syzkaller login: [ 65.451068][ T38] audit: type=1400 audit(1575119877.082:41): avc: denied { map } for pid=7978 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '[localhost]:43121' (ECDSA) to the list of known hosts. [ 67.443720][ T38] audit: type=1400 audit(1575119879.082:42): avc: denied { map } for pid=7989 comm="syz-fuzzer" path="/syz-fuzzer" dev="sda1" ino=16526 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=file permissive=1 2019/11/30 13:17:59 fuzzer started 2019/11/30 13:17:59 dialing manager at 10.0.2.10:40921 2019/11/30 13:17:59 syscalls: 2533 2019/11/30 13:17:59 code coverage: enabled 2019/11/30 13:17:59 comparison tracing: enabled 2019/11/30 13:17:59 extra coverage: extra coverage is not supported by the kernel 2019/11/30 13:17:59 setuid sandbox: enabled 2019/11/30 13:17:59 namespace sandbox: enabled 2019/11/30 13:17:59 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/30 13:17:59 fault injection: enabled 2019/11/30 13:17:59 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/30 13:17:59 net packet injection: enabled 2019/11/30 13:17:59 net device setup: enabled 2019/11/30 13:17:59 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2019/11/30 13:17:59 devlink PCI setup: PCI device 0000:00:10.0 is not available 13:18:11 executing program 0: socket$inet6(0xa, 0x3, 0x6) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) preadv(r0, &(0x7f0000001380)=[{&(0x7f0000000000)=""/183, 0xb7}], 0x1, 0x7) [ 80.031697][ T38] audit: type=1400 audit(1575119891.662:43): avc: denied { map } for pid=8014 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=2051 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 13:18:11 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79", 0x3e}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x266, 0x0, 0x0, 0x0, 0x22c}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) [ 80.187092][ T8015] IPVS: ftp: loaded support on port[0] = 21 [ 80.218275][ T8017] IPVS: ftp: loaded support on port[0] = 21 [ 80.284650][ T8015] chnl_net:caif_netlink_parms(): no params data found [ 80.315232][ T8015] bridge0: port 1(bridge_slave_0) entered blocking state [ 80.323356][ T8015] bridge0: port 1(bridge_slave_0) entered disabled state [ 80.331640][ T8015] device bridge_slave_0 entered promiscuous mode [ 80.342427][ T8015] bridge0: port 2(bridge_slave_1) entered blocking state [ 80.349706][ T8015] bridge0: port 2(bridge_slave_1) entered disabled state [ 80.358443][ T8015] device bridge_slave_1 entered promiscuous mode [ 80.395036][ T8015] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 80.406652][ T8015] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 80.419036][ T8017] chnl_net:caif_netlink_parms(): no params data found [ 80.434865][ T8015] team0: Port device team_slave_0 added [ 80.443613][ T8015] team0: Port device team_slave_1 added [ 80.463510][ T8017] bridge0: port 1(bridge_slave_0) entered blocking state [ 80.470652][ T8017] bridge0: port 1(bridge_slave_0) entered disabled state [ 80.478444][ T8017] device bridge_slave_0 entered promiscuous mode [ 80.488976][ T8017] bridge0: port 2(bridge_slave_1) entered blocking state [ 80.496089][ T8017] bridge0: port 2(bridge_slave_1) entered disabled state [ 80.503615][ T8017] device bridge_slave_1 entered promiscuous mode [ 80.583185][ T8015] device hsr_slave_0 entered promiscuous mode [ 80.651785][ T8015] device hsr_slave_1 entered promiscuous mode [ 80.730955][ T8017] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 80.741548][ T8017] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 80.762326][ T8017] team0: Port device team_slave_0 added [ 80.772474][ T8017] team0: Port device team_slave_1 added [ 80.783549][ T38] audit: type=1400 audit(1575119892.422:44): avc: denied { create } for pid=8015 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 80.808426][ T38] audit: type=1400 audit(1575119892.422:45): avc: denied { write } for pid=8015 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 80.832594][ T38] audit: type=1400 audit(1575119892.422:46): avc: denied { read } for pid=8015 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 80.859551][ T8015] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 80.982841][ T8017] device hsr_slave_0 entered promiscuous mode [ 81.021599][ T8017] device hsr_slave_1 entered promiscuous mode [ 81.101522][ T8017] debugfs: Directory 'hsr0' with parent '/' already present! [ 81.109572][ T8015] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 81.173062][ T8015] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 81.243499][ T8015] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 81.310660][ T8017] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 81.363562][ T8015] bridge0: port 2(bridge_slave_1) entered blocking state [ 81.371033][ T8015] bridge0: port 2(bridge_slave_1) entered forwarding state [ 81.378987][ T8015] bridge0: port 1(bridge_slave_0) entered blocking state [ 81.386302][ T8015] bridge0: port 1(bridge_slave_0) entered forwarding state [ 81.395960][ T2955] bridge0: port 1(bridge_slave_0) entered disabled state [ 81.403930][ T2955] bridge0: port 2(bridge_slave_1) entered disabled state [ 81.417854][ T8017] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 81.473886][ T8017] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 81.534662][ T8017] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 81.708733][ T8015] 8021q: adding VLAN 0 to HW filter on device bond0 [ 81.723571][ T3105] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 81.732526][ T3105] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 81.744695][ T8015] 8021q: adding VLAN 0 to HW filter on device team0 [ 81.757578][ T2955] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 81.765902][ T2955] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 81.774676][ T2955] bridge0: port 1(bridge_slave_0) entered blocking state [ 81.781728][ T2955] bridge0: port 1(bridge_slave_0) entered forwarding state [ 81.790905][ T8017] 8021q: adding VLAN 0 to HW filter on device bond0 [ 81.802030][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 81.810639][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 81.818884][ T18] bridge0: port 2(bridge_slave_1) entered blocking state [ 81.825813][ T18] bridge0: port 2(bridge_slave_1) entered forwarding state [ 81.838897][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 81.848255][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 81.856717][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 81.866940][ T8017] 8021q: adding VLAN 0 to HW filter on device team0 [ 81.876817][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 81.884973][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 81.893353][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 81.901449][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 81.908647][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 81.916450][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 81.935307][ T8023] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 81.943781][ T8023] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 81.951913][ T8023] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 81.960821][ T8023] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 81.969431][ T8023] bridge0: port 2(bridge_slave_1) entered blocking state [ 81.977154][ T8023] bridge0: port 2(bridge_slave_1) entered forwarding state [ 81.985155][ T8023] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 81.993425][ T8023] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 82.002002][ T8023] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 82.010332][ T8023] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 82.018993][ T8023] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 82.026906][ T8023] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 82.038697][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 82.047811][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 82.056658][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 82.067083][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 82.077201][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 82.087264][ T8023] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 82.097215][ T8023] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 82.105659][ T8023] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 82.117148][ T8015] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 82.127877][ T1204] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 82.136396][ T1204] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 82.153451][ T8017] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 82.165226][ T8017] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 82.174323][ T8023] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 82.182502][ T8023] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 82.190537][ T8023] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 82.198037][ T8023] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 82.210594][ T8015] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 82.222605][ T38] audit: type=1400 audit(1575119893.862:47): avc: denied { associate } for pid=8015 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 82.223140][ T1204] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 82.253541][ T1204] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 82.265755][ T8017] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 82.333591][ T8031] ptrace attach of "/syz-executor.1"[8030] was attempted by "/syz-executor.1"[8031] 13:18:13 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) r1 = eventfd2(0x0, 0x0) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000080)=r1) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000240)) 13:18:13 executing program 0: socket$inet6(0xa, 0x3, 0x6) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) preadv(r0, &(0x7f0000001380)=[{&(0x7f0000000000)=""/183, 0xb7}], 0x1, 0x7) 13:18:14 executing program 0: socket$inet6(0xa, 0x3, 0x6) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) preadv(r0, &(0x7f0000001380)=[{&(0x7f0000000000)=""/183, 0xb7}], 0x1, 0x7) 13:18:14 executing program 0: socket$inet6(0xa, 0x3, 0x6) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) preadv(r0, &(0x7f0000001380)=[{&(0x7f0000000000)=""/183, 0xb7}], 0x1, 0x7) 13:18:14 executing program 0: socket$inet6(0xa, 0x3, 0x6) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000000)=""/183, 0xb7}], 0x1, 0x7) 13:18:14 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) r1 = eventfd2(0x0, 0x0) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000080)=r1) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000240)) 13:18:14 executing program 0: socket$inet6(0xa, 0x3, 0x6) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000000)=""/183, 0xb7}], 0x1, 0x7) 13:18:14 executing program 0: socket$inet6(0xa, 0x3, 0x6) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000000)=""/183, 0xb7}], 0x1, 0x7) 13:18:14 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) preadv(r0, &(0x7f0000001380)=[{&(0x7f0000000000)=""/183, 0xb7}], 0x1, 0x7) 13:18:14 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) r1 = eventfd2(0x0, 0x0) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000080)=r1) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000240)) 13:18:14 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) preadv(r0, &(0x7f0000001380)=[{&(0x7f0000000000)=""/183, 0xb7}], 0x1, 0x7) 13:18:14 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) preadv(r0, &(0x7f0000001380)=[{&(0x7f0000000000)=""/183, 0xb7}], 0x1, 0x7) 13:18:14 executing program 0: socket$inet6(0xa, 0x0, 0x6) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) preadv(r0, &(0x7f0000001380)=[{&(0x7f0000000000)=""/183, 0xb7}], 0x1, 0x7) 13:18:14 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) r1 = eventfd2(0x0, 0x0) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000080)=r1) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000240)) 13:18:14 executing program 0: socket$inet6(0xa, 0x0, 0x6) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) preadv(r0, &(0x7f0000001380)=[{&(0x7f0000000000)=""/183, 0xb7}], 0x1, 0x7) 13:18:14 executing program 0: socket$inet6(0xa, 0x0, 0x6) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) preadv(r0, &(0x7f0000001380)=[{&(0x7f0000000000)=""/183, 0xb7}], 0x1, 0x7) 13:18:14 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) eventfd2(0x0, 0x0) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000240)) 13:18:14 executing program 0: socket$inet6(0xa, 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) preadv(r0, &(0x7f0000001380)=[{&(0x7f0000000000)=""/183, 0xb7}], 0x1, 0x7) 13:18:14 executing program 0: socket$inet6(0xa, 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) preadv(r0, &(0x7f0000001380)=[{&(0x7f0000000000)=""/183, 0xb7}], 0x1, 0x7) 13:18:14 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) eventfd2(0x0, 0x0) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000240)) 13:18:14 executing program 0: socket$inet6(0xa, 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) preadv(r0, &(0x7f0000001380)=[{&(0x7f0000000000)=""/183, 0xb7}], 0x1, 0x7) 13:18:14 executing program 0: socket$inet6(0xa, 0x3, 0x6) r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000001380)=[{&(0x7f0000000000)=""/183, 0xb7}], 0x1, 0x7) 13:18:14 executing program 0: socket$inet6(0xa, 0x3, 0x6) r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000001380)=[{&(0x7f0000000000)=""/183, 0xb7}], 0x1, 0x7) 13:18:14 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) eventfd2(0x0, 0x0) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000240)) 13:18:14 executing program 0: socket$inet6(0xa, 0x3, 0x6) r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000001380)=[{&(0x7f0000000000)=""/183, 0xb7}], 0x1, 0x7) 13:18:14 executing program 0: socket$inet6(0xa, 0x3, 0x6) syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000000)=""/183, 0xb7}], 0x1, 0x7) 13:18:14 executing program 0: socket$inet6(0xa, 0x3, 0x6) syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000000)=""/183, 0xb7}], 0x1, 0x7) 13:18:14 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000080)) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000240)) 13:18:14 executing program 0: socket$inet6(0xa, 0x3, 0x6) syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000000)=""/183, 0xb7}], 0x1, 0x7) 13:18:14 executing program 0: socket$inet6(0xa, 0x3, 0x6) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) preadv(r0, 0x0, 0x0, 0x7) 13:18:14 executing program 0: socket$inet6(0xa, 0x3, 0x6) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) preadv(r0, 0x0, 0x0, 0x7) 13:18:14 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000080)) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000240)) 13:18:14 executing program 0: socket$inet6(0xa, 0x3, 0x6) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) preadv(r0, 0x0, 0x0, 0x7) 13:18:14 executing program 0: socket$inet6(0xa, 0x3, 0x6) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) preadv(r0, &(0x7f0000001380), 0x0, 0x7) 13:18:14 executing program 0: socket$inet6(0xa, 0x3, 0x6) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) preadv(r0, &(0x7f0000001380), 0x0, 0x7) 13:18:14 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000080)) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000240)) 13:18:14 executing program 0: socket$inet6(0xa, 0x3, 0x6) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) preadv(r0, &(0x7f0000001380), 0x0, 0x7) 13:18:14 executing program 0: socket$inet6(0xa, 0x3, 0x6) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) preadv(r0, &(0x7f0000001380)=[{0x0}], 0x1, 0x7) 13:18:14 executing program 0: socket$inet6(0xa, 0x3, 0x6) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) preadv(r0, &(0x7f0000001380)=[{0x0}], 0x1, 0x7) 13:18:14 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vhost-vsock\x00', 0x2, 0x0) r1 = eventfd2(0x0, 0x0) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000080)=r1) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000240)) 13:18:14 executing program 0: socket$inet6(0xa, 0x3, 0x6) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) preadv(r0, &(0x7f0000001380)=[{0x0}], 0x1, 0x7) 13:18:14 executing program 0: socket$inet6(0xa, 0x3, 0x6) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) preadv(r0, &(0x7f0000001380)=[{&(0x7f0000000000)=""/183, 0xb7}], 0x1, 0x0) 13:18:15 executing program 0: socket$inet6(0xa, 0x3, 0x6) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) preadv(r0, &(0x7f0000001380)=[{&(0x7f0000000000)=""/183, 0xb7}], 0x1, 0x0) 13:18:15 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vhost-vsock\x00', 0x2, 0x0) r1 = eventfd2(0x0, 0x0) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000080)=r1) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000240)) 13:18:15 executing program 0: socket$inet6(0xa, 0x3, 0x6) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) preadv(r0, &(0x7f0000001380)=[{&(0x7f0000000000)=""/183, 0xb7}], 0x1, 0x0) 13:18:15 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) r1 = eventfd2(0x0, 0x0) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000080)=r1) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000240)) 13:18:15 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vhost-vsock\x00', 0x2, 0x0) r1 = eventfd2(0x0, 0x0) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000080)=r1) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000240)) 13:18:15 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007bd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) 13:18:15 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x3, 0x2) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) write(r0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) [ 83.575452][ T38] audit: type=1400 audit(1575119895.212:48): avc: denied { open } for pid=8207 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 13:18:15 executing program 1: ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0xaf01, 0x0) r0 = eventfd2(0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, &(0x7f0000000080)=r0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, &(0x7f0000000240)) [ 83.599227][ T38] audit: type=1400 audit(1575119895.212:49): avc: denied { kernel } for pid=8207 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 13:18:15 executing program 1: ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0xaf01, 0x0) r0 = eventfd2(0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, &(0x7f0000000080)=r0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, &(0x7f0000000240)) 13:18:15 executing program 1: ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0xaf01, 0x0) r0 = eventfd2(0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, &(0x7f0000000080)=r0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, &(0x7f0000000240)) 13:18:15 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) r1 = eventfd2(0x0, 0x0) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000080)=r1) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000240)) 13:18:15 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) setxattr$security_evm(0x0, &(0x7f0000000080)='security.evm\x00', &(0x7f0000000180)=ANY=[@ANYBLOB], 0x1, 0x0) 13:18:15 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) r1 = eventfd2(0x0, 0x0) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000080)=r1) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000240)) 13:18:15 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) r1 = eventfd2(0x0, 0x0) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000080)=r1) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000240)) 13:18:15 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0xaf01, 0x0) r1 = eventfd2(0x0, 0x0) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000080)=r1) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000240)) 13:18:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x4000) 13:18:15 executing program 0: inotify_init() inotify_add_watch(0xffffffffffffffff, 0x0, 0xfe) inotify_init() inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xc00) ioctl$KDSKBSENT(r0, 0x4b49, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000f68000)={@loopback, 0x800, 0x0, 0xff, 0x1}, 0x20) r2 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x800, 0x2}, 0x20) 13:18:15 executing program 0: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000140)=@updsa={0xf, 0x1a, 0x800, 0x0, 0x0, {{@in6=@ipv4={[], [], @loopback}, @in6=@empty}, {@in6=@mcast1}, @in6=@empty}}, 0xf0}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="60515905000311"], 0xa) close(r2) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10000, 0x0) 13:18:15 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0xaf01, 0x0) r1 = eventfd2(0x0, 0x0) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000080)=r1) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000240)) [ 84.086346][ T8249] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=8249 comm=syz-executor.0 [ 84.100807][ T8249] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=8249 comm=syz-executor.0 [ 84.113888][ T8249] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=8249 comm=syz-executor.0 13:18:15 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0xaf01, 0x0) r1 = eventfd2(0x0, 0x0) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000080)=r1) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000240)) [ 84.127399][ T8249] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=8249 comm=syz-executor.0 [ 84.140882][ T8249] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=8249 comm=syz-executor.0 [ 84.154497][ T8249] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=8249 comm=syz-executor.0 [ 84.168266][ T8249] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=8249 comm=syz-executor.0 [ 84.181657][ T8249] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=8249 comm=syz-executor.0 [ 84.195252][ T8249] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=8249 comm=syz-executor.0 [ 84.209152][ T8249] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=8249 comm=syz-executor.0 13:18:15 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) r1 = eventfd2(0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, &(0x7f0000000080)=r1) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000240)) 13:18:16 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) r1 = eventfd2(0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, &(0x7f0000000080)=r1) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000240)) 13:18:16 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x50000}]}) mount$9p_virtio(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x10002, 0x0) 13:18:16 executing program 0: creat(&(0x7f00000000c0)='./file0\x00', 0x30) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000540)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='f2fs\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 13:18:16 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) r1 = eventfd2(0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, &(0x7f0000000080)=r1) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000240)) [ 84.976352][ T4155] block nbd0: Attempted send on invalid socket [ 84.983172][ T4155] blk_update_request: I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 84.994441][ T8268] F2FS-fs (nbd0): Unable to read 1th superblock [ 85.001299][ T2646] block nbd0: Attempted send on invalid socket [ 85.008307][ T2646] blk_update_request: I/O error, dev nbd0, sector 8 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 85.019200][ T8268] F2FS-fs (nbd0): Unable to read 2th superblock [ 85.035979][ T2647] block nbd0: Attempted send on invalid socket [ 85.042240][ T2647] blk_update_request: I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 85.053018][ T8274] F2FS-fs (nbd0): Unable to read 1th superblock [ 85.059249][ T2646] block nbd0: Attempted send on invalid socket [ 85.065575][ T2646] blk_update_request: I/O error, dev nbd0, sector 8 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 85.077939][ T8274] F2FS-fs (nbd0): Unable to read 2th superblock 13:18:16 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) eventfd2(0x0, 0x0) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, 0x0) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000240)) 13:18:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/dev_mcast\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x4000) 13:18:16 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) eventfd2(0x0, 0x0) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, 0x0) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000240)) 13:18:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/dev_mcast\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x4000) 13:18:16 executing program 0: ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='mem\x00\x01y7swaS.t\x00\xe3\xcb\xe5o\v\xa5\xdc\xc8\x1f\xfar\xce\xdc\nsn\xc6\xda!\xa8\x84\xefR\xffX\xfa\xea\n\xf2\xc5\x90\xe2{\xab\xa0\xbb\xfc#', 0x0, 0x0) ioctl$TCSBRK(r0, 0x5409, 0x0) r1 = accept$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @empty}, 0x0) fallocate(r1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0xffffffffffffffcd, &(0x7f0000000340)={&(0x7f0000000300)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x16, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000480)='TIPCv2\x00') 13:18:16 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) eventfd2(0x0, 0x0) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, 0x0) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000240)) [ 85.300169][ T8298] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 85.307722][ T8298] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 85.389935][ C3] hrtimer: interrupt took 46690 ns [ 124.002322][ T8298] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 13:18:55 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) eventfd2(0x0, 0x0) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000080)) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000240)) 13:19:01 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) eventfd2(0x0, 0x0) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000080)) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000240)) [ 155.442461][ T8299] bridge0: port 2(bridge_slave_1) entered disabled state [ 155.450752][ T8299] bridge0: port 1(bridge_slave_0) entered disabled state [ 241.791725][ T1114] INFO: task syz-executor.0:8301 blocked for more than 143 seconds. [ 241.801570][ T1114] Not tainted 5.4.0-syzkaller #0 [ 241.809035][ T1114] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 241.819689][ T1114] syz-executor.0 D28408 8301 8015 0x00000004 [ 241.826491][ T1114] Call Trace: [ 241.830579][ T1114] __schedule+0x8e1/0x1f30 [ 241.835965][ T1114] ? __sched_text_start+0x8/0x8 [ 241.841639][ T1114] ? lock_downgrade+0x920/0x920 [ 241.846891][ T1114] ? rwlock_bug.part.0+0x90/0x90 [ 241.852578][ T1114] schedule+0xdc/0x2b0 [ 241.857177][ T1114] schedule_preempt_disabled+0x13/0x20 [ 241.863349][ T1114] __mutex_lock+0x7ab/0x13c0 [ 241.868476][ T1114] ? rtnetlink_rcv_msg+0x405/0xaf0 [ 241.874166][ T1114] ? mutex_trylock+0x2f0/0x2f0 [ 241.879586][ T1114] ? find_held_lock+0x35/0x130 [ 241.884529][ T1114] ? rtnetlink_rcv_msg+0x3d0/0xaf0 [ 241.890256][ T1114] ? lock_downgrade+0x920/0x920 [ 241.895726][ T1114] ? rcu_read_lock_held_common+0x130/0x130 [ 241.902720][ T1114] mutex_lock_nested+0x16/0x20 [ 241.908499][ T1114] ? mutex_lock_nested+0x16/0x20 [ 241.914740][ T1114] rtnetlink_rcv_msg+0x405/0xaf0 [ 241.920509][ T1114] ? rtnl_bridge_getlink+0x910/0x910 [ 241.927647][ T1114] ? netlink_deliver_tap+0x228/0xbe0 [ 241.934361][ T1114] ? find_held_lock+0x35/0x130 [ 241.939803][ T1114] netlink_rcv_skb+0x177/0x450 [ 241.945754][ T1114] ? rtnl_bridge_getlink+0x910/0x910 [ 241.952172][ T1114] ? netlink_ack+0xb50/0xb50 [ 241.957662][ T1114] ? __kasan_check_read+0x11/0x20 [ 241.963492][ T1114] ? netlink_deliver_tap+0x24a/0xbe0 [ 241.969901][ T1114] rtnetlink_rcv+0x1d/0x30 [ 241.975371][ T1114] netlink_unicast+0x58c/0x7d0 [ 241.981498][ T1114] ? netlink_attachskb+0x870/0x870 [ 241.987138][ T1114] ? _copy_from_iter_full+0x25d/0x8c0 [ 241.992816][ T1114] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 241.999256][ T1114] netlink_sendmsg+0x8ee/0xe60 [ 242.004360][ T1114] ? netlink_unicast+0x7d0/0x7d0 [ 242.009498][ T1114] ? tomoyo_socket_sendmsg+0x26/0x30 [ 242.015177][ T1114] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 242.021717][ T1114] ? security_socket_sendmsg+0x8d/0xc0 [ 242.027272][ T1114] ? netlink_unicast+0x7d0/0x7d0 [ 242.032142][ T1114] sock_sendmsg+0xd7/0x130 [ 242.036332][ T1114] ____sys_sendmsg+0x753/0x880 [ 242.041029][ T1114] ? kernel_sendmsg+0x50/0x50 [ 242.045869][ T1114] ? __fget+0x35d/0x550 [ 242.050163][ T1114] ___sys_sendmsg+0x11d/0x1b0 [ 242.055297][ T1114] ? do_recvmmsg+0x7a0/0x7a0 [ 242.060468][ T1114] ? __kasan_check_read+0x11/0x20 [ 242.066058][ T1114] ? __fget+0x37f/0x550 [ 242.070307][ T1114] ? ksys_dup3+0x3e0/0x3e0 [ 242.074965][ T1114] ? __fget_light+0x1a9/0x230 [ 242.079839][ T1114] ? __fdget+0x1b/0x20 [ 242.084036][ T1114] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 242.090647][ T1114] __sys_sendmsg+0x105/0x1d0 [ 242.095800][ T1114] ? __sys_sendmsg_sock+0x1f0/0x1f0 [ 242.101247][ T1114] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 242.107036][ T1114] ? do_syscall_64+0x26/0x790 [ 242.112157][ T1114] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 242.118413][ T1114] ? do_syscall_64+0x26/0x790 [ 242.123428][ T1114] __x64_sys_sendmsg+0x78/0xb0 [ 242.128325][ T1114] do_syscall_64+0xfa/0x790 [ 242.133138][ T1114] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 242.139309][ T1114] RIP: 0033:0x45a759 [ 242.143430][ T1114] Code: Bad RIP value. [ 242.147645][ T1114] RSP: 002b:00007fd88e653c88 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 242.156484][ T1114] RAX: ffffffffffffffda RBX: 000000000071c1a0 RCX: 000000000045a759 [ 242.164846][ T1114] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000005 [ 242.173218][ T1114] RBP: 0000000000000003 R08: 0000000000000000 R09: 0000000000000000 [ 242.181602][ T1114] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd88e6546d4 [ 242.189874][ T1114] R13: 00000000004afe1e R14: 00000000006f3730 R15: 00000000ffffffff [ 242.198201][ T1114] INFO: task syz-executor.0:8302 blocked for more than 143 seconds. [ 242.206837][ T1114] Not tainted 5.4.0-syzkaller #0 [ 242.212507][ T1114] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 242.221596][ T1114] syz-executor.0 D28408 8302 8015 0x00004004 [ 242.228029][ T1114] Call Trace: [ 242.231214][ T1114] __schedule+0x8e1/0x1f30 [ 242.235727][ T1114] ? __sched_text_start+0x8/0x8 [ 242.240667][ T1114] ? lock_downgrade+0x920/0x920 [ 242.245770][ T1114] ? rwlock_bug.part.0+0x90/0x90 [ 242.250756][ T1114] schedule+0xdc/0x2b0 [ 242.254842][ T1114] schedule_preempt_disabled+0x13/0x20 [ 242.260322][ T1114] __mutex_lock+0x7ab/0x13c0 [ 242.265030][ T1114] ? rtnetlink_rcv_msg+0x405/0xaf0 [ 242.270138][ T1114] ? mutex_trylock+0x2f0/0x2f0 [ 242.274965][ T1114] ? find_held_lock+0x35/0x130 [ 242.279722][ T1114] ? rtnetlink_rcv_msg+0x3d0/0xaf0 [ 242.284580][ T1114] ? lock_downgrade+0x920/0x920 [ 242.289471][ T1114] ? rcu_read_lock_held_common+0x130/0x130 [ 242.295322][ T1114] mutex_lock_nested+0x16/0x20 [ 242.300264][ T1114] ? mutex_lock_nested+0x16/0x20 [ 242.305117][ T1114] rtnetlink_rcv_msg+0x405/0xaf0 [ 242.310044][ T1114] ? rtnl_bridge_getlink+0x910/0x910 [ 242.315281][ T1114] ? netlink_deliver_tap+0x228/0xbe0 [ 242.320612][ T1114] ? find_held_lock+0x35/0x130 [ 242.325190][ T1114] netlink_rcv_skb+0x177/0x450 [ 242.329857][ T1114] ? rtnl_bridge_getlink+0x910/0x910 [ 242.334977][ T1114] ? netlink_ack+0xb50/0xb50 [ 242.339690][ T1114] ? __kasan_check_read+0x11/0x20 [ 242.344577][ T1114] ? netlink_deliver_tap+0x24a/0xbe0 [ 242.349978][ T1114] rtnetlink_rcv+0x1d/0x30 [ 242.354526][ T1114] netlink_unicast+0x58c/0x7d0 [ 242.359380][ T1114] ? netlink_attachskb+0x870/0x870 [ 242.364573][ T1114] ? _copy_from_iter_full+0x25d/0x8c0 [ 242.370248][ T1114] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 242.376735][ T1114] netlink_sendmsg+0x8ee/0xe60 [ 242.381555][ T1114] ? netlink_unicast+0x7d0/0x7d0 [ 242.386189][ T1114] ? tomoyo_socket_sendmsg+0x26/0x30 [ 242.391507][ T1114] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 242.397625][ T1114] ? security_socket_sendmsg+0x8d/0xc0 [ 242.402883][ T1114] ? netlink_unicast+0x7d0/0x7d0 [ 242.407668][ T1114] sock_sendmsg+0xd7/0x130 [ 242.411984][ T1114] ____sys_sendmsg+0x753/0x880 [ 242.416672][ T1114] ? kernel_sendmsg+0x50/0x50 [ 242.421714][ T1114] ? __fget+0x35d/0x550 [ 242.425556][ T1114] ___sys_sendmsg+0x11d/0x1b0 [ 242.430251][ T1114] ? do_recvmmsg+0x7a0/0x7a0 [ 242.434976][ T1114] ? __kasan_check_read+0x11/0x20 [ 242.440012][ T1114] ? __fget+0x37f/0x550 [ 242.444174][ T1114] ? ksys_dup3+0x3e0/0x3e0 [ 242.448636][ T1114] ? __fget_light+0x1a9/0x230 [ 242.453261][ T1114] ? __fdget+0x1b/0x20 [ 242.457438][ T1114] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 242.463720][ T1114] __sys_sendmsg+0x105/0x1d0 [ 242.468359][ T1114] ? __sys_sendmsg_sock+0x1f0/0x1f0 [ 242.473606][ T1114] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 242.479047][ T1114] ? do_syscall_64+0x26/0x790 [ 242.484001][ T1114] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 242.490328][ T1114] ? do_syscall_64+0x26/0x790 [ 242.495137][ T1114] __x64_sys_sendmsg+0x78/0xb0 [ 242.499910][ T1114] do_syscall_64+0xfa/0x790 [ 242.504346][ T1114] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 242.510176][ T1114] RIP: 0033:0x45a759 [ 242.514075][ T1114] Code: Bad RIP value. [ 242.518143][ T1114] RSP: 002b:00007fd88e632c88 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 242.526404][ T1114] RAX: ffffffffffffffda RBX: 000000000071c248 RCX: 000000000045a759 [ 242.534404][ T1114] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000006 [ 242.542438][ T1114] RBP: 0000000000000003 R08: 0000000000000000 R09: 0000000000000000 [ 242.550411][ T1114] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd88e6336d4 [ 242.558532][ T1114] R13: 00000000004afe1e R14: 00000000006f3730 R15: 00000000ffffffff [ 242.566528][ T1114] [ 242.566528][ T1114] Showing all locks held in the system: [ 242.574111][ T1114] 3 locks held by kworker/1:0/18: [ 242.579144][ T1114] #0: ffff88802cc38128 ((wq_completion)events_power_efficient){+.+.}, at: process_one_work+0x88b/0x1740 [ 242.590271][ T1114] #1: ffff88802c53fdc0 ((reg_check_chans).work){+.+.}, at: process_one_work+0x8c1/0x1740 [ 242.600316][ T1114] #2: ffffffff8a094100 (rtnl_mutex){+.+.}, at: rtnl_lock+0x17/0x20 [ 242.608126][ T1114] 3 locks held by kworker/2:1/37: [ 242.613093][ T1114] #0: ffff8880757db928 ((wq_completion)ipv6_addrconf){+.+.}, at: process_one_work+0x88b/0x1740 [ 242.623620][ T1114] #1: ffff88802c0bfdc0 ((work_completion)(&(&ifa->dad_work)->work)){+.+.}, at: process_one_work+0x8c1/0x1740 [ 242.635105][ T1114] #2: ffffffff8a094100 (rtnl_mutex){+.+.}, at: rtnl_lock+0x17/0x20 [ 242.643446][ T1114] 1 lock held by khungtaskd/1114: [ 242.648407][ T1114] #0: ffffffff895a4080 (rcu_read_lock){....}, at: debug_show_all_locks+0x5f/0x279 [ 242.657876][ T1114] 3 locks held by kworker/2:2/3105: [ 242.663082][ T1114] #0: ffff88802cc27d28 ((wq_completion)events){+.+.}, at: process_one_work+0x88b/0x1740 [ 242.672955][ T1114] #1: ffff888025687dc0 (deferred_process_work){+.+.}, at: process_one_work+0x8c1/0x1740 [ 242.682939][ T1114] #2: ffffffff8a094100 (rtnl_mutex){+.+.}, at: rtnl_lock+0x17/0x20 [ 242.690964][ T1114] 3 locks held by kworker/2:3/3939: [ 242.696503][ T1114] #0: ffff88802cc27d28 ((wq_completion)events){+.+.}, at: process_one_work+0x88b/0x1740 [ 242.706713][ T1114] #1: ffff8880227afdc0 ((linkwatch_work).work){+.+.}, at: process_one_work+0x8c1/0x1740 [ 242.716853][ T1114] #2: ffffffff8a094100 (rtnl_mutex){+.+.}, at: rtnl_lock+0x17/0x20 [ 242.725052][ T1114] 3 locks held by rs:main Q:Reg/7834: [ 242.730528][ T1114] #0: ffff8880168916a0 (&f->f_pos_lock){+.+.}, at: __fdget_pos+0xee/0x110 [ 242.739161][ T1114] #1: ffff88802590e428 (sb_writers#4){.+.+}, at: vfs_write+0x485/0x5d0 [ 242.747736][ T1114] #2: ffff888013595448 (&sb->s_type->i_mutex_key#10){+.+.}, at: ext4_file_write_iter+0x220/0x13c0 [ 242.758730][ T1114] 1 lock held by rsyslogd/7836: [ 242.763589][ T1114] 2 locks held by getty/7960: [ 242.768158][ T1114] #0: ffff8880212b9090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 242.777237][ T1114] #1: ffffc900040022e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 [ 242.786566][ T1114] 2 locks held by getty/7961: [ 242.791141][ T1114] #0: ffff888021360090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 242.799971][ T1114] #1: ffffc900026fa2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 [ 242.809488][ T1114] 2 locks held by getty/7962: [ 242.814173][ T1114] #0: ffff88802aefe090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 242.823141][ T1114] #1: ffffc900040122e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 [ 242.832363][ T1114] 2 locks held by getty/7963: [ 242.836971][ T1114] #0: ffff88802a448090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 242.845796][ T1114] #1: ffffc900040162e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 [ 242.855481][ T1114] 2 locks held by getty/7964: [ 242.860080][ T1114] #0: ffff8880212f6090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 242.869120][ T1114] #1: ffffc9000401a2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 [ 242.878602][ T1114] 2 locks held by getty/7965: [ 242.883130][ T1114] #0: ffff888020201090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 242.892136][ T1114] #1: ffffc900026fe2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 [ 242.902172][ T1114] 2 locks held by getty/7966: [ 242.906942][ T1114] #0: ffff88802b348090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 242.916115][ T1114] #1: ffffc900026ea2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 [ 242.925547][ T1114] 2 locks held by kworker/1:3/8022: [ 242.930790][ T1114] #0: ffff88802cc38928 ((wq_completion)rcu_gp){+.+.}, at: process_one_work+0x88b/0x1740 [ 242.940481][ T1114] #1: ffff8880111bfdc0 ((work_completion)(&rew.rew_work)){+.+.}, at: process_one_work+0x8c1/0x1740 [ 242.950953][ T1114] 3 locks held by syz-executor.0/8293: [ 242.956398][ T1114] 2 locks held by syz-executor.0/8299: [ 242.961691][ T1114] #0: ffffffff8a094100 (rtnl_mutex){+.+.}, at: rtnetlink_rcv_msg+0x405/0xaf0 [ 242.970369][ T1114] #1: ffffffff895a7e38 (rcu_state.exp_mutex){+.+.}, at: synchronize_rcu_expedited+0x4d6/0x5f0 [ 242.981075][ T1114] 1 lock held by syz-executor.0/8301: [ 242.986502][ T1114] #0: ffffffff8a094100 (rtnl_mutex){+.+.}, at: rtnetlink_rcv_msg+0x405/0xaf0 [ 242.995126][ T1114] 1 lock held by syz-executor.0/8302: [ 243.000520][ T1114] #0: ffffffff8a094100 (rtnl_mutex){+.+.}, at: rtnetlink_rcv_msg+0x405/0xaf0 [ 243.009516][ T1114] [ 243.011960][ T1114] ============================================= [ 243.011960][ T1114] [ 243.020266][ T1114] NMI backtrace for cpu 0 [ 243.024549][ T1114] CPU: 0 PID: 1114 Comm: khungtaskd Not tainted 5.4.0-syzkaller #0 [ 243.032104][ T1114] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.12.0-59-gc9ba5276e321-prebuilt.qemu.org 04/01/2014 [ 243.034497][ T1114] Call Trace: [ 243.034497][ T1114] dump_stack+0x197/0x210 [ 243.034497][ T1114] nmi_cpu_backtrace.cold+0x70/0xb2 [ 243.034497][ T1114] ? vprintk_func+0x86/0x189 [ 243.034497][ T1114] ? lapic_can_unplug_cpu.cold+0x3a/0x3a [ 243.034497][ T1114] nmi_trigger_cpumask_backtrace+0x23b/0x28b [ 243.071526][ T1114] arch_trigger_cpumask_backtrace+0x14/0x20 [ 243.071526][ T1114] watchdog+0xb11/0x10c0 [ 243.071526][ T1114] kthread+0x361/0x430 [ 243.071526][ T1114] ? reset_hung_task_detector+0x30/0x30 [ 243.071526][ T1114] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 243.071526][ T1114] ret_from_fork+0x24/0x30 [ 243.103621][ T1114] Sending NMI from CPU 0 to CPUs 1-3: [ 243.109192][ C1] NMI backtrace for cpu 1 skipped: idling at native_safe_halt+0xe/0x10 [ 243.109204][ C2] NMI backtrace for cpu 2 skipped: idling at native_safe_halt+0xe/0x10 [ 243.110143][ C3] NMI backtrace for cpu 3 [ 243.110147][ C3] CPU: 3 PID: 8293 Comm: syz-executor.0 Not tainted 5.4.0-syzkaller #0 [ 243.110152][ C3] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.12.0-59-gc9ba5276e321-prebuilt.qemu.org 04/01/2014 [ 243.110155][ C3] RIP: 0010:native_write_msr+0x6/0x30 [ 243.110163][ C3] Code: d0 c3 0f 21 d8 c3 0f 21 f0 c3 0f 0b 0f 1f 84 00 00 00 00 00 0f 0b 0f 1f 40 00 66 2e 0f 1f 84 00 00 00 00 00 89 f9 89 f0 0f 30 <0f> 1f 44 00 00 c3 55 48 c1 e2 20 89 f6 48 89 e5 48 09 d6 31 d2 e8 [ 243.110166][ C3] RSP: 0018:ffff88802d5095d8 EFLAGS: 00000082 [ 243.110171][ C3] RAX: 0000000070ff2518 RBX: 0000000000000000 RCX: 00000000000006e0 [ 243.110174][ C3] RDX: 0000000000000073 RSI: 0000000070ff2518 RDI: 00000000000006e0 [ 243.110178][ C3] RBP: ffff88802d5095f0 R08: ffff8880213cc140 R09: ffff8880213cc9d0 [ 243.110181][ C3] R10: fffffbfff146dba0 R11: ffffffff8a36dd07 R12: ffff88802d5227c0 [ 243.110184][ C3] R13: 00000000000002bc R14: 0000000000000000 R15: 0000000000000000 [ 243.110188][ C3] FS: 00007fd88e6d8700(0000) GS:ffff88802d500000(0000) knlGS:0000000000000000 [ 243.110191][ C3] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 243.110194][ C3] CR2: ffffffffff600400 CR3: 000000006988c000 CR4: 00000000003406e0 [ 243.110198][ C3] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 243.110201][ C3] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 243.110203][ C3] Call Trace: [ 243.110205][ C3] [ 243.110207][ C3] ? lapic_next_deadline+0x4d/0x80 [ 243.110210][ C3] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 243.110212][ C3] clockevents_program_event+0x25c/0x370 [ 243.110215][ C3] tick_program_event+0xb4/0x130 [ 243.110217][ C3] hrtimer_interrupt+0x369/0x770 [ 243.110220][ C3] smp_apic_timer_interrupt+0x160/0x610 [ 243.110222][ C3] apic_timer_interrupt+0xf/0x20 [ 243.110224][ C3] RIP: 0010:stack_trace_save+0xd7/0xe0 [ 243.110232][ C3] Code: 45 90 48 c7 03 00 00 00 00 c7 43 08 00 00 00 00 48 8b 4d d8 65 48 33 0c 25 28 00 00 00 75 0d 48 83 ec 80 5b 41 5c 41 5d 41 5e <5d> c3 e8 42 d9 e1 ff 66 90 55 48 89 e5 41 57 41 56 41 55 41 89 d5 [ 243.110234][ C3] RSP: 0018:ffff88802d509808 EFLAGS: 00000287 ORIG_RAX: ffffffffffffff13 [ 243.110240][ C3] RAX: 000000000000001b RBX: ffff88802649cca0 RCX: 0000000000000000 [ 243.110243][ C3] RDX: dffffc0000000000 RSI: 0000000000000000 RDI: 0000000000000282 [ 243.110247][ C3] RBP: ffff88802d509808 R08: 0000000000000004 R09: ffff8880213cc9d0 [ 243.110250][ C3] R10: fffffbfff146dba0 R11: ffffffff8a36dd07 R12: 0000000000000a20 [ 243.110254][ C3] R13: ffff88802649cbc0 R14: 0000000000000000 R15: ffff88807aaea000 [ 243.110256][ C3] ? apic_timer_interrupt+0xa/0x20 [ 243.110258][ C3] save_stack+0x23/0x90 [ 243.110260][ C3] ? save_stack+0x23/0x90 [ 243.110263][ C3] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 243.110266][ C3] ? kasan_slab_alloc+0xf/0x20 [ 243.110268][ C3] ? kmem_cache_alloc_node+0x138/0x740 [ 243.110270][ C3] ? __alloc_skb+0xd5/0x5e0 [ 243.110273][ C3] ? ndisc_alloc_skb+0x13c/0x340 [ 243.110275][ C3] ? ndisc_send_rs+0x39b/0x720 [ 243.110278][ C3] ? addrconf_rs_timer+0x30f/0x6e0 [ 243.110280][ C3] ? call_timer_fn+0x1ac/0x780 [ 243.110283][ C3] ? run_timer_softirq+0x6c3/0x1790 [ 243.110285][ C3] ? __do_softirq+0x262/0x98c [ 243.110287][ C3] ? irq_exit+0x19b/0x1e0 [ 243.110290][ C3] ? smp_apic_timer_interrupt+0x1a3/0x610 [ 243.110292][ C3] ? apic_timer_interrupt+0xf/0x20 [ 243.110295][ C3] ? _raw_spin_unlock_irq+0x4f/0x80 [ 243.110297][ C3] ? finish_task_switch+0x147/0x750 [ 243.110299][ C3] ? __schedule+0x8e9/0x1f30 [ 243.110302][ C3] ? preempt_schedule_common+0x4f/0xe0 [ 243.110304][ C3] ? preempt_schedule+0x4b/0x60 [ 243.110307][ C3] ? ___preempt_schedule+0x16/0x18 [ 243.110309][ C3] ? smp_call_function_single+0x410/0x480 [ 243.110312][ C3] ? task_function_call+0xe9/0x180 [ 243.110314][ C3] ? perf_install_in_context+0x308/0x5a0 [ 243.110317][ C3] ? __do_sys_perf_event_open+0x1cbc/0x2c70 [ 243.110319][ C3] ? __x64_sys_perf_event_open+0xbe/0x150 [ 243.110322][ C3] ? do_syscall_64+0xfa/0x790 [ 243.110325][ C3] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 243.110327][ C3] ? find_held_lock+0x35/0x130 [ 243.110329][ C3] ? debug_object_activate+0x201/0x470 [ 243.110332][ C3] ? __kasan_check_read+0x11/0x20 [ 243.110334][ C3] ? mark_lock+0xc2/0x1220 [ 243.110336][ C3] ? should_fail+0x1de/0x852 [ 243.110338][ C3] ? mark_held_locks+0xa4/0xf0 [ 243.110341][ C3] ? mark_lock+0xc2/0x1220 [ 243.110343][ C3] ? kmem_cache_alloc_node+0x22e/0x740 [ 243.110345][ C3] ? __alloc_skb+0xd5/0x5e0 [ 243.110348][ C3] ? kmem_cache_alloc_node+0x22e/0x740 [ 243.110350][ C3] ? kasan_unpoison_shadow+0x35/0x50 [ 243.110353][ C3] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 243.110355][ C3] kasan_slab_alloc+0xf/0x20 [ 243.110358][ C3] kmem_cache_alloc_node+0x138/0x740 [ 243.110360][ C3] ? ipv6_get_lladdr+0x308/0x490 [ 243.110362][ C3] __alloc_skb+0xd5/0x5e0 [ 243.110365][ C3] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 243.110367][ C3] ? __kasan_check_read+0x11/0x20 [ 243.110369][ C3] ndisc_alloc_skb+0x13c/0x340 [ 243.110372][ C3] ndisc_send_rs+0x39b/0x720 [ 243.110374][ C3] addrconf_rs_timer+0x30f/0x6e0 [ 243.110376][ C3] ? ipv6_get_lladdr+0x490/0x490 [ 243.110379][ C3] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 243.110381][ C3] call_timer_fn+0x1ac/0x780 [ 243.110383][ C3] ? ipv6_get_lladdr+0x490/0x490 [ 243.110386][ C3] ? msleep_interruptible+0x150/0x150 [ 243.110388][ C3] ? run_timer_softirq+0x6b1/0x1790 [ 243.110391][ C3] ? trace_hardirqs_on+0x67/0x240 [ 243.110393][ C3] ? ipv6_get_lladdr+0x490/0x490 [ 243.110395][ C3] ? ipv6_get_lladdr+0x490/0x490 [ 243.110398][ C3] run_timer_softirq+0x6c3/0x1790 [ 243.110400][ C3] ? add_timer+0x930/0x930 [ 243.110403][ C3] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 243.110405][ C3] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 243.110408][ C3] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 243.110410][ C3] __do_softirq+0x262/0x98c [ 243.110412][ C3] ? sched_clock_cpu+0x14e/0x1b0 [ 243.110415][ C3] irq_exit+0x19b/0x1e0 [ 243.110417][ C3] smp_apic_timer_interrupt+0x1a3/0x610 [ 243.110419][ C3] apic_timer_interrupt+0xf/0x20 [ 243.110421][ C3] [ 243.110424][ C3] RIP: 0010:_raw_spin_unlock_irq+0x4f/0x80 [ 243.110431][ C3] Code: c0 68 34 53 89 48 ba 00 00 00 00 00 fc ff df 48 c1 e8 03 80 3c 10 00 75 33 48 83 3d 12 2a 99 01 00 74 20 fb 66 0f 1f 44 00 00 01 00 00 00 e8 e7 6b 96 f9 65 8b 05 18 14 48 78 85 c0 74 06 41 [ 243.110434][ C3] RSP: 0018:ffff888070e9f8d8 EFLAGS: 00000286 ORIG_RAX: ffffffffffffff13 [ 243.110440][ C3] RAX: 1ffffffff12a668d RBX: ffff8880213cc140 RCX: 0000000000000006 [ 243.110443][ C3] RDX: dffffc0000000000 RSI: 0000000000000008 RDI: ffff8880213cc9d4 [ 243.110447][ C3] RBP: ffff888070e9f8e0 R08: 1ffffffff15d29b8 R09: fffffbfff15d29b9 [ 243.110450][ C3] R10: fffffbfff15d29b8 R11: ffffffff8ae94dc7 R12: ffff88802d537380 [ 243.110453][ C3] R13: ffff88802c4d0400 R14: ffff88801cc67700 R15: 0000000000000000 [ 243.110456][ C3] ? _raw_spin_unlock_irq+0x23/0x80 [ 243.110458][ C3] finish_task_switch+0x147/0x750 [ 243.110461][ C3] ? finish_task_switch+0x119/0x750 [ 243.110463][ C3] __schedule+0x8e9/0x1f30 [ 243.110465][ C3] ? __sched_text_start+0x8/0x8 [ 243.110468][ C3] ? __this_cpu_preempt_check+0x35/0x190 [ 243.110470][ C3] ? retint_kernel+0x2b/0x2b [ 243.110473][ C3] ? perf_duration_warn+0x40/0x40 [ 243.110475][ C3] ? preempt_schedule+0x4b/0x60 [ 243.110477][ C3] preempt_schedule_common+0x4f/0xe0 [ 243.110480][ C3] ? __perf_event_enable+0x930/0x930 [ 243.110482][ C3] preempt_schedule+0x4b/0x60 [ 243.110484][ C3] ___preempt_schedule+0x16/0x18 [ 243.110487][ C3] ? smp_call_function_single+0x40b/0x480 [ 243.110490][ C3] smp_call_function_single+0x410/0x480 [ 243.110492][ C3] ? perf_duration_warn+0x40/0x40 [ 243.110494][ C3] ? generic_exec_single+0x4c0/0x4c0 [ 243.110497][ C3] ? __do_sys_perf_event_open+0x174c/0x2c70 [ 243.110499][ C3] ? __perf_event_enable+0x930/0x930 [ 243.110502][ C3] task_function_call+0xe9/0x180 [ 243.110505][ C3] ? perf_event_addr_filters_exec+0x310/0x310 [ 243.110507][ C3] ? __do_sys_perf_event_open+0x174c/0x2c70 [ 243.110510][ C3] ? __perf_event_enable+0x930/0x930 [ 243.110512][ C3] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 243.110515][ C3] ? exclusive_event_installable+0x257/0x320 [ 243.110518][ C3] perf_install_in_context+0x308/0x5a0 [ 243.110520][ C3] ? list_add_event+0xed0/0xed0 [ 243.110523][ C3] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 243.110526][ C3] ? __perf_event_header_size.isra.0+0x166/0x1c0 [ 243.110528][ C3] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 243.110531][ C3] __do_sys_perf_event_open+0x1cbc/0x2c70 [ 243.110533][ C3] ? perf_event_set_output+0x4e0/0x4e0 [ 243.110536][ C3] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 243.110538][ C3] ? put_timespec64+0xda/0x140 [ 243.110541][ C3] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 243.110543][ C3] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 243.110546][ C3] ? do_syscall_64+0x26/0x790 [ 243.110548][ C3] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 243.110551][ C3] ? do_syscall_64+0x26/0x790 [ 243.110553][ C3] __x64_sys_perf_event_open+0xbe/0x150 [ 243.110555][ C3] do_syscall_64+0xfa/0x790 [ 243.110558][ C3] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 243.110560][ C3] RIP: 0033:0x45a759 [ 243.110567][ C3] Code: bd b1 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 8b b1 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 243.110570][ C3] RSP: 002b:00007fd88e6d7c88 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 243.110576][ C3] RAX: ffffffffffffffda RBX: 000000000071bf00 RCX: 000000000045a759 [ 243.110580][ C3] RDX: ffffffffffffffff RSI: 0000000000000000 RDI: 0000000020000040 [ 243.110585][ C3] RBP: 0000000000000005 R08: 0000000000000000 R09: 0000000000000000 [ 243.110590][ C3] R10: ffffffffffffffff R11: 0000000000000246 R12: 00007fd88e6d86d4 [ 243.110655][ C3] R13: 00000000004aec2b R14: 00000000006f1ca8 R15: 00000000ffffffff [ 243.111557][ T1114] Kernel panic - not syncing: hung_task: blocked tasks [ 243.121372][ T1114] CPU: 0 PID: 1114 Comm: khungtaskd Not tainted 5.4.0-syzkaller #0 [ 243.121372][ T1114] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.12.0-59-gc9ba5276e321-prebuilt.qemu.org 04/01/2014 [ 243.121372][ T1114] Call Trace: [ 243.121372][ T1114] dump_stack+0x197/0x210 [ 243.121372][ T1114] panic+0x2e3/0x75c [ 243.121372][ T1114] ? add_taint.cold+0x16/0x16 [ 243.121372][ T1114] ? lapic_can_unplug_cpu.cold+0x3a/0x3a [ 243.121372][ T1114] ? ___preempt_schedule+0x16/0x18 [ 243.121372][ T1114] ? nmi_trigger_cpumask_backtrace+0x21b/0x28b [ 243.121372][ T1114] ? nmi_trigger_cpumask_backtrace+0x24c/0x28b [ 243.121372][ T1114] ? nmi_trigger_cpumask_backtrace+0x256/0x28b [ 243.121372][ T1114] ? nmi_trigger_cpumask_backtrace+0x21b/0x28b [ 243.121372][ T1114] watchdog+0xb22/0x10c0 [ 243.121372][ T1114] kthread+0x361/0x430 [ 243.121372][ T1114] ? reset_hung_task_detector+0x30/0x30 [ 243.121372][ T1114] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 243.121372][ T1114] ret_from_fork+0x24/0x30 [ 243.121372][ T1114] Kernel Offset: disabled [ 243.121372][ T1114] Rebooting in 86400 seconds..