x3000)=nil, &(0x7f0000003000/0x2000)=nil, &(0x7f0000007000/0x3000)=nil, &(0x7f0000008000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000009000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0}, 0x68) r18 = inotify_init1(0x0) fcntl$setown(r18, 0x8, 0xffffffffffffffff) fcntl$getownex(r18, 0x10, &(0x7f0000000100)={0x0, 0x0}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x100000002, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000140)={{0x2b, @dev={0xac, 0x14, 0x14, 0x12}, 0x4e20, 0x3, 'ovf\x00', 0x1, 0x7, 0x2a}, {@broadcast, 0x4e22, 0x4, 0x5, 0xffffff01, 0x8}}, 0x44) process_vm_readv(r19, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) setsockopt$PNPIPE_HANDLE(r16, 0x113, 0x3, &(0x7f0000000100)=0x3, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x0) 04:19:44 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100034e22000800000010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3090.994069] audit: type=1400 audit(2000002783.600:82127): avc: denied { map } for pid=19769 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3091.097565] audit: type=1400 audit(2000002783.670:82128): avc: denied { map } for pid=19769 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3091.240959] audit: type=1400 audit(2000002783.700:82129): avc: denied { map } for pid=19769 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3091.409644] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 04:19:44 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100054e22000800000010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) 04:19:45 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x3f78, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) [ 3091.953001] netlink: 'syz-executor.1': attribute type 5 has an invalid length. 04:19:45 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x10000) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000100)=ANY=[@ANYBLOB="080000000000000000000000000000000000000000000000000000000800080000000000000000004b51a0a8780688d2a84377ea55f1cee2e219cc062f2ebed4d81fae3f7159a3ec5e64f6c168d6407a50b3658e2552984ed73da0b63013e1aea0c3222a7ae0e45ba16dce7e68a9ead713aa9eef3a9f4642aa53c5553fb365ebb0d47b98cd19c335ed908f9d9038c0730bd0f92f0f70d097fc46c2acf919c3b2bd7e2320fd3eee5babae17bec4f28935925bf7744ef9daf0a1f652a857382cef13bcbb550a318f22e0d78b493a1eee00"/217]) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000004, 0x8031, 0xffffffffffffffff, 0x0) r2 = socket(0x11, 0x800000003, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001500)='nl80211\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$NL80211_CMD_GET_SCAN(r5, &(0x7f00000015c0)={&(0x7f00000014c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000001580)={&(0x7f0000001540)={0x30, r6, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x7, 0x1}}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r7}]}, 0x30}}, 0x40) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000200)={{{@in=@initdev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @empty}}, 0x0, @in=@local}}, &(0x7f0000000300)=0xe8) r9 = socket$netlink(0x10, 0x3, 0x0) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000540)=@bridge_dellink={0x64, 0x11, 0x8, 0x70bd25, 0x25dfdbfe, {0x7, 0x0, 0x0, 0x0, 0x20000, 0x4820}, [@IFLA_PHYS_PORT_ID={0x12, 0x22, "61bb363b3e272c1bf5a1255a02dd"}, @IFLA_PROTO_DOWN={0x5, 0x27, 0x81}, @IFLA_TXQLEN={0x8, 0xd, 0x2}, @IFLA_BROADCAST={0xa, 0x2, @local}, @IFLA_IFALIAS={0x14, 0x14, 'veth0_virt_wifi\x00'}]}, 0x64}}, 0x0) sendmsg$NL80211_CMD_GET_WIPHY(r4, &(0x7f0000000400)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x48, r6, 0x9f5ea0f3b9fa897a, 0x70bd27, 0x25dfdbfe, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r8}, @NL80211_ATTR_WIPHY={0x8}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x2}, @NL80211_ATTR_WDEV={0xc, 0x99, {0xf5b4, 0x3}}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r11}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x1}]}, 0x48}, 0x1, 0x0, 0x0, 0x24000000}, 0x40000) r12 = msgget$private(0x0, 0x0) msgsnd(r12, &(0x7f0000000a00)=ANY=[@ANYRESHEX], 0x1, 0x0) msgrcv(r12, 0x0, 0x0, 0x0, 0x1800) msgctl$MSG_STAT_ANY(r12, 0xd, &(0x7f0000000480)=""/162) setsockopt$inet6_tcp_buf(r2, 0x6, 0x0, &(0x7f0000000440)="ab9a2a", 0x3) 04:19:45 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x6c00}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) 04:19:45 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000143054e22000800000010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3092.494570] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 04:19:46 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket(0x1, 0x2, 0x0) r0 = getpgid(0x0) getrlimit(0x4, &(0x7f0000000000)) kcmp(r0, 0x0, 0x7913709e57048ee5, 0xffffffffffffffff, 0xffffffffffffffff) getsockname(0xffffffffffffffff, &(0x7f0000000040)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)=ANY=[]}, 0x1, 0xfdffffff00000000}, 0x0) 04:19:46 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a9ec8a3a63673a36d66b103e1fdbb4678731c44d5772a8b52f88132613f2ab9faa48e75b0508e2367018dc4479c6757b0a5622107e780a52d43a222d4aa8fa0c3e961e2401d5dbb22107ce4584d22a35c2ff5c7069779f3a8e888a8ac94312cdb43f7907ebfcf3dc4ad1f5e7577c5c2c9146439e6910c437a8213e177dfca08fb12f6c6a8343821e53d1f0ef24575797141dd16b8065042500017c0bab7265ba185fa61404145c500be7e57f2af455765c675c710da30fb915abbfcb8fe5e5a54f998aeb8ecb869537d7ddb529a8d66a4905586c9dd0d81d4841e2c90bd8fa2bf3802bf963edaae01ebd125510bbe75beac077af773d5d2a34b256e8369f68b0fcab87c7ee033997f53b635b59ac5aa1456d0b35e1dd734149dbcf541d744962b2bd0ece4c267760c3a6d4bce9b03000000cfa703a1a48b59700f8c902e46ae26e6e31185a19c07959edcb6bfc88c9e6bc124147521f6eb327231e35785951377c40b713a4f6854b02c428bef068f9494aa8fc9f99ddff40ef4fdc9360eb1bc2a25ac491f2bc9c7a23fe5662170feb55b3999b45b8b80a8438df19e183d854691a1f2b34352fed522c4265e4ece52f35d351a1676982ce0f2eb2c454b9df04b976179611f1be4deac0dd4c79a122f3d33e52bcce38808809820094c31af5cca2d79bf783bb87588d8c21bad663bbde2644cab2b605d0ca91b5c2417ab7c7bba5173b0bfddfd1d87ce6d257c0526fc051adaf783cb44e5f09899886b26ca746f8d2b392e0871bca6f1cb40c5ac1bf5ca80b934424deddfb547d8f9a38a25aa39752cac866986bb0faaf07ffeecd27bd736fa1a058ee5b17adbde605eb5f3648b4ee013640d018b42ef6b"], 0x48}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newlink={0x54, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x10, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc}]}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x54}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0x10000000, {0x0, 0x0, 0x0, r4}}, 0x20}}, 0x0) [ 3092.902270] netlink: 'syz-executor.1': attribute type 5 has an invalid length. 04:19:46 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x3f9c, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) 04:19:46 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x7400}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) 04:19:46 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000108064e22000800000010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3093.957206] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 04:19:47 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000189064e22000800000010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) 04:19:47 executing program 5: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="d3"], 0x1) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x2812, r1, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x10900, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r4, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f0000001580)={0x20, r5, 0x11, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r3, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000140)={&(0x7f0000000340)={0x154, r5, 0x8, 0x70bd2c, 0x25dfdbfc, {}, [@TIPC_NLA_MON={0x1c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}]}, @TIPC_NLA_MON={0x2c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x80000001}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x800}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}]}, @TIPC_NLA_NODE={0x48, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xb109}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xea}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x200}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xf9be}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_SOCK={0x94, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_CON={0x4c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0xca0a}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x10000}, @TIPC_NLA_CON_FLAG={0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x1}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x478c}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x60}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x3f}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xffff}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x2}]}, @TIPC_NLA_SOCK_CON={0x3c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7fff}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x80000000}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x1}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x47}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xffffffc1}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x1}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x3}]}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NET={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x81c5}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x8}]}]}, 0x154}, 0x1, 0x0, 0x0, 0x20040040}, 0x40000) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x12, r2, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r6, 0x0) [ 3094.252404] netlink: 'syz-executor.1': attribute type 5 has an invalid length. 04:19:47 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x7a00}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) 04:19:47 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x4054, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) [ 3094.707558] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3095.018424] kauditd_printk_skb: 179 callbacks suppressed [ 3095.018440] audit: type=1400 audit(2000002788.190:82309): avc: denied { map } for pid=19864 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3095.117820] audit: type=1400 audit(2000002788.280:82310): avc: denied { map } for pid=19864 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3095.257511] audit: type=1400 audit(2000002788.280:82311): avc: denied { map } for pid=19864 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3095.356567] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 3095.439509] audit: type=1400 audit(2000002788.300:82312): avc: denied { map } for pid=19864 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:19:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000000)=ANY=[@ANYBLOB="02ede9ee3c0d84dd675bb00c000000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x6, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) [ 3095.634684] audit: type=1400 audit(2000002788.300:82313): avc: denied { map } for pid=19864 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:19:48 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000106084e22000800000010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) 04:19:48 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a9ec8a3a63673a36d66b103e1fdbb4678731c44d5772a8b52f88132613f2ab9faa48e75b0508e2367018dc4479c6757b0a5622107e780a52d43a222d4aa8fa0c3e961e2401d5dbb22107ce4584d22a35c2ff5c7069779f3a8e888a8ac94312cdb43f7907ebfcf3dc4ad1f5e7577c5c2c9146439e6910c437a8213e177dfca08fb12f6c6a8343821e53d1f0ef24575797141dd16b8065042500017c0bab7265ba185fa61404145c500be7e57f2af455765c675c710da30fb915abbfcb8fe5e5a54f998aeb8ecb869537d7ddb529a8d66a4905586c9dd0d81d4841e2c90bd8fa2bf3802bf963edaae01ebd125510bbe75beac077af773d5d2a34b256e8369f68b0fcab87c7ee033997f53b635b59ac5aa1456d0b35e1dd734149dbcf541d744962b2bd0ece4c267760c3a6d4bce9b03000000cfa703a1a48b59700f8c902e46ae26e6e31185a19c07959edcb6bfc88c9e6bc124147521f6eb327231e35785951377c40b713a4f6854b02c428bef068f9494aa8fc9f99ddff40ef4fdc9360eb1bc2a25ac491f2bc9c7a23fe5662170feb55b3999b45b8b80a8438df19e183d854691a1f2b34352fed522c4265e4ece52f35d351a1676982ce0f2eb2c454b9df04b976179611f1be4deac0dd4c79a122f3d33e52bcce38808809820094c31af5cca2d79bf783bb87588d8c21bad663bbde2644cab2b605d0ca91b5c2417ab7c7bba5173b0bfddfd1d87ce6d257c0526fc051adaf783cb44e5f09899886b26ca746f8d2b392e0871bca6f1cb40c5ac1bf5ca80b934424deddfb547d8f9a38a25aa39752cac866986bb0faaf07ffeecd27bd736fa1a058ee5b17adbde605eb5f3648b4ee013640d018b42ef6b"], 0x48}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newlink={0x54, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x10, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc}]}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x54}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0x3f000000, {0x0, 0x0, 0x0, r4}}, 0x20}}, 0x0) [ 3095.791727] audit: type=1400 audit(2000002788.380:82315): avc: denied { map } for pid=19864 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3095.899344] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 04:19:49 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f00000001c0)={0x3, 0x100, 0x5, 0x7fffffff, 0x2, 0xe0}) r3 = socket(0x11, 0x800000003, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000180)) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r3, 0x0, r4) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r3) socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newspdinfo={0x1c, 0x24, 0x1, 0x0, 0x0, 0x0, [@XFRMA_SPD_IPV4_HTHRESH={0x6}]}, 0x1c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r7 = socket(0x11, 0x800000003, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = fcntl$dupfd(r7, 0x406, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) write$FUSE_IOCTL(r9, &(0x7f0000000100)={0x20, 0x0, 0x5, {0xffffffc0, 0x0, 0x1, 0x3}}, 0x20) [ 3095.940595] audit: type=1804 audit(2000002788.370:82314): pid=19870 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir170085012/syzkaller.5a0Xjj/348/bus" dev="sda1" ino=16639 res=1 04:19:49 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff020000000000000000000000000001000d4e22000800000010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) 04:19:49 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x8100}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) [ 3096.167552] audit: type=1400 audit(2000002788.380:82316): avc: denied { map } for pid=19864 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:19:49 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x40ac, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) [ 3096.356153] audit: type=1400 audit(2000002788.400:82318): avc: denied { map } for pid=19869 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3096.478885] audit: audit_backlog=65 > audit_backlog_limit=64 [ 3096.874278] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 04:19:50 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff020000000000000000000000000001800e4e22000800000010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) 04:19:50 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r1) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r0, &(0x7f0000000440)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={&(0x7f0000000900)={0x294, r2, 0x400, 0x70bd2d, 0x5, {}, [@TIPC_NLA_NODE={0x40, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x20}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7ff}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NODE={0x30, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xcb3}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_LINK={0x174, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffe00}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9898}]}, @TIPC_NLA_LINK_PROP={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf9b}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_LINK_PROP={0x54, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2719}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3b7}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x101}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x39}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}]}, @TIPC_NLA_PUBL={0x3c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x80}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xfffffa17}, @TIPC_NLA_PUBL_TYPE={0x8}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x6b93ca55}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0xfffffffd}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x4}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xb28}]}, @TIPC_NLA_MEDIA={0x60, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}]}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x400}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x81}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7ff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x401}]}]}]}, 0x294}, 0x1, 0x0, 0x0, 0x40}, 0x8000) r3 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ocfs2_control\x00', 0x400001, 0x0) r4 = socket(0x11, 0x800000003, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r4, 0x0, r5) vmsplice(r4, &(0x7f0000000880)=[{&(0x7f0000000480)="76d57e5a893e4d96c4efa3dc5fed8fa637544ab8b53e0cd315e24bb5f259d7f13e2e8855d38d1ce58d72c7db1e7910bc7ac9046e0a1ef811e34d2152bd805a495e7386b8583de78ed300c65d628bc78326e798dcba56ae1bb5e5912d3849bf6c9a729f66a3fbfdea", 0x68}, {&(0x7f0000000500)="bd3dc024c613e15904d6f903015d67f3e78411e2c74220787e32dfaf6f51ec492aedfa0e453762284391956d3c25f48aed8fbe92e6f9ba197e58db2a1672c1891dba90af1966a3c8cedf3b99275ec2", 0x4f}, {&(0x7f0000000580)="9baec938d944c8414f6c36bff599478a338e958ea6eb95ab8d125d01b23dbbe397b5dbc0c64fa1b63caa30569806c79783a1f1ae12c2573f64e913d5847633bf708d59afd81eb4cf68875df836cb42c58f6e1c1b921950d04643f28f33f32e4a1140038ef7c694bf8271b88f314cb923e6933b07be7da4b09883fa5476c4fe16100c05a5f3fafe14ca174ea7fcb215bee23a1a16c6c01e1a7df488b453e1147f97babbeb03bb3a05df834ba03de4b1f06dc2337625ec8e5b71cbf6b3b584ed2dd4ccb4e539d7dc6065aaeacb26b67770aa2235382dd24efcf24272459ca41d9ec349628570a1dd11b35cb655ae58", 0xee}, {&(0x7f0000000680)="2f28ec87954e3cdd4973ddbcaa6d77a9ec2eea4a2cbbf6bf4873d6997c340aec5171a990725033f9700ae72fb40c5307a11d7d50f6189fb030a7540e42ee58be74334061831c54057294dbef0bf73719aed1cb8a4d3c8543e215fb0e9251c159d5c9ed5b29dd069120dfbf6da67095a8e31af71ac5af574739bafd0b19c688d4704b95288ff461810f1a34c64353bd13fe7d705acb604d05dbac49476a4b6c6592f63f9de3aa65cb41fe6dc25a83d7f14ab0ef", 0xb3}, {&(0x7f0000000740)="5c6714b978582f40010e3ef20f35bb707811b2982eebf3d70bc75f0062fe7bbf1b785658697a91a2663e90467de9a7e2fb58778e38ec7974f7cbf381a9bfe52b8be48016730cfa06a8", 0x49}, {&(0x7f00000007c0)="491e4c5b33bfce129be6db9000251fc99a8bed39493ac733d12d79e72d9b6f000f444f02b4fac1a5dbc9800145ecb39491220ea52fe368c2f73159a107614cd980a59487ad0ded559cdefcd1aceba46eee59e0dcf87e1ce555650dc687e632147593582d781f6a40d7bf2881ed6f230e", 0x70}, {&(0x7f0000000840)="6a2c73c7dfd458b430a4243d71c0e2b0713c69a43b6c3bc7fd5d3daf3012e4c945300bb2", 0x24}], 0x7, 0x4) getsockname$netrom(r3, &(0x7f00000000c0)={{0x3, @default}, [@null, @rose, @netrom, @netrom, @rose, @netrom, @rose, @netrom]}, &(0x7f0000000140)=0x48) r6 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DV_TIMINGS_CAP(r6, 0xc0905664, &(0x7f00000001c0)={0x0, 0x0, [], @bt={0x7e44, 0x0, 0xb05a, 0x8000, 0x491e65e3, 0x3, 0x18, 0x4}}) [ 3097.231959] netlink: 'syz-executor.1': attribute type 5 has an invalid length. 04:19:50 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newlink={0x54, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x10, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc}]}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x54}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0x40000000, {0x0, 0x0, 0x0, r4}}, 0x20}}, 0x0) 04:19:50 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0xa24c}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) 04:19:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) prctl$PR_GET_SECUREBITS(0x1b) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x3, 0x1, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$KVM_SET_NESTED_STATE(r1, 0x4080aebf, &(0x7f0000001480)={{0x2, 0x0, 0x80, {0x0, 0x4}}, "d08a48f90b63234ce6c7d25a4ad191f2bfdb0503283f14f9e9174dfe713a64ae76729e8ab2591b611c17a53ae4bb6fc0cd5ae2376adfb1677fb90ede43a5024fd5446ba25c3be58032e0888504ecccaa26fa5f6d1ff4bb489b4dfdeefb64e7b7e72b3249e6c3f2f87fcd21f3a3494cff6ad93132b0d24c2c9c89c6d75e95fc227c2cdc59d0a74025644a26beb06905583a575bb4997d1697a0f5ba4f001ef4f80c9d46e9c961add1b1ee77bda50cfb7fd298c8804128e6833dfac6710dc4fc2cb578736d184d462e3beb584cee5a876b04c91900cdafc5ce9f872895d29d51b33a8016ba24cd3811e0f5a140314f579562814ee354c70c01f3c08a6a1039b88bbc58d073d9c9cbc0bf8ecc66e1a9474c10ee6de984efee1474987cdf426e684659fedb6f81cab7283cf9d56ac1b3f3f51ec913bcdc6521d59c5634a7cd3242c6e9a993847a438febbc99654f5fa1b063283f34a48ffab7b6b4c4b9daa2451e720949bdf1d1c2f7a30055796ab81277d5541c432049e51dd4d3909eb14e6b39cd690f1d66ace063c648195e59845f467c08d57cfb8776973a187723f0a5f1936ef76e1b8db84194bcf48463536a845ceb4c35d9d1e1bb4ac3b2879b916ce357aab322304077287c5f85b340f64d72366e5810ef47d5cf6bd12215594c8ab896d605e5cd1c0de0eabfff57d65300762de9c1e7f7fdafdf3c8f97b017b07d45157a6b5db4e43208e949de8fdba656ab22533ca4f296bfd7596457252d9008d169b6e5f3846dc1a7e6219a59597c6226fb1e119e7fd32314d4369e2efcae43b9e9bd24fe6684414e6e16a1291d73f845d51447c2f08b2c0049f514a5f5e3ac9ec981ed70393f08b2469d7d871f03ac3438dd4d0e4de630e6bce1bb4e53eba51dc1ed47f3a6f67964473aeb79cb836cbe2c07284b4688465d47e38056f7a1fe86af1bc07377d8376cf7c91aa0fd27dc729cba6856db3a82748a3009f2735eb8513c43177e7fbf95d4b4ca90d47b3fdbb8e3c283e554e012c45519e94c8b9e8c4a94b29a3569bfee15f5cf1b49d40ab68f11d02d619a679a24778ab5b9a6d771f56f398707d0c05f5cb1ed7e0e6dbcbd78c5e71233def50d188c2644a401e86b53d7d7cbb0110ae406059550af711bea8f3d6d7ffef4521d877686a9c3ee2c19b3da369e2858a4a05c25b52b3f6e2dfe9b4e4b3f72e2bb4b4e5061d62c932eadb0d0916d1835c954f7c00983e00cd68df3ebd96f5b5abd2ef6c6bb35fa666172147b91db287eceb1e80ff8da91b8159f9812e0b75baf835c9b39e3901f2098b5ae8415b0bccfc1ccd549047de5a65643afe9d75af41806d3ee23ab8ed37ba06cfbe4a6042648adfd7a178a85835d2b712f2791605a9fc8a5b2a8885a2e85c9aa14864cd1a14c00c1768b9d3247a50ffed2c69d871630f135864f0d473f397afb49fe083f49ef52a82fe06c0e180d115ccee0bb6f60d9b27caa20647419a0d9a0152378094274561e8a7711da849b4f5aa1c22fe8baf7e6da4fd727aba9fcfbd4806643534d1b0132074675dd8016eea2469d9b1d96260884ddebbc6542f0ec731315b9a9f45614c335982ef1b2d2ead9cf040c365faff5a0ad5c182eb07014a8f6a9d0ccf4c81c64151861148f76c8876e338c305bfca2e3861ead26d63ffcce885636de1edff1d1cab1da0cae9319dd8ac3ccd7a047fcc116cb5daa72c852f50c30d648943421b9198ba132add727d4a4d832b5510c7994b95bd3d9d96f0248321d6f840651192cecec940125b1f188d71baf98172a925e095a0bf42ae9a496aded8611ffef675e2d4f6aad446616ec9804675f1b8471c6335fea5f8177c5639812f83aee206e863174b038f0587b9283d7a65e5e23871a73a3615d66222799ef535c64517ae5fcd01ff3707fb3b28be55193a5eeb4b626aa91fc2f845787e3128024a3ee56856435cb6acbd2ffae6438fa28ed87ea642c4f5bdcd3f39a3d3eb0a7d0bc476a93fca543acc79fcc5ba4e66428cfc046e5a4da9cc22402bb907c61a4d1b589ff9dfe083b49ec95043d981cd496a9c1d92b3f212c8706a0dc41caae1c30e40d699cf4811f4e3eb6495645e0e6a032a35163187fd4c19b990e493b5036b45a3420be61a3b2356492ee0e9b5a12d5ca338aadb466d07cb422be67a00deccb6b68d9f668a70dd7f19a802c537f85487b2906c25581d8dd3e28e4d311d13f088ea7c981ebdebee56ebdade8f58a297253dab7c5212fb9cedfbdb9038f19cfa948ab5ee5fda610d5a8037520f9608cdb739543b06b4cde6632a9f9affc8aed90dd94415ce506179f143c96b356c4cdf0857da0d32f849940846bab9fc387b1046b61dd08eea46136606e43f5df00e08f8ab32e45e3d4ccee56c49ba0dc0a2ab875ebc279eceb4f7a433af15ed71afdc268db91837aeac5a08cdd817751add67d8a00d69d60d7501e39d98bb510ceba529093030a4950994dffaecbf14ceeb1b294fabfb67931e1e950126295b86edc670f57d703447f50d80ca48ebd96f191f1f3aa255c786540dc2b483b9cf263d9c36cb3649a0c3305b749baec76398456cddcb04abfdce1220b8b1550b978ea03f4599b205d3b46b297beddc0f61b13faae79a4f4e3b20dc3bbf491ae41daabc868c1733ebdee58b104ff92a70ccee6e69ddb62fda1ddbbb68cab99c0e54800f24dab6105089045f177218c02f94c68bc08dea6eb2604a435d230dde63d229b2e10628fe8f87c9105bf9c8295dce4335c45e104992b1502c73d6d0a7627862d9ecfa629a1e8247de77ffe9ac2d471573fa1b0bf61f6b8455491728b8be6af4cd6c304746403ecbcb32312d417c966b89e779afb27ffb08dfd61edcb0a6fd8b1168073dae0639015f306eb0ca3dff75d4092f00ff4d50c7fc83d6d10e226da6b873bb3cdd6647ea4ed477d0789054a0f94bdd1d650591c2b82436e931031561f2488702e13633fb1a2bea5995f8b09af9f5d297a598101ed7c1729adec5b512ee8c5e10352a94a828a78ddb3f94f4ec77734d09a69a664fb2fa39f80bffb8b532f62c7e1255323b599f5b5906cd1b7880880f474e3f0e74e2a6034cf75f78476da0fe2966b0c56be73148feae07657f24477bbc174e69e8d66aec212a38e3d710ed0da24b40577f369fae767ba73b274be7b63e88687ef3b1dfcbb944e18993e47c51e5092917a5286d9fc1e2a4f6e61504125e27c52a74ef2149155c9f6c94648292bc8400ad37d7b5325896ce67a02698c6b3653cc4ee08f3640dc6b7afaf51fa86d81926ec0d11f551aef8733d4b0e8123b896a363ccec3262108bd9ad305622551d4e099aab57981f13a845d1f08d2b88330e48d94209af3d1072f17fae616afb4007d9d0152c588bcb86a834de21fdc6f075fca0f8b5fb5c0184fecb2288be3e8353476da6ab3795d8bf7f880e2200c1312a0013445c1240a0549e5bbba7d621b15d21e3799e6e83df5c5900a7e2453b4d67a1e1a1a7968a63e2cbb211f5a06eaf97e623e509166406a1e7275240fe932d8c691c12e801593a74d0373a4c16add68f016cce1b33f88bd8e9b805546266b0a779735b024b6b6e35b4cea9d71b2d00edaf9e4ad0d8f972732ae29268b2a2dc5f4560d9bbae95d9cb1f21318d110b50d1f774a365f8ed103b1dcd23996d067cf774bb4156292e0a6d5377fab74ed869f8c57f3f0f1d5fb38d12352727dfc2079d39127a717664dfbaa5d0e36884693639375a28726860074e727743a7806bea9d6891dca8f33999edf44eed51dd2aa466cdd6efcd2dcbc491d9afb47e65cb9388e50a25cad220c6dbd4e17a46b913a2675dfb3d70466be699053945b18a6dc7497d40bb4b00f962a5116bef3430657067fc4a0a492561b9f8d7a8398542ba054a0e35e6ef331e70065aac5a586d6ca582be9475a2335a50078048b7c24b6dfc059d765f641e80ffdb513115b6529bcd716ce55a8c5b4a09759b33f2f142c7445f478864b5bd0a13ab56f1f38f7664ee2ca6b4a7796a150170f6366d29435f83c940fb368321b23201b4a1b1afeb421fa60f29e3aee5fb00af54398d0ec99cf03f234a6e604832ac42f9b699b9ba8c56183a70ea2fa3df0b9e2246077c2f47de730e25632be67626cefe11c94e3e6885017965b3c1faa2221d2b4f5d7e7595c147da8ac3223f3e579e3f1a05d6c38319ad238061bde9f5c91cadc56ea5deec11fb409004dcad56ded818a3aaa0acda65a129826d13d6cc800ad9ef9ded0b30db7d08e4f0059536e6b8b40a30e7c3d60d5cb7a4d12e750bcdef8e58ce5b199e96b5a5f2e087f2e3aefe534be08df3fcbb1df91704bdf7fddd48ec09136ae19ff37f531e8cf106bf2cc527ad29935ff25f3a733c918b19c3ac0ad2b932f222a3e15748c9aca8d29489e1b8308283c719ee85260f066a8bbd8b2bb9ca062406abe999295a2c3f1a4420c57e0e00982bda8aafcd6e1b4759baa5c7259c2f5c5c96db9b89143c98c58d9a1acf63d328878029c5e7b18b6c08f6a1448c11ab2644bb5009cccabbecfff50f858515f69c46ef9e86c70999d071e2cb79d36631d598db1052bf9df1e822b9a06eed813df30f1525595569126d3ca495414f5c5b3b1c8767de42f63b605d60ba7459c7417b17af979953f8b21dd169c8c068787896b3575ee266dd6fb34f4bd792c108af777ecc05e4a0d36336f3d98ca43798fd7afbbb46385eb45215b75a92eeb4cb3d53c061f7ffb96d57b252c0b7f47d51327c5d654c5d706a2bc49999ca06a72d01905ed8269febce6bdff332ac1a2a6002cde1b32f8c0b857314fb7b88ec5cdf8058bfd41d567e73e6877923b9bbf9710f536f7039d2282223d8417d65fcb9291b95b14ab38250309d96adc6fe90413c8d16780b496ab12e44bd1e4b0865f64db1966864516f23a079a1d7f0a463bf1214b039471ec1c12569d2031e35b5206d1fec61fee34ac3a9cd95b72e57d2a4e50d6d3add88337eb894f8e363738353189a89939188d133f6c826028f7dd5b3b735c710d8f76224171ae15c290807da6e4f4c19cd048262d89b59a9185885682fae8e6380c74684b5b0108dc2b19557d2499a45515c7fbacbc828e237657cde52b83884abdf00d4a962fce949797bfebe48f6425ab1f402419890c05789586f75882b3ef58ddc92dc566eb39220ff561afdf6caacd1189310337b12c8c474e5603a71f8b3436064fb64ed3695f8e16923145f55ceaaad0eb9ad3d9bfd7838b5ec1b3e4992920c4bfcd9602b37b8b6d0c3b0443056907f79b798c06aa966b23ffc61c83251fd7ab95fdf83e608b62261cfba409ac3e6ec3fec7cc39ca8d56b415fc97c733d9a7c6ef032831341392736880d84ed54a36fe50a149dff94b7ffa50e3eef34f39b55abffe3b82b120502fbaa538ca6af6fbe7bbde78cd42792db7e1c33e8172a1fb41064b0be03597746169622bd9398da1cbf9722ecc5231400e1b30d5611ad2f9f65e62c2599acbbcf342fddcfe82c3522f986c73456a219d1e47744fc5da13d18d17204d7eca7fa4a510efcf6f744ea3ea006034a48304668985385e9b210d53fcce535fad5a5b7893012c3fad3e0a30cddccadc7adfe9a76429b9f61c4a22c1b172a8e46d766042f55b78c7a0660328ddab7ccdc92c741e316d391a1f76fd29bf4ecdc844bf385b391b055219c5fa86bfe9fd748b7afb4af93612319b0c4961f1e53b4ce30f2a59e845cf57ac736cfeaacfc86d05a11e18a53b3ae859026cf549e29c732e8f7faae4d56a4a7439662cef61591bbb8df85c415006a9cd3b", "3d58ffaab09dcc3489df895e70a74e35dee0a67ec6b2c2c3b23f35d9b1bcc58d54490065038a677198c3ca0f7aa8e63963e1c3ea517727f7679e6eea8df9e593a1478235d6eb9f43033b36eb95233aff16ccbade0453d527a0f9d6077ce9b6ee45016811cf9c5ae4ad1fddb4b1e809ffb951e28323b2295ebf85b4896a2e187a630b99711276a99248b81e1bc76962e6cafcb5e9e50be6394ede2cb6f843cc55a2116807ec3c6a80e04da6c4ed87875ac2867ef4d10686b23cc224dd4efc01d67638d1deeb0811dc2b7c088d86b7194d8bb9150bbb93b5b8aaf9b3f0d59431bd7865cb21802c8b25e1407deec20a6391c26fa21dc4fba3aaabf1ee6f931011c2ec5a987c46f01f793df510550baa1911d50992ca380651e13020a7bd37176e3e380612db9258252a448a8e0b23e8ba152e9e28f9b08385b85586b71a492f02a5379f63750aa1a6e29c9f68d8e089e0a1721914c4ae03a2800741bda98d9065414a22acf07678b43f89ccd20f951db4af6074ceba4310ab75158380f887abdf67627bab7c4ee0a66b5b9b84374dbc5eb1e7d7510392b095f007977df92f99f77906187a80698ab1f7291d4ea0049c2ecdb6d7b6ec0c52c5efb93fe8c7d1408356ad2233d9504a9a88de7c6f63e87ec9dda153b3b0c8926c3b96219852af47698cf570268b6cfd891130719a1af4fd71dc3a452ef8959e5ef95ffb60f4ebebc9b25e8ab462562034bfaffe0bb36a1ad0fbc061e5127791ea568b6e911d9e6d9bff4c22eca2f491ef97b188cc1a2a35c23d07a60bb4f9aafe61642de4917819319db1a1ccb8795a675a22a0fbf080761f64ff535af16d67e3f7e9456da42ff2981dfa71c4c4617a382b60919f2e51dcc64321f0a073a2393c677fbfa684cb5aaa09f961d9d145aa824439e093fba06de442492566fcf476d70d09c9851130334ffff86a0d27ef31f3982c3e83131c6a980e45c1f77ed33fb152f1ff25ca89bb8a74ce1ee885896736730e96f399b0da3f3da78fa5578b79a8590e9206da9200f92de83ac4c5277125b5f4b53c60bc122d3489ab5a0b975337d7f05c28925ec15314eea34d1a35001e3f4605bf4d7b72468c39dd7f8668dcd27182d4db5aaf6bf046349140d11b896e15d293fc17d4b7ba27b8622da735aa4a99916579a2ae5bf23aa2d2c78ce085d0dfa1e21ba69bdcaaf40d54bf91b41d05134c10108e0092380cbe98cfa0e18de020ecf99a784e49046e278c3bfccbb35c694c074ed645bf1aff4933cc32cbc86381f20dcbca6c866fd9a7215a8a54ca62d7cbf0fadc2ba3131ce1ad9b719d9a5874ad72a2659b10d4c1190c2ebc2b91b1fbd9eae811a381abe330f2b16df7887e3b1fc30ebae73e6aebe99cd92b9635dc4bf78f8e7a458f42a1b8530bf43732e403f592ca5396f0b1e105393e5675bc622d4d72af6bfab38b344c032bc396494b60f53efd2d2f8d8e09eba48f596dfbf0d87e2fcd918dffc9f3ae6cb6cfd00365b0edf238c4d979489199e742096388c404366be6ac5e3e44b097deed9aa5bfbb7a0b2b7f6da020382d7fd1cb5d2b3f7e2fda01d60792648f097ec2b615b1e9dcb41158c47aa9d18ef86ea4aa4731cbe36c8f7d1639e6e9485090142e308eba4b0ef11822780c08fc21a655e7c5ddc929c8aed69e43e39e24217b74dad4e5bc258578c6e07b524b0713703b9e09d8819241ba1a17d258332ece33ddd1903763bd118c791839ed6ac4ccd3d16554a734effdfbc548da149247644cc36e1fd61879162c8a8b2fe82ad18bc71f4fff6a0f3feecd7ba4fa87e6efa94b12612d8769548f6bd085cbd592c1d1f64482ff02479c3c601a0887e8b9015c28d42a18c0a46eff6e71c87d6ccd3c708353c34248785d7343f3cccac4d3a631cc5ead697a893db9ba72cca2be8c72cd5bf1ea85eddc96abd734bede2ef33426d0cdec005e4a7ec5359a4f5279d8f1c8e7fd481ff2835a5e89edb274e69918c28aae75c6d09fe1b6008b94ebf1a01101b2bebc63dad854dd736abbd1d4ff429ff46de1c84bada9cbabc97c3a208e9231763a058ff1ead072958855e10e8b57c6ab40db7f96b8a17f3b5593651c5ca1555b6ed99d4494cc0919db505ef907690e00a003311c0ab5e10bc68fb560846cee86a74dc3ea39ef44062667b7d3fb46b2386290ed9ac383ed616fe13f0b5ca809b67ace8cbf38652e7954e1294d8175f2c4a7b27a888183bb006fd4f0c553a5ebf901ffc04d9df0668efdec0e0cae6ef5c38f48fa742d7c53060d4763ba76b4ab6b0ab42326ddb68a2b69dec6554ac1bed187b480cf393d8cead561ed6bbcfd1fcb602659fb4e22fdf4022bdc5242cc9f349dcc182357334850c1b18ced2f2bb2aacdb7d94e95a41722e637f3293551a8e0a058612396536008f3d75bf10c2cc271c0cb0c07c9dd83cc82d00e9eaf9811f32d50b778ce9fe2ca5a03feb29d84c56a56870d4b792530fc518e794f64ad326a899e675890a2be223b545c66f5290f63e765e1fb46d363b8aa0a725384a6e763607b32800fbe680be6a2ba02db0fb7eed76b686e2d053e0878423a73392bdbe6880a06ef7d4af2a7918dcf93124d49c329fc59ae777f7f804849e9830cb7f1ae6821d6d8c7b31cf01a2cd438dd3a3614138fb20ab41c49cfab08cf49aa2000becc383b8d7a6d225bb035b458171cb7025386b7c86b759da6f25c4aa76d1925f3f678e7fd6a4d906ebd8098a98eb34ff3f7e0159180cb773b1c8b765f9461f710573632638c4e5f8aee88f6809c02ad99ca26463eba422a94c6d1054f2532fd8f5dc02956868e131e1cd54ae790777f0e3b4c423ad32c28cf7dcee998cb5f0f74e01c58ad2c3025bc913d7f1a606660f026ed7940ac6d1528de0c285ba8951d7d45b0b18fa5117f2c34e42b01e6b61c2268f06d1d508154f060c8b1465aa1baf7ca5702210fac40939cdd5e97158f864abf264e9abc8663cdf8ef86d6fd204ee9c75b186363598a450ffdaa6deffb3d98fb2b0b0fc80cba4357d1ffd07e907398a5002a768da17db9b0eb132bf1b3d77a8d59f774f2a9e6763dd98235ce09e05fb4ce0e384c26750c7ae3219e4c581227f3b7c685edd0dc8d5acb8c47188477df3bf255420ed4d284838046ec143fcc02c47b5c10191779c969b4de41425ad4344e4bf57f7c462cfff6b43dc24c44fe5db6b6bc78788383154af8278db330ab1ddb54709a6e1b7dea8109bb19c37d09dc2cba6bee5244520bf48567b56b0846004988100f930d75080039fd34886a06dd4951b87a6d28de02fd4383da99f7a949731f683bbc324caef35e7b4eca1f0c117fd7a27c4640a89221152dc34447f90fe9277ede3c7aa99f2154557c000d84364fa8575e37c711355082512f13d75e9e142eab1acd3017a0e512d4dadf367e4a040d6e577bccaaf5fbeb5e4d56cc9a5f84934874bfe45178040c6c948318cc0a5b0e7c86b8cba7be5664662e553d067b48c9908e3909c1f6ba2f036a814e998a6eeefd095f58a37d8c52c9f10c14fe993a0008d77d3c722afe1d0df55df95d28bb061461f519ec1f5c405baadb7238f4d69eb427c509f24096e2a2b6410223a3fdf0e6f166e5579a76f8684f7abb8d61135f1df83db1ce4094eb0603b818a211278fc7ca51bea13cda0689236785fa639e73a83e098047fad7472a13511906e596b55a3c67e502c97cddf746aed994ec2dd885cfac6cfc3acfa1308e29a53820fd62682b4c51a388ab4aaffe121d8ac9e60038fc70b6f346197b8337e52ff9c78e814cfb9c2121776997582e7c9a2e48a1072f7e03bb5f46d35a8274dddd165a86d32d05fb22b249688be369b5d10294657471e0e04211b6bb00d1562993d602a653d9599af34d19c8b9ff82fbf4e73f8b98648aabdc115468a07dbaa5e38f8bf23274fb8064b3b0038153dbfe3d5912f6c93f61876b2667027ddfa702ee992bac9d23a2f7a2964d0b2229ba3bb8e25f965233f4c5386ada1abde47c8f47bd51dc70703610b77a37f4722c485e8c4df15c1c0f43117ebe98f017c8d56865e2b01a5beb21c28d9691f3fed4de43fd36e13a0650c957e5cf83d237f7bac3b8b6c0a699c7d713ff77f1c036569b976fa581a80d72fb38c15aa3c1a97e386919fbd41b9e7ba5254eb9f08a9d561d2f8f796ce7f7bc082ee8d015d6e4e6224e88abae20448375beac4d815c011dc7bcd7ed008104b26a80a5c1d49dbe08e3773a07513cbdd3a9a7f27862390d2fe52d8832ea31516ea789b194322b9d94dfb8793fec4cf9efdf5755d20d3fc7edd4873f43141e3ba633dfd2ddb8bc7015d7f3cb47b4207350f72c2f297ccb69ab34e50969e2f53c2b5dacb998507c0f8dab08d443504e935c924c68b6f72de3aef1918de1f852e547ee7382e1795501678942bbb408f7717e045cfd9d1ad94cc1a347a05ab94ecf82b12ab4cd2c7395b515e167a134d121f7b7aeaf7f457b3a8771765019c920c3920589e23f0cdcc6390eb43980cc1170d8c3b9dafe34a94acde6bd637c9a48c4dd85256c499038b5b0a83635750f22423324ed30b24cf3cd2a94fce275d986a61330e2bbe61d228c8f466cf4f7ea62ea30febb242d6d1e4dbc1b010104ee5275ba43609b3991debd4415152650c06b7d4d0bc9ab29fdca83cb1079e6c2e0f37c77f39bb69ba567c23bcbb29e99c9e74c41a256921b45449fdacba9f560ad299254313a3ee5e57d9dbfd5c8bb0b0f35ce95c550f9d2610a7b91889ff014cee9b31e076f5ebd1f97ab9e54d52018d32ac6e0c8522733e5faa9dd66c79bceabd236d2066f8365a098b8f3c492e1cc065672717a53c102d94f9d4ff0cec3c738870515bdf01989990260b716b933a2f63990faa2bc041a347e080e979a022adde920b3e9417872ef4c7220354c9f1397f633e5a012bcfe3c8f0c93f4a56c17af16730b8a09bcb48484ea88ed4cb3a31c734e7d272f5aaca753792826b61276a0f8d4e569c016c8ef179d852534fdd61f8cce1adf92198cc32e34da74a58e9337b828867cf499c000e1b0a61a982494e32477f2369fe837f8a6858af7a29f9e1bce9ab6c1481866b9034d825105b0479d6afc3cfc23b2a01ff2ad82ec5efaa53d61a4751f77e42cfefe9e5b4a02dfdc60c8d893755d416cfce6858026931934370fd1fac09a2fe0ef551080d1320e50ef1e232dff3599ff300944ecd8cdfbc3c14381d01d34ec127ee9dc4858c5111315cbe3986226a610b77db15249a49a2cf4db817e6e259e7d7036e69251534f0a224f682510e7df924c3b0e1668d5a758626679e51055e0e871d14422745b47a1e9d00d2ab93a880230bf0b5cfe3e667cc3df0553070a6f66886d8d87dd6036df8710d1989f44bf4b723ae4834388b1971ee46a53404cdbaac478dfdc11aa1a9db679eb4c73aca6e5b4ce0b44a3fc0dfe1b8938a7d4f186055a8435cbf7ec998a0105ff9972e675868407bf688453099e9a12243f9c985c447edc37c29713aebb11baafaf3ecaa0e2f681caaed431c5bfd0dc3fcc2e2cf9e7d4bf225032c52de31c8450745152b675248f30db29c793bb79827354673d1b7e7dcdc919b594d90bf990d8472017064e1dfa7a64e849d9e0fcc9eaeb07c1e3c5a8621b05276abd6e57bbbb49d09658837719134d59ec22fadc58216e95934c7f2a042fd2a849a1adafd5d8f439d257b9370e2134f037227f28eee6cb1ad2c422049077221632e05db553daa80f0b24a3e5917c2522df8b14c9a7c3bbda18b7ae97e45b19cfe39c488e52ca0b66fc4a1739d10cd3827ec1ca"}) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x4000000, &(0x7f0000000240)={&(0x7f00000002c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff0f}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x3, r4}]}}}]}, 0x38}}, 0x0) sendto$packet(0xffffffffffffffff, &(0x7f0000000480)="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", 0x1000, 0x4000011, &(0x7f0000000080)={0x11, 0x6, r4, 0x1, 0x1f, 0x6, @random="3ddc9c1b1bec"}, 0x14) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 04:19:50 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x40ec, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) 04:19:51 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100204e22000800000010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3098.389430] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3098.757242] netlink: 'syz-executor.1': attribute type 5 has an invalid length. 04:19:52 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100284e22000800000010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) 04:19:52 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0xf000}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) 04:19:52 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280), 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCX25GCALLUSERDATA(0xffffffffffffffff, 0x89e4, &(0x7f00000002c0)={0x45, "f624b355432a7b498b433c0451524baa585cbc986c1fb6609036073bcc142937bb1ef77f79ca46d2c199cb6203e786eba5429cd65992b15eb4b9b29760d946dcef7c1376571493b208a43af26a210944719055d900c414797d2e2a104fd98c4390a6b079728f381dfb3550ac0ae12a4e5aef80c23ce7a9da447eb5f5e5513020"}) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0xfff, 0x98900) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) r2 = socket(0x11, 0x800000003, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SG_SET_RESERVED_SIZE(r4, 0x2275, &(0x7f0000000080)=0x996) write$P9_RWALK(r0, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) r5 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)) syz_open_dev$sndseq(0x0, 0x0, 0x0) dup2(r0, r5) [ 3099.830962] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 04:19:53 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100304e22000800000010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3100.027172] kauditd_printk_skb: 186 callbacks suppressed [ 3100.027191] audit: type=1400 audit(2000002793.230:82502): avc: denied { map } for pid=20059 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:19:53 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x40f4, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) [ 3100.075608] netlink: 'syz-executor.1': attribute type 5 has an invalid length. 04:19:53 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a9ec8a3a63673a36d66b103e1fdbb4678731c44d5772a8b52f88132613f2ab9faa48e75b0508e2367018dc4479c6757b0a5622107e780a52d43a222d4aa8fa0c3e961e2401d5dbb22107ce4584d22a35c2ff5c7069779f3a8e888a8ac94312cdb43f7907ebfcf3dc4ad1f5e7577c5c2c9146439e6910c437a8213e177dfca08fb12f6c6a8343821e53d1f0ef24575797141dd16b8065042500017c0bab7265ba185fa61404145c500be7e57f2af455765c675c710da30fb915abbfcb8fe5e5a54f998aeb8ecb869537d7ddb529a8d66a4905586c9dd0d81d4841e2c90bd8fa2bf3802bf963edaae01ebd125510bbe75beac077af773d5d2a34b256e8369f68b0fcab87c7ee033997f53b635b59ac5aa1456d0b35e1dd734149dbcf541d744962b2bd0ece4c267760c3a6d4bce9b03000000cfa703a1a48b59700f8c902e46ae26e6e31185a19c07959edcb6bfc88c9e6bc124147521f6eb327231e35785951377c40b713a4f6854b02c428bef068f9494aa8fc9f99ddff40ef4fdc9360eb1bc2a25ac491f2bc9c7a23fe5662170feb55b3999b45b8b80a8438df19e183d854691a1f2b34352fed522c4265e4ece52f35d351a1676982ce0f2eb2c454b9df04b976179611f1be4deac0dd4c79a122f3d33e52bcce38808809820094c31af5cca2d79bf783bb87588d8c21bad663bbde2644cab2b605d0ca91b5c2417ab7c7bba5173b0bfddfd1d87ce6d257c0526fc051adaf783cb44e5f09899886b26ca746f8d2b392e0871bca6f1cb40c5ac1bf5ca80b934424deddfb547d8f9a38a25aa39752cac866986bb0faaf07ffeecd27bd736fa1a058ee5b17adbde605eb5f3648b4ee013640d018b42ef6b"], 0x48}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newlink={0x54, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x10, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc}]}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x54}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0x43000000, {0x0, 0x0, 0x0, r4}}, 0x20}}, 0x0) 04:19:53 executing program 5: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000040)={0x1, 0x800, 0x80002, 0x0, 0xd, ')9\x00'}) r0 = syz_open_pts(0xffffffffffffffff, 0x1) fcntl$setstatus(r0, 0x4, 0x102800) write(r0, &(0x7f0000000000)="d5", 0xfffffedf) r1 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCGISO7816(r1, 0x80285442, &(0x7f0000000140)) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x5) r2 = socket(0x11, 0x800000003, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKREPORTZONE(r4, 0xc0101282, &(0x7f00000000c0)={0x401, 0x1, 0x0, [{0x7, 0x7fff, 0xf5, 0x3, 0x81, 0x6, 0x7f}]}) dup3(r0, 0xffffffffffffffff, 0x0) [ 3100.249474] audit: type=1400 audit(2000002793.300:82503): avc: denied { map } for pid=20059 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:19:53 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0xfeff}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) [ 3100.422584] audit: type=1400 audit(2000002793.310:82504): avc: denied { map } for pid=20059 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3100.586497] audit: type=1400 audit(2000002793.370:82505): avc: denied { map } for pid=20059 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:19:53 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000180354e22000800000010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3100.774087] audit: type=1400 audit(2000002793.380:82506): avc: denied { map } for pid=20059 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3100.939146] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3100.941225] audit: type=1400 audit(2000002793.380:82507): avc: denied { map } for pid=20052 comm="syz-executor.3" path="/root/syzkaller-testdir775558546/syzkaller.VHaxdF/1841/bus" dev="sda1" ino=16660 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 3101.218955] audit: type=1400 audit(2000002793.930:82508): avc: denied { map } for pid=20068 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3101.346300] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 3101.383393] audit: type=1400 audit(2000002793.930:82509): avc: denied { map } for pid=20068 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3101.521885] audit: type=1400 audit(2000002794.020:82510): avc: denied { map } for pid=20068 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:19:54 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0xff0f}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) 04:19:54 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x40fc, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) 04:19:54 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) connect(r2, &(0x7f0000000000)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes128\x00'}, 0x80) recvmmsg(r2, &(0x7f0000001a40)=[{{&(0x7f00000002c0)=@l2tp6={0xa, 0x0, 0x0, @empty}, 0x80, &(0x7f00000001c0)=[{&(0x7f00000003c0)=""/92, 0x5c}], 0x1, &(0x7f0000000440)=""/185, 0xb9}, 0x100}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000240)=""/23, 0x17}, {&(0x7f0000000500)=""/230, 0xe6}, {&(0x7f0000000600)=""/44, 0x2c}, {&(0x7f0000000640)=""/18, 0x12}, {&(0x7f0000000680)=""/4096, 0x1000}, {&(0x7f0000001680)=""/190, 0xbe}, {&(0x7f0000001740)=""/157, 0x9d}, {&(0x7f0000001800)=""/47, 0x2f}, {&(0x7f0000001840)=""/100, 0x64}, {&(0x7f00000018c0)=""/170, 0xaa}], 0xa}, 0x6}], 0x2, 0x0, 0x0) fcntl$setpipe(r1, 0x407, 0x3ff) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000180)={0x7, 'team_slave_1\x00', {0x80000000}}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x0, 0x300) open(0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x4000000, &(0x7f0000000240)={&(0x7f0000001b40)=ANY=[@ANYBLOB="380000001000050700"/20, @ANYRES32=0x0, @ANYBLOB="0fff0000000000001800128008000100736974000c00028008000300", @ANYRES32=r8, @ANYBLOB="73eb13ba5f7c3f7329345a38a5037a05bbdb8584c2021ce37f06026da6bc1b68d6a2d5ac731dd3ecede901ffe19e4d4a81c0a39d650b1931aee5be1267224e156e9b1b9c497e0d8f"], 0x38}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001ac0)=@newlink={0x64, 0x10, 0xc362e63b3f31ba5f, 0x70bd26, 0x0, {0x0, 0x0, 0x0, r8, 0x102}, [@IFLA_PORT_SELF={0x44, 0x19, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "edafb40c203409ec9c6016d89d734b5d"}, @IFLA_PORT_PROFILE={0x21, 0x2, 'wlan1}vmnet1mime_typeloppp1:\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}]}, 0x64}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') socket$packet(0x11, 0x3, 0x300) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x0, 0x10000000, 0xba, 0x0, 0x0, 0x2, 0x6, 0x2, 0x257}, 0x0) [ 3101.707683] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3101.746044] audit: type=1400 audit(2000002794.020:82511): avc: denied { map } for pid=20068 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:19:55 executing program 3: bind$can_raw(0xffffffffffffffff, 0x0, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) semtimedop(0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r1 = socket(0x11, 0x800000003, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup2(r5, 0xffffffffffffffff) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000080)={0x6, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {0x0}]}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r6, 0xc010641d, &(0x7f0000000140)={r7, &(0x7f0000000100)=""/16}) ioctl$DRM_IOCTL_GET_CTX(r4, 0xc0086423, &(0x7f0000000380)={r7}) ioctl$DRM_IOCTL_SWITCH_CTX(r3, 0x40086424, &(0x7f0000000000)={r7, 0x3}) ftruncate(0xffffffffffffffff, 0x0) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r8 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r8, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 04:19:55 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff020000000000000000000000000001003f4e22000800000010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) 04:19:55 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newlink={0x54, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x10, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc}]}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x54}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0x46030000, {0x0, 0x0, 0x0, r4}}, 0x20}}, 0x0) [ 3102.408959] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 3102.901209] device sit11 entered promiscuous mode 04:19:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0xff7f}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) 04:19:56 executing program 3: syz_open_dev$vcsu(&(0x7f0000000080)='/dev/vcsu#\x00', 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_tcp(0xa, 0x1, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000000)={0x8002, 0x6, 0x4, 0x0, 0xfffff252, {}, {0x1, 0x2, 0xe1, 0x0, 0x1, 0xd2, "e555e03a"}, 0x2, 0x1, @userptr=0x9, 0x43, 0x0, 0xffffffffffffffff}) ioctl$KVM_GET_CLOCK(r7, 0x8030ae7c, &(0x7f0000000100)) sendmsg$nl_route(r3, &(0x7f0000004300)={0x0, 0x0, &(0x7f00000042c0)={&(0x7f0000000080)=@setlink={0x34, 0x13, 0x1, 0x1, 0x0, {0x0, 0x0, 0x0, r6, 0x0, 0x2000}, [@IFLA_IFNAME={0x14, 0x4, 'veth0_to_bridge\x00'}]}, 0x34}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 04:19:56 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000105434e22000800000010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3103.251318] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 04:19:56 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x410c, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) 04:19:57 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x4, 0x10000000}, 0x3c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000200)={0x0, @in6={{0xa, 0x4e22, 0x9, @ipv4={[], [], @remote}}}, 0x1000, 0x9}, &(0x7f0000000040)=0x90) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000002c0)={r2, @in={{0x2, 0x4e22, @empty}}, 0x3ff, 0x5, 0x101, 0x200, 0x4, 0x0, 0x34}, &(0x7f0000000380)=0x9c) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100000, 0x500001c) ioctl$BLKBSZSET(r3, 0x40081271, &(0x7f0000000400)=0x1000) socket$kcm(0x2, 0x1000000000000002, 0x0) connect$caif(r3, &(0x7f0000000140)=@util={0x25, "e3878286997653129f2ca36ba5e60322"}, 0x18) r4 = semget$private(0x0, 0x4, 0x0) semop(r4, &(0x7f0000000080)=[{0x0, 0xfff9}], 0x1) semctl$IPC_RMID(r4, 0x0, 0x0) semctl$SEM_STAT_ANY(r4, 0x0, 0x14, &(0x7f0000000440)=""/229) r5 = socket(0x11, 0x800000003, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$TCSETSF(r7, 0x5404, &(0x7f0000000180)={0x0, 0x6, 0x8001, 0xfffffff8, 0x0, "75bdbe26f6a78fc975e6735c8cf99c6002d031"}) r8 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r8, &(0x7f0000000080)={0x0, 0x3, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022008151e05b80ecdb4cb904044865160b00170002000000740004140e00110002000000dc2976d153b4", 0x235}], 0x1}, 0x0) 04:19:57 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000188474e22000800000010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3104.105620] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 3104.228627] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 04:19:57 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0xfffe}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) 04:19:57 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000188484e22000800000010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) 04:19:58 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100604e22000800000010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3105.034186] kauditd_printk_skb: 143 callbacks suppressed [ 3105.034201] audit: type=1400 audit(2000002798.230:82655): avc: denied { map } for pid=20152 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3105.105718] audit: type=1400 audit(2000002798.300:82656): avc: denied { map } for pid=20152 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3105.138317] netlink: 'syz-executor.3': attribute type 4 has an invalid length. [ 3105.164475] netlink: 'syz-executor.1': attribute type 5 has an invalid length. 04:19:58 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newlink={0x54, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x10, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc}]}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x54}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0x47030000, {0x0, 0x0, 0x0, r4}}, 0x20}}, 0x0) 04:19:58 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x4114, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) [ 3105.198862] audit: type=1400 audit(2000002798.300:82657): avc: denied { map } for pid=20152 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:19:58 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000880)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) read(r0, 0x0, 0x0) [ 3105.335039] audit: type=1400 audit(2000002798.330:82658): avc: denied { map } for pid=20152 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:19:58 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0xffff}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) [ 3105.445183] audit: type=1400 audit(2000002798.340:82659): avc: denied { map } for pid=20152 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:19:58 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000002c000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) write$P9_RSYMLINK(0xffffffffffffffff, &(0x7f0000000240)={0x14}, 0x14) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) r4 = syz_open_dev$media(0x0, 0x0, 0x0) r5 = accept4(r4, &(0x7f00000000c0)=@isdn, &(0x7f0000000000)=0x80, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000140)=@assoc_value={0x0}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r5, 0x84, 0x17, &(0x7f00000001c0)={r6, 0x9}, 0x8) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000480)={r6, 0x8001}, &(0x7f00000004c0)=0x8) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x731340, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x200000200, 0x0, 0x4c8]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000280)={0xc, 0x8001}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$KVM_IRQ_LINE_STATUS(0xffffffffffffffff, 0xc008ae67, &(0x7f0000000340)={0x0, 0xcfeb}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)={0x50, 0x0, 0x0, 0x70bd2c, 0x25dfdbfb, {}, [@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x50}, 0x1, 0x0, 0x0, 0x10}, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 3105.550006] audit: type=1400 audit(2000002798.480:82660): avc: denied { create } for pid=20133 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 04:19:58 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e48000029000505d25a80648c63940d0224fc60100000000a000000053582c137153e370207018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f00000000c0)) [ 3105.679189] audit: type=1400 audit(2000002798.870:82661): avc: denied { map } for pid=20158 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:19:59 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000188644e22000800000010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3105.889176] audit: type=1400 audit(2000002798.910:82662): avc: denied { map } for pid=20158 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3106.074360] audit: type=1400 audit(2000002798.910:82663): avc: denied { map } for pid=20158 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3106.222313] audit: type=1400 audit(2000002798.910:82664): avc: denied { map } for pid=20158 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:20:00 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff0200000000000000000000000000010e804e22000800000010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) 04:20:00 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_script(r2, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0) fallocate(r1, 0x0, 0x40000, 0x4) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r1}) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) r3 = socket(0x11, 0x800000003, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r3, 0x0, r4) lseek(r3, 0x5, 0x2) 04:20:01 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000135804e22000800000010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3107.959268] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3108.151374] netlink: 'syz-executor.1': attribute type 5 has an invalid length. 04:20:01 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) 04:20:01 executing program 3: r0 = perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) r2 = socket$caif_stream(0x25, 0x1, 0x0) r3 = socket(0x11, 0x800000003, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r3, 0x0, r4) r5 = socket(0x11, 0x800000003, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f00000000c0)={0xffffff7f, 0xb, 0x4, 0x200000, 0x9, {}, {0x5, 0xa58018c8e1236c02, 0x4, 0x8, 0x3, 0x7, "11833a35"}, 0x0, 0x1, @offset=0xd685, 0x0, 0x0, 0xffffffffffffffff}) r9 = socket(0x11, 0x800000003, 0x0) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r9, 0x0, r10) r11 = socket(0x11, 0x800000003, 0x0) r12 = socket$inet6_tcp(0xa, 0x1, 0x0) r13 = fcntl$dupfd(r11, 0x0, r12) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) r14 = openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/create\x00', 0x2, 0x0) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000300)={0x8, 0x6, 0x8, 0x0, 0x0, [{{r3}, 0x1f}, {{r7}, 0x30}, {{r8}, 0x9}, {{r9}, 0x8}, {{r13}, 0x8b}, {{r0}, 0x8}, {{r14}, 0xc30e}, {{}, 0x7}]}) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000180)={0x0, 0x9}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r15 = getpid() sched_setscheduler(r15, 0x0, &(0x7f00000002c0)) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r1, 0x84, 0x15, &(0x7f0000000200)={0x0, 0xfff, 0xfff}, 0x8) r16 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r16) ptrace$setopts(0x4206, r16, 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000000)={0x2, 0x1, 0xffffffffffffff19, 0x800, r16}) [ 3108.454079] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3109.689749] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 3110.110294] kauditd_printk_skb: 89 callbacks suppressed [ 3110.110308] audit: type=1400 audit(2000002803.310:82754): avc: denied { map } for pid=20413 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3110.290746] audit: type=1400 audit(2000002803.400:82755): avc: denied { map } for pid=20413 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3110.377893] audit: type=1400 audit(2000002803.400:82756): avc: denied { map } for pid=20413 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:20:03 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newlink={0x54, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x10, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc}]}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x54}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0x60000000, {0x0, 0x0, 0x0, r4}}, 0x20}}, 0x0) 04:20:03 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x411c, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) 04:20:03 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100814e22000800000010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) 04:20:03 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x2}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) [ 3110.467827] audit: type=1400 audit(2000002803.400:82757): avc: denied { map } for pid=20413 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3110.616434] audit: type=1400 audit(2000002803.450:82758): avc: denied { map } for pid=20413 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3110.708967] audit: type=1400 audit(2000002803.470:82759): avc: denied { map } for pid=20413 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:20:04 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000147884e22000800000010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3110.838059] audit: type=1400 audit(2000002803.470:82760): avc: denied { map } for pid=20413 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3110.984159] audit: type=1400 audit(2000002803.550:82761): avc: denied { map } for pid=20413 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3111.083587] audit: type=1400 audit(2000002803.550:82762): avc: denied { map } for pid=20413 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3111.205131] audit: type=1400 audit(2000002803.570:82763): avc: denied { map } for pid=20413 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3113.321595] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 3113.341763] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3113.420008] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3113.827769] IPVS: ftp: loaded support on port[0] = 21 [ 3114.562469] chnl_net:caif_netlink_parms(): no params data found [ 3114.925108] IPVS: stopping master sync thread 10390 ... [ 3114.931437] IPVS: stopping backup sync thread 17295 ... [ 3114.956238] device bridge_slave_1 left promiscuous mode [ 3114.961786] bridge0: port 2(bridge_slave_1) entered disabled state [ 3115.006739] device bridge_slave_0 left promiscuous mode [ 3115.012530] bridge0: port 1(bridge_slave_0) entered disabled state [ 3115.062718] device veth1_macvtap left promiscuous mode [ 3115.068569] device veth0_macvtap left promiscuous mode [ 3115.074887] device veth1_vlan left promiscuous mode [ 3115.080035] device veth0_vlan left promiscuous mode [ 3120.406554] bond1 (unregistering): Released all slaves [ 3120.611125] device hsr_slave_1 left promiscuous mode [ 3120.659743] device hsr_slave_0 left promiscuous mode [ 3120.732835] team0 (unregistering): Port device team_slave_1 removed [ 3120.749494] team0 (unregistering): Port device team_slave_0 removed [ 3120.765866] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 3120.859131] bond0 (unregistering): Released all slaves [ 3120.922167] kauditd_printk_skb: 93 callbacks suppressed [ 3120.922184] audit: type=1400 audit(2000002814.120:82857): avc: denied { map } for pid=20551 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3120.962657] audit: type=1400 audit(2000002814.130:82858): avc: denied { map } for pid=20551 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3120.994393] audit: type=1400 audit(2000002814.130:82859): avc: denied { map } for pid=20551 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3121.022183] audit: type=1400 audit(2000002814.130:82860): avc: denied { map } for pid=20551 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3121.049889] bridge0: port 1(bridge_slave_0) entered blocking state [ 3121.050176] audit: type=1400 audit(2000002814.140:82861): avc: denied { map } for pid=20551 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3121.057325] bridge0: port 1(bridge_slave_0) entered disabled state [ 3121.088580] audit: type=1400 audit(2000002814.150:82862): avc: denied { map } for pid=20551 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3121.097026] device bridge_slave_0 entered promiscuous mode [ 3121.118070] audit: type=1400 audit(2000002814.150:82863): avc: denied { map } for pid=20551 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3121.136895] bridge0: port 2(bridge_slave_1) entered blocking state [ 3121.155128] audit: type=1400 audit(2000002814.160:82864): avc: denied { map } for pid=20551 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3121.158811] bridge0: port 2(bridge_slave_1) entered disabled state [ 3121.183610] audit: type=1400 audit(2000002814.160:82865): avc: denied { map } for pid=20551 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3121.197427] device bridge_slave_1 entered promiscuous mode [ 3121.245312] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 3121.264260] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 3121.295850] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 3121.306326] team0: Port device team_slave_0 added [ 3121.318505] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 3121.329087] team0: Port device team_slave_1 added [ 3121.416722] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 3121.423183] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 3121.450873] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 3121.471644] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 3121.478701] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 3121.506372] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 3121.525533] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 3121.541303] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 3121.659531] device hsr_slave_0 entered promiscuous mode [ 3121.706121] device hsr_slave_1 entered promiscuous mode [ 3121.780254] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 3121.810278] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 3121.872991] audit: type=1400 audit(2000002815.070:82866): avc: denied { map } for pid=20552 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3122.287612] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 3122.479635] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3122.503231] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 3122.527731] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 3122.535744] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3122.549351] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3122.575017] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 3122.581139] 8021q: adding VLAN 0 to HW filter on device team0 [ 3122.610763] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 3122.620235] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3122.635260] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3122.646129] bridge0: port 1(bridge_slave_0) entered blocking state [ 3122.652685] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3122.662355] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3122.679937] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 3122.689400] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3122.703539] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3122.711879] bridge0: port 2(bridge_slave_1) entered blocking state [ 3122.718580] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3122.752040] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 3122.761223] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3122.802007] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 3122.812869] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3122.836171] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 3122.845534] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3122.855824] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3122.879264] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3122.891331] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 3122.900316] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3122.916926] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3122.943005] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 3122.951493] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3122.968087] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3122.990665] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 3123.000041] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3123.014408] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3123.032170] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 3123.040721] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3123.086513] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 3123.104836] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 3123.112105] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3123.122661] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3123.158731] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3123.209176] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 3123.234804] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 3123.242865] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3123.257508] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3123.638224] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 3123.650161] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 3123.659505] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 3123.686344] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 3123.693906] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3123.702520] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3123.713900] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3123.721782] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3123.742292] device veth0_vlan entered promiscuous mode [ 3123.778851] device veth1_vlan entered promiscuous mode [ 3123.785529] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 3123.810462] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 3123.857627] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 3123.881887] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 3123.891591] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 3123.902296] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 3123.912935] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 3123.922368] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 3123.945870] device veth0_macvtap entered promiscuous mode [ 3123.952250] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 3123.976635] device veth1_macvtap entered promiscuous mode [ 3123.982891] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 3123.991201] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 3124.005844] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 3124.028451] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 3124.052206] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 3124.078060] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 3124.088473] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3124.098592] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 3124.109313] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3124.119733] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 3124.130505] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3124.140875] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 3124.151514] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3124.164714] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 3124.172454] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 3124.181648] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 3124.192006] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 3124.216313] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3124.227562] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3124.237468] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3124.247641] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3124.257529] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3124.268060] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3124.278615] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3124.289425] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3124.301798] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 3124.310273] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 3124.319788] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 3124.333983] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 3125.327901] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 3125.341342] netlink: 16646 bytes leftover after parsing attributes in process `syz-executor.5'. [ 3125.382501] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 3125.392754] netlink: 16646 bytes leftover after parsing attributes in process `syz-executor.5'. 04:20:18 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000148884e22000800000010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) 04:20:18 executing program 3: r0 = socket$inet(0x2, 0x6, 0x6) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000500)=0x5, 0x4) sendto$inet(r0, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = dup2(r0, r1) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xffeb) init_module(&(0x7f00000000c0)='posix_acl_access}^@:\x00', 0x15, &(0x7f0000000140)='syz_tun\x00') 04:20:18 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) 04:20:18 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x4124, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) 04:20:18 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a9ec8a3a63673a36d66b103e1fdbb4678731c44d5772a8b52f88132613f2ab9faa48e75b0508e2367018dc4479c6757b0a5622107e780a52d43a222d4aa8fa0c3e961e2401d5dbb22107ce4584d22a35c2ff5c7069779f3a8e888a8ac94312cdb43f7907ebfcf3dc4ad1f5e7577c5c2c9146439e6910c437a8213e177dfca08fb12f6c6a8343821e53d1f0ef24575797141dd16b8065042500017c0bab7265ba185fa61404145c500be7e57f2af455765c675c710da30fb915abbfcb8fe5e5a54f998aeb8ecb869537d7ddb529a8d66a4905586c9dd0d81d4841e2c90bd8fa2bf3802bf963edaae01ebd125510bbe75beac077af773d5d2a34b256e8369f68b0fcab87c7ee033997f53b635b59ac5aa1456d0b35e1dd734149dbcf541d744962b2bd0ece4c267760c3a6d4bce9b03000000cfa703a1a48b59700f8c902e46ae26e6e31185a19c07959edcb6bfc88c9e6bc124147521f6eb327231e35785951377c40b713a4f6854b02c428bef068f9494aa8fc9f99ddff40ef4fdc9360eb1bc2a25ac491f2bc9c7a23fe5662170feb55b3999b45b8b80a8438df19e183d854691a1f2b34352fed522c4265e4ece52f35d351a1676982ce0f2eb2c454b9df04b976179611f1be4deac0dd4c79a122f3d33e52bcce38808809820094c31af5cca2d79bf783bb87588d8c21bad663bbde2644cab2b605d0ca91b5c2417ab7c7bba5173b0bfddfd1d87ce6d257c0526fc051adaf783cb44e5f09899886b26ca746f8d2b392e0871bca6f1cb40c5ac1bf5ca80b934424deddfb547d8f9a38a25aa39752cac866986bb0faaf07ffeecd27bd736fa1a058ee5b17adbde605eb5f3648b4ee013640d018b42ef6b"], 0x48}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newlink={0x54, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x10, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc}]}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x54}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0x65580000, {0x0, 0x0, 0x0, r4}}, 0x20}}, 0x0) [ 3125.599218] netlink: 'syz-executor.1': attribute type 5 has an invalid length. 04:20:18 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) r3 = socket(0x11, 0x800000003, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r3, 0x0, r4) r5 = socket(0x11, 0x800000003, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = gettid() r9 = socket(0x400000011, 0x100004000000002, 0x0) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(r10, 0x0, 0x0) r11 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r11) ptrace$setopts(0x4206, r11, 0x0, 0x0) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) r13 = socket(0x11, 0x800000003, 0x0) r14 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r13, 0x0, r14) r15 = socket(0x11, 0x800000003, 0x0) r16 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r15, 0x0, r16) r17 = socket(0x11, 0x800000003, 0x0) r18 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r17, 0x0, r18) r19 = socket(0x11, 0x800000003, 0x0) r20 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r19, 0x0, r20) r21 = socket(0x11, 0x800000003, 0x0) r22 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r21, 0x0, r22) sendmsg$netlink(r2, &(0x7f0000000480)={&(0x7f0000000100)=@kern={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000380)=[{&(0x7f0000000140)={0x2c, 0x1c, 0x2, 0x70bd28, 0x25dfdbfd, "", [@typed={0x8, 0x30, 0x0, 0x0, @fd=r3}, @typed={0x5, 0x2, 0x0, 0x0, @str='\x00'}, @typed={0xc, 0x32, 0x0, 0x0, @u64=0x7f}]}, 0x2c}, {&(0x7f00000001c0)={0x18, 0x23, 0x100, 0x70bd27, 0x25dfdbfb, "", [@typed={0x8, 0x49, 0x0, 0x0, @fd=r7}]}, 0x18}, {&(0x7f0000000580)={0x32cc, 0x38, 0x400, 0x70bd2c, 0x25dfdbfb, "", [@generic="fe6c779c012b76f5302539904e0bce05dbbcbcf84a55a0b4424d3ab9591532f9ee37cbe5b3eb138be714e2ad1086bb155d680af3ed64b822cf7067e896f67d7d838b16774fee72c6e084f909f5ba08bfd24f48c205aa525818199326682a4b042ebeb31e509cca22d1497131addc65fd093902dd6e832a15db6e351128bb713004a4e90713e76733d3a9b36141abf9a485abe6ea481660d94c15116d6b7708b5023716df45d3139c5a5912cc90985df6f2b93f95e33fffd02852e3a7ffbdbfc1dd9188a3aa1b255c8cc2fda994d5b167038b50361ef7e9c1cc", @typed={0x8, 0x38, 0x0, 0x0, @u32=0x7}, @generic="54b505d1b2654995b0de", @generic="e1987195d0e8170512dc7039673fc19ba9189e963e2d4ce9f32b684205e0d024823d342a79ba839fc2dacb1f5fd50f6756823bfdad358a97e90bb02c57ce8c3925", @typed={0xc, 0x75, 0x0, 0x0, @u64=0x8}, @nested={0x30fc, 0x92, 0x0, 0x1, [@typed={0x4, 0x9}, @typed={0x8, 0x7c, 0x0, 0x0, @pid=r8}, @generic="0407be52ca4d0ab5e8cd952b8c4960f47f43f9f34b9d225199f0c82f5e518d06b701c2079701f35b7d07155a418d180bcf8ad32cb5c53ee83e8ed9eb31d35d5d076e38edf5bbe0ed1ab9de6b34d9f310a9eb459ae2bf380f317329e64c5b72d3ee263b6aa9de222776ec388bff6c028987546724291c719160b80d736b9c53b66f6265ad059c7eea29160733ff36c932237b4fb61083a70cbcfaead96dd8b92e42724e5dd0c1ea3f219878720c780d4403867d68782be62b74be97add40d3717535b2cef7f8fa72245a17ceea38df8c586daba8d3f62a70101a8cb5ef09d1427ecf7f7a48ed35a50", @generic="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", @generic="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", @typed={0x4, 0x73}, @generic="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"]}, @generic="c86525553d1a6461ad6db8432a2126048066de58880c86a052373e08da3ddf97aeea9f310c24d353f99b24a87c29a0efc8a62276940fc5046b07ea75b5f676cb9b30d2960cf00af434473e5883af5dad277abf86246a4411e100edad4483457f62dd8d8a5a034a32b9f5c41d47da90edada05f90e330b01b7fe6c8df4b109a3b76267b6e9966"]}, 0x32cc}, {&(0x7f0000003880)={0x1148, 0x1f, 0x200, 0x70bd28, 0x25dfdbfb, "", [@nested={0x80, 0x5f, 0x0, 0x1, [@typed={0x8, 0x74, 0x0, 0x0, @u32=0x9}, @generic="ed730c33cdb8889a70429400bce41b4d0af663c16c84a16465e339be0592b919075a07e0de0928ab636dd5cfb54cd494d8de0a2f9b5873eda782acc4d40dbb2a99fb51add0105767fbd661eb79b97c42384e75bcd60e0dfc4982b16c4b55f8c4ef277e61e2d358f1c599f160746b913b9068095b"]}, @typed={0x8, 0x64, 0x0, 0x0, @uid=r10}, @nested={0x1004, 0x6, 0x0, 0x1, [@generic="63daf05ec43979ac556e974ac27aa3670a3c731196d30b13c4db202834c4903494fb2c36aaed22220280cf9250c11830d5c31b772962e076f05fafe019ae02bf275c14b0728b858742ec97daaa3fb2119a112d30b49822d70d86b9ac1f8556d2b6fb2f964a624e51cd308266f99ebe3ae43787759327ebcf8c947159a2c0fc920719244c083e26848f2f988e68b646656b8eeaafcd96c1c1a968523ba9a87766522f6a0c80b9bc074b18dff4cad70ce99ab7f3227008cc8d79da569c7d273fda51ab8f27f248258f3a75db17dcec9adf695d371669aa299de1aafcf12214ed8b1c4d37062e0fa976f7c744a846857c4ffcca65fa37a359572ede05110b88a48c3a145eea5560b238dd474bf4c476ef73214198c2817f9e9c19eb66602e97beb039921fa403f58feea0a69fd03999ffaf1bef1bccd764129625385686bab97f0c4c7af5965564dd92cfa176280b5c4064cd34e8d63fb483b54ab4072eb5dfdac7768cca92a56e454cac875ce90f6efca0cf4946046f9da372d40d7e487a4f6ce3f958e975dfcaf307eff1dc8d751fe0d351d434b503c681cc4b99a13781aff365a73e29f64614d8100d0a8895c7c4f67513b4856a019dceaebef324697897eba8a35af29df0f24faf44821275f6adc936e438a7eceabe036bd0168f3942c3fc693641fbdaf390285b5d98538343cffc08833573ab87c2fe41081b599ea8ae3a9caa005306381f46525b18211829863da1c51e458fcbca902f295a4181ed39a965ca9a888ae62d4786e9fa6eea4b67238f88e708b7cb0d87d82b42491d4cc735138b9f6549622abd85bc078535dea1b2b0d6349af90ef2fed95a9dd05ed4f321a33fbe93ad10b961d824e2ffcaa95946e503e99d6066b1810a28ccaf90aea0a2909cfc7ff1f291bfa6f3a49fcf0a937f41a614cf12d8bf40e4679fd1f63b77de07306685a741884dc3b9e3744b7734c18e77d46fdd8f68ebe596c7b6a81a1d96ad70434bd0cc50ee9cde405a1d0737d1d0e02bcf85c5dcc1db44b6dcb535f240d14f0985af2a1042929b68a5f8f0892868f721f1c871b452d1c4afd4fc2cbb364f37ed41f36543c9495ae80f2475b597d4549d23c40e05adbf2db1b59e3f69618e4c554638d7f159caa405711d6d881812c302b1f1340fca2830e6ec90ff38f23fdcc0ed36c775847e9f70eb8fa3c91732ddf09a9decbc82ec63c11891bd832eedc5341ef059c12adc21a59295d5c36643e5d780152cae567bc48b422e6168097f78238da156f59f22b1c89ce92aad50be7fb7c957550428e5de492b5a88899fccbc9cab2576b6521085dec8dd527bdcac3c183dc55bc43e9878c1112a2a52fb381a4267154bd4b5976cf3b0c61616be66f7b748bb6e6fc2c3a95d89d46d741bcb28caa0ae50b9e3b1cc204351d515c692a684bf8876acdd8e2c3ca026a8e4efd0a7201737dd49c560dc4c449bc023304a04bd57439133f2883c7e5187bc615e3a2e463b14b65eb4f2424027ab4c099f46c7f34130f7db5c29e1343fb4e16af14f54bfdca4825d6b28c1836a3060fc417574506b74f9c5b68c99f90e943ddd65c13231f7d3bd330edd0584da4117fb24f40b0ac4eabaeaf1543663277fcf7f2931de6d6167427334407532768d9585f7926680da59afddcecb65fae6e8b060c1db5de5012b82138ae4ed647f09fc3b3975005695ba17758facad563c9cd0741f1b6ad0c64d7fbd9d637a778bbb837138ff21b7a3cdc6cddede631c845f67b9a75a6277a83a4d2e16b568492d9367ecb5c1dff8dc796e919e4a519e167ec9b41df6f82c2b0011c46f9671a087185b6a7267a416fea69fc82e5b2792f45fb856d1a18d4f8e249380d0d1c8979c59bf8e313e66fdcc00f07839f9a81ef55c9e8cdbef4f4ca36c41396ef892862d303e0ad3e87045884d59d42e2fd7957f96ec974b7863b644d1b8c20f1174a81e8449d4b1b95f56f506d86af23c8fba231aab7989714951439bdb14b4955aa8819508e891ed338f5f96770d9c652662c376c687c4d45354b7a1ce335b6e3b508989b1c8929eccf882eee704ffeda605f63d8d2a28feaa1f46ef7b4151b15240ec126036b805f3ebe5f2fcd53861eebda6ed238df0b022af59f9c365ef90a60005ae0db77727122bcefd3f7514f5ff93a3b61c07b9725e8b1d532fc1a12329197b69faa560590f35f187c5505ce85883cab26a57a28da90c2b4a7b54609a4fd8590b7677bcc858d50afc9456447a2e526b09cdda59590807ac1db9d429061aeb6fca72641e81730ed51a181ec89a3433add6142dda7a09877c65961e340b7c1c3040ba1ce14f36bbfad604aa4a4c8fc630dae5a70fe0009a6aac648d5d347cb66670244abf50658a823a77383e96ca995d6200f937e5ad1033e1f3e2355ee99093237207fd3924bfc8b06785c0f5674ae4c7671789c5d0c3cc3f21f6e2047281470e38b21e34096e0900d96c96871479c0bb918a679673545228663115ae93654a3b721b1f5731fd0808d79130548a8ce9b60ece93d50d13575110c95a01597f9d9ff2567db9c8f34535c8bf6d4f7a65b64bdd1ac1ca2ad583714463b4d760e33f4e23a356c4444cdaf2175a33c4b6d337c0c41ed11f3f0010572aaa0cadc35ce6d3f6839c3951e5801bae571f7ba5306a387e8f5b17ad9f0fe7de88b53a3bbc4c084187947f91072e1b2ec57a5c9e717ce9968bbd6e9fc4df8d56d57b13e32b20ef6817e675decd9a5b249d860553721305fcff3a0e9d08f7c373e530d01cf8c99b6cd3e2a72a365e8db622120df369277fbbbe8060f0689081737796359d85ce2e9c19d1e81bc5c9a4aa133272bf959bf287c12368864c0ae5148e02f02f950fc8a323789b25d2ebc93503973c1057db10c237ef72ace89ed63b33006ca514169b7ea16d5fcd8f013f5610b600064fbc2bca1b5527d80ee3c1771970c08f67781782951fb4b60fc780467dc5a39406d163db145379749d469d5707ead9c4bc8144783b45e34b0efd4fcd3e9f0b40671202dbaff5fac46f39b0dc507b4894209a64dedfe96a4d9f27d5383b710dbe066eb65fe3143e8bbd51a9708f5fc934f77cf36053531544a9c173e49b4faa664f35eecac270ef7c8aea542f4da4a0f1c33c866a1b81ae1d73220fe23c7f6504c9cedec9464eeb2fa79cf5abea2d8e2a24a9e29c9c0eb61cea3f952bbec325fbce60b4d5abf9d28386712d320748ae292605bf3d461288f20886811e5224cd898cf70fc1db0926ab59b3deac6b6180cda47b4e18bf7114327499065cfb2868b68adb7db208663d2299cf2236381529814d5df4dde94f5e96e20fbc2d0da1853a4f2209a1ea2c930908382eb25c2b5908df41447efb6b85767ca51e2f885c7465ad7290120b1053f7a25f0e19273ff88bde0704595869beee0aa4016f4aa0f6ae4b6c777fa0aa143fd1106c38ec12d1f1fd549259b6a8598b65af6903a353169c6bb84111327293155501ec1df04812064c232b7166fcc2d5fda699ac4ec949d15bfbbb16c5322e4d2d5a01989876ba2150d210665ec6dff35ec2cbba2547cb00a70d406d590bad7bfc78956aa7d1a7511cbec8cbbc21d89f1ee196cbb80d9c203c2c02bf7755b091eaccfa674f2341c5532863e2a482345c09e66a00be7954e9f523360c9820627dc2f60d7df231c6ed85b8779784f18103ec3e7a3668abd4bf1d40e4b60051d5aba1c8244a30fdd11a4917c62c1a855265f4d26d3149993cb0e3f0047c6e6e176e1453e1522ff501887b49f1317f6bdee2f9e1b51ed02846484709d120ae7f41ccd1cb1b1be00a2f5d2662ef0d9f546024075157e9fd8fa7d8c3612fa6ad2f1cf7d2030771ed7c18d21eaf307d5615bda113a5ce2abdfc897a194efedb6760c0320ead82e928965e6a6bc0da9bff2f7fce7503923c0aa535c0900732f47a9c519d4507335a1aef7bc37d9a6e93c16f50573c6f5c31b95138f6860a888b3cab9e628a7210e36f59fe5f5dc2961d40257323b4faaf37e6b4280a9432f1aa3190b2dbf8ff92552e4da37992d7bfd21a4e3d4cbc5721cb41172c954e3a8e2291567408751a70817f17d4fbc4dd7d2bc98944de3223e6776efd875e1258d9a1364031ab19d27ed892c966e02b3108c4ee82a08c071bafdd7b97ac8c64f9fbf998bd8d78b21c17ee33f9aa94a63ce6bb6f0d1624dc8df929bd66457f803004d939325e685c3503b3155697871907df2a1232a5999df0338fcd62e2c645aec23c8ea90d600122bef66ab68768811ea85744254fcbd6101dcd891e44a9d6e33f7a45146f51dee13b7e4fdb9733152261e89cd327b74caf0bd7ae308be67bbeaba0065485a558288d4d7acc57841ab17bee87ff809b09231f5fadb92a5a5b19d85c506e73a07db59247aea1d679dda4984f701083119dc3b9b89cf94d4a86d24519dec8ca39c452c1c89de869485317064a4469f692e90be5298f1c381127c79cf581791a2eab2c8a369bb0c3db86763b7d246a9c3b9183d33d52e7b25c04613ea0e450ff62821498a20e41853144db917fea19c17ab62c53809908b8c7d48af3e70c45b8b7ec00d829268e818e97465d1e5f8b97523bc9674d4d51077b771d844d982aa0baed7e426385cfeb5e0f36e042a76c8c0642b6408e1eb1fecf72533e56d786f22096f22cfed7b97b6b0bc5f1dfcfa53876a236cb390ef7b35a9444c80f17b8cbf9bb5320f954c603aa96ac3c02b6c4f6984a27534b49044771d3198de34f48318e498b0d47f50b23961a35b5d88bd03de8a410f29dece36266800f9813ecc2adc918d11ed3a717bdcae4f56606882e1f06a821837b1ad5dfef52dba243f5e2cc8005faef55828d7b96d4bee5dc1af49dcf285a6471ebc3ba580e78216c0dd745953a24d8018af5604433c43459ef229cbbb9a4e0daba3bd7d36cd2fe22d55e22369427aed2986d047da451b6bd705124ebdad2774727aeed94e770e8935e9037b125b9a2fa16b33232ad7fe272d038b6a8d59c5cbdfa315b4f570b2f78ff35e43f225aa57488c945a50c580eae64edaaceae8f1be9641d38fb9b109f2b112d0e94aca6e9e090a57ecd62746eda41bc5268eaeee3ed5b368d495959e8caacc324f7bb091ebe01d16cc88f7b70d1089e13089f665897653ab4f97a5ab0faecfb211ccadf8f427884167788e2f735e7137afa7824a8cc0433fe388990956c5a0ed4782f366efe477259f9a1ceca2942767ed5a424599c0eade7d6b0ad1a354b8e951b85bba11212c13c98fca6c8927d91e8e259f4dc74fbd840e71778de1221b95b610d7a6d7dc223842aeb721c428cccf10b427a503deed07f2b44404637378b7fcf17650912f7eb8a740a22ee0cfdfacbc934f9f7f4e1c80f3693eb20c7c2cf9a39bd6e3e6aff80629f2be98a1a92c0af9b6c75db3e7c40901930ff401bf31ca596ce87b94278e5abd042f82efeb6a980495e13f336319721f6ebe6c20704e2773fe62c5168bc47949c7f399b903739c967aefb983c6f00a0df1ccdd14757fbbfaafbcb653051e1a5c0bf6b397fa02571c45295199d392cdeaabc50f10feeb20d354e981dfc9308dd95e4c5924b3050a71fa08281b8028ee32c132eb11a727404c761b26c4fa73143020c6586a6068876392b77588ef57527bda795bab4542b5b01b477c8838cb8a225dc7d7e664140c0038291f58752a212d7068db51225584cf60631cfd3cb6a6653e92a1d612bd45aa82a7bd6f4d5b24398ec2c8ffce4429006ed0dfb81ea420d43fbc8440fe95f8a53de9d48f8a5d654cf72290b6078b4f7"]}, @generic="80be356be6bdb06c18077f6945cee0f1657a92402a8b8c8eee5aa603010e0aea63c9ce76cd58923fbb8a4ddc42ea4c991897eca7afb29bc51c78ecc153702005b4a5ac372a7b353401c96e3917b4c94d8add41d05f964aadafb91e6b3c75aa43b8f9401f2b2b32cc401af72331867932215136eecd8f3e0f55486228be4183896f5772a783ffbab9867da42eb949d28a5c2bbd5cbd6073a128a44019bbb9d1120becb09f9fcaa1c7cf26d325"]}, 0x1148}, {&(0x7f0000000200)={0x1c, 0x40, 0x400, 0x70bd28, 0x25dfdbfd, "", [@typed={0x8, 0x82, 0x0, 0x0, @pid=r11}, @typed={0x4, 0x64}]}, 0x1c}, {&(0x7f0000004a00)={0x1bc, 0x1b, 0x200, 0x70bd25, 0x25dfdbff, "", [@generic="de9f214ce943d186ecaf93d42e004d64fa876e7e8bfd67e86b5a05883f2efba55a52148b84d58a036d0617f24624c1773464d91abf23c6c3bed9784c853cb0f2cfb0792d48418c233d5f135b0c6cb91457bdb6ecc626acc18b15c4790e58f0517fbd3c25a4f4af49dd6f2b6f6a4dbee95c1d004ac0f97a7c5b7c80b3623b2e3c357be5cae66ed78e86e381bdd8c57f2b247798b13d592b806622bdf3317be874e5d33c288f65444f3ba70eb70d7f3ee8adf70b158d266af6ea80fbd728f3868e3f07747968610ba3ba2fc79de8b3396b5dc119b568c3aa17e01967dcb0b882d70ddb5722664e02e4082d3f808936fd932ab436", @generic="580d734746fbd44048c8b9001daf97f9c0a3ffabe5bcb420c67790c2fc126ac2f2b30482ae722a569bfa715334e196c606912410b65d5f9b37", @generic="46f3ece0c64dd2a29c512c07d45c9571c001be4b37fdf607a238431649a3c604c57437110806f03c7b321366c6487eae444b6f331e13935af60494171b38be351f95947e4d06c3a45dd94e1e7723d5d59d8f84e12e53ea3a0ad2a9c47dde0107a65926dcc02e", @nested={0x14, 0x79, 0x0, 0x1, [@typed={0x8, 0x19, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @typed={0x8, 0x3d, 0x0, 0x0, @uid=r12}]}, @typed={0x4, 0x44}]}, 0x1bc}], 0x6, &(0x7f0000000400)=[@rights={{0x28, 0x1, 0x1, [r0, r1, r13, 0xffffffffffffffff, r15, r0]}}, @rights={{0x24, 0x1, 0x1, [r18, r0, r20, r21, r0]}}], 0x50, 0x400}, 0x8000) r23 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) ioctl$FS_IOC_RESVSP(r23, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0x100000000, 0xffffffff}) r25 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r25, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r26) io_submit(r24, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r23, &(0x7f0000000000), 0x10000}]) 04:20:18 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000164884e22000800000010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3125.747323] device gretap0 entered promiscuous mode [ 3125.800421] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 04:20:19 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) [ 3125.944693] kauditd_printk_skb: 203 callbacks suppressed [ 3125.944711] audit: type=1400 audit(2000002819.150:83070): avc: denied { map } for pid=20588 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3126.152901] audit: type=1400 audit(2000002819.230:83071): avc: denied { map } for pid=20595 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:20:19 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000106894e22000800000010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3126.297036] audit: type=1400 audit(2000002819.250:83072): avc: denied { map } for pid=20595 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3126.470449] audit: type=1400 audit(2000002819.280:83073): avc: denied { map } for pid=20595 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3126.628517] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3126.649146] audit: type=1400 audit(2000002819.300:83074): avc: denied { map } for pid=20595 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:20:19 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x4138, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) [ 3126.794415] audit: type=1400 audit(2000002819.300:83075): avc: denied { map } for pid=20598 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3126.874379] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 3126.949960] audit: type=1400 audit(2000002819.330:83076): avc: denied { map } for pid=20595 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:20:20 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$cgroup_ro(r2, &(0x7f00000002c0)='cpuacct.usage_user\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) r5 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r5) ptrace$setopts(0x4206, r5, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4352, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x80000000, 0xa}, r5, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1, &(0x7f0000000200)=0x9, 0x4) r6 = gettid() sched_setscheduler(r6, 0x3, &(0x7f0000000180)=0xa272) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r3, &(0x7f0000000140)=ANY=[@ANYBLOB="15dfccf38dddb1865ca8b30b43980b968e92"], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f00000001c0)={0x0, r5}) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = socket(0x11, 0x800000003, 0x0) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r9, 0x0, r10) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r9, 0x84, 0x10, &(0x7f0000000240)=@assoc_value={0x0, 0x7fffffff}, &(0x7f0000000280)=0x8) write$cgroup_type(r4, &(0x7f0000000000)='threaded\x00', 0x248800) 04:20:20 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newlink={0x54, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x10, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc}]}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x54}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0x66000000, {0x0, 0x0, 0x0, r4}}, 0x20}}, 0x0) 04:20:20 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) [ 3127.154338] audit: type=1400 audit(2000002819.350:83077): avc: denied { map } for pid=20598 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:20:20 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100f04e22000800000010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3127.344159] audit: type=1400 audit(2000002819.360:83078): avc: denied { map } for pid=20595 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3127.462323] audit: type=1400 audit(2000002819.370:83079): avc: denied { map } for pid=20595 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3127.894363] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 04:20:21 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100024e22000800000010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) 04:20:21 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x11, 0x800000003, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000340), &(0x7f0000000380)=0x4) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r2, 0xc0505510, &(0x7f0000000200)={0x8, 0x7, 0x7, 0x2, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}, {}]}) syz_read_part_table(0x0, 0x2, &(0x7f0000001440)=[{&(0x7f00000004c0)="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", 0x1ea, 0x16}, {&(0x7f0000000000)="455282", 0x3}]) r6 = socket(0x11, 0x800000003, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$TIOCGSERIAL(r6, 0x541e, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=""/26}) r8 = fcntl$dupfd(r6, 0x0, r7) r9 = socket(0x11, 0x800000003, 0x0) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) r11 = fcntl$dupfd(r9, 0x0, r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) getsockopt$IP_VS_SO_GET_VERSION(r11, 0x0, 0x480, &(0x7f00000003c0), &(0x7f0000000400)=0x40) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r8) [ 3128.238080] netlink: 'syz-executor.1': attribute type 5 has an invalid length. 04:20:21 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-aesni\x00'}, 0x58) r1 = socket(0x11, 0x800000003, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r3, 0x40bc5311, &(0x7f0000000300)={0x1ff, 0x1, 'client1\x00', 0xffffffff80000006, "e92651738ec9053d", "2875639f224be70cc73d6e8dc4429a578983ef097f7cff2efd7ebb631d41d319", 0x8, 0x10000}) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000600)="0000002b9647664af438fd573e0bc50ee47e282800d4704bb27762b66b1674bee56e87e8d07b80820d5759530958aac6480e6a4ba3f0f9dd25504198f66783917aea3b1bb765780dfdc633baf5b5e815c98543c2bf967d5a952cf219331739c0cd29b2dcca471834c1665502fbdec1a2b737b03bab18d6a06819eeb053791877710ec1df4744f5c78d02ce54e0cddf5c4baf232a741592a0f38b73d0db34c91a5d572eadece3aaf34c3c12c28f8282c1756e5c26077da56ae72147ac389981ff7f178e0c3dbb2c9f4499200913358915d8605ba6f337e7b0", 0xfffffdeb) r4 = accept$alg(r0, 0x0, 0x0) r5 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r5) ptrace$setopts(0x4206, r5, 0x0, 0x0) ptrace$poke(0x5, r5, &(0x7f00000003c0), 0x0) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x440000, 0x0) r7 = socket(0x11, 0x800000003, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r7, 0x0, r8) r9 = syz_genetlink_get_family_id$gtp(&(0x7f0000000440)='gtp\x00') sendmsg$GTP_CMD_NEWPDP(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="01c00000", @ANYRES16=r9, @ANYBLOB="000825bd7000fbdbdf25000000000800080002000000060006000300000008000700", @ANYRES32, @ANYBLOB="08000500e00000010c0003000100000000000000"], 0x40}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) r10 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f00000000c0)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_VERSION(r6, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000200)={&(0x7f0000000100)={0x5c, r10, 0x100, 0x70bd26, 0x25dfdbfc, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x2}, @NLBL_MGMT_A_DOMAIN={0x12, 0x1, 'ecb(blowfish)\x00'}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @remote}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x3}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, 'GPL\x00'}, @NLBL_MGMT_A_CLPDOI={0x8}]}, 0x5c}, 0x1, 0x0, 0x0, 0x8810}, 0x60054097) write$P9_ROPEN(r3, &(0x7f0000000280)={0x18, 0x71, 0x2, {{0xc}, 0xff}}, 0x18) sendmsg$alg(r4, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="180000000022000017010000027b9f000000000000000000a3d0b3f03bdb61547dfb3c4279b93188a67bff6d2334691f4a02e333b1d6395f7ab8d641144b13fea3733612b4c6fd7fe2bfb73db32eb6356ade3a643aca8820b9ebe72bb521dae820caaffeaef881e01702e9fea8e7bb1c514bb2625388b5d5661aeacb658c4b7e6a685e4d5808c523119a44bf8dff74f082d4d110c118333eb3e33befd6212cd099dfe71d4405"], 0x18}, 0x0) 04:20:21 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x6}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) 04:20:21 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x4140, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) [ 3128.797057] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 04:20:22 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100034e22000800000010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3129.138247] Dev loop3: unable to read RDB block 1 04:20:22 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newlink={0x54, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x10, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc}]}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x54}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0x71707fe4, {0x0, 0x0, 0x0, r4}}, 0x20}}, 0x0) [ 3129.204136] loop3: unable to read partition table [ 3129.252340] loop3: partition table beyond EOD, truncated [ 3129.328389] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 3129.354775] netlink: 'syz-executor.1': attribute type 5 has an invalid length. 04:20:22 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x7}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) 04:20:23 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x4144, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) [ 3129.999509] Dev loop3: unable to read RDB block 1 [ 3130.074216] loop3: unable to read partition table [ 3130.114305] loop3: partition table beyond EOD, truncated [ 3130.164813] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 04:20:23 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100054e22000800000010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) 04:20:23 executing program 3: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$inet(0x10, 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="6c0100002400070500005904d33a061c48a199fecd00"/31, @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200001e0000000000008000080000f9ff0000fb0310290000000c0003"], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = dup(r5) r7 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x7, 0x10000) splice(r7, &(0x7f0000000100)=0x6, r1, &(0x7f0000000140)=0xfff, 0x80, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x4ffdf, 0x0) 04:20:23 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x80e0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$9p_xen(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x10000, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={r0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000540)={{{@in=@multicast1, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f00000001c0)=0xe8) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r2, r3, 0x0) dup2(r5, r4) ioctl$sock_rose_SIOCDELRT(r5, 0x890c, &(0x7f0000000000)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x3f, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bpq0='bpq0\x00', 0x4, [@null, @default, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}) r6 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) open(0x0, 0x0, 0x0) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r8 = ioctl$KVM_CREATE_VM(r7, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r8, 0xae60) r9 = ioctl$KVM_CREATE_VCPU(r8, 0xae41, 0x0) ioctl$KVM_RUN(r9, 0xae80, 0x0) r10 = dup3(r7, r8, 0x0) dup2(r10, r9) r11 = open(&(0x7f0000000000)='./file0\x00', 0x82040, 0x0) fcntl$setlease(r11, 0x400, 0x0) r12 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r13 = ioctl$KVM_CREATE_VM(r12, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_CREATE_VCPU(r13, 0xae41, 0x0) dup3(r12, r13, 0x0) r14 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r14, 0x29, 0x22, &(0x7f0000000540)={{{@in=@multicast1, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000640)=0xe8) r15 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r16 = ioctl$KVM_CREATE_VM(r15, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r16, 0xae60) r17 = ioctl$KVM_CREATE_VCPU(r16, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r17, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe7d) ioctl$KVM_SET_LAPIC(r17, 0x4400ae8f, &(0x7f0000000400)={"6cdd4237dd245c8404721efdc9c8dc1964125fa96fa42b761c6ec25b2bec0ba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377abaece6b88378e38e06c5fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b53606000000000000007c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df1001000000000694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde317fad4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d4bf6b21224b57f530d0000c1ff53bf79a1f5c5dc34b22645cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f580968af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28a774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a80047fe17dee6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb010100000000000001a047526865c888c9ff36056cc4ad258021e1581d43badaaec6cc5a2ef989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d819164300"}) ioctl$KVM_SET_MP_STATE(r17, 0x4004ae99, &(0x7f0000000180)) renameat(r6, &(0x7f00000003c0)='.//ile0\x00', r6, &(0x7f00000007c0)='./file0/f.le.\x00') [ 3130.411727] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3130.769177] netlink: 'syz-executor.1': attribute type 5 has an invalid length. 04:20:24 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x9}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) 04:20:24 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100084e22000800000010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3131.048021] kauditd_printk_skb: 230 callbacks suppressed [ 3131.048037] audit: type=1400 audit(2000002824.250:83310): avc: denied { map } for pid=20698 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3131.168944] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 04:20:24 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x4148, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) [ 3131.245627] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=20707 comm=syz-executor.3 [ 3131.346686] audit: type=1400 audit(2000002824.290:83311): avc: denied { map } for pid=20698 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3131.440781] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=20707 comm=syz-executor.3 [ 3131.497458] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=20707 comm=syz-executor.3 [ 3131.551224] audit: type=1400 audit(2000002824.330:83312): avc: denied { map } for pid=20698 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3131.667163] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=20707 comm=syz-executor.3 [ 3131.738949] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=20707 comm=syz-executor.3 [ 3131.881675] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=20707 comm=syz-executor.3 [ 3131.924090] audit: type=1400 audit(2000002824.330:83313): avc: denied { map } for pid=20698 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:20:25 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newlink={0x54, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x10, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc}]}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x54}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0x81000000, {0x0, 0x0, 0x0, r4}}, 0x20}}, 0x0) [ 3132.036340] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=20707 comm=syz-executor.3 [ 3132.087431] netlink: 'syz-executor.1': attribute type 5 has an invalid length. 04:20:25 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff020000000000000000000000000001000d4e22000800000010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3132.137532] audit: type=1400 audit(2000002824.420:83314): avc: denied { map } for pid=20704 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3132.221649] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=20707 comm=syz-executor.3 [ 3132.339145] audit: type=1400 audit(2000002824.420:83315): avc: denied { map } for pid=20704 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:20:25 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) [ 3132.436692] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=20705 comm=syz-executor.3 [ 3132.474702] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=20707 comm=syz-executor.3 [ 3132.583972] audit: type=1400 audit(2000002824.440:83316): avc: denied { map } for pid=20698 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3132.583999] audit: type=1400 audit(2000002824.470:83317): avc: denied { map } for pid=20698 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3132.584031] audit: type=1400 audit(2000002824.510:83318): avc: denied { map } for pid=20698 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3132.584056] audit: type=1400 audit(2000002824.530:83319): avc: denied { map } for pid=20704 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:20:26 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ttyprintk\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) dup2(r3, r2) 04:20:26 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x414c, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) [ 3133.097549] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 04:20:26 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100284e22000800000010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) 04:20:26 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x7302}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x11, 0x800000003, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', r3, &(0x7f0000000080)='./file0\x00', 0x8) close(r0) [ 3133.798542] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 3133.928554] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 04:20:27 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xc}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) 04:20:27 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100304e22000800000010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) 04:20:27 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newlink={0x54, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x10, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc}]}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x54}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0x88a8ffff, {0x0, 0x0, 0x0, r4}}, 0x20}}, 0x0) 04:20:27 executing program 3: socketpair(0x28, 0x3, 0x9, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$packet_int(r0, 0x107, 0x14, &(0x7f00000000c0), &(0x7f0000000100)=0x4) syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="6d6f81653d3030307279c33030303030140c0631591c3a1630303030dea0b071115bb215ed3e08134ef422d484a20d02260ad2550733833f53d11c4d821959f5af191c5367f289c6ee71e73a995d682b44621c53d093b976a1b02f35aa2651809d859e7058707ddd98a8c911f15e9a0ece0c32db9c5ac5231f9ca184e81edd59d539fef82ceead44c621f6e12f9bfd8f289965ef02b6e4d9635ffdb20bc958035390ed975d96075c8fdd0cbb3893159d36250acc54a6f85736d32c2aa276c82386184d"]) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/vmstat\x00', 0x0, 0x0) sendmsg$NFT_MSG_GETOBJ(r1, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x13, 0xa, 0x5, 0x0, 0x0, {0xc}}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x0) 04:20:28 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x4150, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) 04:20:28 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="5400000010000507feffffffffdbdf2500000000", @ANYRES32=0x0, @ANYBLOB="0308000000000000240012000b00010067656e657665000014000200850008000100000005000d0002000000050027003200000008000a00", @ANYRES32, @ANYRES64], 0x5}, 0x1, 0x0, 0x0, 0x2000c014}, 0x880) [ 3135.126972] netlink: 'syz-executor.1': attribute type 5 has an invalid length. 04:20:28 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100604e22000800000010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3135.319332] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 04:20:28 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xe}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) [ 3135.515610] tmpfs: Bad mount option moe [ 3135.658460] tmpfs: Bad mount option moe 04:20:29 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) io_setup(0x7fffffff, &(0x7f00000007c0)=0x0) r5 = socket(0x11, 0x800000003, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r5, 0x0, r6) r7 = dup3(0xffffffffffffffff, r6, 0x80000) r8 = socket(0x11, 0x800000003, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) r10 = fcntl$dupfd(r8, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) r11 = socket(0x11, 0x800000003, 0x0) r12 = socket$inet6_tcp(0xa, 0x1, 0x0) r13 = fcntl$dupfd(r11, 0x0, r12) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) io_submit(r4, 0x2, &(0x7f0000000a40)=[&(0x7f0000000880)={0x0, 0x0, 0x0, 0x8, 0x9, r7, &(0x7f0000000800)="348cc8863d9ff39fb3fb05d324271a057fe2786be65e16ff0daeb737d3767ac4a225992be4025c2de814464c3cc21d92e186709e88f86b8c9f3003a2743ba4cb122c0f84a4f174cb37d73ab113f5fa2662742a2fead18e91ff0f8d57", 0x5c, 0x8000, 0x0, 0x2, r10}, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x3, 0x8, r2, &(0x7f0000000900)="9719a902e263953a2e388cf2a207f6d9560769bace6de2c52236ca87386385eb638cc1471556d5024928f47ac70eac7e52bfa092f1c4489b4e5e9d4817d440744d5d6efee9044e2b7f7e553b600db63cc3a47a2c9a3f29162730bb28ddac5c27a4ddd3510a6a3d202f998d6f823c6b921874e61ab985cc6aab04b800c92533584659418b40b77f9326864cbce2c97ae38453a252079dc448e4a621631bce5af13579f9c3b2287cc571ba9c038586f652ec82b8a7063ec23329ca8febfc21a4ee8ff28eb9ff477b8cde412ee4bb5cb0975e641cf9", 0xd4, 0x7fffffff, 0x0, 0x1, r13}]) ioctl$KVM_RUN(r3, 0xae80, 0x0) creat(0x0, 0xbc9dc8fbd81cb4b1) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in=@loopback, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@remote}}, &(0x7f00000006c0)=0xe8) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x3, &(0x7f0000000540)=[{&(0x7f00000001c0)="b5316f688ded7a4883b67417d061314ec4e113f4ea6f130d3beb4e58461e88e6ed0c08c699dc4179555452de4ed03b6a984bc3d555efe4ce201bf3c11ba716fb0d4ca813932ef2314f8ec6614acb52eb0f81bc3aac4c2d22c30ceab3d01ac5b5924624b46da6b6111e6e9d5cd5baf05c14c0898af5829175bb010e574c5fa12aefe3410992dff6450bdc862a11190b6f2a45b0cb69066f5552474a07481cf085860e9e3fab1012fc6e53a2928345331236e20a9791", 0xb5, 0x9}, {&(0x7f00000002c0)="04de38055d0b6f97f4853d59b6c84581cadc2fb84c918136099e1f94a434842cd9b1fe4933c925a7105330a1e734a822fb709a08306069b66f74e1326a9fa533d02e2667892b06f6a12474c1434988dba2d14b634e15a462455ee9dfbb4d8d968a5508259877a46c5546f15be42085df750dfab4bb1c03476ef0a0f4c7fac1c5099d9efb91ae26f4e63eb083ae9bd009a74dce535557e77b06ee30183f316338db0e991415935f5dea1e5d89d4d8fa29bce368b9", 0xb4, 0x3}, {&(0x7f0000000440)="c0e47375d1df150ec1786243a3e4ea31aa910f6800e1124e1311297d9e71bd2458615fad1ae388bbbb9f60f0d61ce9a4f5f4c29fba8426b5984f9700fcd9badf1e2f4aeffc57a665d0b4baca2974ea8486abcbd53b6149a45afb3f3b0b9484aed6bea5cbfc6623559591aff07fe914687897f7c571c4364706a6c2a6326348e6453f1d59b2ef4f16936067339bcb359dc6482a217e5ffad19d30adb11e440448d8d68e0b8578f01f5e8225d57b7f76b10381e8abb377bfed8385c965b224483735289671e6b0eae55649", 0xca, 0x5}], 0x1000040, &(0x7f0000000700)={[{@attr2='attr2'}, {@filestreams='filestreams'}, {@norecovery='norecovery'}, {@largeio='largeio'}, {@swidth={'swidth', 0x3d, 0x1ff}}, {@nolargeio='nolargeio'}, {@qnoenforce='qnoenforce'}, {@barrier='barrier'}, {@norecovery='norecovery'}, {@filestreams='filestreams'}], [{@euid_lt={'euid<', r14}}]}) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) [ 3136.084300] kauditd_printk_skb: 160 callbacks suppressed [ 3136.084319] audit: type=1400 audit(2000002829.290:83480): avc: denied { map } for pid=20789 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3136.147927] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3136.296900] audit: type=1400 audit(2000002829.290:83481): avc: denied { map } for pid=20789 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:20:29 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22020800000010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3136.484244] audit: type=1400 audit(2000002829.290:83482): avc: denied { map } for pid=20794 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:20:29 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x4154, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) [ 3136.621418] netlink: 'syz-executor.1': attribute type 5 has an invalid length. 04:20:29 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newlink={0x54, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x10, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc}]}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x54}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0x9effffff, {0x0, 0x0, 0x0, r4}}, 0x20}}, 0x0) 04:20:29 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000001b40)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}, {{&(0x7f0000000140)=@vsock, 0x80, &(0x7f0000001380)=[{&(0x7f00000001c0)=""/85, 0x55}, {&(0x7f0000000240)=""/127, 0x7f}, {&(0x7f00000002c0)=""/64, 0x40}, {&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001c80)=""/48, 0x30}], 0x5, &(0x7f0000001400)=""/197, 0xc5}, 0x3}, {{&(0x7f0000001500)=@l2tp={0x2, 0x0, @remote}, 0x80, &(0x7f0000001740)=[{&(0x7f0000001580)=""/120, 0x78}, {&(0x7f0000001600)=""/72, 0x48}, {&(0x7f0000001680)=""/166, 0xa6}], 0x3, &(0x7f0000001780)=""/12, 0xc}, 0xce8d}, {{&(0x7f00000017c0)=@generic, 0x80, &(0x7f0000001ac0)=[{&(0x7f0000001840)=""/115, 0x73}, {&(0x7f00000018c0)=""/153, 0x99}, {&(0x7f0000001980)=""/254, 0xfe}, {&(0x7f0000001c40)=""/29, 0x1d}], 0x4, &(0x7f0000001b00)=""/5, 0x5}, 0x7}], 0x4, 0x0, 0x0) r0 = socket(0xa, 0x40000000002, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000080)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/anycast6\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ubi_ctrl\x00', 0x5c0, 0x0) setsockopt$bt_BT_FLUSHABLE(r4, 0x112, 0x8, &(0x7f0000000100)=0x8, 0x4) preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) [ 3136.714737] audit: type=1400 audit(2000002829.290:83483): avc: denied { map } for pid=20794 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3136.886458] audit: type=1400 audit(2000002829.540:83484): avc: denied { map } for pid=20803 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:20:30 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x10}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) [ 3137.118912] audit: type=1400 audit(2000002829.540:83485): avc: denied { map } for pid=20803 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3137.428314] audit: type=1400 audit(2000002829.560:83486): avc: denied { map } for pid=20803 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:20:30 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22030800000010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3137.691445] audit: type=1400 audit(2000002829.570:83487): avc: denied { map } for pid=20805 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3137.882214] audit: type=1400 audit(2000002829.580:83488): avc: denied { map } for pid=20803 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3137.908311] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3138.058917] audit: type=1400 audit(2000002829.580:83489): avc: denied { map } for pid=20805 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3138.681471] netlink: 'syz-executor.1': attribute type 5 has an invalid length. 04:20:32 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22050800000010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) 04:20:32 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x15}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) [ 3138.966667] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 04:20:32 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x4158, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) 04:20:32 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0xffffffffffffff7c, &(0x7f00000bfff0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="b800000019000180e40206005b000000ff010000000000000000000000000001e00000010000000080000000000a0001000000002e", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000fbbccf810000000000000000fd85d16e79bad40ac3794899000000000000000000000000000040d94bfeadbfce0d4ed6f71b242b42000000020000040000000000000000e1e8154f707c51bf00000000000000680200000000000000000000e6010000000100000000002000de9fdc624b5fe772e4f5fcde0b1b3c310cbf9e8fa5d6000000000000"], 0xb8}}, 0x0) r1 = socket(0x11, 0x800000003, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$DRM_IOCTL_MODE_GETPROPERTY(r3, 0xc04064aa, &(0x7f00000001c0)={&(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[{}, {}, {}, {}, {}], 0x7, 0x0, [], 0x5, 0x5}) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) sendmmsg(r4, &(0x7f000000ac80), 0x66, 0x2) 04:20:32 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@enum={0x0, 0x0, 0x0, 0x2, 0x2}, @volatile]}}, &(0x7f0000004600)=""/196, 0x32, 0xc4, 0x8}, 0x20) r0 = socket(0x11, 0x800000003, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r1) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000010c0)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@typedef={0x5, 0x0, 0x0, 0x8, 0x2}]}, {0x0, [0x0]}}, &(0x7f00000000c0)=""/4096, 0x27, 0x1000}, 0x20) r3 = socket(0x11, 0x800000003, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) creat(&(0x7f0000001200)='./file0\x00', 0x16) r6 = socket(0x11, 0x800000003, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r6, 0x0, r7) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r7, 0x6, 0x14, &(0x7f0000001240), 0x4) ppoll(&(0x7f0000001100)=[{r0, 0x2006}, {r2, 0x4000}], 0x2, &(0x7f0000001140)={0x77359400}, &(0x7f0000001180)={[0x2]}, 0x8) 04:20:32 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newlink={0x54, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x10, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc}]}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x54}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0xbe000000, {0x0, 0x0, 0x0, r4}}, 0x20}}, 0x0) 04:20:33 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22080800000010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3139.885451] netlink: 'syz-executor.1': attribute type 5 has an invalid length. 04:20:33 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x48}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) [ 3140.396371] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 04:20:33 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x11, 0x800000003, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r2, 0x0, r3) ioctl$sock_inet_SIOCSIFPFLAGS(r3, 0x8934, &(0x7f0000000000)={'vcan0\x00', 0x200}) r4 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0x8, 0x0, 0x0) 04:20:33 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e220d0800000010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) 04:20:34 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x415c, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) 04:20:34 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x38}}}, 0x1c) r1 = getpgid(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgsnd(r2, &(0x7f0000000a00)=ANY=[@ANYRESHEX], 0x1, 0x0) msgrcv(r2, 0x0, 0x0, 0x0, 0x1800) newfstatat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) r4 = socket(0x11, 0x800000003, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f0000000180)={{{@in=@dev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000000080)=0xe8) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) msgctl$IPC_SET(r2, 0x1, &(0x7f0000000440)={{0x3, r3, 0xee00, r7, r8, 0x0, 0x48dc}, 0x0, 0x0, 0x4, 0x1be262e7, 0x19, 0x6, 0x6, 0x4, 0x2, 0x9, 0xffffffffffffffff, r1}) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000300)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0xffffff8d, 0x0, 0xb3550aa4ba87825e}, 0x9c) socket$tipc(0x1e, 0x5, 0x0) [ 3141.239003] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 3141.301849] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 04:20:34 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22280800000010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) 04:20:34 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4c}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) [ 3141.512473] kauditd_printk_skb: 150 callbacks suppressed [ 3141.512489] audit: type=1400 audit(2000002834.710:83640): avc: denied { map } for pid=20901 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3141.642520] audit: type=1400 audit(2000002834.780:83641): avc: denied { map } for pid=20901 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:20:34 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newlink={0x54, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x10, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc}]}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x54}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0xe47f7071, {0x0, 0x0, 0x0, r4}}, 0x20}}, 0x0) [ 3141.805114] audit: type=1400 audit(2000002834.800:83642): avc: denied { map } for pid=20901 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3142.024243] audit: type=1400 audit(2000002834.810:83643): avc: denied { map } for pid=20901 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:20:35 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x4160, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) 04:20:35 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) write$tun(0xffffffffffffffff, &(0x7f0000000000)={@val={0x0, 0x800}, @void, @x25={0x0, 0x6, 0xf7, "1d4e2b4dba66f6359eb1b7480f8ac3e76eb73125f795286f8be898b163a25dd1aefd0ac36ad4303d24ce9bec3b0dc892230ca7eca8eb13092f4f255ce6a9be49bcf04c8f31f71431555be19327d4dee038a5d13c5d9dcf8d3069c7"}}, 0x62) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="0300000000008000000060727e50008c2f0054326d5498a42373620e6eb5d9a5785aff02000000000000000000000000006e5f04a53db7d71c2f2c2db04202d2b1f8d251d1b9312a820b00000000000000000000ffffac1414bbfe8000000000000000000000000000000420880b0000000000000800000086dd080088be00000000100000000100000000000000080022eb00000000200000000200000000000000000000000800655800000000"], 0xbe) [ 3142.264079] audit: type=1400 audit(2000002834.870:83644): avc: denied { map } for pid=20901 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3142.354077] audit: type=1400 audit(2000002834.910:83645): avc: denied { map } for pid=20901 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:20:35 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22300800000010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3142.605008] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 3142.725434] audit: type=1400 audit(2000002834.920:83646): avc: denied { map } for pid=20901 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:20:36 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x60}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) 04:20:36 executing program 5: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@gettaction={0x28, 0x32, 0x309, 0x0, 0x0, {}, [@action_gd=@TCA_ACT_TAB={0x14, 0x1, [{0x10, 0x1, 0x0, 0x0, @TCA_ACT_KIND={0xc, 0x1, 'skbedit\x00'}}]}]}, 0x28}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) socket$netlink(0x10, 0x3, 0x0) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040), 0x4) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) splice(r0, 0x0, r4, 0x0, 0x4ffe0, 0x0) openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/create\x00', 0x2, 0x0) [ 3142.920336] audit: type=1400 audit(2000002834.920:83647): avc: denied { map } for pid=20907 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3142.936087] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3143.075573] audit: type=1400 audit(2000002834.940:83648): avc: denied { map } for pid=20907 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3143.208059] audit: type=1400 audit(2000002834.950:83649): avc: denied { map } for pid=20907 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:20:36 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22600800000010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3143.728821] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3144.225587] netlink: 'syz-executor.1': attribute type 5 has an invalid length. 04:20:37 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x4164, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) [ 3144.290665] selinux_nlmsg_perm: 22 callbacks suppressed [ 3144.290952] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=20953 comm=syz-executor.5 04:20:37 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newlink={0x54, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x10, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc}]}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x54}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0xf0ffffff, {0x0, 0x0, 0x0, r4}}, 0x20}}, 0x0) 04:20:37 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e220086ddffff10000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3144.456164] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=20953 comm=syz-executor.5 04:20:37 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x68}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) [ 3144.575666] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=20953 comm=syz-executor.5 [ 3144.758650] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=20953 comm=syz-executor.5 [ 3144.855714] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=20953 comm=syz-executor.5 [ 3145.056708] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=20953 comm=syz-executor.5 [ 3145.212117] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=20953 comm=syz-executor.5 [ 3145.301496] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=20953 comm=syz-executor.5 [ 3145.414413] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=20953 comm=syz-executor.5 04:20:38 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000802000010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3145.501269] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=20953 comm=syz-executor.5 [ 3145.568795] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3145.635610] netlink: 'syz-executor.1': attribute type 5 has an invalid length. 04:20:38 executing program 5: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) r3 = socket(0x11, 0x800000003, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SNDRV_PCM_IOCTL_DELAY(r5, 0x80084121, &(0x7f0000000180)) r6 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xff, 0x101000) getsockopt$inet_sctp6_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000080), &(0x7f0000000140)=0x4) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB=',debug=0']) 04:20:38 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x6c}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) 04:20:39 executing program 3: sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000001340)={0x0, 0x0, 0x0}, 0x0) socket$alg(0x26, 0x5, 0x0) bind$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000000)={0x1f, @fixed={[], 0x10}, 0x9}, 0xa) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/igmp6\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x100000000000014a, 0x0) 04:20:39 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x4168, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) [ 3146.007890] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 04:20:39 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000803000010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) 04:20:39 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newlink={0x54, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x10, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc}]}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x54}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0xfeffffff, {0x0, 0x0, 0x0, r4}}, 0x20}}, 0x0) [ 3146.542928] kauditd_printk_skb: 190 callbacks suppressed [ 3146.542943] audit: type=1400 audit(2000002839.740:83840): avc: denied { map } for pid=20987 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3146.649279] netlink: 'syz-executor.1': attribute type 5 has an invalid length. 04:20:39 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x8, 0xfffffc00}, 0xc) syz_emit_ethernet(0x4a, &(0x7f0000000040)=ANY=[@ANYBLOB="0180c2000000aaaaaaaaaa0086dd60fe80000014060000000000000000000000000002000000fe8000000000000000000000000000aa00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="500000009078000038ced2ef6b456900e0a4cb12dc23f8156620fc0d7d81eae35cc92dc3ffc43d4b0ee429b87f613f828d8fdbb3a79b5b52b1078c859968cec64b1d22ece9eccca4d3c5ed4f8d8b480cd59e44057550a3ee76e92eac916383ef4f73dd136d10c32d5065b74d6c59805da043c5f8382a934769503b2c87da33cf94bdd1fa571b8415e188f71638fafc0f9e7f9241000c08022468ffe32652191824dfc9176f84987ee991cdc982f3987d5a50cadc26384df97cd44d316fa780efa4adcf1d7648a070b8"], 0x0) [ 3146.698644] audit: type=1400 audit(2000002839.750:83841): avc: denied { map } for pid=20988 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3146.859969] audit: type=1400 audit(2000002839.760:83842): avc: denied { map } for pid=20987 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:20:40 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x74}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) [ 3147.047549] audit: type=1400 audit(2000002839.770:83843): avc: denied { map } for pid=20987 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3147.280928] audit: type=1400 audit(2000002839.780:83844): avc: denied { map } for pid=20988 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:20:40 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r2 = socket(0x11, 0x800000003, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r2, 0x0, r3) getsockopt$inet_sctp6_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000040), &(0x7f00000000c0)=0x8) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) ppoll(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x200004) sendfile(r0, r4, 0x0, 0x80001d00c0d0) [ 3147.467829] audit: type=1400 audit(2000002839.810:83845): avc: denied { map } for pid=20988 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3147.605470] audit: type=1400 audit(2000002839.820:83846): avc: denied { map } for pid=20987 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:20:40 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000805000010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3147.732486] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3147.735279] audit: type=1400 audit(2000002839.830:83848): avc: denied { map } for pid=20988 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3147.877616] audit: type=1400 audit(2000002839.830:83849): avc: denied { map } for pid=20988 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:20:41 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x2, 0x0, 0x0, 0x1000, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000280)) r1 = socket(0x11, 0x800000003, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setxattr$trusted_overlay_redirect(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.redirect\x00', &(0x7f00000001c0)='./file0\x00', 0x8, 0x604b7ec4ce6d8e8a) ioctl$EVIOCSFF(r3, 0x40304580, &(0x7f0000000180)={0x53, 0x3, 0x7fff, {0x70a, 0x101}, {0x3, 0x2}, @cond=[{0x3, 0x11a, 0xa5, 0x20, 0x7, 0x8000}, {0x3, 0x3, 0x0, 0x7, 0x6, 0x20}]}) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000080)) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000024061f21c0901c8900000000000000000000000000000000000000000000000000b6a74eb38e9e62aabd5a6fcaac2638a100"/104], 0x1) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/nvram\x00', 0x4480, 0x0) openat$cgroup_procs(r4, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000300)=ANY=[@ANYBLOB="300000007f2a6f471d5455025b2b2bef924e7fda844550fa768b8820d665b55d6cde068ab0a60b7efe5d26372f1eaa228346cc9642abf2bd61f9b814b27bfa41939bafb54b00e99d70830022a9e70f20f38f2825f502c1d44abc8d19f992a5870b26b38a5cd01c3d80e50daee0c12455fed58752fd9e2f5d", @ANYBLOB], 0x2}}, 0x8004) r5 = socket$inet6(0xa, 0x1, 0x68) connect$inet6(r5, 0x0, 0x0) sendmmsg(r5, &(0x7f0000006d00)=[{{0x0, 0x1000000, 0x0}}], 0xc6, 0x24000000) sendto$inet(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0xe4ffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000000040)="02006800000ffffffff60005000000e08128b14700000000d59863d20000000002000f2020cc00000000ff0700690000030000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) socketpair(0x0, 0x5, 0xbc, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440)='nl80211\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', 0x0}) getsockopt$inet_opts(r7, 0x0, 0x4, &(0x7f0000000380)=""/47, &(0x7f00000003c0)=0x2f) sendmsg$NL80211_CMD_LEAVE_MESH(r6, &(0x7f00000005c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000540)={0x5c, r8, 0x2, 0x70bd26, 0x25dfdbfc, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r9}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x7f}}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x3}, @NL80211_ATTR_WIPHY={0x8}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x4}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x8000000, 0x4}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4000011}, 0x4) [ 3147.985526] audit: type=1400 audit(2000002839.820:83847): avc: denied { map } for pid=20987 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3148.072388] netlink: 'syz-executor.1': attribute type 5 has an invalid length. 04:20:41 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x416c, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) 04:20:41 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x7a}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) 04:20:41 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000808000010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3148.711478] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 04:20:43 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e2200080d000010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) 04:20:44 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000828000010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) 04:20:44 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newlink={0x54, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x10, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc}]}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x54}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0xffffa888, {0x0, 0x0, 0x0, r4}}, 0x20}}, 0x0) [ 3151.662726] kauditd_printk_skb: 107 callbacks suppressed [ 3151.662744] audit: type=1400 audit(2000002844.860:83957): avc: denied { map } for pid=21031 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3151.773229] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3151.810885] audit: type=1400 audit(2000002844.910:83958): avc: denied { map } for pid=21031 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3151.960355] audit: type=1400 audit(2000002845.060:83959): avc: denied { map } for pid=21039 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3152.095307] audit: type=1400 audit(2000002845.060:83960): avc: denied { map } for pid=21039 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:20:45 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000830000010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3152.174548] netlink: 'syz-executor.1': attribute type 5 has an invalid length. 04:20:45 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x8) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="5c00000010000507000000af1c0cbaef910faae2", @ANYRES32=0x0, @ANYBLOB="03080004000000002c0012000b00010067656e65766500001c000200060005000000000005000d000300000005000d0002000000050027003200000008000a00", @ANYRES32, @ANYBLOB="ffa96e3248650977e623118e9e50c1b89e9e301c3c2263036eecb32c002becb16f8461182d9f00"], 0x5c}}, 0x0) [ 3152.323360] audit: type=1400 audit(2000002845.080:83961): avc: denied { map } for pid=21039 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:20:45 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x4170, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) 04:20:45 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xf0}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) [ 3152.624848] audit: type=1400 audit(2000002845.090:83962): avc: denied { map } for pid=21039 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3152.906977] audit: type=1400 audit(2000002845.140:83963): avc: denied { map } for pid=21039 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3153.259120] audit: type=1400 audit(2000002845.190:83964): avc: denied { map } for pid=21039 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3153.561334] audit: type=1400 audit(2000002845.200:83965): avc: denied { map } for pid=21039 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:20:47 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000860000010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3153.842685] audit: type=1400 audit(2000002845.220:83966): avc: denied { map } for pid=21039 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3155.408827] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3155.485705] netlink: 'syz-executor.1': attribute type 5 has an invalid length. 04:20:49 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e220008f0000010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) 04:20:50 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x300}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) 04:20:50 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x4174, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) 04:20:50 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a9ec8a3a63673a36d66b103e1fdbb4678731c44d5772a8b52f88132613f2ab9faa48e75b0508e2367018dc4479c6757b0a5622107e780a52d43a222d4aa8fa0c3e961e2401d5dbb22107ce4584d22a35c2ff5c7069779f3a8e888a8ac94312cdb43f7907ebfcf3dc4ad1f5e7577c5c2c9146439e6910c437a8213e177dfca08fb12f6c6a8343821e53d1f0ef24575797141dd16b8065042500017c0bab7265ba185fa61404145c500be7e57f2af455765c675c710da30fb915abbfcb8fe5e5a54f998aeb8ecb869537d7ddb529a8d66a4905586c9dd0d81d4841e2c90bd8fa2bf3802bf963edaae01ebd125510bbe75beac077af773d5d2a34b256e8369f68b0fcab87c7ee033997f53b635b59ac5aa1456d0b35e1dd734149dbcf541d744962b2bd0ece4c267760c3a6d4bce9b03000000cfa703a1a48b59700f8c902e46ae26e6e31185a19c07959edcb6bfc88c9e6bc124147521f6eb327231e35785951377c40b713a4f6854b02c428bef068f9494aa8fc9f99ddff40ef4fdc9360eb1bc2a25ac491f2bc9c7a23fe5662170feb55b3999b45b8b80a8438df19e183d854691a1f2b34352fed522c4265e4ece52f35d351a1676982ce0f2eb2c454b9df04b976179611f1be4deac0dd4c79a122f3d33e52bcce38808809820094c31af5cca2d79bf783bb87588d8c21bad663bbde2644cab2b605d0ca91b5c2417ab7c7bba5173b0bfddfd1d87ce6d257c0526fc051adaf783cb44e5f09899886b26ca746f8d2b392e0871bca6f1cb40c5ac1bf5ca80b934424deddfb547d8f9a38a25aa39752cac866986bb0faaf07ffeecd27bd736fa1a058ee5b17adbde605eb5f3648b4ee013640d018b42ef6b"], 0x48}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newlink={0x54, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x10, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc}]}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x54}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0xfffff000, {0x0, 0x0, 0x0, r4}}, 0x20}}, 0x0) 04:20:50 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0xffffffffffffffff) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="340000001200070d00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000140012800b00011f627269646765000004000280"], 0x34}}, 0x0) [ 3156.990499] netlink: 'syz-executor.1': attribute type 5 has an invalid length. 04:20:50 executing program 5: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000000), &(0x7f0000000080)=0x8) r1 = openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) r2 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r2, &(0x7f0000000140)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e24, 0x0, @empty}}, 0x24) sendmmsg(r2, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000000001001000001000000ec80000000a025a5906782ace162e1469a4000000000"], 0x18}}], 0x1, 0x0) prctl$PR_SET_TIMERSLACK(0x1d, 0x2) socket$kcm(0x10, 0x2, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f00000000c0)='veth1\x00', 0x10) connect$inet(r4, &(0x7f0000000280)={0x2, 0x0, @loopback}, 0x10) shutdown(r4, 0x1) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r5, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f00000000c0)='veth1\x00', 0x10) connect$inet(r5, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) shutdown(r5, 0x1) shutdown(r5, 0x1) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r5, 0x8982, &(0x7f0000000240)={0x0, 'batadv0\x00', {0x2}, 0x8}) shutdown(r4, 0x1) fcntl$setpipe(r4, 0x407, 0xfffffffffffffffc) openat$full(0xffffffffffffff9c, 0x0, 0x480402, 0x0) r6 = socket(0x11, 0x800000003, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r6, 0x0, r7) r8 = syz_open_dev$media(0x0, 0x0, 0x0) r9 = accept4(r8, &(0x7f00000000c0)=@isdn, &(0x7f0000000000)=0x80, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r8, 0x84, 0x14, &(0x7f0000000140)=@assoc_value={0x0}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r9, 0x84, 0x17, &(0x7f00000001c0)={r10, 0x9}, 0x8) r11 = syz_open_dev$media(0x0, 0x0, 0x0) r12 = accept4(r11, &(0x7f00000000c0)=@isdn, &(0x7f0000000000)=0x80, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r11, 0x84, 0x14, &(0x7f0000000140)=@assoc_value={0x0}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r12, 0x84, 0x17, &(0x7f00000001c0)={r13, 0x9}, 0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r6, 0x84, 0xd, &(0x7f0000002480)=@assoc_id=r13, 0x4) pipe2(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r14, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[]}}, 0x40001) sendmsg$TIPC_CMD_DISABLE_BEARER(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='\b\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="04002dbd7000fbdb27d0189dbcedb2ec3fca26df250100000020ea227e284100000010001375"], 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) mmap(&(0x7f000015b000/0x1000)=nil, 0x1000, 0x200000e, 0x80110, r1, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x59) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000480)='cpuset.effective_cpus\x00', 0x26e1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x400801) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x420000, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) r15 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r15, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) setuid(r16) r17 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r17}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r18}}) r19 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r19}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r20}}) r21 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r21}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r22}}) chown(&(0x7f0000000140)='./file0\x00', r16, r20) 04:20:50 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800030010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3157.091799] device macvlan711 entered promiscuous mode [ 3157.112173] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3157.141189] kauditd_printk_skb: 96 callbacks suppressed [ 3157.141205] audit: type=1400 audit(2000002850.340:84063): avc: denied { map } for pid=21310 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:20:50 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x346}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) [ 3157.252644] audit: type=1400 audit(2000002850.380:84064): avc: denied { map } for pid=21310 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3157.369925] audit: type=1400 audit(2000002850.390:84065): avc: denied { map } for pid=21310 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3157.505662] audit: type=1400 audit(2000002850.390:84066): avc: denied { map } for pid=21310 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:20:50 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) getrusage(0x0, &(0x7f0000000000)) sendmsg$NFT_BATCH(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a2c000000000a05000000000000000000000000030c00044000000000000000050900010073797a300000000070000000030a01030000000017000000000000000900010073797a3100000000280008800c00014000000000000000080c00014000000000000033b80c000240000000000000000508000a40000000020900010073797a30000000000900030073797a320000000008000540fffffffc140000001100010000000000000000000000000a"], 0xc4}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 3157.647796] audit: type=1400 audit(2000002850.420:84067): avc: denied { map } for pid=21312 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3157.777006] audit: type=1400 audit(2000002850.430:84068): avc: denied { map } for pid=21310 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3157.814646] audit: type=1400 audit(2000002850.430:84069): avc: denied { map } for pid=21312 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3157.952262] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 04:20:51 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x4178, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) [ 3158.011477] audit: type=1400 audit(2000002850.450:84070): avc: denied { map } for pid=21312 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:20:51 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800050010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3158.315751] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 3158.338522] device macvlan712 entered promiscuous mode 04:20:51 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newlink={0x54, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x10, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc}]}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x54}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0xffffff7f, {0x0, 0x0, 0x0, r4}}, 0x20}}, 0x0) 04:20:51 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x347}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) [ 3158.348258] audit: type=1400 audit(2000002850.460:84072): avc: denied { map } for pid=21312 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3158.692289] audit: type=1400 audit(2000002850.450:84071): avc: denied { map } for pid=21310 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:20:52 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000843050010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) 04:20:52 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = socket(0x1, 0x0, 0x0) kcmp(0x0, 0x0, 0x7913709e57048ee5, r0, 0xffffffffffffffff) getsockname(0xffffffffffffffff, &(0x7f0000000040)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000ac0)=0x80) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000b00)=""/210, 0xd2) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = memfd_create(&(0x7f0000000040)='On\xc4\xd0\xee\x127\xd8\xa2\x8a\x80Tc-\xfe9%\x14\x95d;\xe6\xe8\xad.$\xc4\xb8\xa8\xa96\x0e\xebi6\x9e\xbd\x8b\xb9^B{\x8d\xa0\xdf\xbc\x02l\xb8\x84Q\\\r\xc5\xb5(\xd1\xf7\xf7\xc2\xc0\xef\xee6X;I\xd6\xc2\xf9\xfcS\xb1\xdbKth\x1eh\x1f\r\x92\xf7\x1c\x15\xebU\x99\xeb\xfdu\xfc\x03p\xe5\xb0\xaf\x81\x00'/109, 0x0) r3 = socket$inet6(0xa, 0x80003, 0x67) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000400)={0x0, 0x0, 0x0, 0xc}) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000940)='/dev/full\x00', 0xb00, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f0000000980)={0xc1, 0x0, 0x1, 'queue1\x00', 0xf4}) sendmsg$key(r4, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x20040090) r6 = memfd_create(&(0x7f0000000040)='On\xc4\xd0\xee\x127\xd8\xa2\x8a\x80Tc-\xfe9%\x14\x95d;\xe6\xe8\xad.$\xc4\xb8\xa8\xa96\x0e\xebi6\x9e\xbd\x8b\xb9^B{\x8d\xa0\xdf\xbc\x02l\xb8\x84Q\\\r\xc5\xb5(\xd1\xf7\xf7\xc2\xc0\xef\xee6X;I\xd6\xc2\xf9\xfcS\xb1\xdbKth\x1eh\x1f\r\x92\xf7\x1c\x15\xebU\x99\xeb\xfdu\xfc\x03p\xe5\xb0\xaf\x81\x00'/109, 0x0) r7 = fcntl$dupfd(r6, 0x0, 0xffffffffffffffff) setsockopt$IP_VS_SO_SET_DEL(r7, 0x0, 0x484, &(0x7f0000000340)={0x2b, @multicast1, 0x4e24, 0x4, 'rr\x00', 0x1a, 0xffff0000, 0x5d}, 0x2c) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x1f00, &(0x7f0000000100)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1c}, 0x1, 0xfdffffff00000000}, 0x0) r8 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/vcsu\x00', 0x488001, 0x0) write$P9_RLOCK(r8, &(0x7f0000000a80)={0x8, 0x35, 0x1}, 0x8) restart_syscall() ioctl$VIDIOC_QBUF(r7, 0xc058560f, &(0x7f00000001c0)={0x2, 0x3, 0x4, 0x0, 0x80, {0x77359400}, {0x3, 0x8, 0xe6, 0x7, 0x6, 0x7a, "ef66c20a"}, 0x1000, 0x3, @planes=&(0x7f00000003c0)={0x9, 0x9, @fd=r7, 0xf7fffffc}, 0x6, 0x0, 0xffffffffffffffff}) waitid$P_PIDFD(0x3, r9, &(0x7f0000000800), 0x2, &(0x7f0000000880)) [ 3159.528643] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3159.718039] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 3159.798726] device macvlan713 entered promiscuous mode 04:20:53 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x500}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) [ 3160.394575] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 04:20:53 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x417c, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) [ 3160.986431] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 3161.193077] device macvlan714 entered promiscuous mode 04:20:55 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000500)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="894eaa1de43d9d1cfbe35427f8a053bfebfc7c58ee37b255450b7a8954e1aa6c8759e793bb5f126337596166000d8709b32b14a94629b5f4fb012b3248992e42ba6253a970c7d9b29077127999a51b5185b57b1750932e5e2d74c6164fb1aff295315db4930dc6c18dff03744ab753d44faafdaebc750896bf0bc608724d08000800000000000000"], 0x0, 0x88}, 0x20) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0x9}, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000)='SEG6\x00') epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000080)) open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB="d8db7a44890934bacfe2a44ca16068403962563df8021d6d7fdb3bad92f820bf02954ff6a9efb0510045dac88498a86639fa05645f24ff38e53285387780726d52958a5c4c518101cb5f4e9a5c5af79b02b748ce3895954e02173b1145d67087aa169a80201cef20d5ed65951d26a84fd022940cff93421f6237352412a5b1c6b4bf58f4b60c55ce9bc9c1bae7c853a49ade40c3c17e832ad1e93159882e3de3f02773bf474dc80c931a03ce"], 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x40000000003, 0xff], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:20:55 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newlink={0x54, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x10, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc}]}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x54}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0xffffff9e, {0x0, 0x0, 0x0, r4}}, 0x20}}, 0x0) 04:20:55 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000808060010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) 04:20:55 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x0, 0x92000) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000040)={0x2, 0x1}) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000240)=[{&(0x7f0000000100)="d4a773d15a799f827302a4d83e83b9f1e2f8de598001a085f3b77190c063cccee655203dbc30aa739266c0de03540b91febb1b930d319476eb4e8b9bf1ae322617762a97310a949e1b78160de0814cd87cac39d62a3c1f84ed22c5b738d62f9de6f19b63976f5d98329cf21acdeb69e1f7a6842e4144", 0x76, 0x7}, {&(0x7f0000000180)="f5d75fd76a4b1e3d2a4c3730e18343cd94ad79d0dae9fddfe3c4664d126cbe062cf1296c117fbc9f73fd1ca0c127504913960515a64a04d7ba2030df8f1daf9b08a9607992fd67d325b72306cef8dd04f41519187773980d23c01730ef887ae63948e341ff5191d1aff985e38e1ae64d16eee88e284ad1bf61b0e2a9eb346b9cf6", 0x81, 0x2da6}], 0x200000, &(0x7f0000000280)={[{@wsync='wsync'}, {@bsdgroups='bsdgroups'}, {@lazytime='lazytime'}], [{@hash='hash'}, {@dont_appraise='dont_appraise'}, {@obj_user={'obj_user', 0x3d, 'ppp1eth1'}}, {@obj_role={'obj_role', 0x3d, '/dev/bus/usb/00#/00#\x00'}}]}) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$KDGKBLED(r1, 0x4b64, &(0x7f0000000340)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000380)=0x0) process_vm_writev(r2, &(0x7f0000000580)=[{&(0x7f00000003c0)=""/112, 0x70}, {&(0x7f0000000440)=""/139, 0x8b}, {&(0x7f0000000500)=""/121, 0x79}], 0x3, &(0x7f0000001640)=[{&(0x7f00000005c0)=""/4096, 0x1000}, {&(0x7f00000015c0)=""/77, 0x4d}], 0x2, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000001680)='/dev/vcsa\x00', 0x803, 0x0) ioctl$KDENABIO(r3, 0x4b36) r4 = fcntl$dupfd(0xffffffffffffffff, 0x406, r1) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000001700)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r4, &(0x7f00000017c0)={&(0x7f00000016c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001780)={&(0x7f0000001740)={0x2c, r5, 0x200, 0x70bd28, 0x25dfdbfd, {}, [@SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x5}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8000}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) ioctl$SNDCTL_DSP_SPEED(r1, 0xc0045002, &(0x7f0000001800)=0x2) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001840)=0x0) getpgrp(r6) getsockopt$inet_mreq(r1, 0x0, 0x23, &(0x7f0000001880)={@remote, @initdev}, &(0x7f00000018c0)=0x8) ioctl$TIOCMIWAIT(r1, 0x545c, 0x0) r7 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000001900)='/dev/nvme-fabrics\x00', 0x14080, 0x0) ioctl$PIO_FONTRESET(r7, 0x4b6d, 0x0) r8 = accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000001940)={0x1f, 0x0, @none}, &(0x7f0000001980)=0xe, 0x800) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001dc0)={{{@in=@local, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@empty}}, &(0x7f0000001ec0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r8, 0x8933, &(0x7f0000001f00)={'team0\x00', r9}) r10 = openat$vsock(0xffffffffffffff9c, &(0x7f0000001f40)='/dev/vsock\x00', 0x410a00, 0x0) sendmsg$NFNL_MSG_CTHELPER_DEL(r10, &(0x7f0000002080)={&(0x7f0000001f80)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000002040)={&(0x7f0000001fc0)={0x5c, 0x2, 0x9, 0x301, 0x0, 0x0, {0x2, 0x0, 0x9}, [@NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x17}, @NFCTH_STATUS={0x8}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8}}, @NFCTH_NAME={0x9, 0x1, 'syz1\x00'}, @NFCTH_STATUS={0x8}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x80000001}}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0xffff0000}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4044050}, 0x24040001) r11 = accept4$tipc(0xffffffffffffffff, &(0x7f00000020c0), &(0x7f0000002100)=0x10, 0x80000) ioctl$FS_IOC_GETFSLABEL(r11, 0x81009431, &(0x7f0000002140)) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000002240)={'batadv_slave_0\x00', {0x2, 0x4e22, @rand_addr=0x9}}) r12 = socket$key(0xf, 0x3, 0x2) ioctl$sock_proto_private(r12, 0x89e5, &(0x7f0000002280)="3ca804b41547c7aac63a812cdc642827aa06e0b21bf80a10e862515cf0acda054fe39c6a6eb851a8ddd6cb6578c68ff6b8f7e6fc5561068e94743129d6e57f15252b0e2dbdfcfff3a02d75b48b32fc47e7b2d07058702a34ba393a92895e0ffb2b58bad828837c64d4df33b1680480ce06506b2c2e688f1fd7c3ea83d31790ccc7773436702f1be03145c5a8") r13 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000002340)='/dev/qat_adf_ctl\x00', 0x9f01e0b7544a7269, 0x0) ioctl$PPPIOCSDEBUG(r13, 0x40047440, &(0x7f0000002380)=0x9) 04:20:55 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x600}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) 04:20:55 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x4180, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) [ 3162.197455] kauditd_printk_skb: 160 callbacks suppressed [ 3162.197471] audit: type=1400 audit(2000002855.400:84233): avc: denied { map } for pid=21378 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3162.298054] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3162.339826] audit: type=1400 audit(2000002855.500:84234): avc: denied { map } for pid=21378 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:20:55 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000889060010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3162.404449] XFS (loop3): unknown mount option [lazytime]. [ 3162.444486] audit: type=1400 audit(2000002855.500:84235): avc: denied { map } for pid=21378 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3162.584961] audit: type=1400 audit(2000002855.560:84236): avc: denied { map } for pid=21378 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3162.617758] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 3162.724785] audit: type=1400 audit(2000002855.580:84237): avc: denied { map } for pid=21378 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:20:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x700}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) [ 3162.965072] XFS (loop3): unknown mount option [lazytime]. [ 3163.019664] audit: type=1400 audit(2000002855.720:84238): avc: denied { create } for pid=21381 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 04:20:56 executing program 3: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000100)={0x8c9e, 0x8, [{0x0, 0x1}, {0x2, 0x1}, {0x9, 0x1}, {0xf}, {0xe}, {0x5, 0x1}, {0xb, 0x1}, {0xd}]}) creat(&(0x7f00000002c0)='./bus\x00', 0x0) r1 = socket(0x11, 0x800000003, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r2) write$binfmt_elf64(r1, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x5, 0x1, 0x80, 0x4, 0x2, 0x0, 0x629b68fd, 0x2eb, 0x40, 0x18f, 0x1844, 0x1, 0x38, 0x1, 0x1f, 0x6}, [{0x7, 0x9, 0x45c59c1a, 0x43da, 0x2b50, 0xfffffffffffffffd, 0x4d9, 0x3}], "d32735ba83268a3dae8f7ef6551103bcc52ccaaa822dd46f2c6946adc89c48d812ca9a8949cfca6aa206532984fd0ef6df2e4822442dbfc2274df98e25345bfc0309eb203174503c7619375ed315f7a97295e738e93b905c8b9e7f534488e24c2286a4d87ee305363d3be86a953076fcfbbf41becfe2ae1d50bfe23e58bff5229e0f47e1a5b9966b28f6243e60ca756dd04fb0d8400f99404eecd828f3237da6529c2f98a4b37ef6aec9538c3908eb913aac7d4b42411bd08419c673d30b1a732611066c7c96e680bb40f00f7e62f6c213318cb84d1cf1de949deaacc3bb17b2b5766f478ab348dc7d9f95f3b35070427bd2afd64ad7c885b86e765f1d018c82702cca318ab2f8f7b00e9f8a63c12cc487e6446dab96ed6a28620b62f67458dd026090526f03b5c53e5c2bb83cb7c73438d7dd37ccea541c590ad51f04f2c5cb438b73c3ee3944215f417e0bda84bd3d3e0bc34a507e92aece7a03b2750cd3722c7b92f51ff8880de2a4213f010b1b60339ec6dcb5b2f3a7d2f106e505e47399b85d9bd683a1d80659e60741012ff96a21ef0e8393d5ea5e5d49bf043b2e092fba75ab5b55916733898498fc03a6e7713abdb77469f5fb5e27e29e5399c4dc7973299463d5b8b524e5e9b576e5a857a4964bd88fa0ccde6037eaba0fc71093450f84d066baf051863959f9a61d77ed15c5ec9e23e6fce6b6d2aa6bd3ffe74d61deaf42a8b43685ded38c286b60de99eb05795f943c461318243f1930d81406261652630990e322d7ebfb84c9a83ca79cb77baf8ce38792266eaa5dea98a3ee6299157d2127b76fc409aed29fba2844caf2f17aeaddc7921be8ed7a1e181abe916573c64670dabc413e4d7058c378c8989ff7261423f467b5762852e9db49e32d2ace280fac7f1d95ad251b8be313db52c80080e0044363ff5353742c755d2bfd740d0f40f8e311607895a8931933d87cc4a1ae9596e5edf2d208d7dd84e5f209f8df9535586f2c38990f4d338410c0d838b4e8644584d505e3c8280e35dacbf5b4de2d7e49363806565b291ad93d7d6395bf5d117553319f721182ecca9a1e3fb2f48543d665f395802536a5dcea79880e5bfb84e9cf0609f89afffc777b51c0fc0be5db2b23c7cf58154e9893cfd71958a20bb02582c1b675d6a84784c0ee5c1327c3393f2b640fc5039d113a09e56a3548ecc8f8f03c28327f0defa147abb5f7bd23049cd5be422a8778dedf45de4577a9e171dd5d44e4a349b067cd1b55cbf92f499618d8baa612a1e08fa1a27e1c050805f4fa009c76a08244207da8df1ede3cc46f194865c341d25f4fb1339b6a0838575fbe8a92e0db7b471d9feca504f75797ce8d1ff2d097f347d9e8a04526a8bfbb4ae84b16fe2a9ff55318f8aa7935d48a6b051e8a2febea0a2a3d2f45ece5c262c0543495965016606449e26c38d9401bb2a2dc87ba230b0e8592b10c58fc6969ef38d1c31a781e79d06ab864ecb1a3bed03d9ef3ecf3ad10e5a4ce1fe80bd59b86a80983feb9132416a92614e69e2908c5a17608fb106e7dc5bf71d5b449b14baa3626e236ba31d79cf9876ac41978f0a0ff7ece10b45beb6ecd3b32b02e5652604bafede38243b850f3e66bf597dab37155ff3530e0271259a374b80c46a8bb2d1dabff2850708b79328f05173282292dab6ac4a5257222ff48c173d2105826a136ac644db1bcf077696fc400decf7fc73a7accd02e4bd40a95688544fb1e6bbac2f5d568f8e9dd2322ccce70f5d0cf67ca05e0c323462ad866f34a727ab6b48faf691ddd825f167f87692cb9faf5025aa366950d2bf8a97a98215e31da87d5b29890cf59c3fbe8926b85bb0437919ec15e650a5c2ac551fde12b909da09907045412a4d7b51bbb46bf6fc4d4c63953e5bde010da59e22efe53268aa9a6fb3a7e19d2157b0d925a4760ddb187a9cff4210f2abb625bf1d7b387720f792014fdda700587c6aab45763e91ffc2fbc14317d83127f46f8d0db4c20caffc397a28bd8f317b5ab06886f971992d1cb340ae2fb5881bac42bee81c68218f93b601e4b221de892f7253261c346f4766a8f345cc277f5ef8ed5299acfbc47b43caabf405c257e5f6f1adfb2a126ea337e7445b484937c9be70ad8787ec6a0e9d379fbc4c968667b80466866a781451228ae3e26ced7142d5eb0e2afc8b323d335f25154c1e536467089721649673d265688715562d28a60664d0bd4d133b1ac63c3f3dc870d756334fb201869f58ba5c6712b050d22de418fc1bf45f975045ca99628f9a819527661f0b94777e1c05f63eac1aedc5aa18d39861b18edf86c36aef112be2df3d2453380d4c1416cec5ec11cdfe43a7964f27a74bb99fc3109070804589bd987061038591de6847334b19eeca0682d4efc12c519834e2e08ee461b7c7fb419213bb875f6038b7a4eeddc13b351bf4aa0ecf8465311a12fff78a4a5c0e294a77265d971d18d7a8db5283c4c165d31955b5baf40962c385615def77a273072d12f92a5eb589652ab0ecbb81b56a22870332d0ba0f36867af69f5182381d5df5c7b3b61df1ba05a18377724b10471198e3bb10675bb5d7dabb1ec822274f42b1757a7f358502b2ef79e0122a133935ba68cee38877a26f87f5d40fe1f7d26bab57740bcc4efd83fcd63a2be569e99839c0eae5fa25a9a33df993ff139eabf74466d2afa50356fae8372b4706e4090d41c92fe2e6ff8d1d2a26dfd89fe5b23e3384c1d3ba7953001586bf5ddcd41583d58ba97e0691b871b3aabfdde5899271e820064771f5874cbae0cba76f0ea71a0c343dd9d1366cdb613ec5d66fc28b12b2f5027b3a3fbab748a4efba761b9f25f17baf1abd241adda9a58b5ecd4efa23525ad1106b6c905c451e8e7a92b840a2bcb53ea57d0dad95cd4c308061839a1c44659c62431d3552baea3e05fa757dd9757526ac93708b570175fecb3ce7145cd3f0d9b2120546effa396e56bf6672978bf94f38ffe31c9aaf49787d59b9cf85cc30d076f7ff0e1ce7ac56f69ac5da3f591c9a49f6ca69ea0f2f036d8b0a8f35a68d2551ee91470e39a1dc09679aa3f2246d1cd90485b0a40e1351e1734611c17e291f6322a8f113bc82e12c3fb29603106178eacfd66db29775dc79e73f63a0156aa31f9d12362fffcfa0b60c81a480379238d9dfe3a7061c41a42686803a89f949688101de8270f23ff4b1f82db0ceba49442a2285f94a7a5935603acb954cce61eca2a04ef28324dcf0a53d97458d08421bfd7203a1734cc402f0226aa39234d060b5f4ed36554aac2a01bba69f8ec6533520c784274842b2648852089eb850abc2bdb9bc58343263f9c39ca2ca2db299bbddcb74d8dc515818d5f9327dafaa85239dee7948374b9bf4fa22c3dc56990f019a862e75890376fdd92eb823dff70cd2b83ba0c00b6d76915e8dd21c182961ad9cada46911b9587a0e20b6dd6577aeec526e1748901dfe357c04bc8bcc3a3d0ca7ead51889098092c314022e416a846d3529cd5a5a98c1a1b1e3d0c79d70f050ad3536c5742983ceb444a888e8e70a31eddd26de8f3d4788bb1a8f8d8c53192c5f809eebbca7c20894a7aa6bf4538c2cfe9385861ed129a70244405f7ad867eff34458c0b63de4aad63ed0093dad0e899df2f9505c64187b720ec974bfd672aa31fc51b8a784108289c446b95283c8de7f60823b6ffd326cea93f13e9033ffb67fd1d499f1d9bdc2b70286d62c7883aa273a5bd11dfadfc2bb9e49d52a54e92a90ab9c1f15838c2c668dcce020bc256154a7bb713063417cf85e9c8199452da97628c6f7d1716c41de35922ee0190313bfa1f494535b27af2974a34e596ec6d7dc357aa1f7d9966b8f25d442480d0ab3f496e8e1f03560873d98fe31875df4ce63ff93a759799c3f2cbc63066e2aa6424f3e8c34ff26058d364ef8aabd4603e346738dcaeca29f28fc012c50fba5628c5f0881b2a83f88fe48473dbd7c55cc66ecc501381d84ada39e41a7f064d57b877d157a88b085de9aa767d35040cfd5d86971a9ff6c9e084ef1f239536e093f03bc008ed2bae778c27ab7850573abc7e2f0f559dca5c922a2a7b6394dfcf210a256bed467beceda62f04e5813de6e94712c2adbcf2de20ddfe51641dc1a0ac59f1f7de1e159b1bd8de80d1d5ba673f15638d8cf03c3e2c7c9df00fd54e23507db632270fb2a357b3fde710fcfd179c4d0ef348ad0e5bb63fda85be242f8ee8254c6558db1fd83de809e53022adb571e953a131c61f5773339a5e5bcce388430bd0a04cfaf14d01afabcfec88b3fdfc832ffe3a7adfe579003bded2c6e126c2266415dbc2de8dad80b3db88cf88b28a21a6734111abc28d25c124a757f17f0c2f190ba2f5bc0ef265f877f193561553628ccb3dafeb2344492ef5ff0bc474af1b3a59040393cb426c359817fb5a687359e844afc3b7a8ce00d6a25137968ffc8c676867b68bddf7034e6e815a41664e213e6bf7f8a95a379b091d05795c0ecf82274258b2833366d7fdebe9af1b28ca4f79b713689656a4437522ec67fdf6f5260b6bb143ef0f64fb25dd03f8d88e1fb77bd37bc72d4e7f8324265472c485523fc0b3b15a8cbc57e1f9bf2311ca7d20923005274934579a0451e6b3332d700b8633cf5944cc536e43b8842775613563da6e5c10c91208121e9205f1da89432e377e4e4880af91606c988513b85ccd9340e9bcbffa4077f46673101fad4f595eca6b1401601402cb00fe5008bfcdd1ccf26f1345188d56d1e531bea85875007a7756748e8ca14b7c18ae1d80abe025b3e4837336b2cdbcbed12d475e27b6b1903849705fda47b037b2854a7d29fdf3566b58b77be98fd5b731e868ee87a8991ec5f2961482000643e21186530985596b551941e24f7c64b755f721801f90ae18051081a43e170ee3ccefed7243a1ba74243560087ba0823a8f778871e3c8fa9845236919f7b31af4af870aa79259adcd64026d70a339ac9956335ddde4b176d711890e243ce54f30788522bb6d9b6c856e14c0bf9583f9cf0c33c85a7599b1b31a0d956cc36d69bc0f06a302eff226903d2bc6fb56db66d13af156aa424644f3e0a64297ded37e60fe4ba332cd62c042b16b9ddb21b88835665e591deb4810dc9c93bb0d37658f057db41d465b557284a97690ef6e721a4cb7f680e361d1a34b17f95e3614407b3d71acb616e7da40d336ac8a820b9dd4d5f9d72da26fa809237076fbad38f8813bafa8dafc449dfbfcab902f45ffa6454f72d71192187e3575a6ae1d44751abed0ecee0f1dda880307014ac0445ce6e50fb96e402509d29d46dc8c9d179358978588fdf8e3b349161bd6b11b61c351eab5fecc8d8304a02830f4a75a20f3d79f8497411c0df80d7cc650c89d77ba938993a59a718ab963909391dac604afa5e8f5f5e937c03304b8692fed895c9912edece0365b15c774446550f0dc2188133248cafa156874c066d623e6cd8bcc366e82b1e4ffd7603e6e477681c5e1a77426cbeeeb85ce7e21abeb4af9a4851f4077ae9883a6f8d09e84aa02f8be119e00d286e43c09393f2f65e435d3b859768b35e2b081cc636640380b3e4baeeb960d68d5d449dfec704074fc9283bb133b8fca666d6e503372451773521f1fbce74b225dfe8f57bd733d3119f91ae4d01232d890fe344c36d38c183c5172aa9a8c0c1e989504ec6922fc29089f940887a66910c96ef0eb7f8b4d68dc0d6dc59e62c995ccc7842096095e0b7e493689a99d578ef57cb8c23c9da72682d7d26ddc8ec8765582920db5", [[]]}, 0x1178) exit_group(0x0) r3 = socket(0x11, 0x800000003, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r3, 0x0, r4) r5 = socket(0x11, 0x800000003, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) syncfs(r7) r8 = socket(0x11, 0x800000003, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r8, 0x0, r9) ioctl$sock_SIOCBRDELBR(r9, 0x89a1, &(0x7f0000000000)='veth1_to_team\x00') getsockopt$bt_l2cap_L2CAP_LM(0xffffffffffffffff, 0x6, 0x3, &(0x7f0000000040), &(0x7f0000000080)=0x4) [ 3163.337501] audit: type=1400 audit(2000002855.720:84239): avc: denied { map } for pid=21394 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3163.524186] audit: type=1400 audit(2000002855.730:84240): avc: denied { write } for pid=21381 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 3163.678869] audit: type=1400 audit(2000002855.730:84241): avc: denied { map } for pid=21394 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3163.809022] audit: type=1400 audit(2000002855.750:84242): avc: denied { read } for pid=21381 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 04:20:57 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000806080010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3164.240365] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 04:20:58 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e220008000d0010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3165.102160] netlink: 'syz-executor.1': attribute type 5 has an invalid length. 04:20:58 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x4184, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) 04:20:58 executing program 3: syz_emit_ethernet(0x4e, &(0x7f00000000c0)={@local, @link_local, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "814746", 0x18, 0x0, 0x0, @local, @remote, {[@dstopts={0x0, 0x1, [], [@enc_lim, @pad1={0x0, 0x1, 0x2}, @ra]}]}}}}}, 0x0) r0 = socket(0x11, 0x800000003, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$rds(r2, &(0x7f0000000000)={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) [ 3165.384339] device macvlan716 entered promiscuous mode 04:20:58 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newlink={0x54, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x10, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc}]}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x54}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0xfffffff0, {0x0, 0x0, 0x0, r4}}, 0x20}}, 0x0) 04:20:58 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = socket(0x11, 0x800000003, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r2) setsockopt$PNPIPE_ENCAP(r1, 0x113, 0x1, &(0x7f0000000100), 0x4) r3 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c050040dc", 0xff0f}], 0xc102, 0x0) 04:20:59 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e220008800e0010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3166.151152] BFS-fs: bfs_fill_super(): Superblock is corrupted 04:20:59 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x900}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) [ 3166.469520] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 04:20:59 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x4188, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) 04:20:59 executing program 5: syz_open_procfs(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) ptrace$setopts(0x4206, r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x8, 0x0, 0x77, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000, 0x0, 0x3ff}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x80287010, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x5, &(0x7f0000000400)={&(0x7f0000000380)=ANY=[@ANYBLOB="480000001a00050700000000000000800000af00", @ANYRES32=0x0, @ANYBLOB="7fff000000000000140012000c0001006d6163766c616e00a6ff02000a000500040000000000000008000a00", @ANYRES32, @ANYBLOB], 0x48}}, 0x0) 04:21:00 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800200010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3167.210587] kauditd_printk_skb: 128 callbacks suppressed [ 3167.210604] audit: type=1400 audit(2000002860.410:84371): avc: denied { map } for pid=21556 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3167.317616] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 3167.346412] audit: type=1400 audit(2000002860.420:84372): avc: denied { map } for pid=21550 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3167.434713] device macvlan717 entered promiscuous mode [ 3167.469094] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3167.478579] audit: type=1400 audit(2000002860.420:84373): avc: denied { map } for pid=21550 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3167.478613] audit: type=1400 audit(2000002860.450:84374): avc: denied { map } for pid=21555 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3167.478641] audit: type=1400 audit(2000002860.450:84375): avc: denied { map } for pid=21555 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3167.478673] audit: type=1400 audit(2000002860.450:84376): avc: denied { map } for pid=21556 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3167.478699] audit: type=1400 audit(2000002860.470:84377): avc: denied { map } for pid=21556 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3167.478728] audit: type=1400 audit(2000002860.470:84378): avc: denied { map } for pid=21556 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3167.478756] audit: type=1400 audit(2000002860.480:84379): avc: denied { map } for pid=21555 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3167.478780] audit: type=1400 audit(2000002860.510:84380): avc: denied { map } for pid=21555 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:21:00 executing program 3: r0 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nvme-fabrics\x00', 0x4c02c0, 0x0) r1 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r5, 0xae60) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r5, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r5, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r5, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x11c000}) ioctl$KVM_NMI(r6, 0xae9a) ioctl$KVM_RUN(r6, 0xae80, 0x0) r7 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x1) r8 = dup2(r7, r1) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r8, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r8, 0x40605346, &(0x7f0000000040)={0x0, 0x0, {0x3}}) write$sndseq(r8, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0x72c6831c) r9 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000180)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_LIST(r8, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, r9, 0x300, 0x70bd29, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'virt_wifi0\x00'}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @local}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @rand_addr=0x40}]}, 0x38}, 0x1, 0x0, 0x0, 0xc0}, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x60, r9, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @remote}, @NLBL_UNLABEL_A_SECCTX={0x29, 0x7, 'system_u:object_r:getty_var_run_t:s0\x00'}, @NLBL_UNLABEL_A_ACPTFLG={0x5}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @remote}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @local}]}, 0x60}, 0x1, 0x0, 0x0, 0x10}, 0x4) syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="626172723beb4c26b49581260c73aedd3518a7c50100005903000000000000911e39bd407d91631cc023355c5358d7976ffa87b57cac08759e4e49f43a8dc672cac7eb3868fcd8c0e1690366383112f9c1fadfb1655f33854bf496833ea3027003f0b698e5d952a3dfe01d486f4c611dc3a2da8d2b16fe9ee5669fe33bbf398757"]) 04:21:01 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa00}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) 04:21:01 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800280010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) 04:21:01 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x418c, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) [ 3168.416541] gfs2: invalid mount option: barr;L&& s5 [ 3168.485260] gfs2: can't parse mount arguments 04:21:01 executing program 5: r0 = dup(0xffffffffffffffff) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfd53) r1 = socket(0x11, 0x800000003, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_GET_XCRS(r0, 0x8188aea6, &(0x7f0000000140)={0x4, 0x9, [{0x1, 0x0, 0x7}, {0x0, 0x0, 0x4daf}, {0x2, 0x0, 0x10000000200}, {0x5, 0x0, 0x8001}]}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$NFT_MSG_GETSET(r3, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x114}, 0x1, 0x0, 0x0, 0x20001040}, 0x2000c010) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) r5 = socket(0x11, 0x800000003, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r5, 0x0, r6) fcntl$F_GET_FILE_RW_HINT(r5, 0x40d, &(0x7f0000000080)) syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) connect$rxrpc(r7, &(0x7f00000001c0)=@in6={0x21, 0x3, 0x2, 0x1c, {0xa, 0x4e20, 0x6, @empty, 0x7}}, 0x24) bind$inet(r4, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000000)='cdg\x00', 0x4) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) sendto$inet(r4, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b0", 0x27, 0x11, 0x0, 0x0) [ 3168.535108] netlink: 'syz-executor.1': attribute type 5 has an invalid length. 04:21:02 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newlink={0x54, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x10, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc}]}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x54}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0xfffffffe, {0x0, 0x0, 0x0, r4}}, 0x20}}, 0x0) 04:21:02 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xc00}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) 04:21:02 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800300010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) 04:21:02 executing program 3: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount$9p_rdma(&(0x7f0000000000)='127.0.0.1\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f00000002c0)={'trans=rdma,', {'port'}, 0x2c, {[{@sq={'sq'}}]}}) r0 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyS3\x00', 0x400000, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000024c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="3f02000000000000000001000000000000000c4100000014001462726f6164636173742d80696e6b0000"], 0x30}, 0x1, 0xfffffff0}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(r0, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x1c, r2, 0x300, 0x70bd25, 0x25dfdbfd, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4c810}, 0x80) [ 3169.836254] netlink: 'syz-executor.1': attribute type 5 has an invalid length. 04:21:03 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000000)="580000001500add427323b472545a45602117fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac710d2d82817a90d626c65280003ffffffffffffffffffffffe7ee000000", 0x58}], 0x1) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) ioctl$DRM_IOCTL_VERSION(r1, 0xc0406400, &(0x7f0000000300)={0x4, 0x6aa8c000, 0xd5, 0xf, &(0x7f0000000100)=""/15, 0x1c, &(0x7f0000000140)=""/28, 0xcd, &(0x7f0000000200)=""/205}) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x8}, 0x0) [ 3169.975708] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 04:21:03 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000880350010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) 04:21:03 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xe00}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) 04:21:03 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x4190, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) [ 3170.724234] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 04:21:04 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f0000000500)={'#! ', './file0', [{0x20, 'vboxnet0\\selinux(#'}, {0x20, 'eth0vboxnet1\''}], 0xa, "604a977a2e6faae291eacfcb94d03bbc8174b0d14a03c80558cf7655a01b7dcdde60d96948fe0dd02c5f15e2a6aa30ef38247eb3800bc9b2bc0a7745c5bdbcb77322f1634dcd9ff301a15f13c67dfe37c15fca4554fcca80a4301292990862dd9b85b3f5391350d132c7b852e9f57869ecfd7167c6eb9e85c9451443896f406d7bb41020e9738fed7c887703fe3ac8f91ba51bd4b6e7e14ab86af9f959047a1e33f9e4d18f5a15c1c110340cfdfc753475a38444b14be028fce7ac462d7cc12ef508ed7b21d7c0bdec83bd1f595f26f23e8aba5a4ccab00e6d28d3"}, 0x107) prctl$PR_SET_PTRACER(0x59616d61, r0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x203e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$tipc(r1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x8, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0xb000, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2}, 0x0, 0xfff7ffffffffffff, r2, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x4, 0xff, 0x2, 0x0, 0x0, 0x7ff, 0x2a80, 0xb, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x2}, 0x220, 0x81, 0x9, 0x8, 0xffffffff, 0x6, 0x3f}, 0xffffffffffffffff, 0x10, r1, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000140), &(0x7f00000001c0)=0x4) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 3170.928884] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 04:21:04 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e220008003f0010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3171.014701] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 3171.080817] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 04:21:04 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newlink={0x54, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x10, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc}]}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x54}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0xffffffff, {0x0, 0x0, 0x0, r4}}, 0x20}}, 0x0) 04:21:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1500}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) 04:21:04 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f0000000200)={0xa, 0x404e20, 0x0, @loopback}, 0x1c) bind$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x4, 0x0, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0xa040, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x33, &(0x7f0000000480)={0x0, 0x0}, 0x10) getsockopt(0xffffffffffffffff, 0x0, 0x401, 0x0, &(0x7f0000000180)) sendmsg$inet(0xffffffffffffffff, 0x0, 0x20000000) listen(r0, 0x400000001ffffffd) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f0000000040)={'bond0\x00', 0x8}) r3 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PPPIOCSFLAGS1(r3, 0x40047459, &(0x7f0000000240)=0x20000) sendmmsg(r2, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}}], 0x4000000000000d0, 0x0) 04:21:04 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x4194, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) 04:21:05 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000805430010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3172.214395] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 3172.235434] kauditd_printk_skb: 187 callbacks suppressed [ 3172.235451] audit: type=1400 audit(2000002865.440:84568): avc: denied { map } for pid=21646 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3172.425575] device macvlan721 entered promiscuous mode [ 3172.468197] audit: type=1400 audit(2000002865.440:84569): avc: denied { map } for pid=21643 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3172.514142] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 04:21:05 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000180)=0x2, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6(0xa, 0x5, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x63) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20044882, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x48000000]}}, 0x1c) 04:21:05 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer2\x00', 0x0, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r1, 0x800000c004500a, 0x0) r2 = socket$can_raw(0x1d, 0x3, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800cb2d000f08a02fbd8a000055d2000000000020000000000000000000e0b51c7cd39fa34d6421ce80103a09dbc19d49cc750e948c8ffe7fa41b2222803b4c95fcd4ba357f1f9478f604a3544255df65887930", @ANYRES32=r5, @ANYBLOB="000000000000000014001280090001007663616e0000000004000280"], 0x34}}, 0x0) statx(r4, &(0x7f0000000000)='./file0\x00', 0x6000, 0xba54188fe99a2673, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RGETATTR(r0, &(0x7f0000000400)={0xa0, 0x19, 0x2, {0x0, {0x10, 0x1, 0x2}, 0x30, 0xee01, r6, 0x7, 0x1, 0x3192, 0x40, 0x959, 0x0, 0x591e, 0x2, 0x4a, 0x8, 0x7, 0x0, 0xf797, 0x2, 0x7fffffff}}, 0xa0) bind$can_raw(r2, &(0x7f0000000040)={0x1d, r5}, 0x10) clock_gettime(0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff}, 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r7+30000000}, 0x0) 04:21:05 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x2000}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) [ 3172.659858] audit: type=1400 audit(2000002865.440:84570): avc: denied { map } for pid=21641 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3172.822988] audit: type=1400 audit(2000002865.480:84571): avc: denied { map } for pid=21646 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3173.004486] audit: type=1400 audit(2000002865.500:84572): avc: denied { map } for pid=21643 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3173.213055] audit: type=1400 audit(2000002865.500:84573): avc: denied { map } for pid=21643 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:21:06 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000888470010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) 04:21:06 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x4198, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) [ 3173.375056] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3173.399946] audit: type=1400 audit(2000002865.540:84574): avc: denied { map } for pid=21658 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3173.541368] audit: type=1400 audit(2000002865.540:84575): avc: denied { map } for pid=21658 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3173.589309] selinux_nlmsg_perm: 20 callbacks suppressed [ 3173.589336] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3840 sclass=netlink_route_socket pig=21680 comm=syz-executor.5 [ 3173.714116] audit: type=1400 audit(2000002865.550:84576): avc: denied { map } for pid=21646 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3173.837436] audit: type=1400 audit(2000002865.550:84577): avc: denied { map } for pid=21641 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3173.895949] netlink: 'syz-executor.1': attribute type 5 has an invalid length. 04:21:07 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newlink={0x54, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x10, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc}]}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x54}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, r4}}, 0x20}}, 0x0) 04:21:07 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3f00}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) [ 3174.060107] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3840 sclass=netlink_route_socket pig=21682 comm=syz-executor.5 04:21:07 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000888480010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) 04:21:07 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4000000043) r1 = socket(0x11, 0x800000003, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r3, 0x84, 0xc, &(0x7f0000000040)=0xfffffff8, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev}, 0x0, 0x0) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r4, &(0x7f000087dffe)='v', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 04:21:07 executing program 3: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0xfffffffffffffffc, 0x0, 0x0, 0x0, &(0x7f0000001ac0)) 04:21:08 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x419c, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) 04:21:08 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800600010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3175.122580] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 04:21:09 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) [ 3176.597331] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 04:21:09 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000888640010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) 04:21:09 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="58000000020601000000980000000000000000000500040000000000090002007344da6602d9b107efce797a30000000000c000780080013400000000005000500020000000500010006001c00110003006861"], 0x58}}, 0x0) 04:21:10 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(r0, 0x0, 0x0) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(0xffffffffffffffff, 0x28, 0x6, &(0x7f0000000040), 0x10) ioprio_get$uid(0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0xf) setsockopt$RXRPC_SECURITY_KEY(0xffffffffffffffff, 0x110, 0x1, &(0x7f00000003c0)='mime_type*\x00', 0xb) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="14e49c1408a86baece4ddbb91b000000", @ANYRES16=r2, @ANYBLOB="0100000000000000000009000000"], 0x14}}, 0x0) ioctl$PPPOEIOCDFWD(0xffffffffffffffff, 0xb101, 0x0) ioctl$SNDCTL_DSP_GETIPTR(r0, 0x800c5011, &(0x7f00000000c0)) r3 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r3, 0x4008af12, &(0x7f0000000380)={0x1, 0x5}) 04:21:10 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x41a0, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) 04:21:10 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a9ec8a3a63673a36d66b103e1fdbb4678731c44d5772a8b52f88132613f2ab9faa48e75b0508e2367018dc4479c6757b0a5622107e780a52d43a222d4aa8fa0c3e961e2401d5dbb22107ce4584d22a35c2ff5c7069779f3a8e888a8ac94312cdb43f7907ebfcf3dc4ad1f5e7577c5c2c9146439e6910c437a8213e177dfca08fb12f6c6a8343821e53d1f0ef24575797141dd16b8065042500017c0bab7265ba185fa61404145c500be7e57f2af455765c675c710da30fb915abbfcb8fe5e5a54f998aeb8ecb869537d7ddb529a8d66a4905586c9dd0d81d4841e2c90bd8fa2bf3802bf963edaae01ebd125510bbe75beac077af773d5d2a34b256e8369f68b0fcab87c7ee033997f53b635b59ac5aa1456d0b35e1dd734149dbcf541d744962b2bd0ece4c267760c3a6d4bce9b03000000cfa703a1a48b59700f8c902e46ae26e6e31185a19c07959edcb6bfc88c9e6bc124147521f6eb327231e35785951377c40b713a4f6854b02c428bef068f9494aa8fc9f99ddff40ef4fdc9360eb1bc2a25ac491f2bc9c7a23fe5662170feb55b3999b45b8b80a8438df19e183d854691a1f2b34352fed522c4265e4ece52f35d351a1676982ce0f2eb2c454b9df04b976179611f1be4deac0dd4c79a122f3d33e52bcce38808809820094c31af5cca2d79bf783bb87588d8c21bad663bbde2644cab2b605d0ca91b5c2417ab7c7bba5173b0bfddfd1d87ce6d257c0526fc051adaf783cb44e5f09899886b26ca746f8d2b392e0871bca6f1cb40c5ac1bf5ca80b934424deddfb547d8f9a38a25aa39752cac866986bb0faaf07ffeecd27bd736fa1a058ee5b17adbde605eb5f3648b4ee013640d018b42ef6b"], 0x48}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newlink={0x54, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x10, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc}]}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x54}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0x0, {0x2, 0x0, 0x0, r4}}, 0x20}}, 0x0) [ 3177.176386] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 3177.376326] kauditd_printk_skb: 145 callbacks suppressed [ 3177.376343] audit: type=1400 audit(2000002870.580:84723): avc: denied { map } for pid=21834 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:21:10 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4603}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) 04:21:10 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e2200080e800010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3177.569321] audit: type=1400 audit(2000002870.610:84724): avc: denied { create } for pid=21836 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 04:21:10 executing program 3: r0 = socket$inet6(0xa, 0x8000008000080003, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bond_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYRES16, @ANYRES32=r1, @ANYBLOB="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"], 0x3}}, 0x0) close(r0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0x2, 0x0) r3 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x20, 0x2040) ioctl$TIOCL_SETSEL(r3, 0x541c, &(0x7f0000000100)={0x2, {0x2, 0x8, 0x6, 0x6, 0x108, 0x11}}) [ 3177.763155] audit: type=1400 audit(2000002870.610:84725): avc: denied { map } for pid=21834 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3177.956553] audit: type=1400 audit(2000002870.650:84726): avc: denied { write } for pid=21836 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 3177.975636] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3178.216104] audit: type=1400 audit(2000002870.650:84727): avc: denied { map } for pid=21834 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3178.395318] audit: type=1400 audit(2000002870.650:84728): avc: denied { map } for pid=21834 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3178.550379] audit: type=1400 audit(2000002870.700:84729): avc: denied { map } for pid=21834 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:21:11 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000835800010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3178.635604] netlink: 'syz-executor.1': attribute type 5 has an invalid length. 04:21:11 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x41a4, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) [ 3178.732260] audit: type=1400 audit(2000002870.730:84730): avc: denied { create } for pid=21836 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 3178.804599] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 04:21:12 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4703}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) [ 3178.933133] audit: type=1400 audit(2000002870.750:84731): avc: denied { map } for pid=21834 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:21:12 executing program 5: shmget(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000400000084) r2 = msgget$private(0x0, 0x0) msgsnd(r2, &(0x7f0000000a00)=ANY=[@ANYRESHEX], 0x1, 0x0) msgrcv(r2, 0x0, 0x0, 0x0, 0x1800) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f00000000c0)=0x3) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="6560000000b7d0616a06ac725ea803a4b595000000000000000042114b9431ab09443a7326cdd0e8b53e10b3275b0b8561001de47d99d3dd944415cc9cfd44b084bc490074978d911048146aee999eabca26ddd46ef52a7696c74674ce00a679b839ea4f4aa3c4aef5dba2190f1383d6bfbc772428607e89163f9e28599c45175d91df56ccdc15a3042cd25c217e9132d75ab1d59c838ac4a45e7b84f02dc0dc20305cc084917279b29d23e007"], 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) ioctl$TIOCMSET(r4, 0x5418, &(0x7f0000000540)=0x38) fadvise64(r5, 0x0, 0x8000, 0x2) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x400, 0x0) ioctl$EVIOCGPROP(r6, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r6, 0x540f, &(0x7f0000000a80)=0x0) epoll_ctl$EPOLL_CTL_MOD(r6, 0x3, r5, &(0x7f0000000740)={0x4}) kcmp(r7, 0x0, 0x2, r5, r4) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f00000000c0)={0x67, 0x5, {r7}, {0x0}, 0x7f2b15d7, 0x3}) newfstatat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x800, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000,user_id=', @ANYRESDEC=r8, @ANYBLOB=',group_id=', @ANYRESDEC=r9, @ANYBLOB="2c6d61785f726561643d3007000000300230303030303030346331392c626c6b736980653d3078303030303051303030303030303630302c646f6e745f6d6561737572652c7569643e", @ANYRESDEC=0xee00, @ANYBLOB=',subj_user={bdev,smackfstransmute=/dev/kvm\x00,\x00']) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0xc) r12 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r12) ptrace$setopts(0x4206, r12, 0x0, 0x0) r13 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r13) ptrace$setopts(0x4206, r13, 0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f0000000400)={{0x2, 0xee00, r9, r10, r11, 0x81, 0x5}, 0x0, 0x0, 0x10000, 0x9, 0x10000, 0x2a51, 0xffffffff, 0x5, 0x2, 0x168e, r12, r13}) bind$inet6(r1, &(0x7f0000ed3fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f00000000c0)="bd", 0x1, 0x0, &(0x7f0000bb6000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r1) r14 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x101000, 0x0) r15 = syz_open_dev$media(0x0, 0x0, 0x0) r16 = accept4(r15, &(0x7f00000000c0)=@isdn, &(0x7f0000000000)=0x80, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r15, 0x84, 0x14, &(0x7f0000000140)=@assoc_value={0x0}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r16, 0x84, 0x17, &(0x7f00000001c0)={r17, 0x9}, 0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000040)={r17, 0x5, 0x20, 0xfffffffffffffffa, 0x100}, &(0x7f0000000080)=0x18) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r14, 0x84, 0x19, &(0x7f0000000100)={r18, 0x2}, 0x8) 04:21:12 executing program 3: socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') r1 = socket$kcm(0xa, 0x1, 0x0) socketpair(0x6, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffff58) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x8916, &(0x7f0000000000)={r2}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000004c0)='lo\x00\x96o8\x14d\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\'m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1') [ 3179.102350] audit: audit_backlog=65 > audit_backlog_limit=64 04:21:12 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newlink={0x54, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x10, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc}]}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x54}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0x0, {0x3, 0x0, 0x0, r4}}, 0x20}}, 0x0) 04:21:13 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800810010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3179.998342] netlink: 'syz-executor.1': attribute type 5 has an invalid length. 04:21:13 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x41a8, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) [ 3180.127550] device macvlan725 entered promiscuous mode [ 3180.224675] device lo entered promiscuous mode 04:21:13 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4800}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) 04:21:14 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000847880010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) 04:21:14 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000848880010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3181.557381] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 3181.614774] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 04:21:14 executing program 3: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket(0x11, 0x800000003, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VIDIOC_DECODER_CMD(r2, 0xc0485660, &(0x7f0000000100)={0x1, 0x2, @raw_data=[0x200, 0x80000000, 0x3, 0x1ff, 0x3, 0x1, 0x4, 0x7ff, 0x0, 0x8000, 0x17c0, 0x0, 0x1, 0x9, 0x5, 0x5]}) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='squashfs\x00', 0x0, 0x0) syz_mount_image$iso9660(&(0x7f00000003c0)='iso9660\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x8, &(0x7f0000000e00)=[{0x0}, {&(0x7f0000000480)="6537493f8c1fa17570ccc646baba07d10e5e861c78bdc2d6836a75094b2026903343bd1fa5f283f9b0d4cd644694d0d226b845100456193d95e74bf86fc41040f1372d", 0x43, 0x7}, {&(0x7f0000000500)="b2a31a0e40bca3d48b305ed2095300"/25, 0x19}, {&(0x7f0000000540)="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", 0x236}, {&(0x7f0000000b40)="1b3f095dfffdcabc51bb6216f279d8eaf0c0b6f9c0828336c76758e08db1e400c5d5fc0884daa58457cd878896da7c3deab48f2754604ef6bbb02b86fedc64a32fe6afbdc3d542399ef285e135679aa8cac80ab40697502d6afe31f5951de92ddb4728f998f209d65672c28826a40af359581e1fa15f4a05477ef079d2e081d23a5f07fc9d765143de42ad016b4daf85f78cb7bdb581b846703cbffcb37afd2d01c13202667adcb9bcf523115b9e1301679db8", 0xb3, 0xe5}, {&(0x7f0000000c40)="8eca098d821745e7f6c4ca5ae698f4ce65b5b6b4c06b1a7589a9b1509b435cc9a8a3c5ccde179a2421d69868a4eb70c97ef4a0bdb811a5049091173fe6e66ea52740592e3d4d4bc70f3ea11280008794cec2c21db8ff32c09543ecc611c1f294016e946e1a198cea88ac1738dfda793f7944625f477b168a360c9a", 0x7b, 0x401}, {&(0x7f0000000cc0)="fe11c12521a6a7c94f371821a5690eefd3fe71c3badb13f00dda60354948b2df11a525720dd3e22edfb7683f7a6c20e2460b5eba3822a8e44aabd9cf266dfc8484fb3c724e414b1e82d0f2bbefd8449d786fc5fcdf4c2867cf7b440684604d8d2e194f521126988563cc5c26cfe9866ea87bd443446aad75f000597a559cfb998576b6990e8789bc99dc96335dccd94a4a26ecd1175597d4aed2f18845712e2430125af574a899716dc3fab8220df724a43c075fce8136ae5f5f0a87df28ca69ff66dbf938ad8c622f135880ae58c0e63abdda3773874bfb", 0xd8, 0xf6ef}, {&(0x7f0000000dc0)="0cc22d8b921d1665482033eb66fce31a906c6f1db07fc88d957f82a1615c1238674698228c6a9daa6a5fbfa094", 0xffffffffffffff24}], 0x0, &(0x7f0000000780)={[{@norock='norock'}, {@block={'block'}}, {@map_acorn='map=acorn'}, {@map_normal='map=normal'}, {@nojoliet='nojoliet'}, {@session={'session'}}, {@uid={'uid'}}, {@dmode={'dmode'}}]}) 04:21:15 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_init_net_socket$netrom(0x6, 0x5, 0x0) write$binfmt_elf64(r0, &(0x7f0000000600)=ANY=[@ANYBLOB="1b5b346e00020000000000000000000002000000000000000000000000000000400000200000000000000000000000000000000000003800000000000000000000000000000000000000000000000000010400000000000000f6ff00000000000000000400000000"], 0x78) write$6lowpan_control(r2, &(0x7f0000000000)='disconnect aa:aa:aa:aa:aa:10 2', 0x1e) [ 3182.391254] kauditd_printk_skb: 161 callbacks suppressed [ 3182.391276] audit: type=1400 audit(2000002875.590:84891): avc: denied { map } for pid=21964 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3182.429112] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 04:21:15 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000864880010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3182.532337] audit: type=1400 audit(2000002875.660:84892): avc: denied { map } for pid=21964 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3182.661863] audit: type=1400 audit(2000002875.660:84893): avc: denied { map } for pid=21964 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3182.784807] audit: type=1400 audit(2000002875.720:84894): avc: denied { map } for pid=21964 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3182.858752] print_req_error: I/O error, dev loop7, sector 0 [ 3182.864298] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 3182.869638] SQUASHFS error: squashfs_read_data failed to read block 0x0 [ 3182.894567] squashfs: SQUASHFS error: unable to read squashfs_super_block [ 3182.910041] audit: type=1400 audit(2000002875.730:84895): avc: denied { map } for pid=21964 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:21:16 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x41ac, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) 04:21:16 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newlink={0x54, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x10, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc}]}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x54}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0x0, {0x4, 0x0, 0x0, r4}}, 0x20}}, 0x0) 04:21:16 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4c00}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) [ 3183.103388] audit: type=1400 audit(2000002876.030:84896): avc: denied { map } for pid=22031 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3183.270810] audit: type=1400 audit(2000002876.040:84897): avc: denied { map } for pid=22031 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:21:16 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000806890010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3183.448533] audit: type=1400 audit(2000002876.050:84898): avc: denied { map } for pid=22031 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3183.550621] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3183.617820] audit: type=1400 audit(2000002876.050:84899): avc: denied { map } for pid=22031 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3183.709975] print_req_error: I/O error, dev loop7, sector 0 [ 3183.720449] SQUASHFS error: squashfs_read_data failed to read block 0x0 [ 3183.769934] audit: type=1400 audit(2000002876.100:84900): avc: denied { map } for pid=22031 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3183.807308] squashfs: SQUASHFS error: unable to read squashfs_super_block 04:21:17 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$nbd(&(0x7f0000000000)='nbd\x00') r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfec8) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x47}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000200)='illinois\x00', 0x9) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) read(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 04:21:17 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$bt_cmtp(0x1f, 0x3, 0x5) poll(&(0x7f0000000040)=[{r0, 0x2}, {r1, 0x1002}], 0x2, 0x3) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x88, 0x0, @remote, @local}, {0x0, 0x0, 0x8}}}}}, &(0x7f0000000000)={0x0, 0x2, [0x0, 0xf46]}) [ 3184.178119] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 3184.311675] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 04:21:17 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x41b0, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) 04:21:17 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800f00010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) 04:21:17 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4ca2}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) 04:21:18 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newlink={0x54, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x10, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc}]}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x54}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0x0, {0x5, 0x0, 0x0, r4}}, 0x20}}, 0x0) 04:21:18 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000200)='./file0\x00') mknod(&(0x7f0000000000)='./bus\x00', 0xffe, 0x0) clone(0x21000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f00000000c0), &(0x7f00000001c0)=0xc) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_BEGIN_FF_UPLOAD(r2, 0xc06855c8, &(0x7f0000000140)={0x2, 0x800, {0x53, 0x6, 0x1, {0x2, 0x3}, {0xfffc, 0xfff7}, @const={0xfff, {0x6, 0x2, 0x401, 0x79d}}}, {0x51, 0x1f, 0x7f, {0x20, 0x2d6f}, {0x1, 0xff}, @cond=[{0x0, 0x2c, 0x1, 0x100, 0x1ff, 0xd19}, {0x80, 0x40, 0x52, 0xff62, 0x1, 0x6}]}}) 04:21:18 executing program 3: r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ioctl$BLKBSZGET(r1, 0x80081270, 0x0) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x1000f4) ftruncate(r1, 0x8200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x294ad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000001000)) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = fcntl$dupfd(r3, 0x0, r4) r6 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r6) ptrace$setopts(0x4206, r6, 0x0, 0x0) r7 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r7) ptrace$setopts(0x4206, r7, 0x0, 0x0) getpgrp(r7) prctl$PR_SET_PTRACER(0x59616d61, 0x0) r8 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/net/pfkey\x00', 0xa8c0ae64146851e9, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000100)={0x0, 0xfff, 0x5}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000001600)={'ip6tnl0\x00', &(0x7f0000000480)=ANY=[@ANYRES32]}) ioctl$KDGETKEYCODE(r2, 0x4b4c, &(0x7f00000000c0)={0x5e3}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80000, 0x0) ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f0000000340)) syz_open_dev$dri(&(0x7f0000000380)='/dev/dri/card#\x00', 0x9, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x4) ioctl$ASHMEM_GET_PROT_MASK(0xffffffffffffffff, 0x7706, 0x0) r9 = socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r9, 0x84, 0xa, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r10}, 0x20) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r8, 0x84, 0x13, &(0x7f0000000140)={r10, 0x80}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000240)=ANY=[@ANYRES32=r11, @ANYBLOB="4b000000fc09e56c1abb6e35f5afbf2e1593e275a3f31cd3eea69cf3444b7b9b593c4c62ab0d5f51fc1794e476df1281003442d0e52b74b3b908042d04a9cf0000000000000000"], &(0x7f0000000300)=0x53) [ 3185.282143] netlink: 'syz-executor.1': attribute type 5 has an invalid length. 04:21:18 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800020010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) 04:21:18 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5865}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) 04:21:18 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x41b4, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) [ 3185.804818] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 04:21:19 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800030010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3187.015489] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 3187.116895] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 04:21:20 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x6000}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) 04:21:20 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x41b8, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) 04:21:20 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f00000002c0)={0x0, 0x61, "609232b08e589f7036a739222a00f09dd83945fd6fb82ba8486aeb45cfaae530eef7e96d4e3c5fd1d37978a611b6b7551261f09c08890da35f3e13fd2f3af2c448005fe4af7fde63689fd5a7aefb6f9bbf5e33e2294fbd819d3df1c598911e9b45"}, &(0x7f0000000000)=0x69) setsockopt$inet_sctp6_SCTP_MAXSEG(r4, 0x84, 0xd, &(0x7f0000000200)=@assoc_value={r5, 0x2}, 0x8) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000280)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x14, 0x2, 0x0, 0x1, [@vti_common_policy=[@IFLA_VTI_LINK={0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @multicast2}]}}}]}, 0x40}}, 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'veth0_to_team\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="3c00000005000000000000352adc3e25062700000000000006000000000000164a387ada4280c24fd229434c38387f023d8441862c5133c526c0b8f61d267460f96229b339acdc1eb19b445051a9fcdaa4f53f423b95b54e2232f0c44096875421d0bc5c9dbe50a9dbfc2f6698ff21b7c10451450f605521940daa"]}) [ 3187.410164] kauditd_printk_skb: 152 callbacks suppressed [ 3187.410181] audit: type=1400 audit(2000002880.610:85053): avc: denied { map } for pid=22119 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:21:20 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a9ec8a3a63673a36d66b103e1fdbb4678731c44d5772a8b52f88132613f2ab9faa48e75b0508e2367018dc4479c6757b0a5622107e780a52d43a222d4aa8fa0c3e961e2401d5dbb22107ce4584d22a35c2ff5c7069779f3a8e888a8ac94312cdb43f7907ebfcf3dc4ad1f5e7577c5c2c9146439e6910c437a8213e177dfca08fb12f6c6a8343821e53d1f0ef24575797141dd16b8065042500017c0bab7265ba185fa61404145c500be7e57f2af455765c675c710da30fb915abbfcb8fe5e5a54f998aeb8ecb869537d7ddb529a8d66a4905586c9dd0d81d4841e2c90bd8fa2bf3802bf963edaae01ebd125510bbe75beac077af773d5d2a34b256e8369f68b0fcab87c7ee033997f53b635b59ac5aa1456d0b35e1dd734149dbcf541d744962b2bd0ece4c267760c3a6d4bce9b03000000cfa703a1a48b59700f8c902e46ae26e6e31185a19c07959edcb6bfc88c9e6bc124147521f6eb327231e35785951377c40b713a4f6854b02c428bef068f9494aa8fc9f99ddff40ef4fdc9360eb1bc2a25ac491f2bc9c7a23fe5662170feb55b3999b45b8b80a8438df19e183d854691a1f2b34352fed522c4265e4ece52f35d351a1676982ce0f2eb2c454b9df04b976179611f1be4deac0dd4c79a122f3d33e52bcce38808809820094c31af5cca2d79bf783bb87588d8c21bad663bbde2644cab2b605d0ca91b5c2417ab7c7bba5173b0bfddfd1d87ce6d257c0526fc051adaf783cb44e5f09899886b26ca746f8d2b392e0871bca6f1cb40c5ac1bf5ca80b934424deddfb547d8f9a38a25aa39752cac866986bb0faaf07ffeecd27bd736fa1a058ee5b17adbde605eb5f3648b4ee013640d018b42ef6b"], 0x48}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newlink={0x54, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x10, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc}]}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x54}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0x0, {0x6, 0x0, 0x0, r4}}, 0x20}}, 0x0) 04:21:20 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800050010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) 04:21:20 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) mlockall(0x3) r3 = socket(0x11, 0x800000003, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket(0x11, 0x800000003, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) eventfd(0xfffffff8) r8 = fcntl$dupfd(r6, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r8, 0x4) accept4(r5, &(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000080)=0x80, 0x0) [ 3187.645755] audit: type=1400 audit(2000002880.650:85054): avc: denied { map } for pid=22119 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3187.804620] audit: type=1400 audit(2000002880.710:85055): avc: denied { map } for pid=22119 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3187.904417] audit: type=1400 audit(2000002880.750:85056): avc: denied { map } for pid=22123 comm="true" path="/bin/true" dev="sda1" ino=1443 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3188.088533] audit: type=1400 audit(2000002880.750:85057): avc: denied { map } for pid=22123 comm="true" path="/bin/true" dev="sda1" ino=1443 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3188.258052] audit: type=1400 audit(2000002880.770:85058): avc: denied { map } for pid=22119 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3188.276998] netlink: 'syz-executor.1': attribute type 5 has an invalid length. 04:21:21 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800080010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3188.418041] audit: type=1400 audit(2000002880.770:85059): avc: denied { map } for pid=22119 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3188.556784] audit: type=1400 audit(2000002880.790:85060): avc: denied { map } for pid=22123 comm="true" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3188.582917] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 04:21:21 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x6558}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) [ 3188.748890] audit: type=1400 audit(2000002880.790:85061): avc: denied { map } for pid=22123 comm="true" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:21:22 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x41c0, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) [ 3188.934161] audit: type=1400 audit(2000002880.810:85062): avc: denied { map } for pid=22119 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3189.468147] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 04:21:22 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400add427323b470c458c560a", 0x11}], 0x1) close(r2) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="06"], 0x1}}, 0x0) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfeac) splice(r0, 0x0, r2, 0x0, 0x20000000010002, 0x0) 04:21:22 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e220008000d0010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3189.795382] netlink: 'syz-executor.1': attribute type 5 has an invalid length. 04:21:23 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newlink={0x54, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x10, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc}]}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x54}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0x0, {0x7, 0x0, 0x0, r4}}, 0x20}}, 0x0) [ 3189.962267] device macvlan731 entered promiscuous mode 04:21:23 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x6800}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) [ 3190.425607] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=22169 comm=syz-executor.3 04:21:23 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x41c8, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) [ 3190.489172] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=22169 comm=syz-executor.3 04:21:23 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800280010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3190.606689] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=22169 comm=syz-executor.3 [ 3190.727574] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=22169 comm=syz-executor.3 [ 3190.817362] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=22169 comm=syz-executor.3 [ 3190.905774] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=22169 comm=syz-executor.3 [ 3190.969513] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3190.997151] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=22169 comm=syz-executor.3 [ 3191.139387] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=22169 comm=syz-executor.3 [ 3191.222964] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=22169 comm=syz-executor.3 [ 3191.302961] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=22169 comm=syz-executor.3 04:21:24 executing program 5: ioperm(0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) getpgrp(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000000)={0x18}, 0x18) mkdir(&(0x7f0000000500)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000280)='configfs\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = socket(0x11, 0x800000003, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r1) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000540)={{{@in6=@mcast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000180)=0xe8) mount$9p_rdma(&(0x7f0000000080)='127.0.0.1\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x88020, &(0x7f0000000640)={'trans=rdma,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@common=@cache_fscache='cache=fscache'}, {@rq={'rq', 0x3d, 0x6}}, {@sq={'sq', 0x3d, 0x8}}, {@timeout={'timeout', 0x3d, 0x1}}, {@timeout={'timeout', 0x3d, 0x4}}, {@rq={'rq', 0x3d, 0x4bb8}}, {@common=@afid={'afid', 0x3d, 0x7fff}}, {@rq={'rq', 0x3d, 0x7}}, {@rq={'rq', 0x3d, 0x4}}, {@sq={'sq', 0x3d, 0x1}}], [{@euid_lt={'euid<', r2}}, {@subj_type={'subj_type', 0x3d, 'TIPCv2\x00'}}, {@dont_measure='dont_measure'}]}}) lstat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000400)) socket(0x29, 0x2, 0x7f) 04:21:24 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800300010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3191.435221] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 3191.531704] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 04:21:24 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x6c00}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) 04:21:24 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x11, 0x800000003, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r3, 0x0, r4) syz_emit_ethernet(0x3, &(0x7f0000000000)=ANY=[@ANYRES64=0x0, @ANYRESHEX, @ANYRES32], 0x0) 04:21:25 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x41d0, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) 04:21:25 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newlink={0x54, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x10, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc}]}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x54}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0x0, {0x8, 0x0, 0x0, r4}}, 0x20}}, 0x0) 04:21:25 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800600010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3192.409106] overlayfs: overlapping lowerdir path [ 3192.421949] kauditd_printk_skb: 166 callbacks suppressed [ 3192.421966] audit: type=1400 audit(2000002885.620:85229): avc: denied { map } for pid=22206 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3192.497147] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3192.585519] audit: type=1400 audit(2000002885.660:85231): avc: denied { map } for pid=22206 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3192.755452] audit: type=1400 audit(2000002885.670:85232): avc: denied { map } for pid=22206 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3192.928552] audit: type=1400 audit(2000002885.670:85233): avc: denied { map } for pid=22206 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3193.003114] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 3193.069486] audit: type=1400 audit(2000002885.660:85230): avc: denied { write } for pid=22196 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 04:21:26 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x11, 0x800000003, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = ioctl$LOOP_CTL_GET_FREE(r5, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r6) syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0x3, 0x0) r7 = syz_open_dev$evdev(0xfffffffffffffffd, 0x0, 0x0) readv(r7, &(0x7f0000019fe0)=[{&(0x7f00008ec000)=""/219, 0x30}], 0x10000000000003c3) [ 3193.208929] audit: type=1400 audit(2000002885.690:85234): avc: denied { map } for pid=22203 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:21:26 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x7400}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) 04:21:26 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800f00010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3193.344116] audit: type=1400 audit(2000002885.690:85235): avc: denied { map } for pid=22203 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3193.488537] audit: type=1400 audit(2000002885.720:85236): avc: denied { map } for pid=22211 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3193.547491] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3193.571110] audit: type=1400 audit(2000002885.730:85237): avc: denied { map } for pid=22211 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:21:26 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x41d8, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) 04:21:26 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x7, 0x822, [0x20000640, 0x0, 0x0, 0x20000944, 0x20000a1a], 0x0, &(0x7f0000000000), &(0x7f0000000640)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{0x9, 0x4e, 0x940ea04be30f27ce, 'ipvlan1\x00', 'vcan0\x00', 'ip6tnl0\x00', 'ip_vti0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, [], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0x0, 0x0, 0xff], 0x9e, 0x14e, 0x186, [@cgroup0={{'cgroup\x00', 0x0, 0x8}, {{0x1, 0x1}}}], [@common=@nflog={'nflog\x00', 0x50, {{0x7fff, 0x4, 0x2, 0x0, 0x0, "3a2307e77a2c22e62f324bd0b358ec5b7d6777f87ed6fa0f72d40a185fe4c9ad758e026cc54bec08984aedec0c83c51dd2a22b4cbd4c720afea1807081194906"}}}, @snat={'snat\x00', 0x10, {{@remote, 0x2}}}], @arpreply={'arpreply\x00', 0x10, {{@broadcast, 0xffffffffffffffff}}}}, {0x11, 0x22, 0x8863, 'ip6_vti0\x00', 'veth1_to_bridge\x00', 'bridge_slave_0\x00', 'tunl0\x00', @local, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0xff, 0xff], 0xde, 0x116, 0x14e, [@stp={{'stp\x00', 0x0, 0x48}, {{0x5, {0x8, 0x200, 0x0, @random="75d7715f877e", [0xff, 0x0, 0x0, 0xff, 0xff], 0x2, 0x4, 0x40, 0x800, @local, [0xff, 0x0, 0xff], 0x4e21, 0x4e23, 0xfffb, 0x4, 0x8000, 0x1, 0x4ff, 0x400, 0x40, 0x3}, 0x10, 0x41}}}], [@arpreply={'arpreply\x00', 0x10, {{@dev={[], 0x43}, 0x1}}}], @snat={'snat\x00', 0x10, {{@empty, 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{0x5, 0x70, 0x8914, 'vxcan1\x00', 'wireguard1\x00', 'veth0_to_hsr\x00', 'erspan0\x00', @random="0ceb28e2ba37", [0x0, 0x0, 0x0, 0x0, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x6e, 0x6e, 0xa6, [], [], @snat={'snat\x00', 0x10, {{@local, 0x10}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x2, [{0x11, 0xa, 0x883e, 'syzkaller0\x00', 'syz_tun\x00', 'xfrm0\x00', 'veth0_to_bridge\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @remote, [0x0, 0x7f, 0xff, 0x0, 0xff, 0xff], 0x6e, 0xa6, 0xf6, [], [@arpreply={'arpreply\x00', 0x10, {{@empty, 0xffffffffffffffff}}}], @common=@log={'log\x00', 0x28, {{0x0, "f23eba85b51ef58bd8d65ed3825799e6920eddcddcd24b490447f9e0e434", 0x8}}}}, {0x9, 0x6c, 0x15, 'tunl0\x00', 'veth0_vlan\x00', 'wireguard1\x00', 'virt_wifi0\x00', @random="444e772ff5e8", [0x0, 0xff, 0xff, 0x0, 0xff], @dev={[], 0x12}, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x6e, 0x9e, 0xee, [], [@common=@AUDIT={'AUDIT\x00', 0x8, {{0x1}}}], @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7f, 'syz1\x00', {0x2}}}}}]}, {0x0, '\x00', 0x5, 0xfffffffffffffffe, 0x2, [{0x9, 0x9, 0xd, 'veth1_virt_wifi\x00', 'veth1_macvtap\x00', 'ip6erspan0\x00', 'netdevsim0\x00', @broadcast, [0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0xff, 0xff, 0x0, 0x0, 0xff, 0xff], 0xee, 0xee, 0x126, [@statistic={{'statistic\x00', 0x0, 0x18}, {{0x1, 0x0, 0x1f, 0x3, 0x8e9c, {0x1}}}}, @time={{'time\x00', 0x0, 0x18}, {{0x3e21, 0x7fffffff, 0x13ead, 0x8ee9, 0x0, 0x7, 0x1}}}], [], @arpreply={'arpreply\x00', 0x10, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 0xfffffffffffffffc}}}}, {0x5, 0x0, 0x1b, 'netpci0\x00', 'macsec0\x00', 'hsr0\x00', 'bond_slave_0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, [0x0, 0x0, 0xff, 0x0, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x6e, 0xa6, 0xde, [], [@snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffe9}}}], @arpreply={'arpreply\x00', 0x10, {{@remote, 0xffffffffffffffff}}}}]}]}, 0x89a) sendmmsg$inet(r0, &(0x7f0000000400)=[{{&(0x7f0000000240)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000300)=[{&(0x7f00000001c0)="e8", 0x1}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=[@ip_tos_u8={{0x11, 0x84, 0x3}}], 0x18}}], 0x2, 0x0) [ 3193.762740] audit: type=1400 audit(2000002885.740:85238): avc: denied { map } for pid=22206 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:21:27 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newlink={0x54, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x10, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc}]}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x54}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0x0, {0x9, 0x0, 0x0, r4}}, 0x20}}, 0x0) 04:21:27 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800000310000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) 04:21:27 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000380)=ANY=[@ANYBLOB="4000000010003b0e0600000000000000000f0000", @ANYRES32, @ANYBLOB="ffff03000000000008000a00", @ANYRES32, @ANYBLOB="1800120008000100707070000c00020008000100", @ANYRES64=r1, @ANYRESDEC=0x0], 0x7}}, 0x0) r2 = socket(0x11, 0x800000003, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @multicast1}, &(0x7f0000000100)=0xc) sendmsg$nl_route_sched(r4, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=@gettclass={0x24, 0x2a, 0x4, 0x70bd26, 0x25dfdbff, {0x0, 0x0, 0x0, r5, {0xfff1, 0xfff2}, {0xe, 0xffff}, {0x10, 0xa}}, ["", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x0) 04:21:27 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @dev, 0x0, 0x0, 'none\x00', 0x0, 0x7}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r3 = socket(0x11, 0x800000003, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SIOCAX25CTLCON(r5, 0x89e8, &(0x7f0000000200)={@default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, 0x5, 0xc3, 0x6, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @default]}) fchdir(r2) r6 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x2, 0x0) ioctl$FBIOPUT_VSCREENINFO(r6, 0x4601, &(0x7f0000000140)={0x3c00, 0x240, 0xf00, 0x10, 0x0, 0xed, 0x18, 0x2, {0xffffffff, 0x6}, {0x6, 0x8000}, {0x8, 0x3}, {0x7, 0x3, 0x1}, 0x0, 0x10, 0x0, 0x40, 0x1, 0x0, 0x6, 0x1, 0xfffffffc, 0x8, 0x9, 0x3, 0x17, 0x100, 0x1, 0xa}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='hugetlb.2MB.usage_in_bytes\x00', 0x26e1, 0x0) [ 3194.866059] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 04:21:28 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x7a00}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) 04:21:28 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800000510000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) 04:21:28 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x41dc, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) [ 3195.485944] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3195.634091] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 04:21:29 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="34000000640007070000000000000000000000002820211072d6241404", @ANYRES32=0x0, @ANYBLOB="00000000000000001400350073797a6b616c6c657230000000000000854ecaebf16b36b73300c6010ef0192726183a9c661eca24fdbd28dbcbf44f9f8dea3a1c04a5610fdabd1d97d3772b5eda449b4eabf326dfb7"], 0x34}}, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x400000, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) sched_getattr(r3, &(0x7f0000000000)={0x30}, 0x30, 0x0) r4 = getpgrp(0x0) setpriority(0x0, r4, 0xffff) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='[d::],08::6:'], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) write$cgroup_pid(r2, &(0x7f00000002c0), 0x12) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r5, 0x0, 0x0, 0x200007fd, 0x0, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x202a00, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) [ 3195.762931] netlink: 'syz-executor.1': attribute type 5 has an invalid length. 04:21:29 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newlink={0x54, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x10, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc}]}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x54}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0x0, {0xa, 0x0, 0x0, r4}}, 0x20}}, 0x0) 04:21:29 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800430510000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) 04:21:29 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x8100}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) 04:21:29 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000440)='gfs2\x00', &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="6c6f636b7461626c653d73656c6d6435737565246c6f747275737465645c2b766d6e657430271e033954fd2448706f7f69785f61636c5fd402fccfb94a41616363477373776c616e31657468302794657468306b657972e96e67667d766d6ea0da000000000000496655576c8518e1841f1872db22ddd6d75fbd2d84f4c62f3f2dace508d7aa149207ef1b2d67e017144a28ecc588504a2d8eb52682435a7565521093b52aa5918c212ab62009c6d4d751fd9c109c920b4ef7e36c869322c91e744de951b2c7c6567e57582643ace60d29b66c2034509cdcaf19dd8d129d9613ebe9ae564ea1d51c55e8e54334ca5036955ae0f9f3f6fba5c3cc7c9a34523bf595836d0a9efa3a9ec62c9a850f673e1571276888fbfd61369df9aa9fc6f32c61c4239b67ff01b5c9011755e258a60afe5c91fb527739e520205abd700e7fbce5120b645ac9aae7949611fe24e5692ba5c6adf1fc0a9520e61db683224e1517c1126418c41ede550b40b690c37a3deca45f611fb03e380907d5319de2a7a111ab2fa2f152830eac557e002d603c66ac64c5210eb2ebfad52b4fbec583c57f2fb96c4944e18184e4ee0d557368debc8071bfbef43c4bb4684f4554"]) 04:21:29 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x41e0, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) [ 3196.780538] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 04:21:30 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800080610000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3197.092925] libceph: connect [d::]:6789 error -101 [ 3197.099091] libceph: mon0 [d::]:6789 connect error [ 3197.186564] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 3197.254327] gfs2: not a GFS2 filesystem [ 3197.311940] device macvlan735 entered promiscuous mode [ 3197.430341] kauditd_printk_skb: 181 callbacks suppressed [ 3197.430361] audit: type=1400 audit(2000002890.630:85420): avc: denied { map } for pid=22408 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:21:30 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa087}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) [ 3197.562680] audit: type=1400 audit(2000002890.710:85421): avc: denied { map } for pid=22408 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3197.604813] libceph: connect [d::]:6789 error -101 [ 3197.610328] libceph: mon0 [d::]:6789 connect error [ 3197.695787] audit: type=1400 audit(2000002890.740:85422): avc: denied { map } for pid=22408 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3197.817298] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3197.829484] audit: type=1400 audit(2000002890.750:85423): avc: denied { map } for pid=22408 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3197.841558] libceph: connect [d::]:6789 error -101 [ 3197.881954] libceph: mon0 [d::]:6789 connect error [ 3197.922846] audit: type=1400 audit(2000002890.840:85424): avc: denied { map } for pid=22408 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:21:31 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800890610000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) 04:21:31 executing program 5: syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000100)='NLBL_MGMT\x00') r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f00000012c0)=""/167, 0x2f5}, {&(0x7f00000023c0)=""/49, 0x31}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3}}], 0x1, 0x0, 0x0) 04:21:31 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x1, 0x3) creat(&(0x7f0000000180)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x10004, 0x0, 0x1000, 0x2000, &(0x7f0000ffe000/0x2000)=nil}) mount$fuseblk(&(0x7f0000000240)='/dev/loop0\x00', &(0x7f00000002c0)='./file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) ioctl$KVM_CHECK_EXTENSION_VM(0xffffffffffffffff, 0xae03, 0x6) ioctl$USBDEVFS_SETINTERFACE(0xffffffffffffffff, 0x80085504, &(0x7f0000000040)={0x0, 0xb79}) ioctl$RTC_PIE_OFF(r3, 0x7006) [ 3198.171529] audit: type=1400 audit(2000002890.840:85425): avc: denied { map } for pid=22408 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:21:31 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a9ec8a3a63673a36d66b103e1fdbb4678731c44d5772a8b52f88132613f2ab9faa48e75b0508e2367018dc4479c6757b0a5622107e780a52d43a222d4aa8fa0c3e961e2401d5dbb22107ce4584d22a35c2ff5c7069779f3a8e888a8ac94312cdb43f7907ebfcf3dc4ad1f5e7577c5c2c9146439e6910c437a8213e177dfca08fb12f6c6a8343821e53d1f0ef24575797141dd16b8065042500017c0bab7265ba185fa61404145c500be7e57f2af455765c675c710da30fb915abbfcb8fe5e5a54f998aeb8ecb869537d7ddb529a8d66a4905586c9dd0d81d4841e2c90bd8fa2bf3802bf963edaae01ebd125510bbe75beac077af773d5d2a34b256e8369f68b0fcab87c7ee033997f53b635b59ac5aa1456d0b35e1dd734149dbcf541d744962b2bd0ece4c267760c3a6d4bce9b03000000cfa703a1a48b59700f8c902e46ae26e6e31185a19c07959edcb6bfc88c9e6bc124147521f6eb327231e35785951377c40b713a4f6854b02c428bef068f9494aa8fc9f99ddff40ef4fdc9360eb1bc2a25ac491f2bc9c7a23fe5662170feb55b3999b45b8b80a8438df19e183d854691a1f2b34352fed522c4265e4ece52f35d351a1676982ce0f2eb2c454b9df04b976179611f1be4deac0dd4c79a122f3d33e52bcce38808809820094c31af5cca2d79bf783bb87588d8c21bad663bbde2644cab2b605d0ca91b5c2417ab7c7bba5173b0bfddfd1d87ce6d257c0526fc051adaf783cb44e5f09899886b26ca746f8d2b392e0871bca6f1cb40c5ac1bf5ca80b934424deddfb547d8f9a38a25aa39752cac866986bb0faaf07ffeecd27bd736fa1a058ee5b17adbde605eb5f3648b4ee013640d018b42ef6b"], 0x48}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newlink={0x54, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x10, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc}]}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x54}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0x0, {0xc, 0x0, 0x0, r4}}, 0x20}}, 0x0) 04:21:31 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x41e4, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) [ 3198.444040] audit: type=1400 audit(2000002891.070:85426): avc: denied { map } for pid=22420 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3198.593135] audit: type=1400 audit(2000002891.080:85427): avc: denied { map } for pid=22420 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3198.664584] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 3198.766751] audit: type=1400 audit(2000002891.110:85428): avc: denied { map } for pid=22420 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3198.906480] audit: type=1400 audit(2000002891.110:85429): avc: denied { map } for pid=22420 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:21:32 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa24c}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) 04:21:32 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800060810000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3199.208149] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 04:21:32 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x4000, 0x0) r1 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000080)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f00000005c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000580)={&(0x7f00000000c0)={0x4b4, r1, 0x200, 0x70bd2b, 0x25dfdbfe, {}, [@NLBL_CIPSOV4_A_MLSLVLLST={0xe8, 0x8, 0x0, 0x1, [{0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x692cfe79}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x15}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xed}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xc70bc7a}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x78}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf}]}, {0x24, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7f86a3d3}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xaa}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xd8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xbf22e4d}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4dcfa3d4}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x55c6400b}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xcc}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x47}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6ce31ec1}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe8}]}, {0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x402f7214}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x97}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x656a7387}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7d54e680}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xd0d0727}]}, {0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5fdb986d}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6aaebf71}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xfd}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x74}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7d22a574}]}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}, @NLBL_CIPSOV4_A_MLSLVLLST={0x118, 0x8, 0x0, 0x1, [{0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x534a29ae}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x21}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x6a}]}, {0x24, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x9d}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xdd}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xb1}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1aeea5f7}]}, {0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x48}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x213f905e}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x8000}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8d}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7a454d42}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5b8ccd33}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5d5a93b7}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6548d559}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xfa}]}, {0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x13151057}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x20}]}, {0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x61ea6b86}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x70914c5f}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x49}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x75da28d3}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x31c9c4b2}]}, {0x44, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x32}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x1f}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x4f}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x62dbc08a}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xbe}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4a66d9e9}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x474a3667}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x48}]}]}, @NLBL_CIPSOV4_A_TAGLST={0xc, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x6}]}, @NLBL_CIPSOV4_A_MLSCATLST={0xd4, 0xc, 0x0, 0x1, [{0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3c93}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x8686}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb972}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x44ea2102}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xfa0}]}, {0x24, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x470f29d0}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xff02}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x33eaa0ec}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4f054eac}]}, {0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x22293978}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x1366bf82}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x4fca}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x663fedc4}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x9d26f3d}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x54f3c0d9}]}, {0x44, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x87df}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x59583a72}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xbec8fbf}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x58c34ff6}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x118e047a}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2495aee4}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xfb3e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x986}]}]}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x2}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x1}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x6}, {0x5, 0x3, 0x2}, {0x5, 0x3, 0x6}, {0x5, 0x3, 0x7}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x7}]}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x1}, {0x5, 0x3, 0x6}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x2}]}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_MLSLVLLST={0x140, 0x8, 0x0, 0x1, [{0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xa4}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1eecc3f9}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x7}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x4a}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1b0c120c}]}, {0x44, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xc9}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x63d3a654}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x91}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x5d}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x5c}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3f8e83cb}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x17ba2aab}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xd6}]}, {0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7585bc00}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x708d3813}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x18}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x14}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x4d}]}, {0x3c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x440df68}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x795325a9}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xb8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x2d}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2a2de93f}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1b1b92e1}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xff}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x64}]}, {0x24, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xa2}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xd4}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3fa60fae}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xde}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x72}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x185e76a0}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x165ce4f0}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7f35cc59}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x67683536}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xaf}]}]}]}, 0x4b4}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) setxattr$trusted_overlay_opaque(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)='trusted.overlay.opaque\x00', &(0x7f0000000680)='y\x00', 0x2, 0x4) r2 = openat(0xffffffffffffff9c, &(0x7f00000006c0)='./file0\x00', 0x40300, 0x20) write$P9_RSYMLINK(r2, &(0x7f0000000700)={0x14, 0x11, 0x2, {0x4, 0x4, 0x4}}, 0x14) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000740)=0x0) capset(&(0x7f0000000780)={0x20080522, r3}, &(0x7f00000007c0)={0x4, 0xfff, 0x2, 0x1ff, 0x7, 0x9}) r4 = openat(0xffffffffffffff9c, &(0x7f0000000800)='./file0/file0\x00', 0x101001, 0x84) ioctl$TIOCGWINSZ(r4, 0x5413, &(0x7f0000000840)) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f0000000880)=0x5) ioctl$VIDIOC_DV_TIMINGS_CAP(r2, 0xc0905664, &(0x7f00000008c0)={0x0, 0x0, [], @raw_data=[0x6, 0x1, 0x1, 0x401, 0x7, 0x3000, 0xec8, 0x0, 0x6, 0x0, 0x3, 0x400, 0x7, 0x8, 0x8, 0x0, 0x7, 0x9, 0xeda, 0x3f000, 0xfffffffb, 0x7fffffff, 0x100, 0x7fff, 0xa20f, 0xffffffff, 0x9, 0xb6, 0x8, 0xc32, 0x1, 0xfffffe00]}) ioctl$UI_BEGIN_FF_ERASE(r0, 0xc00c55ca, &(0x7f0000000980)={0x0, 0x0, 0x7}) r5 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm-monitor\x00', 0x4000, 0x0) write$P9_RRENAMEAT(r5, &(0x7f0000000a00)={0x7, 0x4b, 0x2}, 0x7) ioctl$TIOCSPTLCK(r2, 0x40045431, &(0x7f0000000a40)) openat$adsp1(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/adsp1\x00', 0x1, 0x0) getsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000ac0), &(0x7f0000000b00)=0x4) r6 = syz_open_dev$vbi(&(0x7f0000000b40)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_TRY_ENCODER_CMD(r6, 0xc028564e, &(0x7f0000000b80)={0x2, 0x0, [0x1742bc7e, 0x3ff, 0x9, 0x8, 0xffff, 0x8, 0x4, 0x6]}) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000c40)={0x980004, 0x100, 0x49, r4, 0x0, &(0x7f0000000c00)={0x4e87da, 0x851f, [], @p_u16=&(0x7f0000000bc0)=0xfffa}}) r8 = syz_genetlink_get_family_id$batadv(&(0x7f0000000cc0)='batadv\x00') getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000d00)={0x0, @empty, @multicast1}, &(0x7f0000000d40)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d80)={{{@in=@multicast1, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@empty}}, &(0x7f0000000e80)=0xe8) sendmsg$BATADV_CMD_SET_VLAN(r7, &(0x7f0000000f80)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000f40)={&(0x7f0000000ec0)={0x64, r8, 0x8, 0x70bd25, 0x25dfdbfd, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r9}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r10}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x2}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xe95d}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x7f}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x1f}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}]}, 0x64}, 0x1, 0x0, 0x0, 0x800}, 0x818) r11 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000001000)={&(0x7f0000000fc0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7}) ioctl$DRM_IOCTL_MODE_SETPLANE(r11, 0xc03064b7, &(0x7f0000001040)={r12, 0x5, 0xc524, 0xfffffffb, 0x4, 0x100, 0x7, 0x4, 0x0, 0x6, 0x81, 0xd1}) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000001080)={0x69df2f4e, 0x4, 0x4, 0x800, 0xd67f, {}, {0x5, 0x1, 0xff, 0x0, 0x1, 0x6, "7f9aabb8"}, 0x1, 0x2, @offset=0x8, 0x3f, 0x0, 0xffffffffffffffff}) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r13, 0x118, 0x1, &(0x7f0000001100)=0x401, 0x4) 04:21:33 executing program 3: ioctl$TCSETX(0xffffffffffffffff, 0x5433, &(0x7f0000000000)={0x9, 0x2de1, [0x80, 0x1ff, 0x0, 0xffbd, 0xf], 0x2}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) r4 = socket(0x11, 0x800000003, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$KVM_ENABLE_CAP_CPU(r6, 0x4008ae89, &(0x7f0000000100)={0x2, 0x0, [0xc0010014, 0x10000, 0x9, 0xffffffffffffffff]}) 04:21:33 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800000d10000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3200.119974] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 04:21:33 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x41ec, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) [ 3200.380834] netlink: 'syz-executor.1': attribute type 5 has an invalid length. 04:21:33 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xf000}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) 04:21:33 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newlink={0x54, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x10, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc}]}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x54}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0x0, {0xe, 0x0, 0x0, r4}}, 0x20}}, 0x0) 04:21:34 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800800e10000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) 04:21:34 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x11, 0x800000003, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet(r3, &(0x7f0000000000)="2c3d2dd703d4ebe0a7e0c1422db71567dfc1600d5e726ba371269dd19f6346910d67f2c45eafe1a1e1560fc7e5e5c6945d3869e60f3d622404fa2b3360cae4928c88c695be78ab3726ad4d0f610c780505d99c9778d89fac83869e4d8f7f1ec8", 0x60, 0x800, &(0x7f0000000080)={0x2, 0x4e20, @remote}, 0x10) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000940)=@raw={'raw\x00', 0x2, 0x3, 0x328, 0x198, 0x198, 0x198, 0x198, 0x198, 0x290, 0x290, 0x290, 0x290, 0x290, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x130, 0x198, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "ea7c5e89c8401b46ee142a8d52160cbc0b726fe53e8538bbdadc9ddd538e5910669144ed8f5c28b865bd7239f20dcbc7c9a63f5f5cf9b0840bace7a91c206ab34ea211db749a7ebd146b29002d52bd7c314acfa1e784729b6eab7dcde83893eebf5420c4618cbea4171ed61cfbde838a517cdb269c92ba1ab99ffcfc1dc61f80", 0x27}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x388) 04:21:34 executing program 3: open(&(0x7f0000000200)='./file0\x00', 0x140c2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000040)={0x40, 0x3, 0x6, 0x5, 0x0, 0x0, {0x5, 0x0, 0x2}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x40}, 0x1, 0x0, 0x0, 0x4004014}, 0x4) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) [ 3201.468388] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 3201.764116] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 04:21:35 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xfeff}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) 04:21:35 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800002010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) 04:21:35 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x41f0, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) [ 3202.471244] kauditd_printk_skb: 189 callbacks suppressed [ 3202.471261] audit: type=1800 audit(2000002895.670:85619): pid=22499 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16690 res=0 [ 3202.596145] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3202.666810] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 3202.686812] audit: type=1400 audit(2000002895.710:85620): avc: denied { map } for pid=22495 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3202.860530] audit: type=1400 audit(2000002895.710:85621): avc: denied { map } for pid=22495 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3202.934147] netlink: 'syz-executor.1': attribute type 5 has an invalid length. 04:21:36 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800002810000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3203.020065] audit: type=1400 audit(2000002895.770:85622): avc: denied { map } for pid=22500 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:21:36 executing program 5: socket$inet(0x2, 0x4000000805, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet_sctp(0x2, 0x5, 0x84) r2 = socket(0x11, 0x800000003, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r2, 0x0, r3) r4 = socket(0x11, 0x800000003, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = dup3(r6, 0xffffffffffffffff, 0x80000) sendmmsg$inet_sctp(r7, &(0x7f00000020c0)=[{&(0x7f0000001980)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000001dc0)=[{&(0x7f00000019c0)="96", 0x1}], 0x1, &(0x7f0000000240)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x2}}], 0x20}], 0x1, 0x0) 04:21:36 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a9ec8a3a63673a36d66b103e1fdbb4678731c44d5772a8b52f88132613f2ab9faa48e75b0508e2367018dc4479c6757b0a5622107e780a52d43a222d4aa8fa0c3e961e2401d5dbb22107ce4584d22a35c2ff5c7069779f3a8e888a8ac94312cdb43f7907ebfcf3dc4ad1f5e7577c5c2c9146439e6910c437a8213e177dfca08fb12f6c6a8343821e53d1f0ef24575797141dd16b8065042500017c0bab7265ba185fa61404145c500be7e57f2af455765c675c710da30fb915abbfcb8fe5e5a54f998aeb8ecb869537d7ddb529a8d66a4905586c9dd0d81d4841e2c90bd8fa2bf3802bf963edaae01ebd125510bbe75beac077af773d5d2a34b256e8369f68b0fcab87c7ee033997f53b635b59ac5aa1456d0b35e1dd734149dbcf541d744962b2bd0ece4c267760c3a6d4bce9b03000000cfa703a1a48b59700f8c902e46ae26e6e31185a19c07959edcb6bfc88c9e6bc124147521f6eb327231e35785951377c40b713a4f6854b02c428bef068f9494aa8fc9f99ddff40ef4fdc9360eb1bc2a25ac491f2bc9c7a23fe5662170feb55b3999b45b8b80a8438df19e183d854691a1f2b34352fed522c4265e4ece52f35d351a1676982ce0f2eb2c454b9df04b976179611f1be4deac0dd4c79a122f3d33e52bcce38808809820094c31af5cca2d79bf783bb87588d8c21bad663bbde2644cab2b605d0ca91b5c2417ab7c7bba5173b0bfddfd1d87ce6d257c0526fc051adaf783cb44e5f09899886b26ca746f8d2b392e0871bca6f1cb40c5ac1bf5ca80b934424deddfb547d8f9a38a25aa39752cac866986bb0faaf07ffeecd27bd736fa1a058ee5b17adbde605eb5f3648b4ee013640d018b42ef6b"], 0x48}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newlink={0x54, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x10, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc}]}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x54}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0x0, {0x10, 0x0, 0x0, r4}}, 0x20}}, 0x0) [ 3203.197661] audit: type=1400 audit(2000002895.770:85623): avc: denied { map } for pid=22500 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:21:36 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff0f}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) [ 3203.284945] minix_free_inode: bit 1 already cleared [ 3203.348423] audit: type=1400 audit(2000002895.770:85624): avc: denied { map } for pid=22500 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3203.500848] audit: type=1400 audit(2000002895.860:85625): avc: denied { map } for pid=22500 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:21:36 executing program 3: r0 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1c00000007ffff0f"], 0x8) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) r3 = socket(0x11, 0x800000003, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) fcntl$F_GET_FILE_RW_HINT(r5, 0x40d, &(0x7f0000000240)) r6 = syz_open_dev$media(0x0, 0x0, 0x12100) r7 = accept4(r6, &(0x7f00000000c0)=@isdn, &(0x7f0000000000)=0x80, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000140)=@assoc_value={0x0}, &(0x7f0000000180)=0x8) ioctl$BLKRRPART(r0, 0x125f, 0x0) setsockopt$inet_sctp_SCTP_AUTH_KEY(r7, 0x84, 0x17, &(0x7f00000001c0)={r8, 0x9}, 0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f00000001c0)={r8, 0x50, "a72f16af1a95c53145dd1aae152025ffa7040dba0bfbdadae695d102e62076591083cc6917ffe570e291589b53a6a15a4d87fc6a6f484d82e617a323463497cddb700cbee6c488d13f0ed4eb76108c2d"}, &(0x7f0000000000)=0x58) 04:21:36 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x41f4, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) [ 3203.764130] audit: type=1400 audit(2000002895.950:85626): avc: denied { map } for pid=22500 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3203.895553] audit: type=1400 audit(2000002895.980:85627): avc: denied { map } for pid=22500 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3204.090879] audit: type=1400 audit(2000002895.980:85628): avc: denied { map } for pid=22500 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:21:37 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800003010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3204.235142] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 3204.367070] device macvlan740 entered promiscuous mode [ 3204.415637] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3204.419884] 9pnet: Insufficient options for proto=fd 04:21:37 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff7f}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) 04:21:38 executing program 5: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f00000001c0)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x141140, 0x0) fchdir(r0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0xe4) r2 = socket(0x11, 0x800000003, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$KDGETKEYCODE(r1, 0x4b4c, &(0x7f0000000000)={0x6, 0x6}) ioctl$KVM_GET_PIT(r4, 0xc048ae65, &(0x7f0000000080)) rename(&(0x7f0000000100)='./bus\x00', &(0x7f0000000180)='./file0\x00') 04:21:38 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800803510000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3205.105504] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 04:21:38 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x4200, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) 04:21:38 executing program 3: socket$bt_bnep(0x1f, 0x3, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x0, 0x0) close(r0) newfstatat(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x2) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) setuid(0x0) r2 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000140)={0x1000, 0x6, 0x4, 0x5, 0x16, "bca662dc9bc92af5bb58490d5d7324e1d050d9"}) socket$inet6(0xa, 0x2, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x80, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) lstat(&(0x7f0000000100)='./file0\x00', 0x0) msgsnd(0x0, 0x0, 0x0, 0x0) r4 = dup(r3) ioctl$SNDRV_PCM_IOCTL_STATUS32(r4, 0x806c4120, &(0x7f0000000280)) msgsnd(0x0, &(0x7f0000000800)=ANY=[], 0x0, 0x0) r5 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf}}) connect$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) [ 3205.519451] netlink: 'syz-executor.1': attribute type 5 has an invalid length. 04:21:38 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newlink={0x54, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x10, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc}]}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x54}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0x0, {0x43, 0x0, 0x0, r4}}, 0x20}}, 0x0) [ 3205.676138] device macvlan741 entered promiscuous mode 04:21:39 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xfffe}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) 04:21:39 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800003f10000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) 04:21:39 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x4208, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) [ 3206.592811] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 04:21:39 executing program 5: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r1, {0x2, 0x0, @dev}, 0x2}}, 0x2e) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) r2 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000140), &(0x7f00000001c0)=0x40) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmmsg(r3, &(0x7f000000a0c0)=[{{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000040)="4b93cc236db9dabf70cdf550352840ba1591ebbe3af5deb06ffb744f7627eac75656e0fbacdcc6972f4741d686a98da95b7da96daf7cc686a4c9723b578a7de2da6f55e436d108a09d9c9515460e6f57a21e147375f367483004f3161d51969fc5b0167399c8f1f9d65660edfd18a385bc187c5dde54677ab891f771f3aa17ca687e66b7fceae79a37f25c95a6a8fb510682fd1b685d99d1e42e14c7b8d5fe36820647e31055df19840db48d2968ccdda143d1c35cddd629705921c26f1defcec411b52ab40b768d6964cb64fd1267fea86ab9089ca7b22b3fde98a92346f8acfb61bad121b581b13640f7745812b2aaf9de", 0xf2}, {&(0x7f00000007c0)="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", 0x481}], 0x2}}], 0x1, 0x0) 04:21:40 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$KVM_SET_CPUID2(0xffffffffffffffff, 0x4008ae90, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vsock\x00', 0x40, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x2812, r0, 0x0) socketpair(0x21, 0x1, 0x2, &(0x7f0000000580)) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) close(r1) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r2 = open(&(0x7f00000003c0)='./bus\x00', 0x40, 0x0) open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_procfs(0x0, 0x0) ioctl$BLKROGET(r3, 0x125e, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x0, &(0x7f0000000fc0)=ANY=[@ANYBLOB], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, r3}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r4 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) lseek(r4, 0x0, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000180), 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r5) write$P9_RSTATu(r2, &(0x7f0000000240)=ANY=[@ANYBLOB="5d0000006d020300004800ff0309e812a4f329aaffc70700000000000000000008000900b7dbe6670000070000000000000002002b3a09000e6465762f736723000100010100000000000064657600deff", @ANYRES32, @ANYRES32=r5], 0x59) r6 = open(&(0x7f00000003c0)='./bus\x00', 0x40, 0x0) open_by_handle_at(r6, &(0x7f0000000540)=ANY=[@ANYBLOB="0a00000001fd8ea389120d2505d3dcaa360e29729f7fb0943fd3d100193a8e317dec7bea4ceff99799542eda9fe3f7b66277289a1fc80000097b0acb3a9e48a538c943bd495b49d5215d2f"], 0x0) r7 = syz_open_procfs(0x0, 0x0) ioctl$BLKROGET(r7, 0x125e, &(0x7f0000000000)) fstat(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r9 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) lseek(r9, 0x0, 0x4) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f00000002c0)=0xfffffffffffffdb9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r11) write$P9_RSTATu(r6, &(0x7f0000000240)=ANY=[@ANYBLOB="5d0000006d020300004800ff0309e812a4f329aaffc70700000000000000000008000900b7dbe6670000070000000000000002002b3a09000e6465762f73672300010001010000", @ANYRES32=r8, @ANYRES32=r10, @ANYRES32=r11], 0x53) getgroups(0x6, &(0x7f00000005c0)=[0x0, 0xffffffffffffffff, 0xee00, 0xee01, 0xee00, r10]) r12 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x2812, r12, 0x0) open(0x0, 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r13 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x12, r13, 0x0) getpid() open(&(0x7f00000003c0)='./bus\x00', 0x40, 0x0) setuid(0x0) r14 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r14, &(0x7f0000000000)={0xa, 0xfffc, 0x10001, @local, 0x2}, 0x1c) sendmmsg(r14, &(0x7f000000ac80), 0x66, 0x0) [ 3207.026650] netlink: 'syz-executor.1': attribute type 5 has an invalid length. 04:21:40 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800054310000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3207.164824] device macvlan742 entered promiscuous mode 04:21:40 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x581b7}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) [ 3207.485962] kauditd_printk_skb: 185 callbacks suppressed [ 3207.485982] audit: type=1400 audit(2000002900.680:85814): avc: denied { map } for pid=22598 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3207.570505] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3207.601528] audit: type=1400 audit(2000002900.690:85815): avc: denied { map } for pid=22599 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3207.837150] audit: type=1400 audit(2000002900.720:85816): avc: denied { map } for pid=22599 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:21:41 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x4210, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) 04:21:41 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newlink={0x54, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x10, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc}]}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x54}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0x0, {0x60, 0x0, 0x0, r4}}, 0x20}}, 0x0) 04:21:41 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800884710000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) 04:21:41 executing program 5: syz_read_part_table(0x0, 0x3, &(0x7f0000000840)=[{&(0x7f0000000000)="0201fdffffff01000000ff07000000000000550008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}, {&(0x7f00000006c0)="184703fcd561cbb9c93a0e5fdce90635db0a3982eda1fd4b3b2d95dd0515e551ad0ec9405b2ded9180a272ee3ac06489e1025783db35fa53129e5e051bf77fef6c1801f7f9332aa2e5f9c080a0c43152fdbf2bc8c900c468a0ae144e53356e95379a86fb8861bde60f07e4d26915f7655534f855d39eae1b5ac1fdc9b01054285059280a3ce2d2fa23fb2ac0baf5ab79e8003ebdbd79d5142a906082ee22d3fa31e9ecb79ee2eef9ccacc77501ca4059feb727b6f9efbebeca5eda3e2156b8", 0xbf, 0x100}, {&(0x7f0000000040)="08000000eee59c04a00a0b98dee9", 0xe, 0x1}]) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nvram\x00', 0x40000, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$TIPC_NL_PUBL_GET(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)={0x13c, 0x0, 0x100, 0x70bd27, 0x25dfdbff, {}, [@TIPC_NLA_MON={0x4c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfffffff7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x400}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}]}, @TIPC_NLA_NODE={0x18, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}]}, @TIPC_NLA_SOCK={0x4}, @TIPC_NLA_NET={0x18, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x101}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1}]}, @TIPC_NLA_MON={0xc, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x8}]}, @TIPC_NLA_BEARER={0x74, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x101}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x5, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x8001}}, {0x14, 0x2, @in={0x2, 0x4e21, @multicast1}}}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100}]}]}, @TIPC_NLA_NODE={0x28, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xffffffff}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x4084}, 0x24044840) [ 3208.134573] audit: type=1400 audit(2000002900.800:85817): avc: denied { map } for pid=22599 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3208.315229] audit: type=1400 audit(2000002900.850:85818): avc: denied { map } for pid=22599 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3208.367153] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 3208.505527] audit: type=1400 audit(2000002901.070:85819): avc: denied { map } for pid=22610 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3208.548772] device macvlan743 entered promiscuous mode [ 3208.682399] audit: type=1400 audit(2000002901.080:85820): avc: denied { map } for pid=22610 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:21:41 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x581b8}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) [ 3208.835433] audit: type=1400 audit(2000002901.110:85821): avc: denied { map } for pid=22611 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3208.968094] audit: type=1400 audit(2000002901.110:85822): avc: denied { map } for pid=22611 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:21:42 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800884810000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3209.062245] audit: type=1400 audit(2000002901.110:85823): avc: denied { map } for pid=22611 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3209.115743] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3209.236603] Dev loop5: unable to read RDB block 1 [ 3209.312030] loop5: unable to read partition table [ 3209.384252] loop5: partition table beyond EOD, truncated [ 3209.474348] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 04:21:43 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800006010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3209.935960] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 04:21:43 executing program 3: write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) write$P9_RAUTH(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000000180)=ANY=[@ANYBLOB="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"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000440)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000016c0)='net/vlan/config\x00') sendmsg$nl_route_sched(r3, &(0x7f00000017c0)={&(0x7f0000001700)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000001780)={&(0x7f00000000c0)=ANY=[@ANYBLOB="240000002a00040028bd7000ffdbdf2500000000", @ANYRES32=0x0, @ANYBLOB="f2ff0c00020002000e00f1ff54f8e883d4450b83f9538eb9631eb8725218981698c91168040ea1881912d548bed34d00"], 0x24}, 0x1, 0x0, 0x0, 0x20080000}, 0x4) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cpuinfo\x00', 0x0, 0x0) sendto$rxrpc(r4, &(0x7f0000002040)="e8c2295603aa5266c68d200f0e183874bcd7063fa67ec69c956cfd4c59b32bc69cd476e72404c543627653549242e3d5185d800fc2210fdab1f0cb6066f598a232b4d8bdca9fc34f552280b3f992dde6a7dd429b3cedc63529076b15d15717fc2eaa1a44b741c3504fae78dd5afbbb39ccb56a3d3ff69174ef6d276d970dd51bd33bd1b46862061b6379f79940739ff817f3fbefb568ce9dcd8da051af7a175a9f3f73a6342763d8858a48323b91686f7d43ae1faa530282974ff4b1f271755b6b31fafe2db65e379f27d38db22dc6cf97c8f696490ce891a70ffdc783328a17e1d2ca4c4740ae69a8631d6ddebba759216276c712e405a2907a816ad33cecf40e81de4cf891aeafaeec5a681cb1ae7f265c3f850cebbcddb49031fa352f9513fc7e4afaf00d694ccf3166894ce9cb3c5e8791e29c1baceb8e630ef0698f7d35a716bce9ee1b7e739a060c75330095a78942f6d7b3b287d3bb98548b98abc23bbe0c3dc841beea8ab7e54c163a6421d470294819e793dc4d9af749d5b136e562d08567b09c91b1f1d314abffe62e7df77cb73a63917c38bde3b337530d921ec0941a92608f8912f23a8fa85c042e77fb61a280ad0865b5f9841e53f15ab138bf08d710ab6496b8ea55a45866be7f1934e675c635798d9be0f98ba22c0e4a218816332dae70c2bfa4905792f13eb8e7c6ac11c28b876ac66b100b3fb93608b162b26b70d33b37c5d6f36a7c46dd9fe10664392905153b46f46efc1c865e6d209820c9d30f6a2f56a9c5468d8433b1c98e238b2d1eef37efa63764f50acd7416a2a8c2aa11d35f78e7700295e415f3ed3798797c378a817ee2ec68087e6dcf7f7d69b399f98205194d61dca763a3d01f7e12c44ce347075a80f6b432a5ca652bbda9e6106d1dacd73ec3ee4bdc18950bfebf51952ad2ac6b62e29f7512f47fd1afab5474040355cc8de0636631e5eb78c69dd7b6cf4e56be3cfaa6a579b41c2ba5a57ce637eecbb504a7fdfbaded16eb0474731450a2f60aa8587d12ef74949bed70b8292f987fa8ff59f124e3a0ae43387b1223e2163e5f8c3131a9416b551287051fb8f7b2eb424bf6583d7b4b9f782ea5608a1a263db95c25e71c6eb853fa4c375f3756bc7472e51c4289cfb3253cb760175f1d1b52c0fdb8c20d10b7bdc8ab61eed7755e9ea1980a54d1d3c674cd38051f8abcf5d8020961f16c682102e8fbb977c674c839312dcf46d1242f1b4fa6d9a938a5e53ee2cdde92d6dd9238e41cfd5dbe3df1b1532ab15d3d7f8f96a189453ac9ad89c99765a2d1dfb46c95cbb2147b3b834551200568ee14a91289265bf2a22c28b68b29872635effedca72636d2dba0f78e39e0762246bcdfddd5f09ccfee95cecacb1950fbf1d3ade4d378bc89dc23b1e153e7debc037df81ef18c17a4aa1bbbabd03d8cb291443275bf6ed8530e73b36b2930991cd98dad70e351742985ccc15c67e4c76a4a49982d835f8006b60cefb0df270f017e4edaedd188e1c1fd95b1e357546c71be6e9719d5ad53eb8ec5d0dfdbf751554bb44cc89e8474bd23795edf250ab1a34a0d08dc77d680a375f2c5f4baaef673dd384a0802084c35e27cdbb00f2e9f29ebcc309150b3706fadb8a3d43be8a8136b170a8e5cc708a72b7bae74e1588a8ea7670bf4a5394a4bf04b9c0c01b1086837b6f4a75acd632c90b3c605c4330c6e716c81789207900e8b9cae2dd0d98a64ce9892cffc2638fb1fbfe8fee9b9d62b54ec874408939a83e05cb37ba209dc3e47ceeb43efd1380d1e06f55d4cb6c97e32167178f0a1386c19af1f11785e1ef018c22a1dee850caf09dec1092a652b40c25242ca9c89f7f010bdbb8c126c8cc466f837ae1887d3f31b06aee5bb88808c146ec26f89bef899eb2c2e318c56ad5d96a10f455d0e29650e71dc0e3f682882fe8d20a1db258993751a2c4a22710109e1c559a854a67ce02e8f1902ad17d3dd8f4cf09d034f3fac6d39385023f54ae2b2ba8055ce081487cecad4f69439a16b217bcec8570728f67fa0da4d167962df607b2e7fc2dd3e69d5ac41750e0b13f9d5a0d7f6905587daf2057bff36f1035340969c9dc838e13a473181ed109db71d3aab2bcbb4182395b95cb09952136b3469d47b1de692d8d44d8de57d1307abae1dfb3a810ea1e5b448a24b467e521eb893db28fb9e4b94da994166ab3b008553df179fd1432457e750006cfbe9a08771fca13017ba3959e585df8886a562677e9714dc0a26d411b016cce802cd9a4584090d8cb4fba163a3b5a7d8ff6f18093fa1c817ceb4356137d8c2dd063fd9840110acfe03f2504f0f5f3777942ee9db4b5379f2dc08d5ac33ed1e40f92abc19512c6a3ac225e4103d411e1d90a48f6709504ad4550221f3a24d9eaaafede68eed1f6d446d4ccbc44c70de7fff58c71daced6958a5564281b35b9ba1fc23047ff1321fa8d9fedc8b6956cdb58b2dd61bef1f7028ec5038a78ef3ea06bcd6b8b12234443a8792bcc04e1168d191f1dda1139c74c8205730dec820e999e72e1b70e36411a3944e72cd76670ea70f7a8ac090251453ba032f5a2076486e3684c56453ec72e69bf87c2077a638ff55b5c0cbdc5d84e639aa54bc3942395a2a8f82a0af4c8357cbdb5fe230b60c2a34b89718779a7b857c56330d7d52d4b9515d8d092101cbe60553c0e56a169acb076b6a19465452769b8dea4060cc1ac38900baae42448a280b63dbc8c8399b03fc81ab492dbfefdac3811e7dfc6a6f50a9e752ecfdaa5f9031642c87021329ade91715688d7a3f0f2093d65f3a679c28a27059d1fe714612ad4bd222b043759e4e13f7e20f3d23bdab283e89f8a38f1ed88077b8ceaaa0c5f6f564bf7659c7e09bf67723d29e030c918fbbb33fefebb6e70a54bc028ecaf38afd9599b375625fa8f2421545833c0733ead64cc07be30dde017ede0026c2b11bf3e469a151f8367fd33be29fff173d9bb31c12d9d456d2516920f434b1d8a2cccb832909c628b66d323b30beab8704666dc1132ad20152a887d64fab52c37723c8ea0ea7beb87ff451e3e1e838a09d2a2aaba8356b8295b5a8f3dc16e8846a31d4e6d0c63f54a169eb6839455620954ee0758bdf94219dd096c62f533a4ca4d564e4c132a3436ebfc2f0918ec6c22e4466c5645fc4f02fedc39c17793a79420270e3e5bf71de30578b4ba5247864221a82f80510ce836ec90a2d490f7a77e5e28f397cca17c020c367e78009187ff6c818e8060d150376cd8184644340e271595d5308231e6fea0eae2800aa6be66f49cd7f48f54f165e83ad723347642c160610753fa38e306e3bb41c6dfd714eae02549a735c8b58b50c38845e17e33a9ed057746b2342a5e7c42e0b3490a979f9f9fca94c4af3600fe588a21f95cf4f1c53d83b377b387a11cd33476775c0a67e7a52220a84f02def04b9b537cd5b1f3b96a74a224e6e6ad84a7674d0399bcebe1586901f12ff997f30ec8c1785c8aeec70aec2a542ebbf565567af3ec9cebfc9fa09726114075c94cc4dcc11935aacc781054b307afa90f79b58dde36bcbb014d0ecb143b2da35683112398ee9afa06f86f64bc03fabd180ef74535a09fe543a66010d36e73a686a071654e52b69a9b15af49feb1a37c3ed8de3ea12df824f02042fbd8e70c046115b67802772f07d93bb1cf02f8b6aed65727a8f81706a21d83f449a6ee333ac09eeb36deb179e3645a3671411cc236cf3ab835b57fc1bf0cc2d8c0ab35a0ef88cf218eb0dc25b9c04f78e965dc2ac520802279de7a2d2d783062924fbb25e4659124b11488e3772c2715ebcc35b7c26acc23f9c5436e598baefb2b924f6a540bc416b6aa982123d9b8998b09ae63ab606b16c1d4ac30ccd145a31c2ec78443e68dd2cb75a908d45e391e4171920cd8751e6af2eb54a34f8d7f22cad819bfc8f46a08f34f4cbf035e2e9b6bc7782077b9f549a4b7fe40a44ef4ffb822b556149a216b6a3a69555a32a9e4bc240d92aa9272df8a8e3abee97ed172059ffb00a67b0b129fa634c58c55272e7157c004ef19d9ca70ca49fd6139716b42200fd0fd9b66f9fc39ffbe750046878c16586a3536f71d63476039794ff5d8c6e2126d09a3a7530e89e97de8c4a2981952dd2caf9063b1a199578a9cae6d176d78bacd90bd5b5745ae44ccfe8de937c69c889e3cc810d2fb80fb9dde674160cd2184fb43133e4479eb33871846911631edd679c8c04ea4d9ffb52fc0b369733e5fa8d46499c8e548bb31a122820ec95693d25f2550b9c25942d1b360bc036b4ee9c0a4dbc8b0a9be6fc106a708e7e3c4ffcef05d5dabc14606e8f9aae4a6879d6ce771b86ac8ce0b2d04892f6b59d11a1c41615b89f0ac5f46d75551f9d3311acd64736bf7674f90a3b3d58b518f36350d3f9400203088e0d662efd6d953e232ac85636b622afd635f65440469a8d617562abcf8fc82ac3facc9e4f22b70575afa89fee0e5a85c5bb60e0ad48eff3fd778858eabe281d5f42c721e7e19079e71005ed18db546ebb418b85f63c8603c1a562f6993e7d5045f5cb4f6ea727232eeb4cfb36ecbb357b1ad0aef0228adc2a1d9f3cbba7dcb7409e9ace293db2f61c1779ec5f287f1dd65a6256ef0003c52d91a8a7df4e4cc32b3c2e85f2952f4911911b9b6b4b6857ae6e22648df97c1ff2784a1831fa7fcba6f01de2a9245f41386046a130c1174627bde280cc3538e31813bc092e213818a92b75dd15a650e75ffe1908557d96ccc12085fabb38b1814b2bcca4cf87a526a3ae546f362fa745a1e5ecd08986a2923d82d85664df564cfb9badcfd2d60abdfa551900993096950f8ccac4f572a57fce6a8f224179c102c8b589d349163b522da9664e779a600f4cfc2792bf9a705218c28f1fe63954788f631153deb678fb7b60e162998e523b25c1a372cf50ae1c14e4f0b3a0730fa0e49371f04ea55e9169f21e6742ef7f174a4b4470d6f61c0c9fdf36795b7367348b4ae943e5666499366bd30b21d5d2799cb93d82b3b504c01e1088fd6dd029abb3da1bff68ed599810bd28ff4b020f89f10ac7fe4a64dec6695a298e661236c35f15c7e22d34ac64e5220fde8c03cd6bc913a10253cab08ca45d4687053693e6509d230c5e6119bb60ee3bbc067b6e6570e7351a605b92410ca0bebfdfc4aee4949dd5f2a56442b6f3ab127205af48d022ca13c8567e63eb6fcb9dabf74ecda737d4a3e07c947c6b743bdfe441deadd2af9ffdbf92bf8b345c68e6bf03908ec36020f66895c2a3fe5f7ff18d8d7c7877a357ba480a01664e3071b521a8331cb4b0886d7301987a7216e18240d55778844f8d3260fea92a244cc9d2cbaf31e37d8fd2a42e2efe147c4f66001e5bebed4e449037021e3ad51fdbc2f1ca48a8d9941fffafd7c130054ab6e960f7a495f35796ffd551ec2322d5b2e06c1822d5de3aa6904683a6271c1f65042952cc180953dbd801270aad5282bf4879ffdf90c9fbfd71bb81519f8ddcc8d2e2381c3580a5786c388f58c7b8c72a8353c9b5829a60ddbaff6614df2639312a8267e33f06e644da3e05b3bcaa6974d62cdea83d9261e4ded341ea8f970d17e4a8b35248352da651ddf85d12613e8cfa369a1df25ff8fe7c43cc4738e52fe2b1d81deeabd52fa94cf07fef3855e08137d5556de3c8741350278c1e15be61a44a724e513ec92c407b4c63e5a71749dca603c3ba9759413ad8607c7739fc58cdb3174a660f413079b66563c99e502c3edf86e758af647db256e416b897355080bc248a589be3ff56c372", 0x1000, 0x2040800, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000300)='/dev/btrfs-control\x00', 0x10b881, 0x0) ioctl$SNDRV_PCM_IOCTL_DELAY(r5, 0x80084121, &(0x7f0000000340)) 04:21:43 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x4218, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) 04:21:43 executing program 5: r0 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ocfs2_control\x00', 0x20000, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f0000001580)={0x20, r2, 0x11, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)={0x20c, r2, 0x20, 0x70bd2d, 0x25dfdbfc, {}, [@TIPC_NLA_BEARER={0xf8, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7fffffff}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @multicast2}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x615, @dev={0xfe, 0x80, [], 0x2d}, 0x400}}}}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x5}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x1, @local, 0x5}}, {0x14, 0x2, @in={0x2, 0x40, @rand_addr=0xffffffff}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x510, @remote, 0x9}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x81, @mcast1, 0xa3}}}}]}, @TIPC_NLA_BEARER={0x90, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100}]}, @TIPC_NLA_BEARER_PROP={0x4c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x200}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @empty}}, {0x14, 0x2, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x26}}}}}]}, @TIPC_NLA_NODE={0x34, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1000}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x80}]}, @TIPC_NLA_NET={0x3c, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x5}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x47e}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7fff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x81}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xf4555b7}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8}]}]}, 0x20c}, 0x1, 0x0, 0x0, 0x10}, 0x4) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) [ 3210.209581] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 3210.307751] device macvlan744 entered promiscuous mode 04:21:43 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x581b9}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) 04:21:43 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newlink={0x54, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x10, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc}]}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x54}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0x0, {0x66, 0x0, 0x0, r4}}, 0x20}}, 0x0) 04:21:44 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800886410000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3211.366085] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 3211.545608] overlayfs: workdir and upperdir must reside under the same mount [ 3211.618960] device macvlan745 entered promiscuous mode [ 3211.717591] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 04:21:44 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x4220, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) [ 3211.761970] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 04:21:45 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x581ba}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) [ 3211.830069] overlayfs: workdir and upperdir must reside under the same mount 04:21:45 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x7b, 0x5, [0xc0000103, 0x0, 0x1000040000002, 0x2], [0xc1]}) r3 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x8000, 0x40100) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x8) 04:21:45 executing program 5: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x3a700f2, &(0x7f0000000140)=ANY=[@ANYBLOB="6a6f75726e616c5f6465763d3078303030303030303030303030303030322c00ea834985305305189768c5637bc9d2646ebf3698e0dc29dba226"]) 04:21:45 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e220008000e8010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3212.579460] kauditd_printk_skb: 172 callbacks suppressed [ 3212.579477] audit: type=1400 audit(2000002905.780:85996): avc: denied { map } for pid=22694 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3212.649510] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3212.741386] audit: type=1400 audit(2000002905.830:85997): avc: denied { map } for pid=22696 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3212.934561] audit: type=1400 audit(2000002905.830:85998): avc: denied { map } for pid=22694 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:21:46 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800358010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3213.097029] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 3213.146602] audit: type=1400 audit(2000002905.830:85999): avc: denied { map } for pid=22696 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:21:46 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) r3 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x7, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x106) r4 = socket$inet6(0xa, 0x3, 0x9) ioctl$sock_netdev_private(r2, 0x89ff, &(0x7f0000000180)="6962dac54bc71f5e31cb3b58db4329669e29e0a806d73a846ffb4e7ee10177bd53741e28e7d37254c8c1f48b1eaa38739f2addf9767e84de2fe0591857af193730a91acd673df76c3390d1409c1bc72dbaa41401f27b52b3fe561af1fb2dd8d24022c4dab2915c8b8eab178360727b033f0605adcca69e2150f388a1746b9c207e2ebb707a9543170a73b904abf5b8d5e496223bf02788bef8dbc46c08515bb3506b1b67adcebb4be2afdd06a187f9049fb7bd7644be3c292986ba3461234bf9dd07505181a5a3a695629f39a5ea1147ff117a82e980e9") sendmsg(r4, &(0x7f0000000100)={&(0x7f0000000340)=@l2tp6={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x5b, 0x0}, 0x0) [ 3213.246527] device macvlan746 entered promiscuous mode 04:21:46 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x4228, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) [ 3213.386585] audit: type=1400 audit(2000002905.850:86000): avc: denied { map } for pid=22694 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:21:46 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newlink={0x54, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x10, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc}]}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x54}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0x0, {0xbe, 0x0, 0x0, r4}}, 0x20}}, 0x0) 04:21:46 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x581bb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) [ 3213.594781] audit: type=1400 audit(2000002905.850:86001): avc: denied { map } for pid=22696 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3213.767359] audit: type=1400 audit(2000002905.850:86002): avc: denied { map } for pid=22694 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3213.936517] audit: type=1400 audit(2000002905.850:86003): avc: denied { map } for pid=22696 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3214.120983] audit: type=1400 audit(2000002905.900:86004): avc: denied { map } for pid=22694 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:21:47 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800008110000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3214.322801] audit: type=1400 audit(2000002905.920:86005): avc: denied { map } for pid=22701 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3214.536709] EXT4-fs (sda1): Cannot specify journal on remount [ 3214.643177] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 04:21:47 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) getpid() sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ff8000/0x2000)=nil}) r3 = socket(0x11, 0x800000003, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') accept$packet(0xffffffffffffffff, &(0x7f0000005ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000005b00)=0x14) sendmsg$BATADV_CMD_SET_MESH(r5, &(0x7f0000005bc0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000005b80)={&(0x7f0000000480)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r6, @ANYBLOB="00000cbd7000487ddf25ce89776beda186f7b6be40bc59e69d6b68f29a9ca90c2e9c537b15d7331bba51f990a2ab6e946273e0761aaf3e751a2e4f128221f1b4", @ANYRES32=r7, @ANYBLOB="2380507b6a776261a9e071d10df43f692c0f6728c4115d47bbe4fcd0a2c41a99b8685cb49d8ab086bcd0245b3583713ee59016000ad3921a5bc2fbda69622fe5ab0a52b98e616950636ab608fee2b1fd5a84a2cea9d952dfd4a4bb73d58fe99a7306a645b527ef6017d4f68947e988e6dce2b1483efabc7564b82348968dd682c6083caab039bdf00a6910d8d922037228b69ba7691bdb9e413b6279736eecae7d4d26427e803afd635668ffb3966fd9d1611ff5154da6887f940b79bbcb96966f1b0a5f142bbb271c50666b986e0f2ba47b87cbe350e7fbd8d2058b66977714571ba7995693b17f9ded9c8a5b8764e9b4b56bc2e7889064ff5250cd7d7072af89e834685bf24c7891191246bf4ad4b4edb773c3b9f48b2ef5c04aaa8200747e4169f3ec3179ba67ad00b58675c595b61dab90a7f9022650b908fc9ac12d1cc7f6122caca8467da35d05189f155cd372b4dc53d4fa1745c3a08de7aae42a0eb3061cf23983d82307bdf1b3316ea4193aa0b333a49818562a33c6393ab65902655cf2d719945b27508bc85360238ff5"], 0x1c}, 0x1, 0x0, 0x0, 0xc080}, 0x4001) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r3, 0x84, 0x20, &(0x7f0000000100), 0x4) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x4cb, 0x200000, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x2]}) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 3215.104600] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 3215.195955] device macvlan747 entered promiscuous mode 04:21:48 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x581bc}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) 04:21:48 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800478810000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3215.710341] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 04:21:48 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() setpgid(0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = dup2(r3, r0) ioctl$UI_SET_KEYBIT(r4, 0x40045565, 0x28e) mkdir(&(0x7f0000001240)='./file0\x00', 0x0) r5 = socket(0x11, 0x800000003, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r5, 0x0, r6) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000040)={0x816, 0xb, 0x4, 0x80000, 0x1, {}, {0x4, 0xb, 0x5b, 0x0, 0x80, 0x7, "ddfe0d16"}, 0x10000, 0x4, @offset=0x10, 0xffff, 0x0, r5}) setsockopt$bt_BT_SNDMTU(r7, 0x112, 0xc, &(0x7f0000000100)=0x7fff, 0x2) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f0000000240)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') 04:21:49 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x4230, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) [ 3216.065035] netlink: 'syz-executor.1': attribute type 5 has an invalid length. 04:21:49 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newlink={0x54, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x10, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc}]}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x54}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, r4}}, 0x20}}, 0x0) [ 3216.199227] device macvlan748 entered promiscuous mode 04:21:49 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x581bd}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) 04:21:49 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800488810000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) 04:21:50 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xe50fb6c50bc849c9) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0x11, 0x800000003, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$PIO_FONTX(r4, 0x4b6c, &(0x7f0000000040)={0x1f5, 0x3, &(0x7f0000000200)="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"}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000003800)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f00000000c0)=""/54, 0x36}, {&(0x7f0000000100)=""/54, 0x36}], 0x2, &(0x7f0000000640)=""/4096, 0x1000}}, {{0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001640)=""/126, 0x7e}, {&(0x7f00000016c0)=""/4096, 0x1000}, {&(0x7f00000026c0)=""/154, 0x9a}], 0x3, &(0x7f00000027c0)=""/204, 0xcc}}, {{&(0x7f00000028c0)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000002b00)=[{&(0x7f0000002940)=""/152, 0x98}, {&(0x7f0000002a00)=""/213, 0xd5}], 0x2, &(0x7f0000002b40)=""/176, 0xb0}, 0x4}, {{&(0x7f0000002c00)=@isdn, 0x80, &(0x7f0000002e40)=[{&(0x7f0000002c80)=""/134, 0x86}, {&(0x7f0000002d40)=""/151, 0x97}, {&(0x7f0000002e00)=""/36, 0x24}], 0x3, &(0x7f0000002e80)=""/209, 0xd1}, 0x7fffffff}, {{0x0, 0x0, &(0x7f0000003240)=[{&(0x7f0000002f80)=""/31, 0x1f}, {&(0x7f0000002fc0)=""/100, 0x64}, {&(0x7f0000003040)=""/232, 0xe8}, {&(0x7f0000003140)=""/230, 0xe6}], 0x4, &(0x7f0000003280)=""/141, 0x8d}, 0x4}, {{0x0, 0x0, &(0x7f0000003680)=[{&(0x7f0000003340)=""/144, 0x90}, {&(0x7f0000003400)=""/179, 0xb3}, {&(0x7f00000034c0)=""/103, 0x67}, {&(0x7f0000003540)=""/198, 0xc6}, {&(0x7f0000003640)=""/54, 0x36}], 0x5, &(0x7f0000003700)=""/193, 0xc1}, 0x8}], 0x6, 0x0, &(0x7f0000003980)={0x77359400}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x18, r5, 0x1, 0xfb, 0x6, @broadcast}, 0x14) openat$vimc2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video2\x00', 0x2, 0x0) sendto$inet6(r0, &(0x7f0000000180)="0503000006003e0000004000c52cf7c25975e605b02f86ddeb2b2ff0dac8897c6b118777faffffff306609000a00c5471d130a66321a54e7df305f80a88161b6fd8f24286a57c3fe257c3314", 0x202, 0x0, 0x0, 0x0) [ 3217.136216] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 04:21:50 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x200, 0x0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)={0x1, 0x1}) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000000), 0x4) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) 04:21:50 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x4238, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) [ 3217.602606] kauditd_printk_skb: 220 callbacks suppressed [ 3217.602623] audit: type=1400 audit(2000002910.800:86205): avc: denied { map } for pid=22791 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:21:51 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800648810000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3217.794787] audit: type=1400 audit(2000002910.860:86206): avc: denied { map } for pid=22791 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3217.872236] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 3217.995848] device macvlan749 entered promiscuous mode [ 3218.031187] audit: type=1400 audit(2000002910.870:86207): avc: denied { map } for pid=22791 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3218.060807] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 04:21:51 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x581be}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) [ 3218.217570] audit: type=1400 audit(2000002910.930:86208): avc: denied { map } for pid=22791 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:21:51 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newlink={0x54, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x10, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc}]}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x54}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0x0, {0x0, 0x2, 0x0, r4}}, 0x20}}, 0x0) [ 3218.348227] audit: type=1400 audit(2000002910.950:86209): avc: denied { map } for pid=22791 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3218.452596] audit: type=1400 audit(2000002911.030:86210): avc: denied { map } for pid=22791 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:21:51 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) socket$inet(0x2, 0x3, 0x1f) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x36b07d66fd11c4bb, '\x00', 0x1}, 0xffffffffffffff60) r1 = socket$l2tp6(0xa, 0x2, 0x73) bind$l2tp6(r1, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x20) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000000)='team\x00') sendmsg$TEAM_CMD_OPTIONS_SET(r5, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r6, 0x8933, &(0x7f0000000380)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@loopback, @in=@empty}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f00000004c0)=0xe8) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r8, 0x0, 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r9, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000b80)=ANY=[@ANYBLOB='\x00\x00', @ANYRES32=0x0, @ANYBLOB, @ANYRES32=r10, @ANYRES32=r10, @ANYBLOB], 0x6}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r11 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r11, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r12 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r12, 0x0, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000b80)=@newlink={0x54, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GENEVE_UDP_CSUM={0x5, 0x8, 0x1}, @IFLA_GENEVE_UDP_ZERO_CSUM6_RX={0x5, 0xa, 0x1}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0x54}}, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff}) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) accept4$packet(r13, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000540)=0x14, 0x800) r14 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r14, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) r15 = socket$nl_route(0x10, 0x3, 0x0) r16 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r16, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r16, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r15, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000009c0)=@newlink={0x5c, 0x10, 0x10, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x10323}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GENEVE_TTL={0x5}, @IFLA_GENEVE_DF={0x5}]}}}, @IFLA_MASTER={0x8}, @IFLA_MASTER={0x8, 0xa, r17}, @IFLA_LINKMODE={0x5, 0x11, 0x80}]}, 0x5c}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @loopback, @broadcast}, &(0x7f0000000b40)=0xc) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000c40), 0x80800) r18 = socket$nl_route(0x10, 0x3, 0x0) r19 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r19, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r18, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000b80)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GENEVE_UDP_CSUM={0x5, 0x8, 0x1}, @IFLA_GENEVE_TTL={0x5}, @IFLA_GENEVE_UDP_ZERO_CSUM6_RX={0x5, 0xa, 0x1}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0x5c}}, 0x0) r20 = socket(0x0, 0x803, 0x0) getsockname$packet(r20, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r4, &(0x7f0000000940)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x1000}, 0xc, 0x0}, 0x8084) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) [ 3218.672452] audit: type=1400 audit(2000002911.050:86211): avc: denied { map } for pid=22791 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:21:52 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800068910000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3218.874312] audit: type=1400 audit(2000002911.200:86212): avc: denied { map } for pid=22798 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:21:52 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x4284, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) [ 3219.063927] audit: type=1400 audit(2000002911.210:86213): avc: denied { map } for pid=22798 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:21:52 executing program 3: r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/keys\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x4000000000010044) [ 3219.197969] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 3219.244201] audit: type=1400 audit(2000002911.230:86214): avc: denied { map } for pid=22798 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3219.356238] device macvlan750 entered promiscuous mode [ 3219.387791] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 04:21:52 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x581bf}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) 04:21:53 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e2200080000f010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3220.318498] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 04:21:54 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800000210000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3220.799449] device geneve2 entered promiscuous mode [ 3220.918134] netlink: 'syz-executor.1': attribute type 5 has an invalid length. 04:21:54 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newlink={0x54, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x10, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc}]}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x54}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0x0, {0x0, 0x3, 0x0, r4}}, 0x20}}, 0x0) 04:21:54 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x2) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0x8) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x1) ioctl$UI_DEV_SETUP(r1, 0x5501, 0x0) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x2) [ 3221.072816] device macvlan751 entered promiscuous mode 04:21:54 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x4324, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) 04:21:54 executing program 3: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xe8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080)='NLBL_UNLBL\x00') bind$rds(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_STATUS32(r0, 0x806c4120, &(0x7f00000000c0)) r1 = openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x8100, 0x0) r4 = memfd_create(&(0x7f0000000480)='Yz\xb7{Est\x00'/19, 0x0) r5 = dup(r4) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r5, 0x404c534a, 0x0) r6 = dup(r5) ioctl$DRM_IOCTL_AGP_RELEASE(r6, 0x6431) r7 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x100000, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) socketpair(0x26, 0xa, 0x40, &(0x7f0000000000)={0xffffffffffffffff}) r10 = socket$alg(0x26, 0x5, 0x0) bind$alg(r10, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r11 = accept4(r10, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c0000001a000180201ffe03ed0b00080000"], 0x1c}}, 0x4040) sendmsg$inet6(r11, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x48000) splice(r11, 0x0, 0xffffffffffffffff, 0x0, 0x810020000000003, 0x0) r12 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r12, 0x8983, &(0x7f0000000280)={0x0, 'veth0_vlan\x00', {0x3}, 0x2}) getsockopt$SO_TIMESTAMPING(r12, 0x1, 0xe, 0x0, &(0x7f0000000100)) r13 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$sock_attach_bpf(r13, 0x1, 0x34, &(0x7f0000009000), 0x4) r14 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f00000000c0)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_REMOVEDEF(r13, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x3c, r14, 0x400, 0x70bd2b, 0x25dfdbfe, {}, [@NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x2}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @rand_addr=0x3}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @local}, @NLBL_MGMT_A_CV4DOI={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x41000}, 0x1) sendmsg$NLBL_MGMT_C_REMOVEDEF(r12, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB='P\x00\b\x00', @ANYRES16=r14, @ANYBLOB="00012bbd7000fcdbdf2505000000080004000100000008000400f9ffffff1400060000000000000000000000ffff000007ff080002000300000008000800e000000106000b0029000000"], 0x50}, 0x1, 0x0, 0x0, 0x4040040}, 0x40) sendmsg$NLBL_MGMT_C_VERSION(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x24, r14, 0x400, 0x70bd28, 0x25dfdbfc, {}, [@NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x2}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x29}]}, 0x24}, 0x1, 0x0, 0x0, 0x20044041}, 0x4c000) sendmsg$NLBL_MGMT_C_REMOVE(r9, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYBLOB="14000000", @ANYRES16=r14, @ANYBLOB="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"], 0x14}, 0x1, 0x0, 0x0, 0x14}, 0x2e60a808d3ddbbb0) sendmsg$NLBL_MGMT_C_VERSION(r8, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x24c2552}, 0xc, &(0x7f0000000380)={&(0x7f0000000540)=ANY=[@ANYBLOB="480073a059c7500000000080001efae73da3dfc5d3a5913a56255f60cd3893a1c9644d8d09d945bfdbc019b279ae6d4126ca36f68c", @ANYRES16=r14, @ANYBLOB="01002cbd7000fddbdf250800000014000600fe8000000000000000000000000000aa08000700ffffffff080004000300000008000800e00000010800070000000000"], 0x3}, 0x1, 0x0, 0x0, 0x8000}, 0x880) sendmsg$NLBL_MGMT_C_LISTDEF(r7, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16=r14, @ANYBLOB="00012bbd7100fddbdf2506000000080002000700000014000600ee8800000000ff000000000000000001080008007fc500011400ed592554e4d40b988236be8f8c74019ddedf"], 0x4c}, 0x1, 0x0, 0x0, 0x40108c1}, 0x94) sendmsg$NLBL_MGMT_C_ADD(r6, &(0x7f00000004c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000480)={&(0x7f00000007c0)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r14, @ANYBLOB="000826bd7000ffdbdf2501000000160001002e2f6367726f04aff1502ef9deea3daa2e336875702e6e65742f73797a31000000"], 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x200000c0) sendmsg$NLBL_MGMT_C_VERSION(r3, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8c000800", @ANYRES16=r14, @ANYBLOB="000128bd7000fedbdf2508000000080002000500000026000100657468316574683070726f6376626f786e65743074727573746564657468302d2d00000014000600fe80000000000000000000000000002206000b001e000000080004000200000006000b000800000008000700ac1414aa14000500fe880000000000000000000000000001"], 0x8c}, 0x1, 0x0, 0x0, 0xc0}, 0x44010) sendmsg$NLBL_MGMT_C_PROTOCOLS(r1, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x5c, r14, 0x300, 0x70bd2b, 0x25dfdbff, {}, [@NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0xffffffffffffffff}, @NLBL_MGMT_A_DOMAIN={0x14, 0x1, '/dev/sequencer2\x00'}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x10}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @empty}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x2c}]}, 0x5c}, 0x1, 0x0, 0x0, 0x24000055}, 0x4880) r15 = dup(r0) vmsplice(r2, &(0x7f00000002c0)=[{&(0x7f00000001c0)="c97886731e", 0x5}, {&(0x7f0000000200)="0546d339a7537ff0be1ef1f5756019d6d23ad07e1eadefe391480ec440e6a0df30daee44bc4007c5826e58b70ee832d34a60176b82d5dae97963ea77bebfafd4a21418b461da3f8cf81fbabed5f2d9475aae96f891d7e433c81a5a957d07bb6be9584c89e3df523f663be0b67f034aab42710459b0d1b466f8674253383271e337415e334f4f835f2deff42db1834ee9696e90d8c1b6beb9b2237847f5fc56f2173a", 0xa2}], 0x2, 0x5) r16 = socket$inet6_sctp(0xa, 0x5, 0x84) r17 = socket(0x2, 0x5, 0x0) bind$inet(r17, &(0x7f0000000780)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r17, &(0x7f0000000000)="cf", 0x2468d, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r17, 0x84, 0x1d, &(0x7f0000000040)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r16, 0x84, 0x9, &(0x7f00000000c0)={r18, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x9c) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r15, 0x84, 0x78, &(0x7f0000000180)=r18, 0x4) r19 = socket$inet6(0xa, 0x3, 0x2c) connect$inet6(r19, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r20 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) sendfile(r19, r20, 0x0, 0x8482) ioctl$KVM_IRQ_LINE_STATUS(r20, 0xc008ae67, &(0x7f0000000300)={0x5, 0xfffffff7}) bind$rds(0xffffffffffffffff, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0xa000, 0x0) 04:21:54 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x581c0}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) 04:21:55 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800000310000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3221.845190] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 3221.986739] device macvlan752 entered promiscuous mode 04:21:55 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x581c1}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) [ 3222.405844] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3222.453217] selinux_nlmsg_perm: 20 callbacks suppressed [ 3222.453237] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pig=22884 comm=syz-executor.3 [ 3222.480902] input: syz1 as /devices/virtual/input/input28 [ 3222.750779] kauditd_printk_skb: 220 callbacks suppressed [ 3222.750794] audit: type=1400 audit(2000002915.950:86435): avc: denied { map } for pid=22890 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:21:56 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x432c, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) 04:21:56 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a9ec8a3a63673a36d66b103e1fdbb4678731c44d5772a8b52f88132613f2ab9faa48e75b0508e2367018dc4479c6757b0a5622107e780a52d43a222d4aa8fa0c3e961e2401d5dbb22107ce4584d22a35c2ff5c7069779f3a8e888a8ac94312cdb43f7907ebfcf3dc4ad1f5e7577c5c2c9146439e6910c437a8213e177dfca08fb12f6c6a8343821e53d1f0ef24575797141dd16b8065042500017c0bab7265ba185fa61404145c500be7e57f2af455765c675c710da30fb915abbfcb8fe5e5a54f998aeb8ecb869537d7ddb529a8d66a4905586c9dd0d81d4841e2c90bd8fa2bf3802bf963edaae01ebd125510bbe75beac077af773d5d2a34b256e8369f68b0fcab87c7ee033997f53b635b59ac5aa1456d0b35e1dd734149dbcf541d744962b2bd0ece4c267760c3a6d4bce9b03000000cfa703a1a48b59700f8c902e46ae26e6e31185a19c07959edcb6bfc88c9e6bc124147521f6eb327231e35785951377c40b713a4f6854b02c428bef068f9494aa8fc9f99ddff40ef4fdc9360eb1bc2a25ac491f2bc9c7a23fe5662170feb55b3999b45b8b80a8438df19e183d854691a1f2b34352fed522c4265e4ece52f35d351a1676982ce0f2eb2c454b9df04b976179611f1be4deac0dd4c79a122f3d33e52bcce38808809820094c31af5cca2d79bf783bb87588d8c21bad663bbde2644cab2b605d0ca91b5c2417ab7c7bba5173b0bfddfd1d87ce6d257c0526fc051adaf783cb44e5f09899886b26ca746f8d2b392e0871bca6f1cb40c5ac1bf5ca80b934424deddfb547d8f9a38a25aa39752cac866986bb0faaf07ffeecd27bd736fa1a058ee5b17adbde605eb5f3648b4ee013640d018b42ef6b"], 0x48}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newlink={0x54, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x10, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc}]}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x54}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0x0, {0x0, 0x4, 0x0, r4}}, 0x20}}, 0x0) [ 3223.012748] audit: type=1400 audit(2000002916.010:86436): avc: denied { map } for pid=22890 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3223.202088] audit: type=1400 audit(2000002916.060:86437): avc: denied { map } for pid=22890 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:21:56 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800000510000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3223.387297] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 3223.387407] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pig=22900 comm=syz-executor.3 04:21:56 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000200)={0x2, 'syzkaller0\x00', {0xaa}}) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) r5 = socket(0x11, 0x800000003, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') r10 = socket(0x11, 0x800000003, 0x0) bind(r10, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r10, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(r8, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001e00)={0x20, r9, 0xa05, 0x0, 0x0, {0x3}, [{{0x8, 0x1, r11}, {0x4}}]}, 0x20}}, 0x0) r12 = socket$netlink(0x10, 0x3, 0x0) r13 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r12, &(0x7f0000000040)={0x0, 0x4000000, &(0x7f0000000240)={&(0x7f00000002c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff0f}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x3, r14}]}}}]}, 0x38}}, 0x0) r15 = socket(0x11, 0x800000003, 0x0) r16 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r15, 0x0, r16) ioctl$sock_SIOCGIFINDEX(r16, 0x8933, &(0x7f0000000340)={'macvlan1\x00', 0x0}) r18 = socket$netlink(0x10, 0x3, 0x0) r19 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r19, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r19, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r18, &(0x7f0000000040)={0x0, 0x4000000, &(0x7f0000000240)={&(0x7f00000002c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff0f}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x3, r20}]}}}]}, 0x38}}, 0x0) r21 = socket$netlink(0x10, 0x3, 0x0) r22 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r22, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r22, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r21, &(0x7f0000000040)={0x0, 0x4000000, &(0x7f0000000240)={&(0x7f00000002c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff0f}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x3, r23}]}}}]}, 0x38}}, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(r7, &(0x7f0000000640)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000600)={&(0x7f0000000380)={0x244, r9, 0x100, 0x70bd25, 0x25dfdbfb, {}, [{{0x8, 0x1, r4}, {0xf8, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0xfffffff7}}, {0x8, 0x6, r14}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r17}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x8}}}]}}, {{0x8, 0x1, r20}, {0xe4, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x401}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x8}}}]}}, {{0x8, 0x1, r23}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x400}}}]}}]}, 0x244}}, 0x4000000) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000014c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000009000100686673630000000008000200000000005b47b4b04fed4e2a21ad8beb06b167de4283ffaec56d159e56a166c9db835a8808a86292f4bea321847a42767a7b89b65e4841c9695825a4b10dd5cb8b24f89f29ceef0a428124dcefb40b6b8ce6222864e92d22b053bda211a0aa613e4d66c8a0490480cbaca2b1216ca5637c028cbe0af4fd21ed36a2ddd56830044f3ead6d80d6f3f39955a2bb6662c29c913e8356d5a58ddb4293241f2ed955ffa0b9"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000015c0)=@newtfilter={0x64, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0x8}}, [@filter_kind_options=@f_rsvp={{0x9, 0x1, 'rsvp\x00'}, {0x34, 0x2, [@TCA_RSVP_CLASSID={0x8}, @TCA_RSVP_DST={0x28, 0x2, @multicast1}, @TCA_RSVP_PINFO={0x20}]}}]}, 0x64}}, 0x0) [ 3223.422196] audit: type=1400 audit(2000002916.060:86438): avc: denied { map } for pid=22890 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3223.526585] device macvlan753 entered promiscuous mode [ 3223.654606] audit: type=1400 audit(2000002916.120:86439): avc: denied { map } for pid=22890 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:21:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x581c2}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) [ 3223.747652] audit: type=1400 audit(2000002916.160:86440): avc: denied { map } for pid=22890 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3223.941000] audit: type=1400 audit(2000002916.160:86441): avc: denied { map } for pid=22890 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3224.109502] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3224.148907] audit: type=1400 audit(2000002916.190:86442): avc: denied { create } for pid=22865 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 04:21:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x801, 0x0) r1 = socket(0x11, 0x800000003, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r2) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000040)='ip6_vti0\x00') r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x40000, 0x0) close(r3) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 3224.384283] audit: type=1400 audit(2000002916.240:86443): avc: denied { write } for pid=22865 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 04:21:57 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800000810000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3224.542687] audit: audit_backlog=65 > audit_backlog_limit=64 04:21:57 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x4358, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) [ 3225.131554] device sit1 entered promiscuous mode 04:21:58 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800000d10000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3225.281667] device sit2 entered promiscuous mode [ 3225.330065] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3225.421200] device sit3 entered promiscuous mode [ 3225.532061] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 3225.572282] device macvlan754 entered promiscuous mode 04:21:58 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newlink={0x54, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x10, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc}]}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x54}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0x0, {0x0, 0x5, 0x0, r4}}, 0x20}}, 0x0) 04:21:58 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x581c3}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) 04:21:58 executing program 5: timer_create(0x0, &(0x7f0000000100)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000000c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$inet6(r1, &(0x7f0000000240)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r4 = socket(0x11, 0x800000003, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$TIOCL_GETMOUSEREPORTING(r6, 0x541c, &(0x7f0000000040)) r7 = gettid() recvmmsg(r1, &(0x7f0000002080)=[{{0x0, 0x53, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) write$P9_RRENAMEAT(r1, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) dup3(r0, r1, 0x0) r8 = socket(0x11, 0x800000003, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) r10 = fcntl$dupfd(r8, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$EVIOCSABS20(r10, 0x401845e0, &(0x7f0000000000)={0x8fc8, 0x0, 0x100, 0x8, 0x80000000, 0x4}) tkill(r7, 0x1004000000013) 04:21:59 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x4360, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) 04:21:59 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800002810000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) 04:21:59 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72e2aba000000012e0b3836005404b0e0301a08000000e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100000000000000497400000000000000065ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0xfe6e) ioctl$VHOST_SET_MEM_TABLE(r1, 0x4008af03, &(0x7f0000000040)={0x1, 0x0, [{0x2, 0x8, &(0x7f0000000000)=""/8}]}) sendmsg$inet6(r2, &(0x7f0000000180)={&(0x7f0000000080)={0xa, 0x4e24, 0x0, @local, 0x1}, 0x1c, 0x0, 0x0, &(0x7f0000000300)=[@pktinfo={{0x24, 0x29, 0x32, {@empty, r4}}}], 0x28}, 0x0) [ 3226.502254] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 3226.751800] device macvlan755 entered promiscuous mode 04:22:00 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800003010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3226.855991] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 04:22:00 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x581c4}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) [ 3227.374981] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 04:22:00 executing program 3: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) r2 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6100) ftruncate(r2, 0x8200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x175d900f) memfd_create(0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r3 = socket(0x11, 0x800000003, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$KDGKBDIACR(r5, 0x4b4a, &(0x7f0000000300)=""/201) 04:22:00 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x4368, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) 04:22:00 executing program 5: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000003c0), 0xc, &(0x7f0000000400)={&(0x7f0000000800)=ANY=[@ANYBLOB="c0010000", @ANYRES16, @ANYBLOB="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"/442], 0x1c0}, 0x1, 0x0, 0x0, 0x40000}, 0x4000000) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) r0 = socket(0x11, 0x800000003, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x11, 0x800000003, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) open_by_handle_at(r5, &(0x7f0000000140)={0x43, 0x0, "7377252aa53b231b65648c4ee5e364e52c11e0ca6528850b3dcee44a79a1807a8965bd576555215d3d95e0fe0d8379f4488765aaf6c10728f98c89"}, 0x40000) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000040)={0x7, 0x9, 0x9, 0x1, 0xd, "6b5c624abf1ace728ee592984a4b0443b63c61"}) 04:22:00 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800006010000003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3227.788429] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 3227.902526] device macvlan756 entered promiscuous mode [ 3227.981851] kauditd_printk_skb: 186 callbacks suppressed [ 3227.981867] audit: type=1400 audit(2000002921.180:86628): avc: denied { map } for pid=22996 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:22:01 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a9ec8a3a63673a36d66b103e1fdbb4678731c44d5772a8b52f88132613f2ab9faa48e75b0508e2367018dc4479c6757b0a5622107e780a52d43a222d4aa8fa0c3e961e2401d5dbb22107ce4584d22a35c2ff5c7069779f3a8e888a8ac94312cdb43f7907ebfcf3dc4ad1f5e7577c5c2c9146439e6910c437a8213e177dfca08fb12f6c6a8343821e53d1f0ef24575797141dd16b8065042500017c0bab7265ba185fa61404145c500be7e57f2af455765c675c710da30fb915abbfcb8fe5e5a54f998aeb8ecb869537d7ddb529a8d66a4905586c9dd0d81d4841e2c90bd8fa2bf3802bf963edaae01ebd125510bbe75beac077af773d5d2a34b256e8369f68b0fcab87c7ee033997f53b635b59ac5aa1456d0b35e1dd734149dbcf541d744962b2bd0ece4c267760c3a6d4bce9b03000000cfa703a1a48b59700f8c902e46ae26e6e31185a19c07959edcb6bfc88c9e6bc124147521f6eb327231e35785951377c40b713a4f6854b02c428bef068f9494aa8fc9f99ddff40ef4fdc9360eb1bc2a25ac491f2bc9c7a23fe5662170feb55b3999b45b8b80a8438df19e183d854691a1f2b34352fed522c4265e4ece52f35d351a1676982ce0f2eb2c454b9df04b976179611f1be4deac0dd4c79a122f3d33e52bcce38808809820094c31af5cca2d79bf783bb87588d8c21bad663bbde2644cab2b605d0ca91b5c2417ab7c7bba5173b0bfddfd1d87ce6d257c0526fc051adaf783cb44e5f09899886b26ca746f8d2b392e0871bca6f1cb40c5ac1bf5ca80b934424deddfb547d8f9a38a25aa39752cac866986bb0faaf07ffeecd27bd736fa1a058ee5b17adbde605eb5f3648b4ee013640d018b42ef6b"], 0x48}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newlink={0x54, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x10, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc}]}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x54}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0x0, {0x0, 0x6, 0x0, r4}}, 0x20}}, 0x0) 04:22:01 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x581c5}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) [ 3228.164287] audit: type=1400 audit(2000002921.200:86629): avc: denied { map } for pid=22996 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3228.292311] audit: type=1400 audit(2000002921.210:86630): avc: denied { map } for pid=22996 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3228.627043] audit: type=1400 audit(2000002921.230:86631): avc: denied { map } for pid=22996 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3228.684273] audit: type=1400 audit(2000002921.240:86632): avc: denied { map } for pid=22996 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3228.745087] audit: type=1400 audit(2000002921.350:86633): avc: denied { map } for pid=22996 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:22:02 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800000010020003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3228.783109] audit: type=1400 audit(2000002921.350:86634): avc: denied { map } for pid=22996 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:22:02 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x4370, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) [ 3229.053246] audit: type=1400 audit(2000002921.370:86635): avc: denied { map } for pid=23000 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3229.240884] audit: type=1400 audit(2000002921.370:86636): avc: denied { map } for pid=23000 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3229.454328] audit: type=1400 audit(2000002921.410:86637): avc: denied { map } for pid=23000 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3229.494810] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 04:22:02 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = socket(0x11, 0x800000003, 0x0) r4 = socket(0x11, 0x800000003, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r6, 0x660c) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r3, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) setsockopt$RXRPC_SECURITY_KEY(r8, 0x110, 0x1, &(0x7f0000000000)='-wlan0:proc\x00', 0xc) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x3, &(0x7f0000000080)=[{&(0x7f0000000040)="0201a5ffffff01000000ff07000000000000550008000000000000000040000000006300000000000000887700720030b5829237c300000000000080f3e16150", 0x40, 0x1c0}, {&(0x7f0000000180)="fe3e9c469b5ff292894fa4858846c505cf436d6f3d9bcd3ccce4cf72f89be97d19a0fc2763b02174a028ce31cb4d6cad506467d323944aecb6ce1f09992336f374e249f19aede53d3a4bf444c42cc15e42448c1aa8dd3b5dcd305a0020e1ddf4510ab8eb583a706bc1b8bf34d06319350b646d69878e3cfb9435f2dbae36c457ddc4c5b64768bd51cadd7ad8f74da3901de80efe2c50fd08b4f20c0b8e4249b87ec0b73794db94a77127876383300eaa969802254bdd75c967743a6fa0563228", 0xc0, 0xff}, {&(0x7f0000000300)="70934ed8d71baa7d27", 0x9}]) 04:22:03 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r1) ptrace$setopts(0x4206, r1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f008001fffffff00004000633377fbac141411e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) r2 = socket(0x11, 0x800000003, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r2, 0x0, r3) signalfd4(r3, &(0x7f0000000040), 0x8, 0x80000) [ 3230.147123] netlink: 'syz-executor.1': attribute type 5 has an invalid length. 04:22:03 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800000010030003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3230.265139] device macvlan757 entered promiscuous mode [ 3230.344183] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 04:22:03 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x581c6}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) 04:22:04 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x4380, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) [ 3230.882277] loop3: [ICS] p1 04:22:04 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newlink={0x54, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x10, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc}]}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x54}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0x0, {0x0, 0x7, 0x0, r4}}, 0x20}}, 0x0) [ 3230.924853] loop3: p1 start 3629028208 is beyond EOD, truncated 04:22:04 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800000010050003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3231.558566] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 3231.591081] loop3: [ICS] p1 [ 3231.597984] loop3: p1 start 3629028208 is beyond EOD, truncated [ 3231.704639] device macvlan758 entered promiscuous mode 04:22:04 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) arch_prctl$ARCH_SET_GS(0x1001, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)={0x60, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}, @IPSET_ATTR_REVISION={0x4}, @IPSET_ATTR_FAMILY={0x0, 0x5, 0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}, @IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0x28}]}]}, 0x60}}, 0x0) [ 3231.744554] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 04:22:05 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000640)={0x4, &(0x7f0000000680)=[{0x0, 0x40, 0x3f, 0x4}, {0x8, 0x8, 0x0, 0x2}, {0x2, 0x0, 0x59, 0x2}, {0x0, 0x3f, 0x0, 0x4002}]}, 0x10) sendmmsg(r0, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f0000000140)=[{0x0}, {&(0x7f0000001300)="af22d7abc7c99cd0ef7f7993f68393e8cac585de7b6f1dd7ca5a4ca1fa16dc2d26a79148114bab1baa462f55fe25c5520c5f464b00b9caa57f1a3d02331b336ff6389772986130ed809ebd61c20945f06118c159fa237fa5b72048f84c9ab257d8e3b8e4edc6fcbfc4a1a40d830b4f2964c5d31e1afd70ef294261f77037355b19f00b2120a12b27c38965d395f8236511e338975209a91a70b1310281b65e9bb91f", 0xa2}], 0x2}}], 0x1, 0x4001) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) recvmmsg(r0, 0x0, 0x0, 0x80, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x8000, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x7f0000000000000, 0x0, 0x9, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x4, 0x70, 0x0, 0x0, 0x39, 0x7, 0x0, 0x6, 0x40, 0x8, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x8}, 0x190, 0x0, 0xafc, 0x0, 0x0, 0xfffffffc, 0xa3}, 0x0, 0x4000009, 0xffffffffffffffff, 0x1c) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast2, @loopback, 0x4, 0x0, 0x1, 0x100, 0x0, 0x2040242}) r2 = memfd_create(&(0x7f0000000600)='+lo.cpusetvboxnet1&\x00', 0x0) r3 = dup2(0xffffffffffffffff, r2) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000100)) write$P9_RAUTH(r3, &(0x7f00000000c0)={0x14, 0x67, 0x2, {0x80, 0x0, 0x5}}, 0x14) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000100)) r4 = socket$inet(0x2, 0x0, 0x0) r5 = socket$inet_sctp(0x2, 0x0, 0x84) r6 = dup3(r4, r5, 0x0) sendto$inet(r3, 0x0, 0x0, 0x40881, 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r6, 0xc008ae05, &(0x7f0000000240)=""/47) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000500)={'nat\x00'}, 0x0) getpid() ptrace$getregset(0x4204, 0x0, 0x200, &(0x7f0000000180)={&(0x7f0000000040)=""/80, 0x41}) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000008c0)='cgroup.controllers\x00', 0x2761, 0x0) r8 = socket$inet(0x2, 0x0, 0x0) r9 = socket$inet_sctp(0x2, 0x0, 0x84) dup3(r8, r9, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_VERSION(r3, 0xc0406400, &(0x7f00000004c0)={0x0, 0xb53, 0x3, 0xbb, &(0x7f00000002c0)=""/187, 0x0, 0x0, 0x17, &(0x7f0000000200)=""/23}) ioctl$USBDEVFS_DISCONNECT_CLAIM(r7, 0x8108551b, &(0x7f00000006c0)={0x80, 0x3, "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"}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 04:22:05 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x581c7}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) 04:22:05 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800000010080003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3232.586742] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3232.750740] netlink: 'syz-executor.5': attribute type 4 has an invalid length. [ 3232.997750] kauditd_printk_skb: 170 callbacks suppressed [ 3232.997763] audit: type=1400 audit(2000002926.180:86808): avc: denied { map } for pid=23085 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3233.068905] netlink: 'syz-executor.1': attribute type 5 has an invalid length. 04:22:06 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x4384, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) 04:22:06 executing program 5: pipe(0x0) sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x2a939, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x0, 0x0) fcntl$lock(r2, 0x8, &(0x7f0000000240)) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r2, 0x4020565b, &(0x7f0000000340)={0x0, 0x5, 0x1}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14fe000033001901000010000000000003000000"], 0x14}}, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000001600)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) open(&(0x7f00000003c0)='./file0\x00', 0x8aaf656ebb96b22b, 0x2) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/vmallocinfo\x00', 0x0, 0x0) close(r3) getsockopt$EBT_SO_GET_INFO(r3, 0x0, 0x80, &(0x7f0000000100)={'broute\x00'}, &(0x7f00000001c0)=0x78) r4 = socket$inet(0x2, 0x80001, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000300), 0x12) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x0, 0x0) preadv(r5, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) ioctl$TIOCGPTPEER(r2, 0x5441, 0x7) socket(0xa, 0x3, 0x8) [ 3233.194091] audit: type=1400 audit(2000002926.250:86809): avc: denied { create } for pid=23081 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 04:22:06 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newlink={0x54, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x10, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc}]}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x54}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0x0, {0x0, 0x8, 0x0, r4}}, 0x20}}, 0x0) [ 3233.377826] device macvlan759 entered promiscuous mode [ 3233.458928] audit: type=1400 audit(2000002926.270:86810): avc: denied { map } for pid=23083 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:22:06 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x581c8}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) 04:22:06 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e220008000000100d0003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3233.737678] audit: type=1400 audit(2000002926.270:86811): avc: denied { map } for pid=23083 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3234.033252] audit: type=1400 audit(2000002926.290:86812): avc: denied { map } for pid=23085 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3234.167829] audit: audit_backlog=65 > audit_backlog_limit=64 [ 3234.182498] audit: audit_backlog=65 > audit_backlog_limit=64 04:22:07 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000000)=0x2) ioctl$KVM_SET_REGS(r2, 0x4090ae82, 0x0) setsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) [ 3234.229494] audit: audit_backlog=65 > audit_backlog_limit=64 [ 3234.242981] audit: audit_backlog=65 > audit_backlog_limit=64 [ 3234.246442] audit: audit_backlog=65 > audit_backlog_limit=64 [ 3234.544470] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3235.002807] Unknown ioctl 1075861083 04:22:08 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800000010280003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3235.392344] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 3235.610495] device macvlan760 entered promiscuous mode [ 3235.884697] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 04:22:09 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x4388, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) [ 3236.065980] Unknown ioctl 21569 04:22:09 executing program 3: socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="4400000010000104000000fffffffa0000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012800b00010062726964676500000c000280050016000000000008000a00", @ANYRES32=r2, @ANYBLOB], 0x44}}, 0x0) ioctl(r0, 0x100000890f, &(0x7f0000000040)="b14e2086af1da09b763ff8629c369ac5aa2f779754") 04:22:09 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a9ec8a3a63673a36d66b103e1fdbb4678731c44d5772a8b52f88132613f2ab9faa48e75b0508e2367018dc4479c6757b0a5622107e780a52d43a222d4aa8fa0c3e961e2401d5dbb22107ce4584d22a35c2ff5c7069779f3a8e888a8ac94312cdb43f7907ebfcf3dc4ad1f5e7577c5c2c9146439e6910c437a8213e177dfca08fb12f6c6a8343821e53d1f0ef24575797141dd16b8065042500017c0bab7265ba185fa61404145c500be7e57f2af455765c675c710da30fb915abbfcb8fe5e5a54f998aeb8ecb869537d7ddb529a8d66a4905586c9dd0d81d4841e2c90bd8fa2bf3802bf963edaae01ebd125510bbe75beac077af773d5d2a34b256e8369f68b0fcab87c7ee033997f53b635b59ac5aa1456d0b35e1dd734149dbcf541d744962b2bd0ece4c267760c3a6d4bce9b03000000cfa703a1a48b59700f8c902e46ae26e6e31185a19c07959edcb6bfc88c9e6bc124147521f6eb327231e35785951377c40b713a4f6854b02c428bef068f9494aa8fc9f99ddff40ef4fdc9360eb1bc2a25ac491f2bc9c7a23fe5662170feb55b3999b45b8b80a8438df19e183d854691a1f2b34352fed522c4265e4ece52f35d351a1676982ce0f2eb2c454b9df04b976179611f1be4deac0dd4c79a122f3d33e52bcce38808809820094c31af5cca2d79bf783bb87588d8c21bad663bbde2644cab2b605d0ca91b5c2417ab7c7bba5173b0bfddfd1d87ce6d257c0526fc051adaf783cb44e5f09899886b26ca746f8d2b392e0871bca6f1cb40c5ac1bf5ca80b934424deddfb547d8f9a38a25aa39752cac866986bb0faaf07ffeecd27bd736fa1a058ee5b17adbde605eb5f3648b4ee013640d018b42ef6b"], 0x48}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newlink={0x54, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x10, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc}]}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x54}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0x0, {0x0, 0x9, 0x0, r4}}, 0x20}}, 0x0) 04:22:09 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800000010300003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) 04:22:09 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x581c9}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) [ 3237.171647] Unknown ioctl 1075861083 04:22:10 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x438c, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) [ 3237.666110] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3238.007962] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 3238.055840] device macvlan761 entered promiscuous mode [ 3238.428759] kauditd_printk_skb: 289 callbacks suppressed [ 3238.428777] audit: type=1400 audit(2000002931.630:87044): avc: denied { map } for pid=23285 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3238.540347] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3238.542532] audit: type=1400 audit(2000002931.670:87045): avc: denied { map } for pid=23285 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3238.577623] audit: type=1400 audit(2000002931.700:87046): avc: denied { map } for pid=23285 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3238.604838] audit: type=1400 audit(2000002931.720:87047): avc: denied { map } for pid=23285 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3238.630653] audit: type=1400 audit(2000002931.790:87048): avc: denied { map } for pid=23285 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3238.656166] audit: type=1400 audit(2000002931.820:87049): avc: denied { map } for pid=23287 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3238.739178] audit: type=1400 audit(2000002931.860:87050): avc: denied { map } for pid=23287 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3238.932478] audit: type=1400 audit(2000002931.880:87051): avc: denied { map } for pid=23285 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3239.104260] audit: type=1400 audit(2000002931.890:87052): avc: denied { map } for pid=23285 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3239.318807] audit: type=1400 audit(2000002931.930:87053): avc: denied { map } for pid=23285 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:22:12 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGSKNS(r0, 0x894c, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r2, &(0x7f0000000000)="3deb7620659a7fa9e70bf19763964f02993cfbbee862fe273d25e3538744b09e3407ceec23dbc3a0f3274f2426d27ccdf35f337a025a0e26e5d9f4894e9b772938f366c1dd566e25a363eb5f314628fabdacda665d553663cf50a62548c6d811d9aa03caa37c9ad2d276b084ba66ba959b5ede94b56989838844eb874aab69f8cc60dc876c3de158d0381f018aa990bd0c710f802d4adfa5f3a91ed4f6da7b555ae654ae79170c7891eb90bf", &(0x7f0000000100)="86f755cda4708476e282fde0859dcb8871264ed7e4dbbac9fe417a83b847bb8a8ed1fbf1553a47f8035945e5f9c1a5e75c80b41e6f4ed444de804ab01f", 0x1}, 0x20) write(r0, &(0x7f00000000c0)="240000005a001f001007f4f9002304000a04f51108000400020100020800038005000000", 0x24) 04:22:12 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x581ca}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) 04:22:12 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800000010600003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) 04:22:12 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) write$P9_RATTACH(r5, &(0x7f00000000c0)={0x14, 0x69, 0x2, {0x80, 0x1, 0x4}}, 0x14) r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r6, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x2}, 0x4) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB="58000000100001080000000000000000000000003c14a8041fae264db40da01f2ecc95aa12cd0a7e8d4a0ab5ed2558808f992836d4dd818ecdf8142b698d1fc198b460d855b1ceef94dec935689866ab4f44a8bbf3818c2ae5e46174fe2ba780fa4ffa510713514a384112b282d7c2e7cc7d7b026e2386a6234a922ec3eb3e8f", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b0000000000300016802c0001802800010000000000aad172aaa03fce4ea412d71537bd6c36e7d8a47400"/66], 0x58}}, 0x0) 04:22:12 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x4390, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) 04:22:12 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newlink={0x54, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x10, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc}]}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x54}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0x0, {0x0, 0xa, 0x0, r4}}, 0x20}}, 0x0) [ 3239.865822] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 04:22:13 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800000010f00003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3240.394593] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3240.579970] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3240.642845] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 04:22:13 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x581cb}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) 04:22:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000001200)='SEG6\x00') r0 = socket$inet6(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f00000001c0)={'batadv0\x00', 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$FIGETBSZ(r2, 0x2, &(0x7f0000000000)) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') sendmsg$BATADV_CMD_GET_DAT_CACHE(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000580)={0x1c, r3, 0x31905e13403123b7, 0x0, 0x0, {0xb, 0x0, 0xf000}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r1}]}, 0x1c}}, 0x0) r4 = socket(0x11, 0x800000003, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockopt$inet_mtu(r6, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000080)=0x4) mount(0x0, 0x0, 0x0, 0x0, 0x0) 04:22:14 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800000010000303376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) 04:22:14 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x4394, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) 04:22:14 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a9ec8a3a63673a36d66b103e1fdbb4678731c44d5772a8b52f88132613f2ab9faa48e75b0508e2367018dc4479c6757b0a5622107e780a52d43a222d4aa8fa0c3e961e2401d5dbb22107ce4584d22a35c2ff5c7069779f3a8e888a8ac94312cdb43f7907ebfcf3dc4ad1f5e7577c5c2c9146439e6910c437a8213e177dfca08fb12f6c6a8343821e53d1f0ef24575797141dd16b8065042500017c0bab7265ba185fa61404145c500be7e57f2af455765c675c710da30fb915abbfcb8fe5e5a54f998aeb8ecb869537d7ddb529a8d66a4905586c9dd0d81d4841e2c90bd8fa2bf3802bf963edaae01ebd125510bbe75beac077af773d5d2a34b256e8369f68b0fcab87c7ee033997f53b635b59ac5aa1456d0b35e1dd734149dbcf541d744962b2bd0ece4c267760c3a6d4bce9b03000000cfa703a1a48b59700f8c902e46ae26e6e31185a19c07959edcb6bfc88c9e6bc124147521f6eb327231e35785951377c40b713a4f6854b02c428bef068f9494aa8fc9f99ddff40ef4fdc9360eb1bc2a25ac491f2bc9c7a23fe5662170feb55b3999b45b8b80a8438df19e183d854691a1f2b34352fed522c4265e4ece52f35d351a1676982ce0f2eb2c454b9df04b976179611f1be4deac0dd4c79a122f3d33e52bcce38808809820094c31af5cca2d79bf783bb87588d8c21bad663bbde2644cab2b605d0ca91b5c2417ab7c7bba5173b0bfddfd1d87ce6d257c0526fc051adaf783cb44e5f09899886b26ca746f8d2b392e0871bca6f1cb40c5ac1bf5ca80b934424deddfb547d8f9a38a25aa39752cac866986bb0faaf07ffeecd27bd736fa1a058ee5b17adbde605eb5f3648b4ee013640d018b42ef6b"], 0x48}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newlink={0x54, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x10, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc}]}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x54}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0x0, {0x0, 0xc, 0x0, r4}}, 0x20}}, 0x0) 04:22:14 executing program 5: mq_open(&(0x7f0000000200)='\xc9J\x05Q\xf3\xc3\xeetdU\xa1\x98\f\xbc%\x1bd\xc5J\xee\xb88\xdc\xe6\xcb\xadTV\x92q\xfb2\xc3\xf9f\x06/\xa4\x1b\xbf\xcd\x88\x99\xea\bs9wy\x81\xf6\x93\xce\x15\x95!B \xe5\x89\xee\x85\xef\xcb\x97\xadWJ\xe9\xceh-\xec\xa9\xb7\xb3b\x88\xb1\xc6V\x11[\xb6Ft\xa3\xc7)\xe2\xae\x85TE\xd9\xd9\x7f\xde!\"\x8b\xd0\x8c\x1eL)\xe39Z6*\xf8\x05\x8963\xf2P\x7fk\x1f\xb5\xba\x88n(FB\"j\xd9;\xa9{\xa1\xff\xac\xad\x84\x1e\xdf\x91V\xb78\x14F\xdbS', 0x40, 0x0, &(0x7f0000000740)={0x3c, 0x1, 0x81, 0x6}) truncate(&(0x7f00000001c0)='./file0\x00', 0xca) syz_genetlink_get_family_id$net_dm(&(0x7f0000000500)='NET_DM\x00') bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100), 0xc) 04:22:15 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800000010000503376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) 04:22:15 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000000c0)={'bridge0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="09000000000000000003000000000000000000000000001ed050b385b5299beb3ccc700cb8eafecdec70d1a3fb4fdeaaaaea3e8d8e716a776390ba982d7b02d98949423e374ae3719f75a16bdb23b197b3f77ab42f3a10091ff825814208a83bbf86f92a82d4ef1b808677bd5d300fe3d52dfb68e3eb7f2b5da7c949b1df4a97ff667d84675e52458ef35ceada7d511fa612fff0dede382215f95d65ad45d54e223d93f9b9d3ad4b0562de1742d2ac722315f853ff39b1"]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x654880, 0x0) r1 = socket(0x11, 0x800000003, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r2) sendmsg$NFNL_MSG_ACCT_GET(r1, &(0x7f0000000240)={&(0x7f0000000040), 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x44, 0x1, 0x7, 0x801, 0x0, 0x0, {0x3, 0x0, 0x7}, [@NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x6}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0xa}, @NFACCT_FILTER={0x4}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x7fffffff}]}, 0x44}, 0x1, 0x0, 0x0, 0x400c0}, 0x4000000) [ 3242.427559] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 04:22:15 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x4398, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) 04:22:15 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x581cc}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) 04:22:16 executing program 5: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x107) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x7ff}, @timestamp, @window], 0x3) r1 = socket$inet6(0x10, 0x3, 0x10) sendto$inet6(r1, &(0x7f0000000000)='E', 0x10a73, 0x88c, 0x0, 0x4b6ae4f95a5de35b) 04:22:16 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800000010430503376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3243.355802] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3243.433467] kauditd_printk_skb: 206 callbacks suppressed [ 3243.433483] audit: type=1400 audit(2000002936.630:87260): avc: denied { map } for pid=23563 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3243.610552] audit: type=1400 audit(2000002936.640:87261): avc: denied { map } for pid=23571 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3243.685611] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 3243.747622] audit: type=1400 audit(2000002936.650:87262): avc: denied { map } for pid=23571 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3243.788882] device macvlan762 entered promiscuous mode 04:22:17 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xffff, 0x0) r1 = socket(0x11, 0x800000003, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$RTC_IRQP_READ(r3, 0x8008700b, &(0x7f0000000180)) ioctl$SIOCX25GFACILITIES(r1, 0x89e2, &(0x7f0000000040)) ioctl$VIDIOC_G_PARM(r0, 0xc0285628, &(0x7f0000000080)) [ 3243.830453] audit: type=1400 audit(2000002936.650:87263): avc: denied { map } for pid=23571 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:22:17 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newlink={0x54, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x10, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc}]}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x54}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0x0, {0x0, 0xe, 0x0, r4}}, 0x20}}, 0x0) 04:22:17 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x581cd}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) [ 3243.985458] audit: type=1400 audit(2000002936.700:87264): avc: denied { map } for pid=23573 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:22:17 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800000010080603376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) 04:22:17 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x439c, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) 04:22:17 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r2, 0x8200) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r3, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x44800) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x4000000000000000, 0x0, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0xfe00}]) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x4000000, &(0x7f0000000240)={&(0x7f00000002c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff0f}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x3, r6}]}}}]}, 0x38}}, 0x0) r7 = socket(0x400000011, 0x100004000000002, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(r8, 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f00000001c0)={{{@in6=@local, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x30d, 0x2, 0x80, 0x180, 0x33, r6, r8}, {0x4, 0x8, 0x4, 0x5, 0x6, 0x0, 0xf4c, 0x3ff}, {0x4, 0x9, 0x3, 0x4}, 0x47, 0x0, 0x1, 0x1, 0x0, 0x3}, {{@in=@broadcast, 0x4d4, 0x2b}, 0x2, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3506, 0x1, 0x0, 0x94, 0x7, 0x81, 0xfff}}, 0xe8) [ 3244.224153] audit: type=1400 audit(2000002936.700:87265): avc: denied { map } for pid=23573 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3244.404015] audit: type=1400 audit(2000002936.700:87266): avc: denied { map } for pid=23571 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3244.543941] audit: type=1400 audit(2000002936.720:87267): avc: denied { map } for pid=23573 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3244.715285] audit: type=1400 audit(2000002936.730:87268): avc: denied { map } for pid=23573 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3244.890512] audit: type=1400 audit(2000002936.740:87269): avc: denied { map } for pid=23571 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3244.915081] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 04:22:18 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800000010890603376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) 04:22:18 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000000c0)="2f0000001c0005c5ffffff000d000000020000000b000000ec0091c913000180f0ffffeb", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x1, 0x3, 0x0) ioctl$sock_SIOCGSKNS(r1, 0x894c, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f00000001c0)={{0x2, 0x0, @identifier="38e1961148d38419bc0ed337d8e87e88"}, 0x73, [], "c1c90f9e001d2b39e396fa1e8b28a3e0f116370b5313b1255db097524f0c9c7ec0f80ddf178c53853d3372f24bbf4a91a366f74541106f9f3495c916368658aa2cd6ccb3638384c9fba9d0dcbab12c09d622f3800491db61a98923ba827acd7dae8f10e1ac7636b1bd16b14ea3b822a37171cb"}) write(0xffffffffffffffff, &(0x7f00000000c0)="2400000058001f03ff07f4f9002304050a04f51108000100030100020800038005000000", 0x3f5) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 3245.424694] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 3245.501287] device macvlan763 entered promiscuous mode 04:22:18 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x581ce}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) [ 3245.846932] device sit15 entered promiscuous mode 04:22:19 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800000010060803376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) 04:22:19 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x43a4, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) [ 3246.055685] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3246.217583] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 3246.289829] device macvlan764 entered promiscuous mode 04:22:19 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="280010003100090300000000000000000000000014000100100001000a0001007065646974000000237e910c000f59bb8117ac5eefedca37082bcb886139eef018a4cb666ad740e1a149792f616b57346d66274d45da8b14443ef0eee6e964b0359591b4fd64f1f786741f8c87d5b8f1b224"], 0x28}}, 0x0) 04:22:19 executing program 5: syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = memfd_create(&(0x7f0000000880)='#em1#+\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x20000100000094, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x9, 0x0, &(0x7f0000706ffc)) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000200)=0x3, 0x4) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket(0x11, 0x800000003, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r4, 0x84, 0x1e, &(0x7f0000000100)=0x7c, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x264, &(0x7f0000000000)=[{}]}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r6, &(0x7f00000003c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x4000008) setregid(0x0, 0x0) 04:22:19 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newlink={0x54, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x10, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc}]}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x54}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0x0, {0x0, 0x10, 0x0, r4}}, 0x20}}, 0x0) 04:22:19 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x581cf}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) 04:22:19 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800000010000d03376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3247.218087] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 04:22:20 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800000010800e03376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) 04:22:20 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e48000020000505d25a80648c63940d0824fc60100003400a000000053582c137153e370207018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x2b0000, 0x0) write$P9_RRENAMEAT(r1, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) [ 3247.719151] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 3247.838273] device macvlan765 entered promiscuous mode 04:22:21 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x43ac, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) 04:22:21 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x581d0}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) [ 3248.095914] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 04:22:21 executing program 5: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) connect$rds(r2, &(0x7f0000000280)={0x2, 0x4e24, @broadcast}, 0x10) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f00000002c0)) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) r3 = socket(0x5, 0x1, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) mknod(&(0x7f0000000380)='./file0\x00', 0x8000, 0x20) setsockopt$inet_sctp6_SCTP_CONTEXT(r4, 0x84, 0x23, &(0x7f0000000080), 0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000002940), 0x10) setsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x1) r5 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/adsp1\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_SYNC(r5, 0x5001, 0x0) 04:22:21 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800000010002003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3248.415963] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 04:22:21 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newlink={0x54, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x10, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc}]}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x54}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0x0, {0x0, 0x43, 0x0, r4}}, 0x20}}, 0x0) [ 3248.461637] netlink: 16646 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3248.545575] kauditd_printk_skb: 174 callbacks suppressed [ 3248.545590] audit: type=1400 audit(2000002941.750:87444): avc: denied { map } for pid=23666 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3248.710006] audit: type=1400 audit(2000002941.750:87445): avc: denied { map } for pid=23666 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:22:21 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff024}, {0x80000006}]}, 0x10) ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f0000000040)) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') [ 3248.852932] audit: type=1400 audit(2000002941.750:87446): avc: denied { map } for pid=23666 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3248.920717] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 3249.037989] audit: type=1400 audit(2000002941.750:87447): avc: denied { map } for pid=23666 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3249.145289] device macvlan766 entered promiscuous mode [ 3249.222501] audit: type=1400 audit(2000002941.800:87448): avc: denied { create } for pid=23664 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 04:22:22 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800000010002803376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) 04:22:22 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x581d1}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) [ 3249.526553] audit: type=1400 audit(2000002941.830:87449): avc: denied { map } for pid=23666 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3249.567518] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3249.744131] audit: type=1400 audit(2000002941.890:87450): avc: denied { map } for pid=23666 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3249.900960] audit: audit_backlog=65 > audit_backlog_limit=64 [ 3249.924042] audit: type=1400 audit(2000002941.890:87451): avc: denied { map } for pid=23666 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:22:23 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0xa) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup3(r4, r5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x20b) close(r2) r7 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4f0a, 0x0) [ 3249.977493] audit: audit_backlog=65 > audit_backlog_limit=64 04:22:23 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x43b0, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) 04:22:23 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = socket(0x11, 0x800000003, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r2, 0x0, r3) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000040)={0x4, 0xfffb, 0x0, 0x7, 0x0, 0x9, 0x0, 0x5, 0x0}, &(0x7f00000000c0)=0x20) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000100)={r4, 0x1}, &(0x7f0000000140)=0x8) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002580)={[{@iocharset={'iocharset', 0x3d, 'utf8'}}]}) 04:22:23 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800000010003003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3250.494588] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3250.869170] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 3250.980153] device macvlan767 entered promiscuous mode [ 3251.040109] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=23710 comm=syz-executor.5 04:22:24 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newlink={0x54, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x10, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc}]}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x54}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0x0, {0x0, 0x60, 0x0, r4}}, 0x20}}, 0x0) 04:22:24 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x581d2}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) [ 3251.107251] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=23710 comm=syz-executor.5 [ 3251.187101] FAT-fs (loop3): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive! [ 3251.190462] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=23710 comm=syz-executor.5 [ 3251.229887] FAT-fs (loop3): bogus number of reserved sectors [ 3251.252293] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=23710 comm=syz-executor.5 04:22:24 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x43b4, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) [ 3251.301710] FAT-fs (loop3): Can't find a valid FAT filesystem 04:22:24 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800000010803503376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3251.446745] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=23710 comm=syz-executor.5 [ 3251.595451] FAT-fs (loop3): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive! [ 3251.661199] FAT-fs (loop3): bogus number of reserved sectors 04:22:24 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/tty/ldiscs\x00', 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) r2 = socket(0x11, 0x800000003, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r2, 0x0, r3) sendto$unix(r2, &(0x7f00000001c0)="ca7e3e18dd5988d04cee5ada6ee5655ea44255eddbd2db5191888dc4dbc97133eadc403dc565e102845f5e1ee6ede8609e8db1ddc5052a9e5075658816641111cb946a07a4ca1ed7a069a967", 0x4c, 0x8000, &(0x7f0000000240)=@abs={0x0, 0x0, 0x4e20}, 0x6e) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r4) setsockopt$ax25_SO_BINDTODEVICE(r1, 0x101, 0x19, &(0x7f0000000000)=@bpq0='bpq0\x00', 0x10) preadv(r0, &(0x7f00000002c0)=[{&(0x7f0000000040)=""/235, 0xeb}], 0x1, 0x0) [ 3251.704737] FAT-fs (loop3): Can't find a valid FAT filesystem [ 3251.914725] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 3252.060602] device macvlan768 entered promiscuous mode 04:22:25 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r2 = socket(0x11, 0x800000003, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket(0x11, 0x800000003, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r5, 0x0, r6) r7 = socket(0x11, 0x800000003, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r7, 0x0, r8) r9 = socket(0x11, 0x800000003, 0x0) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r9, 0x0, r10) r11 = socket(0x11, 0x800000003, 0x0) r12 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r11, 0x0, r12) r13 = socket(0x11, 0x800000003, 0x0) r14 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r13, 0x0, r14) r15 = socket(0x11, 0x800000003, 0x0) r16 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r15, 0x0, r16) r17 = socket(0x11, 0x800000003, 0x0) r18 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r17, 0x0, r18) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYPTR64=&(0x7f0000000240)=ANY=[@ANYRES64=r1, @ANYRES32=r17, @ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRES16=r8, @ANYRESHEX=r9, @ANYPTR, @ANYPTR, @ANYRES64], @ANYRES64=r12, @ANYRESOCT=r14, @ANYRES32=r15]], 0x1}, 0x1, 0x0, 0x0, 0x4000014}, 0x60488c5) r19 = socket(0x11, 0x800000003, 0x0) r20 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r19, 0x0, r20) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="0500001f1000080500000003000000000000ba85610000", @ANYRES32=0x0, @ANYBLOB="002d0000000000002400128009000100766c616e000000001400828006000100000088a8000108000500000000000000", @ANYPTR=&(0x7f0000000400)=ANY=[@ANYRES16, @ANYRESOCT=r20], @ANYBLOB="cbf2b7524e6597c2a172e34898f49f289d4f22c3724142351fdb6f05dbe12895f212c68ceb1c05095c2e37d8fe8bd619d87f537257d28ae05689cabdf355f77aa5a8a73c9bbbeb13270241ff681598addef5660baedf298386b9688a8db51a6a8accd54df070e78bcaefb3fd263efd507493812da35702db8db53c5f476198a48eeafb1ea9fe6fa429be043efa2561e213e099a2847b"], 0x5}}, 0x4) r21 = socket$netlink(0x10, 0x3, 0x0) ioctl(r21, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") 04:22:25 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x581d3}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) [ 3252.319257] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 04:22:25 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800000010003f03376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) 04:22:26 executing program 5: r0 = socket(0x11, 0x800000003, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PIO_UNISCRNMAP(r2, 0x4b6a, &(0x7f0000000180)="7d2b549fb69d0c08139d9cc44bc04c001f81b932") mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_mount_image$minix(&(0x7f0000000080)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x4c00, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600b42e006000a0090040300001af5c96824", 0x12, 0x400}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) [ 3253.085239] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 04:22:26 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x43b8, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) [ 3253.312824] netlink: 'syz-executor.1': attribute type 5 has an invalid length. 04:22:26 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800000010054303376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3253.434231] device macvlan769 entered promiscuous mode 04:22:26 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newlink={0x54, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x10, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc}]}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x54}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0x0, {0x0, 0x66, 0x0, r4}}, 0x20}}, 0x0) 04:22:26 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x581d4}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) [ 3253.620148] kauditd_printk_skb: 223 callbacks suppressed [ 3253.620164] audit: type=1400 audit(2000002946.820:87641): avc: denied { map } for pid=23761 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3253.778904] audit: type=1400 audit(2000002946.820:87642): avc: denied { map } for pid=23761 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3253.982269] audit: type=1400 audit(2000002946.830:87643): avc: denied { map } for pid=23761 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3254.022481] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 3254.161245] audit: type=1400 audit(2000002946.830:87644): avc: denied { map } for pid=23761 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3254.304524] minix_free_inode: bit 1 already cleared 04:22:27 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800000010884703376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3254.376100] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 04:22:27 executing program 3: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x1, 0x1) r3 = socket$packet(0x11, 0x3, 0x300) getsockopt$inet6_int(r1, 0x29, 0x3a, &(0x7f0000000080), &(0x7f00000000c0)=0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xffffffffffffffff}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) r4 = socket(0x11, 0x800000003, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r6, 0x84, 0x65, &(0x7f0000000100)=[@in={0x2, 0x4e24, @local}, @in6={0xa, 0x4e24, 0x3f, @loopback, 0x3f}, @in6={0xa, 0x4e21, 0x100, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x2}, @in6={0xa, 0x4e21, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @in6={0xa, 0x4e22, 0x20, @ipv4={[], [], @broadcast}, 0x5}, @in6={0xa, 0x4e24, 0xff, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x6}, @in={0x2, 0x4e21, @local}], 0xac) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 3254.404282] audit: type=1400 audit(2000002946.950:87645): avc: denied { map } for pid=23761 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3254.605618] audit: type=1400 audit(2000002947.030:87646): avc: denied { map } for pid=23761 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3254.818812] audit: type=1400 audit(2000002947.050:87647): avc: denied { map } for pid=23761 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3255.022705] audit: type=1400 audit(2000002947.090:87648): avc: denied { map } for pid=23761 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:22:28 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x43bc, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) [ 3255.208025] audit: type=1400 audit(2000002947.100:87649): avc: denied { map } for pid=23761 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:22:28 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800000010884803376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3255.380180] audit: type=1400 audit(2000002947.180:87650): avc: denied { map } for pid=23761 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3255.488084] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 3255.638837] device macvlan770 entered promiscuous mode [ 3255.673063] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 04:22:29 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newlink={0x54, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x10, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc}]}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x54}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0x0, {0x0, 0xbe, 0x0, r4}}, 0x20}}, 0x0) 04:22:29 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000000)) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$ext4(&(0x7f0000000140)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="25bca27476e7628a2734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a782f270146d0e0206a73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)={[{@auto_da_alloc='auto_da_alloc'}], [{@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_gt={'fowner>', r2}}, {@seclabel='seclabel'}]}) 04:22:29 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800000010006003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) 04:22:29 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x581d5}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) 04:22:29 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x43c0, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) 04:22:30 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r5) ptrace$setopts(0x4206, r5, 0x0, 0x0) r6 = socket(0x400000011, 0x100004000000002, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(r7, 0x0, 0x0) r8 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r8, 0xae01, 0x0) r9 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r9, 0x5423, &(0x7f00000000c0)=0x3) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="6560000000b7f061971513405ea803a4b4950000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) ioctl$TIOCMSET(r9, 0x5418, &(0x7f0000000540)=0x38) fadvise64(r10, 0x0, 0x8000, 0x2) r11 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x400, 0x0) ioctl$EVIOCGPROP(r11, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r11, 0x540f, &(0x7f0000000a80)=0x0) epoll_ctl$EPOLL_CTL_MOD(r11, 0x3, r10, &(0x7f0000000740)={0x4}) kcmp(r12, 0x0, 0x2, r10, r9) ioctl$DRM_IOCTL_GET_CLIENT(r8, 0xc0286405, &(0x7f00000000c0)={0x67, 0x5, {r12}, {0x0}, 0x7f2b15d7, 0x3}) newfstatat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x800, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000,user_id=', @ANYRESDEC=r13, @ANYBLOB=',group_id=', @ANYRESDEC=r14, @ANYBLOB="2c6d61785f726561643d3007000000300230303030303030346331392c626c6b736980653d3078303030303051303030303030303630302c646f6e745f6d6561737572652c7569643e", @ANYRESDEC=0xee00, @ANYBLOB=',subj_user={bdev,smackfstransmute=/dev/kvm\x00,\x00']) r15 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r15) ptrace$setopts(0x4206, r15, 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f00000007c0)=0x0) r17 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r17, 0xae01, 0x0) r18 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r18, 0x5423, &(0x7f00000000c0)=0x3) r19 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000002640)=ANY=[@ANYBLOB="6560000000b7f061971513405ea803a4b40006000000000000009ad50659d150eed98f319ce0f05690335d266824b235a07954f29f1613270b5199150759d77b58214566f0093e304d5c4721cb28b2415d5fb575f6146c4c9d529ea687486b31448976b835779ec59c8305f15ff19f367f2c5a0f34"], 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) ioctl$TIOCMSET(r18, 0x5418, &(0x7f0000000540)=0x38) fadvise64(r19, 0x0, 0x8000, 0x2) r20 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x400, 0x0) ioctl$EVIOCGPROP(r20, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r20, 0x540f, &(0x7f0000000a80)=0x0) epoll_ctl$EPOLL_CTL_MOD(r20, 0x3, r19, &(0x7f0000000740)={0x4}) kcmp(r21, 0x0, 0x2, r19, r18) ioctl$DRM_IOCTL_GET_CLIENT(r17, 0xc0286405, &(0x7f00000000c0)={0x67, 0x5, {r21}, {0x0}, 0x7f2b15d7, 0x3}) newfstatat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x800, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000,user_id=', @ANYRESDEC=r22, @ANYBLOB=',group_id=', @ANYRESDEC=r23, @ANYBLOB="2c6d61785f726561643d3007000000300230303030303030346331392c626c6b736980653d3078303030303051303030303030303630302c646f6e745f6d6561737572652c7569643e", @ANYRESDEC=0xee00, @ANYBLOB=',subj_user={bdev,smackfstransmute=/dev/kvm\x00,\x00']) r24 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r24) ptrace$setopts(0x4206, r24, 0x0, 0x0) r25 = socket(0x11, 0x800000003, 0x0) r26 = socket$inet6_tcp(0xa, 0x1, 0x0) r27 = fcntl$dupfd(r25, 0x0, r26) ioctl$PERF_EVENT_IOC_ENABLE(r27, 0x8912, 0x400200) fstat(r27, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r30 = socket(0x11, 0x800000003, 0x0) r31 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r30, 0x0, r31) r32 = socket(0x11, 0x800000003, 0x0) r33 = socket$inet6_tcp(0xa, 0x1, 0x0) r34 = fcntl$dupfd(r32, 0x0, r33) ioctl$PERF_EVENT_IOC_ENABLE(r34, 0x8912, 0x400200) socket$inet6_udplite(0xa, 0x2, 0x88) r35 = socket(0x11, 0x800000003, 0x0) r36 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r35, 0x0, r36) r37 = syz_open_dev$ttys(0xc, 0x2, 0x1) r38 = socket(0x11, 0x800000003, 0x0) r39 = socket$inet6_tcp(0xa, 0x1, 0x0) r40 = fcntl$dupfd(r38, 0x0, r39) ioctl$PERF_EVENT_IOC_ENABLE(r40, 0x8912, 0x400200) r41 = socket(0x11, 0x800000003, 0x0) r42 = socket$inet6_tcp(0xa, 0x1, 0x0) r43 = fcntl$dupfd(r41, 0x0, r42) ioctl$PERF_EVENT_IOC_ENABLE(r43, 0x8912, 0x400200) r44 = socket(0x11, 0x800000003, 0x0) r45 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r44, 0x0, r45) r46 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r46) ptrace$setopts(0x4206, r46, 0x0, 0x0) statx(r1, &(0x7f0000000940)='./file0\x00', 0x0, 0x40, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r48 = gettid() getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000a80)={{{@in6=@dev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000b80)=0xe8) statx(0xffffffffffffff9c, &(0x7f0000000bc0)='./file0\x00', 0x4000, 0x20, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r51 = getpgid(0x0) stat(&(0x7f0000000d00)='./file0\x00', &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0}) r53 = getgid() getpgid(0x0) r54 = socket(0x400000011, 0x100004000000002, 0x0) getsockopt$sock_cred(r54, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(r55, 0x0, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000011c0)='./file0\x00', &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4000) r57 = getpid() r58 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r58) ptrace$setopts(0x4206, r58, 0x0, 0x0) r59 = socket(0x400000011, 0x100004000000002, 0x0) getsockopt$sock_cred(r59, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(r60, 0x0, 0x0) ioctl$DRM_IOCTL_GET_CLIENT(r1, 0xc0286405, &(0x7f0000001280)={0x606, 0x40, {r58}, {r60}, 0x5, 0xfffffffffffffffc}) r62 = getegid() r63 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r63) ptrace$setopts(0x4206, r63, 0x0, 0x0) r64 = geteuid() r65 = getegid() r66 = socket(0x11, 0x800000003, 0x0) r67 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r66, 0x0, r67) getsockopt$sock_cred(r67, 0x1, 0x11, &(0x7f00000012c0)={0x0}, &(0x7f0000001300)=0xc) r69 = socket(0x400000011, 0x100004000000002, 0x0) getsockopt$sock_cred(r69, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(r70, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001340)={0x0, 0x0, 0x0}, &(0x7f0000001380)=0xc) r72 = socket(0x400000011, 0x100004000000002, 0x0) getsockopt$sock_cred(r72, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(r73, 0x0, 0x0) r74 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r74, 0xae01, 0x0) r75 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r75, 0x5423, &(0x7f00000000c0)=0x3) r76 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="6560000000b7f061971513405ea803a4b4950000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) ioctl$TIOCMSET(r75, 0x5418, &(0x7f0000000540)=0x38) fadvise64(r76, 0x0, 0x8000, 0x2) r77 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x400, 0x0) ioctl$EVIOCGPROP(r77, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r77, 0x540f, &(0x7f0000000a80)=0x0) epoll_ctl$EPOLL_CTL_MOD(r77, 0x3, r76, &(0x7f0000000740)={0x4}) kcmp(r78, 0x0, 0x2, r76, r75) ioctl$DRM_IOCTL_GET_CLIENT(r74, 0xc0286405, &(0x7f00000000c0)={0x67, 0x5, {r78}, {0x0}, 0x7f2b15d7, 0x3}) newfstatat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x800, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000,user_id=', @ANYRESDEC=r79, @ANYBLOB=',group_id=', @ANYRESDEC=r80, @ANYBLOB="2c6d61785f726561643d3007000000300230303030303030346331392c626c6b736980653d3078303030303051303030303030303630302c646f6e745f6d6561737572652c7569643e", @ANYRESDEC=0xee00, @ANYBLOB=',subj_user={bdev,smackfstransmute=/dev/kvm\x00,\x00']) r81 = socket(0x11, 0x800000003, 0x0) r82 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r81, 0x0, r82) r83 = socket(0x11, 0x800000003, 0x0) r84 = socket$inet6_tcp(0xa, 0x1, 0x0) r85 = fcntl$dupfd(r83, 0x0, r84) ioctl$PERF_EVENT_IOC_ENABLE(r85, 0x8912, 0x400200) fcntl$getownex(r85, 0x10, &(0x7f00000013c0)={0x0, 0x0}) r87 = socket(0x400000011, 0x100004000000002, 0x0) getsockopt$sock_cred(r87, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(r88, 0x0, 0x0) lstat(&(0x7f0000001400)='./file0\x00', &(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r90 = socket(0x11, 0x800000003, 0x0) r91 = socket$inet6_tcp(0xa, 0x1, 0x0) r92 = fcntl$dupfd(r90, 0x0, r91) ioctl$PERF_EVENT_IOC_ENABLE(r92, 0x8912, 0x400200) r93 = accept$packet(r92, &(0x7f00000014c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001500)=0x14) r94 = socket(0x11, 0x800000003, 0x0) r95 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r94, 0x0, r95) r96 = socket$pppl2tp(0x18, 0x1, 0x1) r97 = socket(0x11, 0x800000003, 0x0) r98 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r97, 0x0, r98) r99 = socket(0x11, 0x800000003, 0x0) r100 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r99, 0x0, r100) r101 = openat$ion(0xffffffffffffff9c, &(0x7f0000001540)='/dev/ion\x00', 0x8000, 0x0) r102 = socket(0x11, 0x800000003, 0x0) r103 = socket$inet6_tcp(0xa, 0x1, 0x0) r104 = fcntl$dupfd(r102, 0x0, r103) ioctl$PERF_EVENT_IOC_ENABLE(r104, 0x8912, 0x400200) r105 = socket(0x11, 0x800000003, 0x0) r106 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r105, 0x0, r106) r107 = socket(0x11, 0x800000003, 0x0) r108 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r107, 0x0, r108) r109 = socket(0x11, 0x800000003, 0x0) r110 = socket$inet6_tcp(0xa, 0x1, 0x0) r111 = fcntl$dupfd(r109, 0x0, r110) ioctl$PERF_EVENT_IOC_ENABLE(r111, 0x8912, 0x400200) fcntl$getownex(r1, 0x10, &(0x7f0000001f00)={0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001f40)={{{@in6=@mcast1, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f0000002040)=0xe8) lstat(&(0x7f0000002080)='./file0\x00', &(0x7f00000020c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r115 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r115) ptrace$setopts(0x4206, r115, 0x0, 0x0) r116 = getpgrp(r115) r117 = socket(0x11, 0x800000003, 0x0) r118 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r117, 0x0, r118) getsockopt$inet_IP_IPSEC_POLICY(r117, 0x0, 0x10, &(0x7f0000002140)={{{@in=@loopback, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000002240)=0xe8) r120 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r120) ptrace$setopts(0x4206, r120, 0x0, 0x0) stat(&(0x7f00000023c0)='./file0\x00', &(0x7f0000002400)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000002480), &(0x7f00000024c0), &(0x7f0000002500)=0x0) r123 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r123) ptrace$setopts(0x4206, r123, 0x0, 0x0) r124 = socket(0x400000011, 0x100004000000002, 0x0) getsockopt$sock_cred(r124, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(r125, 0x0, 0x0) r126 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r126, 0xae01, 0x0) r127 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r127, 0x5423, &(0x7f00000000c0)=0x3) r128 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="6560000000b7f061971513405ea803a4b4950000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) ioctl$TIOCMSET(r127, 0x5418, &(0x7f0000000540)=0x38) fadvise64(r128, 0x0, 0x8000, 0x2) r129 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x400, 0x0) ioctl$EVIOCGPROP(r129, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r129, 0x540f, &(0x7f0000000a80)=0x0) epoll_ctl$EPOLL_CTL_MOD(r129, 0x3, r128, &(0x7f0000000740)={0x4}) kcmp(r130, 0x0, 0x2, r128, r127) ioctl$DRM_IOCTL_GET_CLIENT(r126, 0xc0286405, &(0x7f00000000c0)={0x67, 0x5, {r130}, {0x0}, 0x7f2b15d7, 0x3}) newfstatat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x800, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000,user_id=', @ANYRESDEC=r131, @ANYBLOB=',group_id=', @ANYRESDEC=r132, @ANYBLOB="2c6d61785f726561643d3007000000300230303030303030346331392c626c6b736980653d3078303030303051303030303030303630302c646f6e745f6d6561737572652c7569643e", @ANYRESDEC=0xee00, @ANYBLOB=',subj_user={bdev,smackfstransmute=/dev/kvm\x00,\x00']) r133 = socket(0x11, 0x800000003, 0x0) r134 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r133, 0x0, r134) r135 = socket(0x11, 0x800000003, 0x0) r136 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r135, 0x0, r136) r137 = socket(0x11, 0x800000003, 0x0) r138 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r137, 0x0, r138) r139 = socket(0x11, 0x800000003, 0x0) r140 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r139, 0x0, r140) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000002540)=0x0) r142 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r142, 0xae01, 0x0) r143 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r143, 0x5423, &(0x7f00000000c0)=0x3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xc0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0), 0x0, 0x0, 0x0, &(0x7f00000007c0)={0x9, 0x3}, 0x0, 0x0, &(0x7f0000000880)={0x0, 0xf, 0x0, 0x8}, &(0x7f00000008c0)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)=0x10001}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x0, 0x11, &(0x7f00000003c0)=ANY=[@ANYBLOB="850000005300000095000000000000445a0708d1303274df9696513dcf76656b8ba4549a791dba3e4233542f67a07e7255df2fa25dc49432457ddde8ec5afff74287d7b8e902ab041da7cbfb0fefd473038d958723088900cdc2ffcc604a94dbf6fd2cd61b0dfc2cbe6880df8b5d0e00e07ea49e083963cedf928cc8cbae6903bb9adc8847cb065d8fa0a5014641"], 0x0, 0x0, 0x2e, &(0x7f0000000500)=""/46, 0x41100, 0x9, [], 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000580)={0x0, 0x10, 0x3}, 0x10, r144}, 0x78) r145 = socket(0x11, 0x800000003, 0x0) r146 = socket$inet6_tcp(0xa, 0x1, 0x0) r147 = fcntl$dupfd(r145, 0x0, r146) ioctl$PERF_EVENT_IOC_ENABLE(r147, 0x8912, 0x400200) r148 = socket(0x11, 0x800000003, 0x0) r149 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r148, 0x0, r149) r150 = socket(0x11, 0x800000003, 0x0) r151 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r150, 0x0, r151) r152 = socket(0x11, 0x800000003, 0x0) r153 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r152, 0x0, r153) r154 = socket(0x11, 0x800000003, 0x0) r155 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r154, 0x0, r155) r156 = socket(0x11, 0x800000003, 0x0) r157 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r156, 0x0, r157) r158 = bpf$PROG_LOAD(0x5, &(0x7f0000006780)={0xc, 0xd, &(0x7f0000006980)=ANY=[@ANYRESHEX=0x0, @ANYRES64, @ANYRES64, @ANYRESOCT=r156, @ANYRES64, @ANYRES64=r149, @ANYRES16, @ANYRES64, @ANYPTR64=&(0x7f0000006a00)=ANY=[@ANYRESOCT=r93, @ANYPTR=&(0x7f0000006880)=ANY=[@ANYRESDEC=r150], @ANYRES16, @ANYRES16=r153, @ANYRESDEC, @ANYRESHEX], @ANYRESHEX=r155], 0x0, 0x0, 0xffffffffffffff18, 0x0, 0x3, 0x1, [], 0x0, 0x14, r147, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0xc, 0x4, 0x3}, 0x10, r144}, 0x78) ioctl$TIOCMSET(r143, 0x5418, &(0x7f0000000540)=0x38) fadvise64(r158, 0x0, 0x8000, 0x2) r159 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x400, 0x0) ioctl$EVIOCGPROP(r159, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r159, 0x540f, &(0x7f0000000a80)=0x0) epoll_ctl$EPOLL_CTL_MOD(r159, 0x3, r158, &(0x7f0000000740)={0x4}) kcmp(r160, 0x0, 0x2, r158, r143) ioctl$DRM_IOCTL_GET_CLIENT(r142, 0xc0286405, &(0x7f00000000c0)={0x67, 0x5, {r160}, {0x0}, 0x7f2b15d7, 0x3}) newfstatat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x800, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000,user_id=', @ANYRESDEC=r161, @ANYBLOB=',group_id=', @ANYRESDEC=r162, @ANYBLOB="2c6d61785f726561643d3007000000300230303030303030346331392c626c6b736980653d3078303030303051303030303030303630302c646f6e745f6d6561737572652c7569643e", @ANYRESDEC=0xee00, @ANYBLOB=',subj_user={bdev,smackfstransmute=/dev/kvm\x00,\x00']) r163 = socket(0x11, 0x800000003, 0x0) r164 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r163, 0x0, r164) r165 = socket(0x11, 0x800000003, 0x0) r166 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r165, 0x0, r166) r167 = socket(0x11, 0x800000003, 0x0) r168 = socket$inet6_tcp(0xa, 0x1, 0x0) r169 = fcntl$dupfd(r167, 0x0, r168) ioctl$PERF_EVENT_IOC_ENABLE(r169, 0x8912, 0x400200) lstat(&(0x7f0000002580)='./file0\x00', &(0x7f00000025c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r171 = socket(0x11, 0x800000003, 0x0) r172 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r171, 0x0, r172) fstat(r172, &(0x7f00000066c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r174 = socket(0x400000011, 0x100004000000002, 0x0) getsockopt$sock_cred(r174, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(r175, 0x0, 0x0) lstat(&(0x7f0000002a00)='./file0\x00', &(0x7f0000002a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r177 = socket(0x11, 0x800000003, 0x0) r178 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r177, 0x0, r178) r179 = socket(0x11, 0x800000003, 0x0) r180 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r179, 0x0, r180) r181 = socket(0x11, 0x800000003, 0x0) r182 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r181, 0x0, r182) syz_open_dev$rtc(&(0x7f0000002ac0)='/dev/rtc#\x00', 0xea7, 0x101000) r183 = socket(0x11, 0x800000003, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r183, 0x0, 0xffffffffffffffff) r184 = socket(0x11, 0x800000003, 0x0) r185 = socket$inet6_tcp(0xa, 0x1, 0x0) r186 = fcntl$dupfd(r184, 0x0, r185) ioctl$PERF_EVENT_IOC_ENABLE(r186, 0x8912, 0x400200) r187 = socket(0x3, 0x800000003, 0x6) r188 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r187, 0x0, r188) r189 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r189) ptrace$setopts(0x4206, r189, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000002e00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r191 = socket(0x11, 0x800000003, 0x0) r192 = socket$inet6_tcp(0xa, 0x1, 0x0) r193 = fcntl$dupfd(r191, 0x0, r192) ioctl$PERF_EVENT_IOC_ENABLE(r193, 0x8912, 0x400200) r194 = socket$inet6(0xa, 0xc, 0xf7) r195 = openat$selinux_access(0xffffffffffffff9c, &(0x7f00000040c0)='/selinux/access\x00', 0x2, 0x0) r196 = socket(0x11, 0x800000003, 0x0) r197 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r196, 0x0, r197) r198 = openat$full(0xffffffffffffff9c, &(0x7f0000004100)='/dev/full\x00', 0x40600, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000004140)=0x0) r200 = socket(0x400000011, 0x100004000000002, 0x0) getsockopt$sock_cred(r200, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(r201, 0x0, 0x0) getgroups(0x2, &(0x7f0000004180)=[0x0, 0x0]) fcntl$getownex(r1, 0x10, &(0x7f00000041c0)={0x0, 0x0}) r204 = getuid() fstat(0xffffffffffffffff, &(0x7f0000004200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r206 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r206) ptrace$setopts(0x4206, r206, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000005e80)='./file0\x00', 0x5000, 0x250, &(0x7f0000005ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r208 = socket(0x11, 0x800000003, 0x0) r209 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r208, 0x0, r209) r210 = socket(0x11, 0x800000003, 0x0) r211 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r210, 0x0, r211) r212 = socket(0x11, 0x800000003, 0x0) r213 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r212, 0x0, r213) r214 = socket(0x11, 0x800000003, 0x0) r215 = socket$inet6_tcp(0xa, 0x1, 0x0) r216 = fcntl$dupfd(r214, 0x0, r215) ioctl$PERF_EVENT_IOC_ENABLE(r216, 0x8912, 0x400200) r217 = ioctl$KVM_CREATE_VCPU(r216, 0xae41, 0x2) r218 = socket(0x11, 0x800000003, 0x0) r219 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r218, 0x0, r219) r220 = socket(0x11, 0x800000003, 0x0) r221 = socket$inet6_tcp(0xa, 0x1, 0x0) r222 = fcntl$dupfd(r220, 0x0, r221) ioctl$PERF_EVENT_IOC_ENABLE(r222, 0x8912, 0x400200) ioctl$VIDIOC_S_EXT_CTRLS(r1, 0xc0205648, &(0x7f0000006040)={0xa20000, 0x9, 0x3, 0xffffffffffffffff, 0x0, &(0x7f0000006000)={0xa20920, 0x3, [], @p_u32=&(0x7f0000005fc0)=0x40}}) r224 = socket(0x11, 0x800000003, 0x0) r225 = socket$inet6_tcp(0xa, 0x1, 0x0) r226 = fcntl$dupfd(r224, 0x0, r225) ioctl$PERF_EVENT_IOC_ENABLE(r226, 0x8912, 0x400200) r227 = socket(0x11, 0x800000003, 0x0) r228 = socket$inet6_tcp(0xa, 0x1, 0x0) r229 = fcntl$dupfd(r227, 0x0, r228) ioctl$PERF_EVENT_IOC_ENABLE(r229, 0x8912, 0x400200) r230 = socket(0x11, 0x800000003, 0x0) r231 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r230, 0x0, r231) ioctl$sock_FIOGETOWN(r231, 0x8903, &(0x7f0000006680)=0x0) sendmmsg$unix(r4, &(0x7f0000006440)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000700)=[{&(0x7f0000000180)="b57e059afc88d0cd", 0x8}, {&(0x7f00000001c0)="ed22b214156669c07e9f630d5d8d39e5246748a7bdc8602c8f8c5a9f7ac968a24b2d485c69db982f6c41ad0a9f9730069d285d147cd77953bc691540109d248e22fd16f698227b11d8b7c4ac631cb7a490f12ea98b49c7a972caaef9091489ee5990546b0986a84a00c30301a5b5778c1b5bed275aed00b2a79c667349f509a814f0477df1f74de90508fd40c6f2b18f34c6ed9e7de7dcae51307de2d0732ef60ad026e42d4fb3b8065ddf6020c8107892b510dd880e144b28190e6eb67de0a8c18e6fe1953a03a047390000e70986ed165b6b638098", 0xd6}, {&(0x7f00000002c0)="4c47f256a1d0007c2b899a11448d2b6dad74e1e800d98596066ae992abe4ec486f4da8192d2f1e4bb41d14f3eae27f3c1d97762702527a83d7e4ef2c7c035a03d1eb9ffa63b418212dd4dab337b6819ececcd19eb8bd04b3b5d5a7adeba15349300e983f8b8c881e4c8af67b68932d6256", 0x71}, {&(0x7f0000000340)="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", 0xfd}, {&(0x7f0000000440)="3bfc832b359692abf96d2e29ea26054207737d203c316334f153ab346ce02c1e22e3c3605be4fb3a2dc73bd918fd5df3141100001df7bd9ce920b20fd315c010638f7f763fc2064ec894a05b", 0x4c}, {&(0x7f00000004c0)="5069060269d51e16685ecedcee1f6db66f7dae7172691fc36b223c4251f074e374e7b298a51f21e34c32c0f7d7f576bbc0e65d875a7a8e2db6b57f545cde8335cb16a7e2bf7c7e0fb3d1b553d46ccb94a0", 0x51}, {&(0x7f0000000540)="9ffbc39540e09dbddc051a5732c45c91679b7e1c4b86003ef29f", 0x1a}, {&(0x7f0000000580)="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", 0xfc}, {&(0x7f0000000680)="1c71d92746416007934299f2b207aa5d98680b281ab4c618504ce656ad960eb93be059f6a4b8c5e31ec9f686de4c34fb04d69c621f5e79dccc8f65e9fa7f7bf93e9e1d1cf239c4ca5fd9a509934e4df9085e03c6c4fc048cdcc75c3ea5b2516cfa4f87f3c5f58a6f0189d400e29ca79fb5eb7f376bb2902f", 0x78}], 0x9, &(0x7f0000000dc0)=[@cred={{0x1c, 0x1, 0x2, {r5, r7, r14}}}, @cred={{0x1c, 0x1, 0x2, {r15, r16, r23}}}, @cred={{0x1c, 0x1, 0x2, {r24, r28, r29}}}, @rights={{0x18, 0x1, 0x1, [r30, r34]}}, @rights={{0x10}}, @rights={{0x2c, 0x1, 0x1, [r36, r0, r1, r37, r40, r43, r45]}}, @cred={{0x1c, 0x1, 0x2, {r46, 0xee00, r47}}}, @cred={{0x1c, 0x1, 0x2, {r48, r49, r50}}}, @cred={{0x1c, 0x1, 0x2, {r51, r52, r53}}}], 0x118}, {&(0x7f0000000f00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001180)=[{&(0x7f0000000f80)="881367241ffe5ac7bdd465751634c4557f47d14fcdf97bc88960e34acf0ea0410fe9eff406e505d525e13114e4a7fc8af76138019b3ddd4b8ee685adb7a34cb7d67b1c545aea088bc63941a9c2149faec97f495821b4a85e064cc89db85b85c536932e654edcd99a5d12bfb995898902c151c651d0e40621abf5a9f1f3f97f378198e04679d632ea3124f89f90a3284e79bf9957b9f334e1911022f9733fa7e482922e03ffda9a1cf5ab388585de4069ca56c7362bc729eea6602d20d6cd39ee9a26c120692a11731be43ed480914e6e0917351e084ee0e98a78603907e395fcc5950a51ec28fc", 0xe7}, {&(0x7f0000001080)="ccb5aa3caab2c33386ddeacd015df1568a295ef064f8b061545b143c1cf2cf47ed22f5fe5566d74ea399767db5d617172d872f8afe0ad23e4486d25bea9be7de43eca5eb79223f5c2ab1d6150401ad6b240a450411e073dc9b3dc8d279202353c11b46ab56afcb3fdb1ca47ff3e4d94c0cb2879160852801746aa204f1f0eaf935eeb4d3ebe4d61735d71cdaa43995105ae9f60a14d5f5ed3e5080503c2b799a7c6e004c5e8efdb09f1416e7faaac5d2d5944dfef429156f62624a85d46013482855c92548d3f64ccca3cdfa14264c9a9dbba65e0f9d93ecca9f0bc8c57fa0c9b2d61a5598e54ee0fdef1ade1404", 0xee}], 0x2, &(0x7f0000001580)=[@cred={{0x1c, 0x1, 0x2, {r232, r55, r56}}}, @cred={{0x1c, 0x1, 0x2, {r57, r61, r62}}}, @cred={{0x1c, 0x1, 0x2, {r63, r64, r65}}}, @cred={{0x1c, 0x1, 0x2, {r68, r70, r71}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r73, r80}}}, @rights={{0x14, 0x1, 0x1, [r81]}}, @cred={{0x1c, 0x1, 0x2, {r86, r88, r89}}}, @rights={{0x28, 0x1, 0x1, [r93, r94, r1, r1, r96, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [r98, r99, r1, r101]}}, @rights={{0x38, 0x1, 0x1, [r0, r104, 0xffffffffffffffff, r1, r0, r106, r0, r107, 0xffffffffffffffff, r111]}}], 0x158}, {&(0x7f0000001700)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001e40)=[{&(0x7f0000001780)="f8c3abbbbea22c58b196bcfb817e59f2e67de767bf2d767f2d248db2a6e53b4e6c8e5321678f4ce4a31aa85057b69939d4b07ce51234425d115c641fa4f836904932539b8f48af2e43f25fb5fcf4795c574120ff6a3e0a04b3a53b4f5a158c261e30bada34dc801d21755b41b8a47a6d04b223bb6c9cef5b4d0f3688fb371cc1a3a258ca11d84f6cca33", 0x8a}, {&(0x7f0000001840)="3febb65d0a8943aeec004e2f121d014f2673aa801d7826763e6928f82a4b4eaed520f405", 0x24}, {&(0x7f0000001880)="ea7c59bf6af21875fb4b1876d8b0dee3ea85270ca8d1bf195824317c832c90af6bc373e21dacbf9418fe1f848de22153f9e67aacea22390af7fde4247910267e3b7011722242445fe22c7f09166cdad2f93331c69d92acad7c7403e506790f3bba90dfd85fc3e526163775bd919b06262477215c3605b4dac43bec1f867bdaa36dd6dc729ef38200058befd244dff72f4ea558f39f7ced6806b007750968f3a9b3adec100d1db4f27e", 0xa9}, {&(0x7f0000001940)="237f486da9ffe7436fdd5fc03d15b6b5b33f90c50a4c136bd5cb4f05bcdf074bd227d1e0e045e4dd763610df8d11986829057cb0f7d939d195dbb961ebaf8b973379e993aafa3e1b74c702a8eff3c7d99235da6f29a184c95524510e6a4da43cdefb9fe343b9d70381ce89c999b961666ab35ed15b9b6ed2c119b3c32d6758446350d385b4cdc764215d717d0ba19f89dfc81a097a5de136f555baacff7d4e", 0x9f}, {&(0x7f0000001a00)="fb13f4c8c6dff031de02d135444415af0a5ca01423f432d5c1fe497c19fa86e3c23729ef3b7a5a67317caa7ca7527ef4395c5f61a47a1d0d368bd9f2a86f0df8f4cd41ebfa80db242238d5d7eba8c8b07cf5f49ec612a137d2a469113bff39b423b24cdf059ea7c9193570d7871c1c0be6079b207e1568fd9005a6796322430660f7555631b6857d1ca6bb5519dbfc4f0ce41422a2f539db56b4d7c3a2e29a7ca00bf9a7077cc3f491b556650be2d9537854d1b5fff2c0af165dbe7b1ae50a4d0f0f4caabea53eb16509b2e5bba9ee01b70c7f32142513b7568401b57b0408c37e6faaab0839069f3ed702181db54f", 0xef}, {&(0x7f0000001b00)="72b41cf7763e5ec0a47e4c20a757ee9147e486da6040a36882207254f14299e68f4d8731d109a6d94ee9ac1cf4f493f4e2c721cbc5f2ef1a237bf99d2616922dfa9cd2582619fc497aca003435a0473243d90d8e9c56182e88be16218034772f3d535d1cc31f84046455e00214a3837528266564a44ee54e186df6417948efde422c", 0x82}, {&(0x7f0000001bc0)="8df02f6de69419b823320a7ebc7cb41a1cd854409399e99e1daacece31c9d0a9087e2232ab285dbaf37e5a896d16427227435d65de39ab4a8e2653b9e6b8159a77e60f4a8c042f6221c12153b9f86fd01f7054727431cd259a121a5b5f1594718d", 0x61}, {&(0x7f0000001c40)="ba308dd0c0e2975163108b5b2397e495991ea40a85737648e37c9d14bf0129868eb0502e39803e7db0d090bf79e74db46c58de5581c71832ccaddbfeb14f0eb6275c50509025dc9f675109ff5bd24093b05016d052c6ee90509ae2e578b51d817bbf5cedfa9c46fbc201f3b5979707eb1a54dffc50a9c290251003e3560318acd7496b107b476bf704324e4ea1225639a999f5b11fff248a4c1a983a664d2fcb32677d243b7f19cd7da612cc93099bab1439130df180916c22369ac250a7b246e902a6e292eaecb9c8b2a5f5cc4054f91e53f00e36e972f9507fb87a45cbac6ea0de72606e417232be", 0xe9}, {&(0x7f0000001d40)="b3ad57e7d1a8213a48285c42d2ce606c602516ced69674d4869168718d159a128d34727702962cdcdca5f6baf3594966b2d86ea7377cb820aa916c1e50603f92a674578f917089a4a68d52f37ca39040d6d7a5c9cf51622b659013c2f171ec8c63bb01f471d04b52079ca50eb38d65c055dfd3f60eb558d94ec2709a9989a0822350b8359e300e49807d0ffb17ba783214583b86373afb37ebe1f1a717ff704387bf85381e2b3aada961d7b97f350457f57b713fe5c68ee94514e1ebab17df8a298070aac5cf8d93b7697ab6a0d6cd2cc8dc8466ab496eb45524c36b7ab1d2", 0xdf}], 0x9, &(0x7f0000002280)=[@cred={{0x1c, 0x1, 0x2, {r112, r113, r114}}}, @cred={{0x1c, 0x1, 0x2, {r116, r119, 0xee00}}}], 0x40, 0x10}, {&(0x7f00000022c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000002380)=[{&(0x7f0000002340)="ce0b23fed063388e852f", 0xa}], 0x1, &(0x7f00000026c0)=[@cred={{0x1c, 0x1, 0x2, {r120, r121, r122}}}, @cred={{0x1c, 0x1, 0x2, {r123, r125, r132}}}, @rights={{0x2c, 0x1, 0x1, [r0, r0, 0xffffffffffffffff, r133, r136, r137, r140]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r141, r162}}}, @rights={{0x18, 0x1, 0x1, [r163, r166]}}, @rights={{0x18, 0x1, 0x1, [r0, r169]}}, @cred={{0x1c, 0x1, 0x2, {0x0, r170, r173}}}], 0xe0, 0x40}, {&(0x7f00000027c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f00000029c0)=[{&(0x7f0000002840)="bcb080c33012202f5454d34ea4e0d552e5d7", 0x12}, {&(0x7f0000002880)="00e53776e8160741fa76e53397345a26c53cf0b45a81ea6889f0dd34d7f0a28594eef1b226fbe9bdebc51456d4dbe66075cbf7be39496f496ef9132929234e72545c3e90a49ff443f58561bc0f89f8b9e6de2ee9e0c9591caaa2e2b5f555b908badc80d611a372bc72f21e69b2d11e", 0x6f}, {&(0x7f0000002900)="590ccf5891c7b47f353dbc54960876d0b895b3709c0e1345c64f791f80c80f4ac2dd341016a7ed9f066fde43967e4d7c7fa1fbe983820baac4350c1b09e4c411f2d9503855850922b66aeb2f2d612431f5e48c15ef798a83e9153f21c28de8ec7bc9f89869768173acaf3283721718c7091c04ee8e4144f3d1818e8567f96f143c746373c5dfbe4658", 0x89}], 0x3, &(0x7f0000002b00)=[@cred={{0x1c, 0x1, 0x2, {r12, r175, r176}}}, @rights={{0x10}}], 0x30, 0x20040010}, {&(0x7f0000002b80)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000002dc0)=[{&(0x7f0000002c00)="30e066617febeb7781c5b05bf3ebe35747ec7856e65d7c366a314767d4fedd625f29b6136288f1c79c739bfb0b44427a641e7f6412885d69a15587177f912cb16a49c31fd7fc5d1f96d9cd31aa91478bf8e7415c5d320b4147acba9b5df137b3728c1ed11b2d1c454147053da9b822eaf609b10fff49bb63d13e5569f8c675d246663acc08c2c65f20c36b89a21afd41aff46dc15d1aec5e623c67da78dc8a0393d006eac6ac5d5863ee75f96b250afd931619c5f0b3504b38fa43cc20c0075929eb5807713407bc91758baab53ee36bb83a562039", 0xd5}, {&(0x7f0000002d00)="739dd80124e0560c6fd85ab5cf084b497643d28c8a119d6a62405e2cc77797c53228d4f19aeed2c7e9", 0x29}, {&(0x7f0000002d40)="08b669aa8a4b6caa4a0954154f956eb8f2dbaf14bd9631a1cf9a23916a00213e34b17fd62ae9f3665836cc24fcf61b1f671eb1c67cdee6bf6a4a773aa179b93b4f5c", 0x42}], 0x3, &(0x7f0000002e80)=[@rights={{0x1c, 0x1, 0x1, [r1, r188, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r189, 0xffffffffffffffff, r190}}}], 0x40, 0x40001}, {&(0x7f0000002ec0)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f0000004080)=[{&(0x7f0000002f40)="9448e0082a54b33166d0b61d078feb0f6c0efe062e9f55840065d182469c280f3545517744c7e217728325e13d81b08593cc", 0x32}, {&(0x7f0000002f80)="04cb1ab194151d527ad1ff8078119b09ab813118c68aa96d2111397ba7d5bb95885fcedf63c5", 0x26}, {&(0x7f0000002fc0)="28f202ec5429b2db5e9e7ce520c446840da01d52e3e396c2875b1fa94969de1c665fb5034a6205c87e9df92467e21fc2bca0fd4140032931d1e078185f780ae201dda8fc56618a72aa559fe151b45de4386797180e4d76b3e865cdb08c044de1bae7f1af584932a567134c72139c7b9fbc3ff4aa9700e989aab833fe32802bff45ef782cccaf", 0x86}, {&(0x7f0000003080)="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", 0x1000}], 0x4, &(0x7f0000004280)=[@rights={{0x34, 0x1, 0x1, [r193, r194, r195, r1, 0xffffffffffffffff, r1, r196, r0, r198]}}, @cred={{0x1c, 0x1, 0x2, {r199, r201, r202}}}, @cred={{0x1c, 0x1, 0x2, {r203, r204, r205}}}], 0x78, 0x8c8}, {&(0x7f0000004300)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000005700)=[{&(0x7f0000004380)="eee22ed27147614bbc3869e6b538ccd846f522d4ab9a64823e76c0ce0559c85e851ddc8b9049d129fa61ee3ee48ea05364b85700973be67abddb53d3b3c33cf5497c8b08ecbecdb9dcdf1cfff89193a070a8a18ab0f2f336233cbeabdb029afea71b09078fa424b0c55edb6eeee3716856cc26a3eda27d01f2c33b42cd09f0bc5597874a1c270b9c29f74b5568d4ef43a1c169df0b0f5903d1330d20d51433f436482784915839aa67e183551dea7d8694a330f387435dd73917e2c00012f15462f18ea020b2afed344fe3b332c2da6693970e8ed8c2fc4fbe5b98e2f3a512a3597cc6b263fb87a36931aebcd143dd7dfb77ef17016f4db8609909ac5c30d9edcf9063a2d7de795f8a2607b9454a8f3b815116c1139b21e699f4dd2ebc9c7ac42653a443ec54bcbf0e7a231ae5a55602ca43fb47b5decfccfdd4e7784180d2720c480078e837ec6cad9ba45142252147f045fc0035174ef2dbc7c84cb1da1caa2fadb91d8e00fa765f83ea48672c3db1c0f980b184ec01328089b64992b382e9f2bb003793755562d01532f62137fc3ca80a6305fac3105c2ec8539899703a2d2f4398276e61e51679f340917c1324fe081a939e95e34cf25aff54e78860be05826829e10a5c6b7883e24c0f704905cdae5fba6df9d3d366428e8f9007d0c313696c19b248bc77463cccd17f55c48fffc02d6d257744638461f86879198c90a7cbd265d7d0665eaec1bc9d834e7eedc13f626032200dc909929e5366546d7ceba0fa42dff9bf9dabf12181b49de2915a79b17816ca0c6358a686a3603ba0a931affbf2e414e008f7ac68f4a0c07dff79c7ae2d0dbe5947d052dc076557ef1f0f2a1e186e4796620a2a44ad7e857eb3639f518265b7f28239ed1f51efa12f8bc2ce9c8511fa5616fc936ec79ad83307e6a24abb97737af0123e24e9e6ba5e2c46b8331350c3c77dec3c4bc84b2a2c11abd6d1ce481962980953379f1c931611cc1911222242ba941251366e42caf9c915d2a80b1683875d5d3bbf25191861055a6436aad6950470fd5e8ee4f864f61364d5d24b25c1a1bf487949eca79489b8c647e8b1ff7eb0eecb65e54d86649712254bfbc6ed1a2d3e97c5a47c9e953fd24fb2cd0281e4d0fafe58765186292ed31083ae881aa1f60e5c0689037559af86ebd63f64dc1152b0cc89554374a3191da5a89e12f35461986890b61450d09a6acf0a2b5004eb38b9d2f75a964db0e72ba16141e02b09697dfbfe08726a1a0043d9b744956eb974b291b310393794f7325606cae43aefca2313d07ae7091baaa5142fa2c2a4ce5fe69daee2752b0bdca61d8bb433486711b958b404987a2646d640598fee5d4913d9f78c3d7f0649d0c8d2c69ac2a70f44ec149b077f01f64de3bbd0d2e09f8cd8ea2e736eb54751149dad64c73ba49aa5619fc6b1267d689f2443a86df9ba87a7b8393cbadb68bab987c1e0db8646e2cba348cbbaccd6e7239c958d74dcd04985a5c17a12b3ede79a0c81af6d3bfc54b7363d8ce8065856ed423d7c9c60d1d7183d4a28d8095939e9af46184464dc2075d611c5f2ce5c0134c1e8780d76e25ab20f5a252e3963cebd5baa316b5d7112b5414b704bc1ebba2cd3cc9ba320daeaa7146f1d80bc104cac5abc8b305b607b1ccc5918567175d73e29e151f8aff81bf8c1d07cc41ba7861b236dc35caf81fd162f387ab548cd1b2bebd13ca4237adfca1ce39c61821df8daaa7692dbf5a650cc4dc617dd2c2136d493976f4babbdfe2540808263a25734fe3385058c6953197ceb28525c5470a57d5a56e07818ff6b17929deb8efd50a9794bfa1477b6131c1fb00b70dbd66f7fcc86a1d303fdc90076ddf47f39fc97cfb0386f3d998b6058a7e3e1809f2ccb4eecf570b75944d101c5b595cb71e16b4f6a51170fc8c122739660b694157f9ee2f2aff62eca43e38d0f413cf6137833f413590ce43ffb9110984ad5fea2cccea2a10d0e7734ec42410db39ac1c1d1ea1a8e3d567a24bec1d1f9041bf921f516c0d29730fbf00d6db22be956ae5ccb148ef5e3d18064ec0359b36051869115eb42f0ea2e9813619bb9b7e826931102f8b447cc4d121dd02de45dc61aeb0fcb9d1d3bb361bb274aaf1b025d00d75115c119682b996153869b87213911fb696cbd02d9136328c83138b2ff1a990bc788604c4c9ae60a14c08010257046a28308249780baa48a03d4ff26f5163d48f0e2203f479e4c3b96aa0c0ded8b79fcff3af3e4b26c09411e38173942d5565036e67de0ec995938f3fdde7662657b46f1ee4a0a73adfa84098248ca2bcf9d71707d3a5769b490d1b51025ae30580cf6c3e95f5690a8e781c10f4417b65ac4e7b190b369af22bc7bb33041fa784a4083c81a28d75ccbb9f2dbf595d90e442df3027a2fff6f19b0745fcc2de2893dae487db9cc494fde5bdff64746b5690e867fbff4e3a99d9a1b99f6857450fa03597154fcbd25871368f132f7bbd4f8cde49aa820184a77f83f911688c5cbe85c755648c6ecff42497d92114ba19348f1b5d61611f2d92547d6bfd8492e4fe238944e5395a38c381dd78a2e8fa04b2c090da725a101fe42f64c807fa924cb73bc2e1a751218f5d3df0e98e653a8314d6d0edc9f566ef118387195ab715194246b27b3a5a78cfa3a427ad151f269f608005009444298c4566dc2723a1c9e687a36407848dffd07de0a8793cf7e119c8c25d746f35bb8108f00e6800c2168ebfa98db64137ddf9f5e20da15bf853106af0d16b1643369922973db82b4fe692c3ac5d94273a15d22af65487ab743593c24c534c2c1b0ade0a35cc29ada8858de003f0c284b8d9784b6ab124f8538c6810395c41a433f164b62de8d8caff3c8b4d814c60690bee0ebe2a8f32f9e833bf1b53e0bd2225d55e2e313cae17e14a555f49a7747eb0154e3c354dfea207302e63808cba5514c49ea59852ff45a5b73fe1247f51c73c2bf3db2a3b174ca2ec4272874947f2f372b81206c40611e82daca6a5f6877485d5948057b603ac6e42451aebe77ef3b05f3d995214d8e92d1038e664ea2d41269da197efaf8c5473a43947fb77f315b681f44a62a461d3edb8bff270522d681e7406b7c984205b9235aabc051e8114b905dcb39b859cd129efb946b2a5408a0af3edc4024f8e404fdc894fcd73649c0aef9c6d63f37fd8bddf1899431bcf7ab21073e898add83aa1e9f0e39c426beb9fff646a77227c680c6333ecc44188d346b1773161cd1698245cdd7f90608c980bfbe4f04921c53fbcc66c42e6487898beea6a5c03ff3c029c5ca0e637a1a363bceaaf17edfedd56f95c3fde9917a20a20e71d1fdc17761eb15306ccbf6e29d3c8b0c3735f135c8fc8ffaac839ecbdc451c366ecb9dfe51adbf1523bb20357f893b367e8fdb3b3884f5330689420dca84de922cf66cac7c1d331c2f9773f6c87513681c10ca7a776f6b05b651add2f543745df223b4c22d71e70dd96d35e2c12df0d959a3ee2eed770bb87f16e8048db9d78b980eb38aaabf7b940495bc34994a3973944a03963200a36543cb3c507f28bdb5d7d15ed2067c9d7a7eaf6c78b0536431963e700be9a5130a9aa714283a3b989f55668187e64bb2cde24ce2f67dc09dfe41e6f29e8567eb71079cd2487b6adde26db54d0cd49654098a8a6226483938cf4a0183dacd4881a4ca4e70a366c4d353619d912e720e3616c792aeacbd60b859d3b08b4e2755b4ca098091fc725c1d77efdf2920d44b3781afeb8f71ed399bfe1a82957f7d6652140abe33672081dd1efad26fc65cac86db6c0f55e85e17cec9ebb2256007d790312e778c90698a34511abfc23e44a633932e2be52c022c6ef57d5e6415e1af4bb17838d6ad2b1e8639ded40428f4d29b5c663d8dd74093acb021b95b421c7bc20afa53389046022452f18e42c9de6c4438e4fa4b6dace748025b02187b10e2089ca284d142f99793cfae2e8075c50d00becaeb8f2674cb9964d80dbf4f9a844746390da0ea962cff7a3f66ded6a2832f806ddfd31b082963a4b8adec4b97b288de9ebc465ad16a417658d4df0685ece88fdd8f742f5c65bb19fad3c557af394174e20bab3be029782c70ef81f4d16c228cc30f885b7d321b6c7c81fc7c1ca1b1fcaf147218fcdce040bf5a7555a84230617884d86aa3ee2ccf9dd9c04535f17084c5fd89768b6d88a0c7ad29874c1c08fcfd25592acdf5976b870cf58a3bd4a0e017cdf6c2721e63ddc01b5db6c2a0c56f6d986e5537665505c9ba103dadea06a2e6a94a585b1f26d9a78d66d85f5098f2a26e4900065a6a4162bc09b9384972fb8991cd40b120453a260fc545edf7f0e209d8669370ea71ec739c5c6eecd0c57fd5b2f01ddf4c5631728c976a0f16194bdcf5413934d0a093c442fd11d745e8724caa305244c6de3b761680f3c7342c068e0b34f7ad359bd7b5c8e0c8ac98f68236f1b8af6bf40410807c5baba3610623c0c40229fc7e27b912638d075bbddd2a28955703c55a148921c98dd11371ab3c86123abb5235ab2a414234439e29e6faafe8283f2f76428d6d2e0833536b07371773a947d644c65c5052fc50dc01e7117d8f22cc87ea6c864bb02dcad5735550cba63ee4fb0d1d7e5f559ada1d15b5cf2da1008ed615854fd838806ce934c672b23b92a9702ae8128bcdee6daff081c76a2efeb38b3bab850124fb4e5f6cdca0266fbdcf6d2016c3988b24a6f439a9681bdf8592b1f6234fc177c55140882d2bbd638a31b18cfd77ebceceb3e6d121149e1486873c59229122060cdb7d1b7dcc6d9718dd3a8dc83a3d8e9291d6d0d0ce8b5f4e2e8e41054a05353ea5d6ac57c16ec6172c7a0459dd1d40cbf630eaa8403161af9856fbf86620f039308a8b3d4b0afbb1602d29ffcd360e1424839b504af9cc6d0c2593ac04ff2048ba2f86b9c48a241785a5ea903d603286b76c95e0ea43c3ae8a704e70374cd146cdbcff8daa2105ea9fffa256e808472c496c876f05643ebe3bc0dc4ddcd8d4ab421c4d772d54060ba47d02e42328987eb65d59b88b703bb21d16f8caafbfb4543b8ab7ed7eecc459cba823a73392f6ae3622004df46e1d3130eed0fdd6def542e747b9a816018934bdf906fcec0ad1b4723b462a13d508bce650d765a40552a62e037ec4c382e8158de2a79a854e2cbf4525f016075e3bd8c9fd7fc7ee4902d38089c6b2daa6f2f2be18ff2e78e662a32b759b2c2d745ee3f778d136cb6ab5aada0d49368436729be469f68fbca91d02117672fd89f53a4df6260c6475e4b602dc59b0a2de552ec31b42c16a61cddfe9f5522609f0b542d3837aa9fb11b9bcde291873b9a1af45ecab099708829adad8a28a9a29b6407909affa142b78b2951840ba17c4f5189ff910706c078f1e0c184a6b034826157c453a1bbf8f525131cbd1226591d0ff1a838861dd551b02bc04313d71c96a0d0e90e0b615aaf2e3bfc184a97850189aac012d3d0c4e5c2c79d05ffcfc89d6b702170bd27f56d4258b3e9da602b9dc4f67b12c1039e9f071f4bf561f85452ef2819ba0c88e2c9baa497a1fb101913d761c0b45e91343607a6ea9c8b9322fcdba2c84a4b53c4fefefacb3e4b3a3c7ea91fe8f948375492299386891ac2e5dd499bcfad73d8c88b1c2b6f8802df43f6b210e178883ef46a1047747d9ac2a7e2d3ea35c525c470b70960c84bfa1aae877b6cd6e4e87d387185185b20e14c0b3ea025ede43a601fe2873d40a632dc8e633b1f2d936d9f9e16187c6ba9cdb0b61bdc285ab1ea41c7106af67c647", 0x1000}, {&(0x7f0000005380)="d24b2d01ea25acfcf084d8e83866034fd593aea5f3d7d115a1ed4989c130ca1cea6ff8ae8f820dfeb23a10082d0c187eb55659e7c2098be82631d8bcedad7429ddddc3a6940db7a27f6da3419cf75f8d29180184c825dbe9a9a4c62f490e0c0432f34b4d44c36fc1be9259809d1ffef6ff5aa84cfa16e7ea2156bc55f08161493057efe97dabb1285ac1a31fef2bdeb69df24de5e06ce8194f7440676c0f71f1dfbdae49dc7ed811d6de82fb1d7044fb9da6f9d715074bdd8fa4d7f7d09f5e05251f316275528abf", 0xc8}, {&(0x7f0000005480)="37fa5bced75cd69ac4e61fbe9ef1cefc60bf574a45e95c9e42473935bea84675e681d52b51dc6effe900433d6fc6188aa2134c7ee9b7eb86a0ed", 0x3a}, {&(0x7f00000054c0)="3ee6995c196eda157d141fb07c9420bdb5ac620101ab1fa4fe1a8059ae8be054b07bc6ec145b5a815c6379a8a8a3ae85b0475350c344d00e9655506a582e111a07334a2227f0f69a3f5a23fec1549c09f4b038746401892f8c449c8ae6a57af7eb65a9f86cbbd7771241832c035a6d62a47e53dd2915701790ab5bd58a", 0x7d}, {&(0x7f0000005540)="169b261b52ec0a3801336efabbfd02864de5ff41c6f1e4bb0604a47af51955d98b43349686f255a0e361594e126bab74bb2058a2ac1f018272b9b13fc1294aab57fd4e9f", 0x44}, {&(0x7f00000055c0)="2cbf52a4d517b1a27aaf9e861eea9d23b8685b652f485c69e0382a368d0dedb51fdea6567580d3c1e7815e3ef51475149773ea86876cef89df733d60634e3ecbab275a48d8fd35ea7e144a6a58fec35652cb4b836d384f1c390f3b5e7116c25f09a75df9c3ffb08a09c78486291adc428e334f3daf81a2850f0d7702ef2bcea68ed01c016e0e74a017ca6ffa91f44db8c8e66d5c0e246d508c8ecc9971db67515ec33ae98f62b7ba1ce434ee6b2937d7c2e70aef13af1058209db48781ea4294266eea931edf15ef8c75ef5713c9c6", 0xcf}, {&(0x7f00000056c0)="c4d90307739f81f3f1269c39257f0ed408896ca0d1", 0x15}], 0x7, 0x0, 0x0, 0x1}, {&(0x7f0000005780)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000005e00)=[{&(0x7f0000005800)="f5c2ab1500dc1a06ab55a8136c0114533e21124cff83ae3b2281c9dafc3b53bd7549c954c0abb640459b3175b8557891a39d7edf95dc8df033f459e598c504595c665870b23e6cc29c8fb7cd19844b353102ad43f0cb59bcbd2b87f4dc514e8265b4cd9bb328650f698df6ed0e070c9b1dc860084966459f41fc346e334f3d6b07fe462e1efd32383df2be124b289719163caab85d7a56bdee4e1df1dffe63cc", 0xa0}, {&(0x7f00000058c0)="6236dd051dd8a3442b0638f1ce9b1cfb0b50794393971b430b6a97aa2003c784b9342660b298b75d960968f0054bc5ba512b7bbe54eb4df02ff6bfc0117f04bf61554238c39b57a47c94322c658b9ec2550b5270936f121ac8ed63284ae0397c0a09c9175bb1f880e5d1e85bf2ca0b33c3a6ac38f090b2baec2a072830a52b2c4b4d33f2a9f71f835027e13b9583672e845bc54f31365ff00a01fc890f1796f31fc2f635db029e9fcda1b91da6067b67dae36cf0ab83c5da632517d2ebe634d2da0242702fd46fcd01a47ad76d6c02", 0xcf}, {&(0x7f00000059c0)="0f8e9457", 0x4}, {&(0x7f0000005a00)="26383e99a80b7e80e6efbdbb2015be1cef918e337f7c13dda10884baa42d7c9e858988fa68540756e0b7c22fba24389b062969bccad757212d8160725627bf7e3a419762e45e7c05b3ae72079347a64dd3ef1dd43adf0912ec836310333b3d6da3806ae0311a6c4921477c2c6260ed08f966ba5106ccbd8747c29e47e709a8300a60cb9d41f2ef2119463b00f627cd36ad2252937418103ef113b92b0ac251a0828670dcdc0d9f5931904056d0a5a14762195f3bf96c411461120cf6b16abf04431808d7cea9e63c58634ebcd10861ee88546f07b3aa8d", 0xd7}, {&(0x7f0000005b00)="a4d3ee85ca0ad5b65a1369b29167b7fe729c012cd84664396a110cf980d25eb17e92b09d49ca3df7384db635579830bb4fd32f883baf2c9fc9e23727ea135c73e0f0af79fb57e1f4ebea99d8edc61b0eca204a5cfa9522d1bfb9fd1597f8223974805b411815ed54abce7098730a499391ca004c15cd8646ddb52b4566c56cf84db404c8b6d99c115b24d3800d27101ebba102f24d89953a99801cdbd2c9c378046b7a7f52cc065c32ce52d52ef4654ce076ea2c35ae69fc2f67ba3dfd409a5ddad31c393338ce5843555af8d1446551c652e368585a08738bbba2975ecbd5efe52ba3c1d49807222bde40b8cd96569ad6a8", 0xf2}, {&(0x7f0000005c00)="5336707e937591fff28ec9f7becfecd14e52b19f4f4030b49645ca4e56cc6f6a9cf330a9241f9c753814f0ef024ebc19034e8c69103c3844ce05505b76b234ee71ab798cbcb5e5bab25e80ec863220933dacb6aee1782b46ad09924fe38e4f479c10ff9af26600b3d0320bba4ee624bf1facf5bca6eecff09a3a926849ef2843bd90c5c118d1491d781ad728e990f7243b06c5e086c0a9c54db529b36ec9c2e4a56b2b44daa1e65eaf2f94d960cf7f90d3131e3502d42431b38185a8be8fb31b58f66f18fda6a9f65c76c6bf369ea9aa6ff0005e13c53743b1ee0d646d1ac2860728ec2c7e3463", 0xe7}, {&(0x7f0000005d00)="c961f98d20d5fbda7354bcd50ee08012511c488c91cacdfec17431aafd401559f5e1bdb2f586f2b4020ec08665b21839cac9ede59c237e71a4441368516ea5aafff559181d0fed22630c8632bff5a6c85446bfa8ef037c1cadc8637c7d4da6e112460ce171393189b4505b659b211316ac3dbe8e940f1c911bbd628b06a6f99fae663e6859591c536b1304a5f8686acfa5a7bb7abf6b24591706c89f6fa14e4cb92419e738f381b4c913784e28e14e3369ab5872cba750dacfa718aeabbd21c1951963e7c41ac6", 0xc7}], 0x7, &(0x7f0000006080)=[@cred={{0x1c, 0x1, 0x2, {r206, 0xee00, r207}}}, @rights={{0x28, 0x1, 0x1, [r208, r211, r0, r1, r1, r0]}}, @rights={{0x1c, 0x1, 0x1, [r1, r212, r217]}}, @rights={{0x30, 0x1, 0x1, [r219, r222, r223, 0xffffffffffffffff, r226, r229, 0xffffffffffffffff, r0]}}], 0x98, 0x8040004}, {&(0x7f0000006140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000006400)=[{&(0x7f00000061c0)="6a2af4331c70bf6d25ae57d81933dfcf77e15a514284362af57e4348ff17032a0fd25956b3d226014c135785b84bfe4725752fc7e54be6af26b9cf4ee796eaabebb7ccfe952e06744327b3a5ee9d287d89677d648a948f32d71a3ae85cfc39f910f5a4abdc9e27178365a798ffdd63bdaac3e669bc70adc90fac6f165a00c976eecf46f8bb8513d53fcf4520af8834431f6af936821f35f8076e69ee8adf95a5a0844e1287b7e629c9c2781bd69c1a143d54f20b59", 0xb5}, {&(0x7f0000006280)="f0efa5e222ebd4b8e6abf88476551a317d381daeae14654437571f39c8ed2bfae0814e36f53df58aaf2b57546e9354b4cf36a3eea69065e8ea247f0fe9d4707ee2aafe89ec1b487b24c28e7911d9e6d1fb22b28086bbcddc0c70ba000388f0b48792054463cc361dd134d76fd0f0fdd6c61079c324ca647407c266dffa463da7e683b7b9e29322e692ed5bccbfcfa8566d3d93058bd2a6513306949a83ab235e92", 0xa1}, {&(0x7f0000006340)="9ee1a33ba443e3c997e1602d1b226dccc01bc3097489ae0efab8e376b8499cae6684ec8c3505ad2d79ec35bb74deb741dc08daaf34d62baaa762650517a6623dbb4880618b4788e8fd346da8dc971eb72c70fae23dc37d92e6088bd0df53340e996e47ffd80d1aedb3e4f07ea2e5e9aecdc5aa614967dd0628eb25cd9353fdc8467bdcde29f934041261d8702f9bf8129428362f1474e90179f022cc34569b22f7e43b4cce1db5ae28c574504cc6ada6321fb63c2f", 0xb5}], 0x3}], 0xa, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000000), &(0x7f00000000c0)=0xc) syz_mount_image$minix(&(0x7f0000000040)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 3257.140090] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3257.517868] EXT4-fs (loop3): Unrecognized mount option "fowner>00000000000000000000" or missing value 04:22:30 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800000010886403376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3257.764223] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 3257.880154] device macvlan771 entered promiscuous mode [ 3257.964725] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 04:22:31 executing program 3: write$tun(0xffffffffffffffff, 0x0, 0x0) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r3 = inotify_init() inotify_add_watch(r3, &(0x7f0000000080)='.\x00', 0xfe) write$P9_RREAD(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="72000000750000670000000ee72b01782f6c097baa30d95c3128d5a2f2bc2fa0a225247df9f679b8297771a030848f7068864b2c5fb4f9f82b400eb7027b7b2a866450b009fe4190dae834fddc03f71006233ac08cfad4c4e24068a61a25bc68db6cbbe5e02587f46ff1349e6eb58caf4a76"], 0x72) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2}, 0x14) r4 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r5 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x1) r6 = dup2(r5, r4) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r6, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r6, 0x40605346, &(0x7f0000000040)={0x0, 0x0, {0x3}}) openat$pidfd(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self\x00', 0x100, 0x0) r7 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000180)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_LIST(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, r7, 0x300, 0x70bd29, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'virt_wifi0\x00'}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @local}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @rand_addr=0x40}]}, 0x38}, 0x1, 0x0, 0x0, 0xc0}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) 04:22:31 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x581d6}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) 04:22:31 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x43c4, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) 04:22:31 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newlink={0x54, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x10, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc}]}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x54}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, r4}}, 0x20}}, 0x0) [ 3258.628965] kauditd_printk_skb: 188 callbacks suppressed [ 3258.628981] audit: type=1400 audit(2000002951.830:87830): avc: denied { map } for pid=23947 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:22:31 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e220008000000100e8003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3258.778700] audit: type=1400 audit(2000002951.880:87831): avc: denied { map } for pid=23947 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3258.950285] audit: type=1400 audit(2000002951.910:87832): avc: denied { map } for pid=23947 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3259.101776] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 3259.162649] audit: type=1400 audit(2000002951.940:87833): avc: denied { map } for pid=23947 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3259.186783] device macvlan772 entered promiscuous mode 04:22:32 executing program 3: semop(0x0, &(0x7f0000000000)=[{}], 0x1) prctl$PR_GET_CHILD_SUBREAPER(0x25) prctl$PR_GET_SECUREBITS(0x1b) r0 = socket(0x400000011, 0x100004000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(r1, 0x0, 0x0) syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x2, &(0x7f0000000200)=[{&(0x7f00000000c0)="2b8944151977a51946497c8b925fe5e107db53c14d87471e7ec96a0e315322c7dc715987afc4d7975923c0a213ab64c9a4a64e4e0de3faf96be0e6842a0013e7af", 0x41, 0xf01}, {&(0x7f0000000140)="79702394852b961b25b1618085ce7a44c18f6863fb2932e74f39fbd6efb6bab10464ec81778263743146a947254363c84eba894d4a917bf38f6c6073c0cbc3951b4922bbed2308bccfdb788465d534ead83b39330cb1bbbea000cd8b2335f46f5c48d88e06ab91d2cc37d79f956b1765e27a4cd75e4b5c941e819e8207b1bed7e6ba90c45057e0ce5d01cc319d94e535ac6bd30c8ac3520d694160ce26a83b1b7b5b583362c3117b7a01275366fc3326b3a090cdb388", 0xb6, 0x6}], 0x142000, &(0x7f0000000240)={[{@acl='acl'}, {@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x7}}, {@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@noacl='noacl'}, {@user_xattr='user_xattr'}], [{@smackfshat={'smackfshat', 0x3d, '-(vmnet0./'}}, {@smackfsdef={'smackfsdef', 0x3d, 'd'}}, {@euid_lt={'euid<', r1}}]}) [ 3259.334259] audit: type=1400 audit(2000002951.970:87834): avc: denied { map } for pid=23947 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:22:32 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x581d7}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) [ 3259.425015] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3259.491334] audit: type=1400 audit(2000002952.050:87835): avc: denied { map } for pid=23947 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:22:32 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800000010358003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3259.717647] audit: type=1400 audit(2000002952.050:87836): avc: denied { map } for pid=23947 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3259.850506] audit: type=1400 audit(2000002952.070:87837): avc: denied { map } for pid=23949 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:22:33 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x43c8, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) [ 3260.014766] audit: type=1400 audit(2000002952.070:87838): avc: denied { map } for pid=23949 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3260.175580] audit: type=1400 audit(2000002952.070:87839): avc: denied { map } for pid=23949 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3260.369599] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 04:22:33 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800000010008103376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3260.670476] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 3260.787047] device macvlan773 entered promiscuous mode 04:22:36 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, r0, 0x0) r1 = socket$inet6(0xa, 0x3, 0x9) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x400000, 0x0) recvmmsg(r2, &(0x7f0000002780)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, 0x80, &(0x7f0000002440)=[{&(0x7f0000000140)=""/4096, 0x1000}, {&(0x7f0000001140)=""/4096, 0x1000}, {&(0x7f0000002140)=""/160, 0xa0}, {&(0x7f0000002200)=""/132, 0x84}, {&(0x7f00000022c0)=""/95, 0x5f}, {&(0x7f0000002340)=""/237, 0xed}], 0x6, &(0x7f0000000040)=""/48, 0x30}, 0x3}, {{0x0, 0x0, &(0x7f00000026c0)=[{&(0x7f00000024c0)=""/249, 0xf9}, {&(0x7f0000002b80)=""/4096, 0x1000}, {&(0x7f00000025c0)=""/19, 0x13}, {&(0x7f0000002600)=""/172, 0xac}], 0x4, &(0x7f0000002700)=""/83, 0x53}, 0x7}], 0x3, 0x40010000, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) 04:22:36 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newlink={0x54, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x10, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc}]}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x54}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x2, r4}}, 0x20}}, 0x0) 04:22:36 executing program 3: syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) write$P9_RLERROR(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="0e000000070100050070726f637bd83bdccd1bc0bee38f0433b0a15917626f6ea6dab2532a76e4a133f930f80f615637124fa687dad031dc67a1c04932cdc2a99cdc356d4a6209bc309b38a9315cf6922683ddc8d7d0d0b5b8d72bfa73f6d1629c7511455ef172fc31147f86c480ec9e9ebcb172012c4a393755827145605ab5b5f52354b8fffb6f13058423018fcc8ce2c864de7e224c6fd3e2a77c21cf1a232058c50a63764bc6afe9ccac0000000000000000"], 0xe) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x24000, 0x0, 0x4, 0x3, 0x3}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(0x0, 0x0, 0x5) writev(r1, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff824f400005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffff770000000000200000007200000000000000a4000000000000000000", 0xffffffe5}], 0x2) r2 = socket(0x11, 0x800000003, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket(0x11, 0x800000003, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$KVM_SET_NR_MMU_PAGES(r6, 0xae44, 0x20002) r7 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) write$selinux_context(r0, &(0x7f0000000140)='system_u:object_r:chkpwd_exec_t:s0\x00', 0x23) r8 = socket(0x11, 0x800000003, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r8, 0x0, r9) shutdown(r8, 0x0) ioctl$KVM_CREATE_PIT2(r7, 0x4040ae77, &(0x7f00000000c0)={0x3}) 04:22:36 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x581d8}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) 04:22:36 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x43cc, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) 04:22:36 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800000010478803376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3263.185042] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 3263.241740] device macvlan774 entered promiscuous mode 04:22:36 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800000010488803376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3263.320099] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 04:22:36 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x581d9}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) 04:22:37 executing program 3: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) r3 = socket(0x11, 0x800000003, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket(0x11, 0x800000003, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r6, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = socket(0x11, 0x800000003, 0x0) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) r11 = fcntl$dupfd(r9, 0x0, r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f00000000c0)={0x990000, 0xeb89, 0x8fe3, r11, 0x0, &(0x7f0000000080)={0xa2093d, 0x0, [], @p_u32=&(0x7f0000000040)}}) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) [ 3263.767748] kauditd_printk_skb: 187 callbacks suppressed [ 3263.767763] audit: type=1400 audit(2000002956.970:88027): avc: denied { map } for pid=24026 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:22:37 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x43d0, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) [ 3263.932595] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3263.950465] audit: type=1400 audit(2000002957.010:88028): avc: denied { map } for pid=24026 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:22:37 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800000010648803376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3264.172161] audit: type=1400 audit(2000002957.050:88029): avc: denied { map } for pid=24026 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3264.309989] audit: type=1400 audit(2000002957.050:88030): avc: denied { map } for pid=24026 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3264.394179] netlink: 'syz-executor.1': attribute type 5 has an invalid length. 04:22:37 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newlink={0x54, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x10, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc}]}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x54}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x3, r4}}, 0x20}}, 0x0) [ 3264.456510] audit: type=1400 audit(2000002957.100:88031): avc: denied { map } for pid=24026 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3264.525943] device macvlan775 entered promiscuous mode [ 3264.621671] audit: type=1400 audit(2000002957.130:88032): avc: denied { map } for pid=24026 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3264.792206] audit: type=1400 audit(2000002957.130:88033): avc: denied { map } for pid=24026 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3264.930081] audit: type=1400 audit(2000002957.210:88034): avc: denied { map } for pid=24026 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3265.179999] audit: type=1400 audit(2000002957.230:88035): avc: denied { map } for pid=24026 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3265.362030] audit: type=1400 audit(2000002957.270:88036): avc: denied { map } for pid=24028 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3265.372083] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3266.118046] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 04:22:39 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800000010068903376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) 04:22:39 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x581da}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) 04:22:39 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x43d4, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) 04:22:39 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040)=0x7, 0x4) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000003a40)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1e) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) 04:22:39 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newlink={0x54, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x10, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc}]}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x54}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x4, r4}}, 0x20}}, 0x0) 04:22:39 executing program 5: r0 = getpgrp(0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='[d::],08::6:'], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000200)={0x0, 0x92, 0x4, @thr={0x0, 0x0}}, &(0x7f0000044000)) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000022c0)='/dev/vcsa\x00', 0x2000, 0x0) r2 = syz_genetlink_get_family_id$wireguard(&(0x7f0000002340)='wireguard\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002640)={'lo\x00', 0x0}) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x4000000, &(0x7f0000000240)={&(0x7f00000002c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff0f}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x3, r6}]}}}]}, 0x38}}, 0x0) r7 = socket(0x11, 0x800000003, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r7, 0x0, r8) getsockopt$PNPIPE_IFINDEX(r7, 0x113, 0x2, &(0x7f0000002680), &(0x7f00000026c0)=0x4) sendmsg$WG_CMD_GET_DEVICE(r1, &(0x7f00000027c0)={&(0x7f0000002300)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000002780)={&(0x7f0000002700)=ANY=[@ANYBLOB='|\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="020029bd7000fcdbdf250000000008000100", @ANYRES32=r3, @ANYBLOB="0800050000000000060006004e240000140002007769726567756172643000000000000008000100", @ANYRES32=r6, @ANYBLOB="0800050000ffffff23000300aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa08000100", @ANYRES32=r2, @ANYBLOB], 0x9}, 0x1, 0x0, 0x0, 0x4000021}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) tkill(r0, 0x1000000000014) [ 3266.711822] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 3266.848855] device macvlan776 entered promiscuous mode 04:22:40 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e2200080000001000f003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3266.881510] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 04:22:40 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x581db}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) [ 3267.897892] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 04:22:41 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x43d8, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) 04:22:41 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800000010000203376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3268.101886] device sit4 entered promiscuous mode 04:22:41 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ttyprintk\x00', 0x80040, 0x0) ioctl$KDDELIO(r1, 0x4b35, 0x76) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000400)=[{&(0x7f00000002c0)="18ad6adc722bf1c1e926b854dcdd2994444a9e96d859f3bb26c0e606622e60dd57119c185417ffbf718d5ca0265dbb33f22f60f38c1caf0932d83c2b0fc0824a0e", 0x41}, {&(0x7f0000000340)="e851d3a642a42be37177465b702b48eb82519468ae2dded0fc0f193146cd8aa12e1ad9a35283cd707530f14a44fed85088c24b75a68b126c7562313fc825c672709e431ee7650964080d72a974a6057fb73fc1a8d38d3da81ac0e037ec8a899a17a9bacad19dad05b0b16da6a27bbad7d91d76d20fb0344ef68cd29b718560ca66e97021b5c36ac014026321f0b4776dbb789abd8afdb912e35477bdf46c2febc05d44b13a8f2910a3803653c30ff3a7b461b2bccac9", 0xb6}], 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x1, 0x1, 0x0, 0x3}, 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r4, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm_plock\x00', 0x100, 0x0) sendto$inet(r3, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r4, &(0x7f0000005540)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0xfe3}], 0x1}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r4, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) [ 3268.269795] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 3268.352957] device macvlan777 entered promiscuous mode 04:22:41 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newlink={0x54, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x10, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc}]}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x54}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x5, r4}}, 0x20}}, 0x0) 04:22:41 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x581dc}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) 04:22:41 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800000010000303376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3268.774432] kauditd_printk_skb: 146 callbacks suppressed [ 3268.774448] audit: type=1400 audit(2000002961.980:88183): avc: denied { map } for pid=24098 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3268.965479] audit: type=1400 audit(2000002961.980:88184): avc: denied { map } for pid=24097 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:22:42 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x10040, 0x0) r2 = socket(0x11, 0x800000003, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r2, 0x0, r3) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) sendmsg$NL80211_CMD_LEAVE_MESH(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x20, 0x70bd2a, 0x25dfdbff, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r4}]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2f42f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r6, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r6) sendto$inet(r0, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x240, 0x0, 0x0) 04:22:42 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x43dc, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) [ 3269.154036] audit: type=1400 audit(2000002961.980:88185): avc: denied { map } for pid=24097 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3269.231392] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3269.332831] audit: type=1400 audit(2000002962.010:88186): avc: denied { map } for pid=24098 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3269.507752] audit: type=1400 audit(2000002962.030:88187): avc: denied { map } for pid=24098 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:22:42 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800000010000503376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3269.661457] audit: type=1400 audit(2000002962.040:88188): avc: denied { map } for pid=24097 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3269.820110] audit: type=1400 audit(2000002962.060:88189): avc: denied { map } for pid=24097 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3269.948181] audit: type=1400 audit(2000002962.230:88190): avc: denied { map } for pid=24103 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3270.064516] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 3270.082946] audit: type=1400 audit(2000002962.230:88191): avc: denied { map } for pid=24103 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3270.170648] device macvlan778 entered promiscuous mode [ 3270.203921] audit: audit_backlog=65 > audit_backlog_limit=64 [ 3270.249079] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 04:22:43 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x581dd}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) 04:22:43 executing program 3: syz_mount_image$iso9660(&(0x7f0000000100)='iso9660\x00', &(0x7f0000000000)='./file0\x00', 0xffffffbffffffffe, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="01434430303101004c494e55582022062020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202a20202020202020000000000000004f0200400000024f00000000000000000000000000000000000000000000000000000000000000000100000123f7d9377a1e0000000000000000", 0x82, 0x8000}], 0x0, 0x0) 04:22:43 executing program 5: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) sched_getattr(r2, &(0x7f0000000000)={0x30}, 0x30, 0x0) r3 = getpgrp(0x0) setpriority(0x0, r3, 0xffff) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='[d::],08::6:'], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) write$cgroup_pid(r1, &(0x7f00000002c0), 0x12) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r4, 0x0, 0x0, 0x200007fd, 0x0, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x202a00, 0x0) memfd_create(0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x40000000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)) r5 = socket(0x11, 0x800000003, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r5, 0x0, r6) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r7, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f0000001580)={0x20, r8, 0x11, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r5, &(0x7f0000000480)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000240)={&(0x7f0000000300)={0x17c, r8, 0x200, 0x70bd2d, 0x25dfdbfe, {}, [@TIPC_NLA_NET={0x54, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8}, @TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x8}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x400}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x2}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x89f}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xfffffffb}]}, @TIPC_NLA_LINK={0x68, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_NET={0x34, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0xffff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x50ea}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2000000}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x9}]}, @TIPC_NLA_SOCK={0x78, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xe7}, @TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_CON={0x3c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x1000}, @TIPC_NLA_CON_NODE={0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xffffff7c}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x3}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x5}]}, @TIPC_NLA_SOCK_CON={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x3}]}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x17c}, 0x1, 0x0, 0x0, 0x800}, 0x40400c0) r9 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) shmget(0x2, 0x1000, 0x800, &(0x7f0000ffd000/0x1000)=nil) ioctl$UI_SET_EVBIT(r9, 0x40045564, 0x11) 04:22:43 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800000010000803376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) 04:22:43 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newlink={0x54, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x10, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc}]}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x54}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x6, r4}}, 0x20}}, 0x0) 04:22:43 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x43e0, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) [ 3271.215859] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 3271.365208] device macvlan779 entered promiscuous mode 04:22:44 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800000010000d03376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) 04:22:44 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x581de}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) [ 3271.884881] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3272.262660] ISOFS: Logical zone size(0) < hardware blocksize(1024) [ 3272.294177] libceph: connect [d::]:6789 error -101 [ 3272.299883] libceph: mon0 [d::]:6789 connect error [ 3272.346735] libceph: connect [d::]:6789 error -101 [ 3272.376879] libceph: mon0 [d::]:6789 connect error 04:22:45 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r1) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000200), &(0x7f0000000240)=0x4) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000007000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000040)="660f382b1a0f01df0f300f32d9e90f086665676426f7c5000000000f2245deef1e03e5", 0x23}], 0x1, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) connect$l2tp6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x20) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self\x00', 0x2001, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, 0x0, &(0x7f0000000040)) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000140)={0xfff, 0xa, 0x4, 0x100000, 0x8, {0x77359400}, {0x4, 0x0, 0x2, 0xff, 0x81, 0x20, "93862188"}, 0x0, 0x7, @userptr=0xfffffffffffffff8, 0x7, 0x0, 0xffffffffffffffff}) getsockopt$IP_VS_SO_GET_TIMEOUT(r5, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000080)=0xc) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x2) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x100, 0x40000004, 0x0, 0x0, 0x0, 0x4cb, 0x80000000], 0x10000}) ioctl$KVM_RUN(r4, 0xae80, 0x0) 04:22:45 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800000010002803376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) 04:22:45 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x43e4, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) [ 3272.888722] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 04:22:46 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r2, 0x0, r3) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000040)={0x2000}) r4 = syz_open_procfs(0x0, 0xffffffffffffffff) fcntl$notify(r4, 0x402, 0x13) close(r4) [ 3273.137107] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 3273.246320] device macvlan780 entered promiscuous mode 04:22:46 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800000010003003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) 04:22:46 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newlink={0x54, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x10, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc}]}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x54}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x7, r4}}, 0x20}}, 0x0) 04:22:46 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x581df}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) [ 3273.785268] kauditd_printk_skb: 163 callbacks suppressed [ 3273.785284] audit: type=1400 audit(2000002966.990:88353): avc: denied { map } for pid=24195 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3273.948394] audit: type=1400 audit(2000002967.000:88354): avc: denied { map } for pid=24195 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:22:47 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0xfffffffc) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x200004) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) sendfile(r3, r4, 0x0, 0x80001d00c0d0) r5 = socket(0x11, 0x800000003, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r5, 0x0, r6) r8 = socket(0x11, 0x800000003, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r8, 0x0, r9) ioctl$EXT4_IOC_GROUP_EXTEND(r8, 0x40086607, &(0x7f0000000040)=0x400) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$TIOCL_SETSEL(r7, 0x541c, &(0x7f0000000000)={0x2, {0x2, 0x2, 0x8, 0x244, 0xbb23, 0xf}}) [ 3274.148750] audit: type=1400 audit(2000002967.030:88355): avc: denied { map } for pid=24199 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:22:47 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x43e8, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) 04:22:47 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800000010006003376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3274.321966] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3274.354251] audit: type=1400 audit(2000002967.030:88356): avc: denied { map } for pid=24194 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3274.504409] audit: type=1400 audit(2000002967.030:88357): avc: denied { map } for pid=24199 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:22:47 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="34000002640006070000000000600f1000ef000023d0f7ed20cf87ba81dbc54a219a6e3326df2ce7b8a76532415364a32d091b467d619cbab951abcf2aeecd537dae556f173affcdb6e2008edb29f86a8aa8e31e4040b0c9fc0a3bb2246ac608b0", @ANYRES32=0x0, @ANYBLOB="00000000000000001400350073797a6b616c6c657230000000000000854eca01f16b36b73300c6010ef0192726183a9c661eca26fdbd28dbcbf44f9f8dea3a1c04a5610fdabd1d97d3772b5eda449b4eabf326dfb74a44b82c24631d6e7cfb70ad4752c5f8af9e03b05b62bf9b2dc10f5f1437c6b191a903478298ec7674240cfd5e7c328464a38376aaba152abb4bd370aa0b41d337d3308e"], 0x34}}, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x400000, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) sched_getattr(r3, &(0x7f0000000000)={0x30}, 0x30, 0x0) r4 = getpgrp(0x0) setpriority(0x0, r4, 0xffff) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) write$cgroup_pid(r2, &(0x7f00000002c0), 0x12) socket$inet(0x2, 0x4000000000000001, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x202a00, 0x0) memfd_create(0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x40000000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) [ 3274.668755] audit: type=1400 audit(2000002967.040:88358): avc: denied { map } for pid=24194 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3274.788684] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 3274.878841] audit: type=1400 audit(2000002967.050:88359): avc: denied { map } for pid=24199 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3274.965614] device macvlan781 entered promiscuous mode [ 3275.144261] audit: type=1400 audit(2000002967.060:88360): avc: denied { map } for pid=24199 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:22:48 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x581e0}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) [ 3275.335518] audit: type=1400 audit(2000002967.110:88361): avc: denied { map } for pid=24199 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:22:48 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800000010000002376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3275.468530] audit: type=1400 audit(2000002967.150:88362): avc: denied { map } for pid=24199 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3275.590548] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 04:22:49 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newlink={0x54, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x10, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc}]}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x54}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x8, r4}}, 0x20}}, 0x0) 04:22:49 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x43f0, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) [ 3276.062337] ceph: device name is missing path (no : separator in hd::],08::6:kllS&Ԣ,Z zDWB;Pcef͋%kY/ @#|[PZ$U"?,@Fkiє~750XjAyRPK#oZ-q˭R@ƮӳQc- T3T܈%/Ci51( m"w*Qr]w\n+HʭuqЛ) [ 3276.197254] netlink: 'syz-executor.1': attribute type 5 has an invalid length. 04:22:49 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/partitions\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000001c0)={0x5, &(0x7f0000000180)=[{0xc9, 0x7, 0x1, 0x7}, {0x87f1, 0x1, 0x2, 0x1ff}, {0x3, 0x7f, 0x2, 0x7fff}, {0x0, 0x40, 0x5, 0x3}, {0x8, 0x8, 0x1, 0x3ff}]}) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f00000002c0)=ANY=[@ANYBLOB="186984942ad89d629ef55e24e85784219753da2c775b90cedbf605f2b8c4c6ef07a5515faa73197a107fd29b1caf30ff13c2b2697fef40122c3b92835257dcdd0e1241ee09907fc7ea00248f65c6666b6acfc6c8aea04eedfd8bf24fd4c91ebf4399570cea58a25ea54a15d00af0a543cf267e71a97dd9ff7fcb0d8713860e5e577552f20b2c73c54d717f8455f96e75c486bac37cda3b947395b692688c06ccc2906609c647436fd6b27549871f15fa"], &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000380)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) [ 3276.317856] device macvlan782 entered promiscuous mode 04:22:49 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x581e1}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) 04:22:49 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800000010000004376e73e6710600249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3276.732580] ceph: device name is missing path (no : separator in hd::],08::6:kllS&Ԣ,Z zDWB;Pcef͋%kY/ @#|[PZ$U"?,@Fkiє~750XjAyRPK#oZ-q˭R@ƮӳQc- T3T܈%/Ci51( m"w*Qr]w\n+HʭuqЛ) [ 3276.824807] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 04:22:50 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800000010000003376e73e6710602249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) 04:22:50 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x43f4, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) 04:22:50 executing program 5: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3000003, 0x5c831, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$selinux_context(0xffffffffffffffff, &(0x7f0000000040)='system_u:object_r:auditd_log_t:s0\x00', 0x22) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000580)='/selinux/enforce\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x14, 0x0, 0x800, 0x70bd29, 0x25dfdbfd}, 0x14}}, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000200)) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcsa\x00', 0x24001, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000100)=[@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0xfec0000000000000], [], @local}, 0x5}, @in6={0xa, 0x4e22, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}], 0x38) fsetxattr$security_evm(r2, &(0x7f0000000000)='security.evm\x00', &(0x7f00000000c0)=@sha1={0x1, "864f8808f9a74f1b1c3f5419357223f1d4b518bf"}, 0x15, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f00001da000/0x18000)=nil, 0x0, 0xfffffe72, 0x0, 0x0, 0xa00000000000000) [ 3277.652157] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 3277.762060] device macvlan783 entered promiscuous mode [ 3277.786191] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 04:22:51 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x581e2}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) 04:22:51 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newlink={0x54, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x10, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc}]}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x54}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x9, r4}}, 0x20}}, 0x0) 04:22:51 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800000010000003376e73e6710603249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) 04:22:51 executing program 3: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) unshare(0x8000400) mq_open(&(0x7f0000000000)='-$\x00', 0x6e93ebbbcc0884ee, 0x0, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) r1 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x9, 0x400) r2 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x5) splice(r2, &(0x7f00000002c0)=0x6, r0, &(0x7f0000000340)=0xe55, 0x1ff, 0x3) r3 = socket(0x10, 0x80002, 0x0) openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ttyprintk\x00', 0x1e3183, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_NEW_INTERFACE(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, r5, 0x405, 0x0, 0x0, {0x5f}}, 0x14}}, 0x0) sendmsg$NL80211_CMD_DEL_STATION(r3, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10100000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x2c, r5, 0x20, 0x70bd26, 0x25dfdbfd, {}, [@NL80211_ATTR_STA_SUPPORT_P2P_PS={0x5}, @NL80211_ATTR_MGMT_SUBTYPE={0x5, 0x29, 0xc}, @NL80211_ATTR_STA_TX_POWER_SETTING={0x5, 0x113, 0x2}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40440}, 0x44) sendmsg$NL80211_CMD_SET_WIPHY(r1, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x1c, r5, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, 0x80}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x48000) r6 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) r7 = socket(0x1, 0x5, 0x0) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r7, 0x800442d4, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x5, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa03}, 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r8+30000000}, 0x0) [ 3278.816114] kauditd_printk_skb: 176 callbacks suppressed [ 3278.816131] audit: type=1400 audit(2000002972.020:88539): avc: denied { map } for pid=24295 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:22:52 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x43f8, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) [ 3279.088138] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 3279.095848] audit: type=1400 audit(2000002972.020:88540): avc: denied { map } for pid=24292 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3279.095887] audit: type=1400 audit(2000002972.050:88541): avc: denied { map } for pid=24292 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3279.095914] audit: type=1400 audit(2000002972.060:88542): avc: denied { map } for pid=24295 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3279.095942] audit: type=1400 audit(2000002972.110:88543): avc: denied { map } for pid=24292 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3279.095969] audit: type=1400 audit(2000002972.130:88544): avc: denied { map } for pid=24292 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3279.095996] audit: type=1400 audit(2000002972.140:88545): avc: denied { map } for pid=24295 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3279.096027] audit: type=1400 audit(2000002972.200:88546): avc: denied { map } for pid=24292 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 04:22:52 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800000010000003376e73e6710605249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) 04:22:52 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x191881, 0x0) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, &(0x7f0000000040)={@default, @bcast}) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@barrier_none='barrier=none'}]}) [ 3279.096053] audit: type=1400 audit(2000002972.200:88547): avc: denied { map } for pid=24298 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3279.096081] audit: type=1400 audit(2000002972.210:88549): avc: denied { map } for pid=24292 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3279.891773] device macvlan784 entered promiscuous mode [ 3279.946689] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3280.271443] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 04:22:53 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800000010000003376e73e6710608249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) [ 3280.422805] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 04:22:53 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x11, 0x800000003, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r3, 0x0, r4) sendmsg$nl_netfilter(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f00000002c0)={0x330, 0xe, 0xb, 0x201, 0x70bd28, 0x25dfdbfe, {0x2, 0x0, 0xa}, [@nested={0x8e, 0x91, 0x0, 0x1, [@generic="d114280b68c1e2d0d12c0bb11209b9111a9bbe27e84b0cfc640632f3cbcc4b10c180a0ca7f949f77b0c454e2174c05680c1aff817cdf525e0a2ddda71f72dface29ae5f920dc7ab3e0835ff450447a0bec2116827403a3ec9f0e5daadc355ac8fb66deef72436f9dbb59a2ce8bbc93a3737d1e10166d5e3d47b68f3418d821cdf6499d0b08407d27fd75"]}, @nested={0x282, 0x75, 0x0, 0x1, [@generic="7a0e7ceb93b30ed62a27ff1dc00f013e37442da5813ad49bacc2338a1b9ae9b0ad8ba38aa53e5d86", @typed={0x8, 0x2b, 0x0, 0x0, @fd=r4}, @typed={0xad, 0x4a, 0x0, 0x0, @binary="e60eb6365465b35a0392def25cd8f4c0417a2e5dabeccce5df2c3acdd1b2aac6f583058130a8c72ad4634d50ad58623c422bb1526783d215c0e6e0696ce5dab5ae5d503ee74fcb2b188fe2796ed69af73323b6d2188c634a161080a431ebc6a08b2ce04b4f1005392102c352271f85c2ef3bfc35837d29b271b6c267ba30e474ca59d1c88f880e41f13343f65dae9226d38cbcdf06f8cc0b5cb9b05f6924246ea4f166b471b067c970"}, @generic="2cef66efc828a0bca74eafec147bf13c7758aa88dfda55a39d36a2c88138e5b477525b98ba2c150222e2dfcd3c054e930e1e4a1ae10e3a1e9d940f989ada2ba88b77344400b9d8ef680faad9dbe4a909f3847909c843f4fb50087664749f6336a04b17101f73e9e2acf8ceb602acab964e2bc4adebde3b55d1645af240622851308b680ff1402a4d49dd8d638221a6349608c869642d8d454e3ff0d02a9d31bfbe", @generic="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"]}, @generic="1f6c8406b3e0"]}, 0x330}, 0x1, 0x0, 0x0, 0x1}, 0x44800) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r5, 0x29, 0x41, 0x0, &(0x7f0000001000)) getsockopt$bt_hci(r5, 0x0, 0x1, &(0x7f0000000040)=""/50, &(0x7f0000000080)=0x32) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x9) accept4(0xffffffffffffffff, &(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, &(0x7f0000000140)=0x80, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r6 = socket(0x11, 0x800000003, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r6, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$sock_SIOCOUTQ(r8, 0x5411, &(0x7f0000000600)) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_generic(0x10, 0x3, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) sendmsg$NFT_MSG_GETCHAIN(r9, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 04:22:53 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x581e3}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x1}, @IFLA_MACVLAN_MACADDR={0xa, 0x4, @dev}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x5c}}, 0x0) [ 3280.669358] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 04:22:54 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) tkill(0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x2000025f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x394}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x43fc, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) 04:22:54 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newlink={0x54, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x10, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc}]}]}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x54}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0xa, r4}}, 0x20}}, 0x0) 04:22:54 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600081100fe8000000000000000000000000000bbff02000000000000000000000000000100004e22000800000010000003376e73e671060d249d85255c8b896b14276c653eb73e17dbc7593ab339db274167666bd750d85093ce04d4c6c455af37e46f7f39f1651cf9c97f59acc1e23b0043b30ee4d318df71fafe62172527cdd50fd70279ec02e64e724a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd4132739664f7e0fd9d207770ed2887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c9148ad01d050000005ec0089900000000"], 0x0) 04:22:54 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000180), 0x10) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x40000, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x0, @mcast1}, r3}}, 0x48) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000000), r3, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f00000001c0)={0x8, 0x120, 0xfa00, {0x2, {0x5, 0xfff, "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", 0x2, 0xf7, 0x5, 0x1f, 0x1, 0x2, 0x6}, r3}}, 0x128) sendmsg$can_bcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000640)=ANY=[@ANYBLOB="053899905858679ddae7e2b9d7664bc6ff9100"/28, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x7530, @ANYBLOB="00000000010000000000000000000000388dbba2b150d176"], 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000004c0)={0x5, 0x0, 0x0, {}, {}, {0x0, 0x0, 0x1105}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "71075b8a74c927af"}}, 0x48}}, 0x0) r4 = socket(0x11, 0x800000003, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$can_bcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="07006f6cf3794b913715000000000000", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=r6, @ANYRES64=0x0, @ANYBLOB="00000000080000000000000000000000c4d981ae211e6951"], 0x6}}, 0x0) r7 = socket(0x11, 0x800000003, 0x0) r8 = getuid() r9 = socket(0x400000011, 0x100004000000002, 0x0) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(r10, 0x0, 0x0) getresuid(&(0x7f0000000480), &(0x7f0000000a40), &(0x7f0000000a80)=0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f0000000300)='./file0\x00', 0x81, 0x4, &(0x7f00000009c0)=[{&(0x7f0000000340)="58e4658d87b2320f15cffd94c12da5221b6d4bf7e24c910fdeebf3eefc7828d2b7015fe1e9afc5bb7be2ba6fa4bb4c183337dd3678", 0x35, 0x37}, {&(0x7f00000006c0)="72a3a33016c0569e7538f8a1846e0487714b3aeb68477d1e862f75d2de5cbb2e580d4141a354d408d28bf3183e3b4e3b6ccbc71c7ac55340990bcbff2976490300128db7feee53f7e4ee122aedf55b0466bcce2737ea1129e5393f8ea20ae5c3194c2de02a897ddaaf42020c43ac3249e294b5003697692b4323c42ad646c26f0e2a35a6ec5112aaf6367a76c8bb3e440550d25485ef194510dc377a36697d2d60635b30ebfa98302ffadbb482ed8ea32a1dd47743392ddcece3e868b9659470ecb609ff227a7145bc3e2ffaaa0d84ca57ef36fc2712c4ac790902d2", 0xdc, 0x101}, {&(0x7f00000007c0)="915e95a6c1dafea45e0891848f34303e8b96834860e9d050c122b338c17f366c6657ce90a14dd36958d1ff451cf5b67d3fb54d9be849be2ff7a239ed3aa7a6b60cdeeb5518d795e699b490976a692d3ac86303af63bd4a77ca186ee61ce2938accd0f8a28c62e677e9037a9296b4728a0909cc75e6a307dcdd2065fca26b67a564967ba3c24cbb858ba25a9da0cd2a3e1574a1ef8f9956cab59d6240fe220d6f478e2dd0a2f1f4066898151742505f9d68fba352d0dcba2c664a1eecb25d6991cf4f", 0xc2, 0x40000000}, {&(0x7f00000008c0)="2e3d844462773518340eeeeba16446b06e29da3037a177c25d52e3e5fb1811069c555806a75b8ee89a44d421d7fbd3f644dfb2cdebb6753981bd75de2be8022bbe0ff4f14e1be9c532810da0fe359567fc78981b13f763fc2eb7104596207657b822b6a1bef027242c39a1323b60d018359d005a4405f1e85db0b84752f024475c08a7f29e98596ffa3403cb84e212dc624e6cc90e237828bf2b4578b91c8665871a53bfca02dde7980e1540e564c6761d36c7cb32e0a87f056d882876e06591b0368dd4af23821caa19952a1840b9fb67dee2707f131e462ce3a8d89118f0092e081a9cd3c28827389ca11a6a4f6c9928a4fa4e", 0xf4, 0x2}], 0x10d400, &(0x7f0000000ac0)={[{@huge_never={'huge=never', 0x3d, 'posix_acl_accessmd5sumwlan1wlan0'}}, {@huge_never={'huge=never', 0x3d, '/dev/infiniband/rdma_cm\x00'}}], [{@fowner_lt={'fowner<', r8}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}, {@obj_type={'obj_type', 0x3d, '@%'}}, {@euid_eq={'euid', 0x3d, r10}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'security'}}, {@appraise='appraise'}, {@euid_eq={'euid', 0x3d, r11}}]}) r12 = socket$inet6_tcp(0xa, 0x1, 0x0) r13 = fcntl$dupfd(r7, 0x0, r12) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) r14 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r14, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r14, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x0, @mcast1}, r15}}, 0x48) write$RDMA_USER_CM_CMD_SET_OPTION(r14, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000000), r15, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r13, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x4, @dev={0xfe, 0x80, [], 0xf}, 0x40}, {0xa, 0x4e24, 0x7fffffff, @mcast1, 0x5}, r15, 0x1ba}}, 0x48) [ 3282.021032] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3386.433271] rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: [ 3386.439838] rcu: (detected by 0, t=10502 jiffies, g=377125, q=1691) [ 3386.446374] rcu: All QSes seen, last rcu_preempt kthread activity 10326 (4295275784-4295265458), jiffies_till_next_fqs=1, root ->qsmask 0x0 [ 3386.459228] syz-executor.5 R running task 28480 24460 20546 0x00000008 [ 3386.466475] Call Trace: [ 3386.469075] [ 3386.471522] sched_show_task.cold+0x2ee/0x35d [ 3386.476055] ? set_rq_offline.part.0+0x140/0x140 [ 3386.480966] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 3386.486015] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3386.491763] rcu_check_callbacks.cold+0xaa1/0xd90 [ 3386.496683] update_process_times+0x32/0x80 [ 3386.501047] tick_sched_handle+0xa2/0x190 [ 3386.505217] tick_sched_timer+0x47/0x130 [ 3386.509311] __hrtimer_run_queues+0x33b/0xdc0 [ 3386.513847] ? tick_sched_do_timer+0x1b0/0x1b0 [ 3386.518596] ? hrtimer_fixup_activate+0x30/0x30 [ 3386.523286] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 3386.528404] ? ktime_get_update_offsets_now+0x2d3/0x440 [ 3386.533953] hrtimer_interrupt+0x314/0x770 [ 3386.538284] smp_apic_timer_interrupt+0x111/0x550 [ 3386.543176] apic_timer_interrupt+0xf/0x20 [ 3386.547436] RIP: 0010:_raw_spin_unlock_irqrestore+0x95/0xe0 [ 3386.553273] Code: 48 c7 c0 48 57 f2 88 48 ba 00 00 00 00 00 fc ff df 48 c1 e8 03 80 3c 10 00 75 39 48 83 3d 6a 5a 9d 01 00 74 24 48 89 df 57 9d <0f> 1f 44 00 00 bf 01 00 00 00 e8 2c d2 f3 f9 65 8b 05 d5 f0 ac 78 [ 3386.572297] RSP: 0018:ffff8880ae807bc8 EFLAGS: 00000286 ORIG_RAX: ffffffffffffff13 [ 3386.580234] RAX: 1ffffffff11e4ae9 RBX: 0000000000000286 RCX: 1ffff1100848d9a1 [ 3386.587581] RDX: dffffc0000000000 RSI: ffff88804246cce8 RDI: 0000000000000286 [ 3386.594879] RBP: ffff8880ae807bd8 R08: ffff88804246c440 R09: ffff88804246cd08 [ 3386.602172] R10: 0000000000000000 R11: 0000000000000000 R12: ffff8880ae823a00 [ 3386.609458] R13: 0000000000000000 R14: 0000000000000000 R15: ffff8880ae823a00 [ 3386.616770] ? apic_timer_interrupt+0xa/0x20 [ 3386.621224] mod_timer+0x571/0x1030 [ 3386.624895] ? mark_held_locks+0xb1/0x100 [ 3386.629264] ? timer_reduce+0x11d0/0x11d0 [ 3386.633706] ? check_preemption_disabled+0x48/0x290 [ 3386.638815] ? prandom_u32_state+0x13/0x180 [ 3386.643361] garp_join_timer_arm+0x5e/0x80 [ 3386.647818] garp_join_timer+0x73/0x80 [ 3386.651733] call_timer_fn+0x18d/0x720 [ 3386.655649] ? garp_gid_event+0x60/0x60 [ 3386.659651] ? process_timeout+0x40/0x40 [ 3386.663758] ? garp_gid_event+0x60/0x60 [ 3386.667762] run_timer_softirq+0x64f/0x16a0 [ 3386.672114] ? add_timer+0xbe0/0xbe0 [ 3386.675871] __do_softirq+0x25c/0x921 [ 3386.679696] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3386.685271] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3386.690852] irq_exit+0x180/0x1d0 [ 3386.694421] smp_apic_timer_interrupt+0x13b/0x550 [ 3386.699306] apic_timer_interrupt+0xf/0x20 [ 3386.703659] [ 3386.705957] RIP: 0010:_raw_spin_unlock_irqrestore+0x95/0xe0 [ 3386.711713] Code: 48 c7 c0 48 57 f2 88 48 ba 00 00 00 00 00 fc ff df 48 c1 e8 03 80 3c 10 00 75 39 48 83 3d 6a 5a 9d 01 00 74 24 48 89 df 57 9d <0f> 1f 44 00 00 bf 01 00 00 00 e8 2c d2 f3 f9 65 8b 05 d5 f0 ac 78 [ 3386.731029] RSP: 0018:ffff888051a3fad8 EFLAGS: 00000212 ORIG_RAX: ffffffffffffff13 [ 3386.738921] RAX: 1ffffffff11e4ae9 RBX: 0000000000000212 RCX: 0000000000000000 [ 3386.746410] RDX: dffffc0000000000 RSI: ffff88804246ccc0 RDI: 0000000000000212 [ 3386.753700] RBP: ffff888051a3fae8 R08: ffff88804246c440 R09: 0000000000000000 [ 3386.760994] R10: 0000000000000000 R11: 0000000000000000 R12: ffffffff8ad94fa0 [ 3386.767233] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3386.768366] R13: ffffffff8ad94fa0 R14: 0000000000000000 R15: ffffffff8ad961c8 [ 3386.784366] avc_alloc_node+0x44e/0x630 [ 3386.788381] avc_compute_av+0x22d/0x690 [ 3386.792485] avc_has_perm+0x32d/0x610 [ 3386.796322] ? avc_has_perm_noaudit+0x570/0x570 [ 3386.801148] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3386.805944] ? security_transition_sid+0x126/0x190 [ 3386.811024] ? security_transition_sid+0xf1/0x190 [ 3386.815898] selinux_socket_create+0x2a0/0x610 [ 3386.821489] ? selinux_sctp_assoc_request+0x5c0/0x5c0 [ 3386.826718] security_socket_create+0x7b/0xc0 [ 3386.832380] __sock_create+0x90/0x730 [ 3386.836220] __sys_socket+0x103/0x220 [ 3386.840048] ? move_addr_to_kernel+0x80/0x80 [ 3386.844639] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3386.849450] ? do_syscall_64+0x26/0x620 [ 3386.853559] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3386.858959] ? do_syscall_64+0x26/0x620 [ 3386.862971] __x64_sys_socket+0x73/0xb0 [ 3386.866978] do_syscall_64+0xfd/0x620 [ 3386.870956] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3386.876245] RIP: 0033:0x45b399 [ 3386.879599] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3386.898646] RSP: 002b:00007f5e89c57c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 3386.906405] RAX: ffffffffffffffda RBX: 00007f5e89c586d4 RCX: 000000000045b399 [ 3386.913713] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 000000000000000a [ 3386.921004] RBP: 000000000075c118 R08: 0000000000000000 R09: 0000000000000000 [ 3386.928411] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 3386.935951] R13: 0000000000000b42 R14: 00000000004cc2d3 R15: 000000000075c124 [ 3387.072335] kauditd_printk_skb: 118 callbacks suppressed [ 3387.072353] audit: type=1400 audit(2000003080.270:88667): avc: denied { map } for pid=24459 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3387.514002] audit: type=1400 audit(2000003080.400:88668): avc: denied { map } for pid=24471 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3387.898700] audit: type=1400 audit(2000003080.400:88669): avc: denied { map } for pid=24471 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3388.229718] audit: type=1400 audit(2000003080.400:88670): avc: denied { map } for pid=24471 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3388.514707] audit: type=1400 audit(2000003080.400:88671): avc: denied { map } for pid=24471 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 2033/05/18 04:24:40 Manager.Poll call failed: connection is shut down [ 3388.953958] audit: type=1400 audit(2000003080.410:88672): avc: denied { map } for pid=24474 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1