last executing test programs: 14.0917991s ago: executing program 0 (id=4982): timer_create(0x7, &(0x7f00000001c0)={0x0, 0x1a, 0x1, @thr={&(0x7f0000000000)="f73004fe6be1bd668e9d5031f73cd4c9c604ffab6c38660acbbecb78b7bdde1f5b8c4cd7c612bd699e15058aa648457260fbaf69ca89c489c8bcd34d5901ad44f8c46dca26c9f431d0f5e9a94c6649dfdcbd6351b91e9f43d25e3be416bb0558901c11d2d4ae0c2c6a144b6a96c61b62f5ce61e9006e97e0e84d7cd451150ff49fc3c6807303a1ae53d02938bd622a4a3e14e6d6683210b079c0a5d1a21c45d7c5e79249ec45f3290465e6efe3ec63d14aa8de80b385fd", &(0x7f00000000c0)="b27b55601cb40b05a95f22350decf54b55eb09839f0e1e0234aa5d9c31e032022b44a8a380887be6a429d9c9e8c723167a27a4fadc23b8f54ae5434b0089f5a1b77cb060b6211b27148517645152c29576df072f1bcc948580b943961850e8978ef5eeb7822d0a7aa66a1f28a0608a19a2703a8af23c62b6015a13a8b16079ea0aca58724ac8eb213d6b9f3309a3387752dc1abe2c5affd40d4d64227077ee8ee87684a5d4ea0ddf5dc86cf167bf79dfd0a1905e57961b4ab5df5f292521fef2f7d64361433220247a5b537cbe31f8c76356ffb961d24124a7f0aa051779e5c5d76bc04490398181fe8f985de211d2aeac0ff6139e"}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000240)={{0x77359400}}, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) timerfd_gettime(r1, &(0x7f00000002c0)) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f0000000300)=""/189) ioctl$DRM_IOCTL_SET_MASTER(r1, 0x641e) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f00000003c0)) ioctl$SNDRV_PCM_IOCTL_DELAY(r1, 0x80084121, &(0x7f0000000400)) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f0000000440)=""/220) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e20, @local}}, 0x200, 0x9}, &(0x7f0000000600)=0x90) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000640)={r2, 0x4}, &(0x7f0000000680)=0x8) fsetxattr(r1, &(0x7f00000006c0)=@random={'btrfs.', '/dev/vcsa\x00'}, &(0x7f0000000700)='/dev/vcsa\x00', 0xa, 0x3) socket$inet6(0xa, 0x800, 0xd6) ioctl$PIO_FONTRESET(r1, 0x4b6d, 0x0) pipe2(&(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}, 0x10000) pipe2(&(0x7f0000000780)={0xffffffffffffffff}, 0x880) timer_create(0x4, &(0x7f0000001880)={0x0, 0x27, 0x0, @thr={&(0x7f00000007c0)="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", &(0x7f00000017c0)="ec0e3768d239c97642260467e74b3058a7d7db0b362b7ed1480e91eaa6a1bcc9ed9c9c5cc1fb874e7b9d9c28a0aa9b64e0fef66944094ba3139e6e2c52dd10e55c04eacb432bf99815271236820f411b58691c48724b972cb69b83c6726f8293911013040290bf715f9dbfa8d83600578f1284ac3f6d6775762e9050f5216ff458ef08591d87efb5fd78c64f6b136f0c3c693d"}}, &(0x7f00000018c0)=0x0) timer_settime(r6, 0x0, &(0x7f0000001900)={{0x77359400}, {0x0, 0x989680}}, &(0x7f0000001940)) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000001980)=[@in6={0xa, 0x4e20, 0x7fffffff, @remote, 0x2}], 0x1c) sendmsg$kcm(r3, &(0x7f00000031c0)={&(0x7f00000019c0)=@hci={0x1f, 0x3, 0x1}, 0x80, &(0x7f0000003000)=[{&(0x7f0000001a40)="e28fe3436976964fb59836c9465136b74a2277ce052f91558b7898f397604019ef75987caaae48df65b9759a0b343ed5cce0b55cb4433493f03caec23b0c9b520e434a727c848272001232eefeef98d3ad98abf1db4c664a85f9daa944f81844d9b22c934033d7dafbfce62332be4ddb4bf910bd58235d3b8fb27309d069216c61", 0x81}, {&(0x7f0000001b00)="4c242ead95b574603cf32a5ad9fef8f4c604a7ffeb5e73ae998444cc4b23d426e6386f42074a131d46ea05647faa416d56aa1890fd814d11cdf5bae8097d4f591d74bd03809ddda98e224555a8c28b7d9c049b405b14e381e0c02c14412596967f721a12ca8f6878472e967d4d0d05d8731986704724c68e64780f95ddf2f708017c18bbd600fe4546330727", 0x8c}, {&(0x7f0000001bc0)="7396e191e71a25be57ef0de221a4cc5edfcc63007cd011b58838fa16ab3c09ae0540e1105f0909f0578db6a49c67945acb3d7b0ad48aac935d85891b09d2bafbcb0f4014561934e30e442e0fd2e7ae4d34d93559516dcab4552f18c954fba9a240b5427bd4cdb2bd8b6755e2e0c75931799092ecd37eb5b6daf01c9a7914387d5ec377a300f6a4475e06deb0f3", 0x8d}, {&(0x7f0000001c80)="54b5c28cf67a89fa9c4f4320a8ac491a3e6bef831255a6b93f6f23faeac084940db181a3b1a525938393dc36d641739997cb690ce9ba1b20a31bfea4d8e6b8d68f802cc40d9ff8d48b5917c183a453aa43d6edda9088f920b86d689d8bd53d165ef6fa083b6ebfeb15fa78e81cd1462f15b531063b43dff5243a4e28d93337e62079cec4b10a0ec2160a73afd5133760a8b56c27de47431ade77", 0x9a}, {&(0x7f0000001d40)="3df735acb834e85b24439bcd588ef1df46f124b74b9bd812644da4e3e8930afe99b5fd6442a590caee4ffe2a5f7ae65af45f7d53636b8ae5ca05be4bb66f32b9c993254deffd22e08e424cc9bfa52bafc17db5e5bcc525dd102c78f2e78b", 0x5e}, {&(0x7f0000001dc0)="5fabfae346eaa3122892454d9eb15d8cf36775a11c0d11ef54323f946787f95bd9dd5a7142c97f0f3cc9ebfebcfe46e4d142ec310ebd3263192e64edb549977895ffe6bcf916a19f2e7b5d9646587ed7dfac9d94282baf6c13a76d0f9de30ca7797a907b452fe2da9b1666a373cd1d3517ab6c090f8a06bdbbd1b80bb461f29921a04d89733587d9208884477fa3d09cbeb58224150e1fc6ed8fa2d73687f0fba9cde01bd07ff26eafbc610c0ecf336c42d0a8c53fa4307fead2004667", 0xbd}, {&(0x7f0000001e80)="3ef926346456af126393ea17f0bb755227289446d38dabf0ada6ee37419c8a26533e4ab663e85af7808df645cd1a6ec27899662e005d2ce97e9ada7f644293431b48f261c799b089a38afd7b03954063b92abb3bf79c03d8f636d7745c70990cda2741abfb6e7adca4aa62575ebb83a3fd19939ded169631ccc73141e19dc59f164ad37f1de13ce81af31e80872f5dd0f5f4c35d5ffa0d46e68c823c473aa0f47234625f201ea53867aff6b12f468f56c1b7e580fe58858894db85899e5e8ea1ca255ceeadc02f2b513f6495418aa36532", 0xd1}, {&(0x7f0000001f80)="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", 0x1000}, {&(0x7f0000002f80)="822c05396cf6142f915159d31b8a146039cd1378f948b08b284a114e25a06deca13df26d7b2ae1e4fbad15cee72471cce0e669e326008d94298ab7ee69b8fffe613f995c07ed91b8abe8cd5d780a50a576a0b9b2ecb4f6fb017463b2a0020f4b1ff92dda2a051263382985ee5f3e50c90ccdaa73b2d2882b", 0x78}], 0x9, &(0x7f00000030c0)=[{0x50, 0x116, 0x5, "f2243bb5a0b1c0f41c825c14c9dcc9b98618d8d96e12de184aa9a000a9392ff5a074148996ec208c3f8cd2693ed4060ddc7d07c6a136f39506289ebd"}, {0x20, 0x10d, 0x9cc8, "2b6764d82ea78a509c3bb4e637b2e2"}, {0x60, 0x3a, 0x2896, "77c7577a8faf8b0b2f4ab0bfa67ae0258d4dc320ac21c44b998861c455aa281220b00e35d2220139334d2115e8afa943c9814bca5f90085bf48659940ec4aec53258e998d1e1484c0556"}], 0xd0}, 0x20000080) timer_create(0x1, &(0x7f0000003200)={0x0, 0x2d, 0x4}, &(0x7f0000003240)=0x0) timer_getoverrun(r7) fcntl$F_GET_RW_HINT(r1, 0x40b, &(0x7f0000003280)) openat$full(0xffffffffffffff9c, &(0x7f00000032c0), 0x900, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000003300)=@assoc_value={r2, 0x15}, &(0x7f0000003340)=0x8) timer_gettime(r6, &(0x7f0000003380)) timer_settime(r7, 0x0, &(0x7f00000033c0)={{0x0, 0x3938700}}, &(0x7f0000003400)) r8 = openat$procfs(0xffffffffffffff9c, &(0x7f0000003440)='/proc/mdstat\x00', 0x0, 0x0) dup3(r5, r8, 0x80000) 13.187673398s ago: executing program 0 (id=4985): r0 = memfd_secret(0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(0xffffffffffffffff, 0xc06864a1, &(0x7f0000000040)={&(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, 0x0}) (async) ioctl$DRM_IOCTL_MODE_GET_LEASE(0xffffffffffffffff, 0xc01064c8, &(0x7f0000000100)={0x5, 0x0, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0]}) (async) ioctl$DRM_IOCTL_MODE_OBJ_GETPROPERTIES(0xffffffffffffffff, 0xc02064b9, &(0x7f00000001c0)={&(0x7f0000000140)=[0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0], 0x1, 0x0, 0xfbfbfbfb}) (async) ioctl$DRM_IOCTL_MODE_GET_LEASE(0xffffffffffffffff, 0xc01064c8, &(0x7f0000000240)={0x3, 0x0, &(0x7f0000000200)=[0x0, 0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f00000002c0)={&(0x7f0000000280)=[r1, r2, r3, r4], 0x4, 0x80000, 0x0, 0xffffffffffffffff}) (async) ioctl$KDSIGACCEPT(r0, 0x4b4e, 0x36) (async) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000300)={0x3536, 0x702, 0x800e, 0x0, 0x10000, 0x1ff80000, 0x9, 0x2, 0x0}, &(0x7f0000000340)=0x20) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000380)={r6, 0x3ff}, &(0x7f00000003c0)=0x8) (async) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000400)={0x6, 0x8001}) (async) ioctl$FBIOGET_FSCREENINFO(r0, 0x4602, &(0x7f0000000440)) (async) r8 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r8, 0x84, 0x71, &(0x7f00000004c0)={r7, 0x5}, &(0x7f0000000500)=0x8) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000540)=0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000580)={{{@in=@multicast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f0000000680)=0xe8) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f00000006c0)={0x1, 0xb1e, {r9}, {r10}, 0x7, 0xfffffffffffffffe}) r12 = socket$nl_generic(0x10, 0x3, 0x10) r13 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreq(r13, 0x0, 0x23, &(0x7f0000000700)={@private=0xa010100, @remote}, 0x8) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000740), 0x8100, 0x0) (async) setpriority(0x2, r9, 0x2) (async) pipe2$watch_queue(&(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (async) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000007c0)={r6, 0x200, 0x2}, &(0x7f0000000800)=0x8) (async) r15 = socket(0xa, 0xa, 0x7) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0xffff) (async) quotactl$Q_GETINFO(0xffffffff80000500, &(0x7f0000000840)=@md0, r11, &(0x7f0000000880)) (async) r16 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000900), r15) ioctl$sock_SIOCGIFINDEX_80211(r12, 0x8933, &(0x7f0000000940)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_NEW_INTERFACE(r5, &(0x7f0000000a80)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000a40)={&(0x7f0000000980)={0xb4, r16, 0x22, 0x70bd29, 0x25dfdbfe, {{}, {@void, @val={0x8, 0x3, r17}, @void}}, [@mon_options=[@NL80211_ATTR_MNTR_FLAGS={0x18, 0x17, 0x0, 0x1, [@NL80211_MNTR_FLAG_COOK_FRAMES={0x4}, @NL80211_MNTR_FLAG_CONTROL={0x4}, @NL80211_MNTR_FLAG_CONTROL={0x4}, @NL80211_MNTR_FLAG_FCSFAIL={0x4}, @NL80211_MNTR_FLAG_FCSFAIL={0x4}]}, @NL80211_ATTR_MU_MIMO_GROUP_DATA={0x1c, 0xe7, "3da2015ff66a7460651a660ec11a0740e3adcdaa8f5d2c66"}, @NL80211_ATTR_MU_MIMO_GROUP_DATA={0x1c, 0xe7, "a54f6ef285671fe3f7e3934256394ae75955085c14be212a"}], @mon_options=[@NL80211_ATTR_MNTR_FLAGS={0x10, 0x17, 0x0, 0x1, [@NL80211_MNTR_FLAG_PLCPFAIL={0x4}, @NL80211_MNTR_FLAG_FCSFAIL={0x4}, @NL80211_MNTR_FLAG_FCSFAIL={0x4}]}], @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_MESH_ID={0xa}, @mon_options=[@NL80211_ATTR_MU_MIMO_FOLLOW_MAC_ADDR={0xa, 0xe8, @device_b}, @NL80211_ATTR_MU_MIMO_GROUP_DATA={0x1c, 0xe7, "863b1deb98f852352fe66d0ac70879a3535e0f98358c2d5b"}]]}, 0xb4}, 0x1, 0x0, 0x0, 0x4}, 0x24040000) (async) ioctl$LOOP_GET_STATUS(r14, 0x4c03, &(0x7f0000000ac0)) 11.69027233s ago: executing program 0 (id=4987): r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_RATE_SET(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000003b4d27"], 0x14}}, 0x0) recvmsg(r1, &(0x7f0000000040)={&(0x7f0000000980)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, 0x0}, 0x0) r3 = dup3(r1, r2, 0x0) sendmsg$AUDIT_TRIM(r2, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x4001, 0x8000000, 0x238, 0xf8, 0x720d, 0x148, 0xf8, 0x148, 0x1c8, 0x240, 0x240, 0x1c8, 0x240, 0x7fffffe, 0x0, {[{{@ip={@remote, @empty, 0x0, 0x0, 'wlan1\x00', 'ip6erspan0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @dev}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x298) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000003d80)=[{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000640)="dd47481d499c9c029c7453bc5a64130291ebe1ff660fac57aabcde2e85e9a609f2f163b014ae08836fa0c3cb87d0cfca227d7da9f3d622888a8090984981609e6bf846661b", 0x45}, {&(0x7f00000006c0)="d42a60383ba9ab0f5b99a306e986e3d367c4600aeb35b354d074588b35f9af4dabffc112193fc2ffa1cfac924f3f9079f6475983cad9d1155baebd", 0x3b}], 0x2, 0x0, 0x0, 0x4000044}, {0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000800)="ec441753db98daec8ab19516af831e0e94085d26a1a14cebf413afb54557e023708097943b2a5f7c8c7c9968fb88e405eaa13fe02ae9ee6ef80c576fbb552d4296588f", 0x43}, {&(0x7f0000000880)="5c8d5aae4ae69f8674dde23aa80d39fdceaff7f262c15180ac360cbff497ce81dcb57ab74fcd98cf56ca61f5f1a009446515ec6d411a4275fe898f2b", 0x3c}, {0x0}, {&(0x7f0000000940)}], 0x4, 0x0, 0x0, 0x8}, {0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000a80)="1bec6166502bcde987872276d8220f40add10f81d726e46643f5bf11a3829c0321752135a8fb32b3b11f93625162c139a43337cdf379bf629d029d029e05803b451c51df3d9047717ef885c8b5280f", 0x4f}], 0x1, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x250, 0x4}, {0x0, 0x0, &(0x7f0000000f00)=[{0x0}, {&(0x7f0000000ec0)="5f890d4248360786ff248971ee9ee9a2ebe7f1d06938f2340949a335373ec8dd78a978", 0x23}], 0x2, &(0x7f0000000f40)=[@op={0x18}, @assoc={0x18, 0x117, 0x4, 0x8}, @assoc={0x18, 0x117, 0x4, 0x8}, @assoc={0x18, 0x117, 0x4, 0x3ddd}, @op={0x18, 0x117, 0x3, 0x1}], 0x78, 0x8000}, {0x0, 0x0, &(0x7f0000002440)=[{&(0x7f00000010c0)="c4f9ba87b7f35da7ca4071f04417511fa060ad774f6561fece1f92b9c1f83f984d1783934cea7d152fcd9b8f761994ebbb18f217ca65f0dd92eef2fb4d39d93f32c942507e9f8b4c8d705a2687717b03075b853548496eb5ccf53a48d466300d0dc2ee54217255d4763ea4eb8e58e50d7fd37f4661aa04bd59fef660fb", 0x7d}, {&(0x7f0000001180)="b53aa97f2f14bf9dc9913bdd35c6e78d4e94cf3cab3b88ba56795f32d79eee041e3db729dda27d9996ca6acddb85540b56b3559c0c3483c2130d763e10c72cc3135d1c171904d3c1af649848c48224d4a5c1abbbd76bc96e252cfab3aa1685607623679f6b07712b54ecf932499053058a6382e4008bb0485dbd30d6dbad5c916f9deaa50cda74b100e4b0e36ccf92a68e7bf81720f1654705493e4834db15d80c7240548bb334a554b2e3ff2b8b44eef0732d0b9124cadd8094071bc58b830db7be4e7c088f820f46b8c866", 0xcc}, {&(0x7f0000001280)="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", 0xed0}, {0x0}, {&(0x7f0000002380)="ccd1066f23cb9d496894308d09ba589cd88d3b03ddb654474c50ca15af337ed5b25baf65fbbbfd8bad3bbbb6a28d1baeccf98c8a2e8313c532c67c32a3d85ad871e481930e1c0d53115906ef4e4517d7b9477029f46e75ecd6dc301c851c42d6ab", 0x61}], 0x5, 0x0, 0x0, 0x4000c10}, {0x0, 0x0, &(0x7f0000002500)=[{&(0x7f00000024c0)}], 0x1, &(0x7f0000002540)=[@op={0x18, 0x117, 0x3, 0x1}, @op={0x18}], 0x30, 0x200400c0}, {0x0, 0x0, &(0x7f0000003a80), 0x0, &(0x7f0000003b00), 0x0, 0x4040891}], 0x7, 0x20040000) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, 0x0}, 0x801) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-arm64-ce\x00'}, 0x58) r5 = fsmount(r3, 0x1, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f00000005c0)={'syztnl0\x00', 0x0, 0x2f, 0x5, 0x3, 0x2, 0x8, @private2={0xfc, 0x2, '\x00', 0x1}, @remote, 0x8000, 0x10, 0x5, 0x7}}) bind$can_j1939(r5, &(0x7f00000002c0)={0x1d, r6, 0x0, {0x1, 0x1}}, 0x18) accept4$vsock_stream(r4, 0x0, 0x0, 0x0) close(0xffffffffffffffff) 4.049564195s ago: executing program 0 (id=4993): prctl$PR_MCE_KILL(0x21, 0x1, 0x1) prctl$PR_MCE_KILL(0x21, 0x1, 0x0) prctl$PR_MCE_KILL(0x21, 0x0, 0x1) prctl$PR_MCE_KILL(0x21, 0x1, 0x0) prctl$PR_MCE_KILL(0x21, 0x0, 0x1) prctl$PR_MCE_KILL(0x21, 0x0, 0x0) prctl$PR_MCE_KILL(0x21, 0x1, 0x0) prctl$PR_MCE_KILL(0x21, 0x1, 0x2) prctl$PR_MCE_KILL(0x21, 0x0, 0x1) prctl$PR_MCE_KILL(0x21, 0x1, 0x0) prctl$PR_MCE_KILL(0x21, 0x0, 0x2) prctl$PR_MCE_KILL(0x21, 0x1, 0x0) prctl$PR_MCE_KILL(0x21, 0x0, 0x2) prctl$PR_MCE_KILL(0x21, 0x0, 0x0) prctl$PR_MCE_KILL(0x21, 0x1, 0x2) prctl$PR_MCE_KILL(0x21, 0x1, 0x0) prctl$PR_MCE_KILL(0x21, 0x1, 0x1) prctl$PR_MCE_KILL(0x21, 0x1, 0x1) prctl$PR_MCE_KILL(0x21, 0x0, 0x0) prctl$PR_MCE_KILL(0x21, 0x1, 0x0) prctl$PR_MCE_KILL(0x21, 0x1, 0x1) prctl$PR_MCE_KILL(0x21, 0x1, 0x2) prctl$PR_MCE_KILL(0x21, 0x1, 0x0) prctl$PR_MCE_KILL(0x21, 0x1, 0x0) prctl$PR_MCE_KILL(0x21, 0x1, 0x2) prctl$PR_MCE_KILL(0x21, 0x0, 0x0) prctl$PR_MCE_KILL(0x21, 0x1, 0x2) prctl$PR_MCE_KILL(0x21, 0x0, 0x2) prctl$PR_MCE_KILL(0x21, 0x0, 0x1) prctl$PR_MCE_KILL(0x21, 0x0, 0x3) 3.739220258s ago: executing program 0 (id=4995): r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002300)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r3, &(0x7f0000002440)={0x0, 0x0, &(0x7f0000002400)={0x0}}, 0x0) ioctl$SIOCGSKNS(r1, 0x5450, 0x0) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x0, &(0x7f0000000040)=0x108, 0x4) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r0, 0x5450, 0x0) 3.305405021s ago: executing program 0 (id=4997): timer_settime(0x0, 0x1, &(0x7f0000000000)={{}, {0x77359400}}, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'syztnl0\x00', &(0x7f0000000080)={'ip6_vti0\x00', r1, 0x2f, 0x0, 0x8e, 0xfd7, 0x52, @mcast1, @empty, 0x700, 0x700, 0xffff, 0x6}}) syz_usb_connect(0x3, 0x562, &(0x7f0000000140)={{0x12, 0x1, 0x300, 0x3c, 0x3b, 0xa8, 0x20, 0x424, 0xcf30, 0xcff0, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x550, 0x1, 0x2, 0x7, 0x90, 0x75, [{{0x9, 0x4, 0xf0, 0x39, 0xc, 0xb5, 0x9d, 0x1f, 0xe, [@uac_control={{0xa, 0x24, 0x1, 0x5, 0x8}, [@extension_unit={0x7, 0x24, 0x8, 0x2, 0x4, 0x2}, @extension_unit={0x9, 0x24, 0x8, 0x3, 0x120e, 0x0, "d288"}, @output_terminal={0x9, 0x24, 0x3, 0x5, 0x302, 0x6, 0x2, 0x5}, @mixer_unit={0x9, 0x24, 0x4, 0x6, 0x1, "218e2ee9"}]}, @cdc_ncm={{0x7, 0x24, 0x6, 0x0, 0x1, "21e4"}, {0x5, 0x24, 0x0, 0x3}, {0xd, 0x24, 0xf, 0x1, 0x0, 0x1, 0x2, 0x8}, {0x6, 0x24, 0x1a, 0x4, 0x12}}], [{{0x9, 0x5, 0x4, 0x0, 0x200, 0x0, 0x5, 0xf7, [@generic={0x8f, 0x9, "3aa74ae17aa4e0baaa9b1fecb76347ba0778126685a8dcf18143e25c1498c47e35aa18d88059425efb37a750c8e5c675e7e94e12eeb5bbefde148860c5864f2917a3239f684bc758a5a8260c6ad8dbee39289ee340a5c4f32eea13b98c95bbb6be18aad3dc6e664f89381025755fc1e8643a8d97be3912c24ed2b419dea242ca9fe62ca9cbf96457bb7f6ce1d6"}]}}, {{0x9, 0x5, 0xb, 0x0, 0x200, 0x29, 0x12, 0x9, [@uac_iso={0x7, 0x25, 0x1, 0x2, 0xf8, 0x1}]}}, {{0x9, 0x5, 0x0, 0x3, 0x8, 0x5, 0x4, 0x0, [@uac_iso={0x7, 0x25, 0x1, 0x0, 0xe}, @generic={0x70, 0x21, "15412cb321b2f03cb3acf2bd9c4633cb01e48e2126006a2e304dbb9f1344b2ddff3af0c0c60a70095c6b861d9e66a342f95b4943a5425b84b8c4224f51697891da4f2b9211c0a89ea3c0aefb121340d83bc2094ffb68d2fdb5b882d3eb5a4a6436defe978352212e319a310e9954"}]}}, {{0x9, 0x5, 0x9, 0x1, 0x20, 0x22, 0x9b, 0x4, [@generic={0x30, 0xf, "1fea84d76e4ee693d22011f86900638354b1294fefea2797608f126320a5d186a1c458a775a04d24e7d337a4e3c7"}]}}, {{0x9, 0x5, 0x6, 0x0, 0x40, 0x80, 0x4, 0x6, [@uac_iso={0x7, 0x25, 0x1, 0x82, 0x3, 0x3}]}}, {{0x9, 0x5, 0x2, 0x10, 0x40, 0x3f, 0x5, 0x7, [@uac_iso={0x7, 0x25, 0x1, 0x40, 0x4, 0x40}, @generic={0x51, 0xb, "cbf5ed64f98555194c7d4acac68da2c145503d6d6fb39e6c581f759f82b310201d6ae4492be9a25cf4bb7d1c7db3eb1a548960fd73894bfec0cf0c13d07fda66af35c6f51866b9b22d635ca7b0cce3"}]}}, {{0x9, 0x5, 0x6, 0x4, 0x10, 0x6, 0x4, 0x9}}, {{0x9, 0x5, 0xb, 0x0, 0x40, 0x4, 0x9, 0x80, [@generic={0x2d, 0x22, "38bcd6efd44b85e05f1e5ffd6b6ac472013dc576796e82ad9e1baec6b8806555f0932badafc14f9f1a8b11"}]}}, {{0x9, 0x5, 0x7, 0x10, 0x10, 0x10, 0xfb, 0x6, [@uac_iso={0x7, 0x25, 0x1, 0x3, 0x0, 0xfbff}]}}, {{0x9, 0x5, 0x7, 0x0, 0x10, 0x8, 0x8, 0x6, [@generic={0xce, 0x5, "5cb7a1c6bc54f6c8d478a5880441bde20f2e3c8ca7486d61a253a366005cd017d606c82fd628f59f0b3da4b3554885d71c9c86cefedbc00afcd3968a4b6f0ca14c13b7cd5df426bea6eb560f3f8ef76b10395be52093672602ac845f76067ecc8fd90bf1561899a8d5f923ea5254ec4604b455986559f23e8de04eef5a297ef9e8db487bfc11bc82f03b02670040e06b8392ffffc8807ce3bf24493eb85bcc953ceb8b422a1ffe7ca28fb190799998a6b2a21828bf050fe90d0150d8ac5dfcbc6db7b6ccc5d23e7d0518c12c"}]}}, {{0x9, 0x5, 0x9, 0x8, 0x10, 0x6, 0x4, 0x1}}, {{0x9, 0x5, 0xc, 0xc, 0x40, 0x80, 0x4, 0xf9, [@generic={0xf4, 0x6, "e3b5226fd75a8600fe572c56f66244e672b163573b5b02b81098949aa8bb92b228aa62067b4169be19019e97d17946b334afc4a46d92c03506902fe1968e54bcecb256415d719bd268d119da3ff185338d17548fcc65dac4d7c73d400906a9b6bda57de1eac7f8787c67e51196b62588e43e3fdcb5e9ba8e0054583566050e0dbab49f8ff074124f95faa95f6e6433bd1e0ca5a62dca75fe3b028c9f5796575ef2b118c43cab8e1a01cba00feba8a4250f09c7071b7a10efbe0de41f9557b4aa3a4b250c14c96b95d0c523f6f2cd1c7e3bf9e900b9a2a3f09b86fedec8ddf2fdef5ad18ab40403cd214f0f88ca701dbd18fc"}, @generic={0xf6, 0xf, "670522d2ba816964645006b1fd175d46fc4b1e9083629c1e7117baecafdfde04710d1ad26eb3c3dd0454bde89885b047fd094995447ab1652ef3db0b2311c98f71e348d794b836ba3b87e38f8946cac9fc1d3959a6149ee3d6e6cdb9283d99242510a3146a2bbb92591272db9317517f10aba1ac5a4d1dbd014df9c1cdc0a8528fdbb1a2f3c93c3987c4b3d286405cfe2f183f62d9a5970624ab313c87ca1cf2efcf1e144f89cc5e9a9c123e04d0e45b96f3c65a42dcbe68b89691cc84990b57e43ab8c1a2c710615eb44e202e66882466d75e2338039a9475a306fca5b411ccd7e079e2091ee63b39ca6b3c34a3ef64067bc287"}]}}]}}]}}]}}, &(0x7f0000000740)={0xa, &(0x7f00000006c0)={0xa, 0x6, 0x200, 0x2, 0xb, 0x8, 0x0, 0xa6}, 0x5, &(0x7f0000000700)={0x5, 0xf, 0x5}}) r2 = open_tree(0xffffffffffffffff, &(0x7f0000000780)='./file0\x00', 0x9000) ioctl$KDGKBLED(r2, 0x4b64, &(0x7f00000007c0)) syz_usb_connect$printer(0x3, 0x36, &(0x7f0000000800)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x10, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x6, 0x50, 0xea, [{{0x9, 0x4, 0x0, 0x7f, 0x5, 0x7, 0x1, 0x2, 0x34, "", {{{0x9, 0x5, 0x1, 0x2, 0x20, 0x10, 0x1, 0x80}}, [{{0x9, 0x5, 0x82, 0x2, 0x10, 0x9, 0x0, 0x28}}]}}}]}}]}}, &(0x7f0000000980)={0xa, &(0x7f0000000840)={0xa, 0x6, 0x201, 0x2, 0x9, 0x6, 0x10, 0x62}, 0xf, &(0x7f0000000880)={0x5, 0xf, 0xf, 0x1, [@ss_cap={0xa, 0x10, 0x3, 0x2, 0x0, 0x87, 0x7, 0x9}]}, 0x3, [{0x4, &(0x7f00000008c0)=@lang_id={0x4, 0x3, 0x40c}}, {0x4, &(0x7f0000000900)=@lang_id={0x4, 0x3, 0xc07}}, {0x4, &(0x7f0000000940)=@lang_id={0x4, 0x3, 0x1009}}]}) ioctl$KDSETMODE(r2, 0x4b3a, 0x1) ioctl$KDSKBLED(r2, 0x4b65, 0x3) ioctl$SNDCTL_DSP_SPEED(r2, 0xc0045002, &(0x7f00000009c0)=0xc0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000a80)=@nat={'nat\x00', 0x1b, 0x5, 0x400, 0x110, 0x288, 0xffffffff, 0x1e0, 0x110, 0x368, 0x368, 0xffffffff, 0x368, 0x368, 0x5, &(0x7f0000000a00), {[{{@uncond, 0x0, 0xd8, 0x110, 0x0, {}, [@common=@set={{0x40}, {{0x4, [0x4, 0x4, 0x3, 0x3, 0x87ba01a7a8d308d5], 0x2, 0x3}}}, @common=@icmp={{0x28}, {0xf, "b588", 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x4, @loopback, @private=0xa010100, @port=0x4e24, @icmp_id=0x8}}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0xd}, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x0, 0x23a79f48e9463681, 'dvmrp1\x00', 'syz_tun\x00', {0xff}, {0xff}, 0x23, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@ttl={{0x28}, {0x1, 0x53}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x4, @broadcast, @multicast1, @icmp_id=0x66, @gre_key=0x8}}}}, {{@uncond, 0x0, 0x70, 0xa8}, @REDIRECT={0x38, 'REDIRECT\x00', 0x0, {0x1, {0x19, @multicast2, @local, @gre_key, @port=0x4e20}}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@ttl={{0x28}, {0x3, 0x7f}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@broadcast, 'ipvlan0\x00', {0x3}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x460) ioctl$SOUND_PCM_READ_BITS(r2, 0x80045005, &(0x7f0000000f00)) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000fc0)={'syztnl0\x00', &(0x7f0000000f40)={'syztnl0\x00', r1, 0x4, 0xff, 0x8, 0x8, 0x4e, @private1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x10, 0x6, 0x1}}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000001080)={'syztnl2\x00', &(0x7f0000001000)={'syztnl2\x00', r3, 0x2f, 0x9, 0x9, 0x4, 0x2c, @private0, @local, 0x20, 0x80, 0x4, 0x1}}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r4, &(0x7f00000010c0)={0x2, 0x4e22, @broadcast}, 0x10) ioctl$TIOCSPGRP(r2, 0x5410, &(0x7f0000001100)) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000001140)={0x2, 0x7}, 0x4) ioctl$TIOCL_SETSEL(r2, 0x541c, &(0x7f0000001180)={0x2, {0x2, 0x9, 0x3, 0x3069, 0x1, 0xf}}) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r2, 0xc0189379, &(0x7f00000011c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(r5, &(0x7f00000012c0)={&(0x7f0000001200)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000001280)={&(0x7f0000001240)={0x14, 0x4, 0x1, 0x101, 0x0, 0x0, {0x9, 0x0, 0x3}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x44000}, 0x8001) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001300), 0x30400, 0x0) ioctl$BLKSECDISCARD(r6, 0x127d, &(0x7f0000001340)=0x6) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r5, 0xc0502100, &(0x7f0000001380)={0x0, 0x0}) tkill(r7, 0x1d) ioctl$TIOCL_SETVESABLANK(r2, 0x541c, &(0x7f0000001400)) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r6, 0xc0045516, &(0x7f0000001440)) sendmsg$TIPC_NL_LINK_GET(r5, &(0x7f0000001580)={&(0x7f0000001480)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000001540)={&(0x7f0000001500)={0x14, 0x0, 0x1, 0x70bd2c, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x20008040}, 0x4000010) 2.952573607s ago: executing program 1 (id=4998): r0 = semget$private(0x0, 0x2, 0x2) semctl$SETVAL(r0, 0x1, 0x10, &(0x7f0000000000)=0x9) (async) r1 = semget$private(0x0, 0x1, 0x50c) semctl$SETALL(r1, 0x0, 0x11, &(0x7f0000000040)=[0x3, 0xd, 0x100, 0x9]) (async) r2 = mq_open(&(0x7f0000000080)='^!.^@d}:}/5\\{\x00', 0x80, 0x148, &(0x7f00000000c0)={0x507, 0x7ff, 0xbaeb, 0xa1}) semctl$IPC_INFO(r0, 0x3, 0x3, &(0x7f0000000100)=""/110) (async) statx(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x4000, 0x40, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) (async) fstat(r2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) (async) statx(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x800, 0x8, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) (async) getresgid(&(0x7f0000000480)=0x0, &(0x7f00000004c0)=0x0, &(0x7f0000000500)=0x0) semctl$IPC_SET(r0, 0x0, 0x1, &(0x7f0000000540)={{0x3, r3, r5, r6, r9, 0x20, 0x3}, 0xffffffffffff7b98, 0x7f, 0x0, 0x0, 0x0, 0x0, 0xb34f}) (async) clock_gettime(0x2, &(0x7f00000005c0)) (async) r10 = semget(0x0, 0x3, 0x200) semctl$IPC_RMID(r10, 0x0, 0x0) (async) r11 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r11, 0x8983, &(0x7f0000000600)={0x0, 'vlan0\x00', {0x3}, 0x6}) r12 = geteuid() ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f00000006c0)=0x0) lsetxattr$system_posix_acl(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x3}, [{0x2, 0x4, r6}, {0x2, 0x3, r12}, {0x2, 0x3, r6}, {0x2, 0x1, r3}, {0x2, 0x2, r6}, {0x2, 0x7, r13}], {0x4, 0x3}, [{0x8, 0x1, r7}, {0x8, 0x1, r4}, {0x8, 0x2, r7}, {0x8, 0x4, r8}, {0x8, 0x0, r5}, {0x8, 0x2, r8}], {0x10, 0x5}, {0x20, 0x4}}, 0x84, 0x2) r14 = accept$packet(0xffffffffffffffff, 0x0, &(0x7f00000007c0)) ioctl$SIOCGSTAMPNS(r14, 0x8907, &(0x7f0000000800)) semget$private(0x0, 0x0, 0x2c) (async) r15 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000840)='/proc/crypto\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r15, 0x400454d0, 0x1c) semget(0x2, 0x1, 0x1a8) (async) epoll_ctl$EPOLL_CTL_MOD(r15, 0x3, r2, &(0x7f0000000880)={0xb}) semget(0x2, 0x4, 0x80) (async) futex_waitv(&(0x7f0000002680)=[{0xfffffffffffffffd, &(0x7f00000008c0)=0x5, 0x82}, {0x8000, &(0x7f0000000900)=0x4, 0x82}, {0x7, &(0x7f0000000940)=0x6, 0x82}, {0x0, &(0x7f0000000980)=0x6, 0x2}, {0xa, &(0x7f00000009c0)=0xf06, 0x2}, {0x8000000000000000, &(0x7f0000000a00)=0x3, 0x82}, {0x3, &(0x7f0000000a40)=0x6, 0x2}, {0x3, &(0x7f0000000a80)=0xb1, 0x2}, {0xb, &(0x7f0000000ac0)=0x5, 0x82}, {0xe, &(0x7f0000000b00)=0x2, 0x82}, {0xffffffff, &(0x7f0000000b40)=0x5de, 0x82}, {0x100000000, &(0x7f0000000b80)=0x5, 0x82}, {0x7, &(0x7f0000000bc0)=0x6, 0x82}, {0x200, &(0x7f0000000c00)=0x5, 0x2}, {0x431c9722, &(0x7f0000000c40)=0x9, 0x2}, {0x8, &(0x7f0000000c80)=0x1, 0x7fb99c6600c32198}, {0xe22a, &(0x7f0000000cc0)=0x3, 0x82}, {0x0, &(0x7f0000000d00)=0x8, 0x2}, {0x2f, &(0x7f0000000d40)=0xffffffffffffffff, 0x2}, {0x81, &(0x7f0000000d80)=0x1, 0x2}, {0x8, &(0x7f0000000dc0)=0x1, 0x2}, {0xfffffffffffffffd, &(0x7f0000000e00)=0xc, 0x82}, {0x5, &(0x7f0000000e40)=0x8, 0x82}, {0x8, &(0x7f0000000e80)=0x5, 0x82}, {0x7, &(0x7f0000000ec0)=0x9b, 0x2}, {0xbf7c, &(0x7f0000000f00)=0x100, 0x82}, {0x6, &(0x7f0000000f40)=0x5, 0x82}, {0x400, &(0x7f0000000f80)=0x7, 0x82}, {0x8, &(0x7f0000000fc0)=0x3, 0x2}, {0x0, &(0x7f0000001000)=0x8b, 0x2}, {0x1ff, &(0x7f0000001040), 0x82}, {0x4, &(0x7f0000001080)=0x3, 0x2}, {0x7, &(0x7f00000010c0)=0x81, 0x82}, {0x53, &(0x7f0000001100)=0x2}, {0x9, &(0x7f0000001140)=0x5, 0x82}, {0x40, &(0x7f0000001180)=0x7, 0x2}, {0x41, &(0x7f00000011c0)=0x8, 0x82}, {0x7ff, &(0x7f0000001200)=0x100000000, 0x2}, {0x7, &(0x7f0000001240)=0x9, 0x82}, {0x7f, &(0x7f0000001280)=0xffffffffffffff87, 0x2}, {0x6, &(0x7f00000012c0)=0x4, 0x82}, {0x1ff, &(0x7f0000001300), 0x2}, {0x6, &(0x7f0000001340)=0x3, 0x82}, {0x0, &(0x7f0000001380)=0x5, 0xa3f6a09e8bf32d1f}, {0x0, &(0x7f00000013c0)=0x4, 0x2}, {0x928, &(0x7f0000001400)=0x3, 0x41}, {0x462a, &(0x7f0000001440)=0x400, 0x2}, {0x7fffffffffffffff, &(0x7f0000001480)=0x2, 0x82}, {0x3, &(0x7f00000014c0)=0x6, 0x2}, {0x8, &(0x7f0000001500)=0xa32}, {0x43, &(0x7f0000001540)=0x33f, 0x2}, {0x1, &(0x7f0000001580)=0x5, 0x82}, {0x3, &(0x7f00000015c0), 0x186}, {0x7, &(0x7f0000001600)=0x100000001, 0x2}, {0x4, &(0x7f0000001640)=0xff, 0x2}, {0x5, &(0x7f0000001680), 0x2}, {0x9d3, &(0x7f00000016c0)=0xd21d, 0x82}, {0x5, &(0x7f0000001700)=0x2, 0x82}, {0x3, &(0x7f0000001740)=0x5, 0x2}, {0x5, &(0x7f0000001780), 0x2}, {0x3, &(0x7f00000017c0)=0xb, 0x2}, {0x8, &(0x7f0000001800)=0x10, 0x2}, {0xfffffffffffffffe, &(0x7f0000001840)=0x101, 0x82}, {0xa, &(0x7f0000001880)=0x1, 0x2}, {0x80000001, &(0x7f00000018c0)=0x9, 0x2}, {0x7ff, &(0x7f0000001900)=0x3, 0x2}, {0x19, &(0x7f0000001940)=0xfffffffffffffffb, 0x2}, {0x15, &(0x7f0000001980)=0x309, 0x2}, {0x6, &(0x7f00000019c0)=0x401, 0x2}, {0x8, &(0x7f0000001a00)=0x1, 0x82}, {0xb48, &(0x7f0000001a40)=0x4, 0x82}, {0x3, &(0x7f0000001a80)=0x800, 0x82}, {0xffff, &(0x7f0000001ac0)=0xffffffffffffffff, 0x2}, {0xfffffffffffffff8, &(0x7f0000001b00)=0x384379f0, 0x82}, {0x6, &(0x7f0000001b40)=0x5, 0x82}, {0x1, &(0x7f0000001b80)=0x8000}, {0x10000, &(0x7f0000001bc0)=0x4, 0x2}, {0x1ff, &(0x7f0000001c00)=0x5, 0x2}, {0x8, &(0x7f0000001c40)=0x8000000000000000, 0x2}, {0x1, &(0x7f0000001c80)=0x7f, 0x82}, {0x8, &(0x7f0000001cc0)=0x8, 0x82}, {0x2, &(0x7f0000001d00)=0x7, 0x2}, {0x10001, &(0x7f0000001d40)=0x8, 0x82}, {0xfffffffffffffffb, &(0x7f0000001d80)=0x9, 0x82}, {0xffffffffffffffc0, &(0x7f0000001dc0)=0x3, 0x80}, {0x8, &(0x7f0000001e00)=0x5, 0x82}, {0x4, &(0x7f0000001e40)=0x7, 0x82}, {0x80, &(0x7f0000001e80)=0x9f1}, {0x9, &(0x7f0000001ec0)=0x1, 0x82}, {0x4, &(0x7f0000001f00)=0x9, 0x82}, {0x4, &(0x7f0000001f40)=0xfffffffffffffff9, 0x2}, {0xffffffffffffa966, &(0x7f0000001f80), 0x82}, {0x6, &(0x7f0000001fc0)=0x7, 0x2}, {0x1, &(0x7f0000002000)=0x8, 0x2}, {0x3, &(0x7f0000002040)=0x80000001, 0x2}, {0x8001, &(0x7f0000002080)=0xffffffff0000, 0x2}, {0x27, &(0x7f00000020c0)=0x8, 0x82}, {0x4, &(0x7f0000002100)=0x4, 0x2}, {0xa, &(0x7f0000002140)=0x4, 0x82}, {0x8, &(0x7f0000002180)=0x4, 0x2}, {0x3, &(0x7f00000021c0)=0x2, 0x2}, {0x4, &(0x7f0000002200)=0x361f7d41, 0x82}, {0x929, &(0x7f0000002240)=0x6, 0x2}, {0x4, &(0x7f0000002280)=0x21}, {0x1, &(0x7f00000022c0)=0xff, 0x2}, {0x7, &(0x7f0000002300)=0x1, 0x2}, {0x9, &(0x7f0000002340)=0x6, 0x2}, {0x6, &(0x7f0000002380)}, {0x2, &(0x7f00000023c0)=0x9, 0x2}, {0x4d, &(0x7f0000002400)=0x2, 0x82}, {0x7, &(0x7f0000002440)=0x5, 0x82}, {0x9, &(0x7f0000002480)=0xffffffffffff4e97, 0x2}, {0xd43a, &(0x7f00000024c0)=0x3d, 0x82}, {0x5, &(0x7f0000002500), 0x82}, {0x9fd, &(0x7f0000002540)=0x100, 0x82}, {0x3af5, &(0x7f0000002580)=0xdd, 0x2}, {0xff, &(0x7f00000025c0)=0x6, 0x2}, {0x6, &(0x7f0000002600)=0x7, 0x82}, {0x3, &(0x7f0000002640)=0x1000, 0x2}], 0x77, 0x0, &(0x7f00000031c0), 0x94c2eb0ebfd41b1) (async) recvmmsg(0xffffffffffffffff, &(0x7f0000005240)=[{{&(0x7f0000003200)=@llc, 0x80, &(0x7f00000033c0)=[{&(0x7f0000003280)=""/86, 0x56}, {&(0x7f0000003300)=""/175, 0xaf}], 0x2, &(0x7f0000003400)=""/129, 0x81}, 0xd}, {{&(0x7f00000034c0)=@pptp={0x18, 0x2, {0x0, @multicast2}}, 0x80, &(0x7f0000003a40)=[{&(0x7f0000003540)=""/204, 0xcc}, {&(0x7f0000003640)=""/160, 0xa0}, {&(0x7f0000003700)=""/171, 0xab}, {&(0x7f00000037c0)=""/72, 0x48}, {&(0x7f0000003840)=""/45, 0x2d}, {&(0x7f0000003880)=""/234, 0xea}, {&(0x7f0000003980)=""/162, 0xa2}], 0x7, &(0x7f0000003ac0)=""/35, 0x23}, 0x2}, {{0x0, 0x0, &(0x7f0000004c80)=[{&(0x7f0000003b00)=""/199, 0xc7}, {&(0x7f0000003c00)=""/11, 0xb}, {&(0x7f0000003c40)=""/15, 0xf}, {&(0x7f0000003c80)=""/4096, 0x1000}], 0x4, &(0x7f0000004cc0)=""/46, 0x2e}, 0xa3}, {{&(0x7f0000004d00)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x80, &(0x7f0000005100)=[{&(0x7f0000004d80)=""/170, 0xaa}, {&(0x7f0000004e40)=""/98, 0x62}, {&(0x7f0000004ec0)=""/174, 0xae}, {&(0x7f0000004f80)=""/60, 0x3c}, {&(0x7f0000004fc0)=""/169, 0xa9}, {&(0x7f0000005080)=""/118, 0x76}], 0x6, &(0x7f0000005180)=""/189, 0xbd}, 0x8}], 0x4, 0x40000000, &(0x7f0000005340)={0x0, 0x989680}) (async) ioctl$BINDER_SET_MAX_THREADS(r15, 0x40046205, &(0x7f0000005380)=0x308) 2.507897071s ago: executing program 1 (id=4999): ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff}}, './file0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000040)={@loopback, @dev, 0x0}, &(0x7f0000000080)=0xc) sendmsg(r0, &(0x7f00000003c0)={&(0x7f00000000c0)=@xdp={0x2c, 0x9, r2, 0x15}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="487556cad49e56ccedbf4dc7b03ba9a367640a2303bd4a5092afd1eaff926e872df1b14fc903030ae688ec12640d73a1ad24ecd9ba51fa25ccc588942fb14532a3476a9deae621af1201450d9c872650b1caf98ffc9abfb3e9832b40a20f256b6ef6bea96bc6e46b3353529e33f4d2056dbf1d9afd95139ef959662351541466c1856e4940652fab41d8c69f2bd58f96a618711d2d03be6dab35b4b34473989390157e1b07edbe7b", 0xa8}], 0x1, &(0x7f0000000240)=[{0x100, 0x113, 0x12e, "9c553f9cbc762c270fbb45903a62d9474f3f3976326d18ece5adda81933598791017a88c06e70d4e8ed77e2dee33ec108d616fcb4c0f38f023a55a47cc3a3f97522da87788a5d6e65f901bacb5c44198494e29693f1316b5600fb257d5429ec5b9f5d777d3a2d142d136d3af20a3888bf0647594f72a7cfd0c28dd60ca555e15ccb5899173afb3e721d15a0e99edf8bb8bbea04a8ec3f28f7183d33c55d35b077bc9b52af5d40693bdd5b47d54d59548c6c021269a948b8265cff4fddd563d21f8d0202f9d4bd28624b084ffe58d7df22b7dc1738154868716cf88782e3883f82348af1bdee0e9fe7dbb32e5fcc7a7b1"}, {0x10, 0x108, 0xc8}, {0x40, 0x29, 0x5, "5fa88350256b45de89b009b0d9f4ac3d3dabc7b238469a031d3f56756b52c337a42c6759b72c311a8db628"}], 0x150}, 0x2000000) mount$binder(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x2204468, &(0x7f0000000480)={[{@stats}, {@max={'max', 0x3d, 0x1}}, {@max={'max', 0x3d, 0x4}}, {@stats}, {}], [{@uid_eq={'uid', 0x3d, 0xee01}}, {@subj_user={'subj_user', 0x3d, '{,'}}, {@fsmagic={'fsmagic', 0x3d, 0x8001}}, {@uid_gt}, {@fsname={'fsname', 0x3d, '#,([\xc7(!!/'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@subj_type={'subj_type', 0x3d, '{,+$-/^+(\xb3]'}}, {@hash}]}) syz_genetlink_get_family_id$mptcp(&(0x7f00000005c0), 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000600)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={0x0, @tipc=@nameseq={0x1e, 0x1, 0x2, {0x2, 0x3, 0x2}}, @nl=@kern={0x10, 0x0, 0x0, 0x20000000}, @hci={0x1f, 0x2, 0x2}, 0x4, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x7, 0x3ff, 0x1}) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r4, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x500022}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x54, 0x17, 0xa, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x2}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x3}]}, 0x54}, 0x1, 0x0, 0x0, 0x1}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001b40)={&(0x7f0000000800)=@nfc_llcp, 0x80, &(0x7f0000001a00)=[{&(0x7f0000000880)=""/109, 0x6d}, {&(0x7f0000000900)=""/75, 0x4b}, {&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/119, 0x77}], 0x4, &(0x7f0000001a40)=""/246, 0xf6}, 0x10001) sendmsg$IPSET_CMD_DEL(r3, &(0x7f0000001c40)={&(0x7f0000001b80)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000001c00)={&(0x7f0000001bc0)={0x24, 0xa, 0x6, 0x5, 0x0, 0x0, {0xa, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0xfffffff9}]}, 0x24}, 0x1, 0x0, 0x0, 0x40840}, 0x8851) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001cc0), r3) sendmsg$NL80211_CMD_DEL_STATION(r1, &(0x7f0000001d80)={&(0x7f0000001c80)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001d40)={&(0x7f0000001d00)={0x38, r5, 0x400, 0x70bd2c, 0x25dfdbfd, {{}, {@void, @val={0xc, 0x99, {0xfffffffd, 0x7}}}}, [@NL80211_ATTR_LOCAL_MESH_POWER_MODE={0x8, 0xa4, 0x2}, @NL80211_ATTR_STA_PLINK_ACTION={0x5, 0x19, 0x1}, @NL80211_ATTR_STA_TX_POWER={0x6, 0x114, 0x6}]}, 0x38}, 0x1, 0x0, 0x0, 0x80}, 0x40810) r6 = getgid() ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000001dc0)={{0x1, 0x1, 0x18, r0, {0xffffffffffffffff, r6}}, './file0\x00'}) r10 = openat$mice(0xffffffffffffff9c, &(0x7f0000001e00), 0x428141) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000001e80)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_CQM(r10, &(0x7f0000002000)={&(0x7f0000001e40)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001fc0)={&(0x7f0000001ec0)={0xe4, r5, 0x800, 0x70bd2a, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r11}, @void}}, [@NL80211_ATTR_CQM={0x14, 0x5e, 0x0, 0x1, [@NL80211_ATTR_CQM_RSSI_THRESHOLD_EVENT={0x8, 0x3, 0x4}, @NL80211_ATTR_CQM_TXE_INTVL={0x8, 0x7, 0x45}]}, @NL80211_ATTR_CQM={0x44, 0x5e, 0x0, 0x1, [@NL80211_ATTR_CQM_TXE_RATE={0x8}, @NL80211_ATTR_CQM_RSSI_THRESHOLD_EVENT={0x8, 0x3, 0x4}, @NL80211_ATTR_CQM_RSSI_HYST={0x8, 0x2, 0x9}, @NL80211_ATTR_CQM_RSSI_HYST={0x8, 0x2, 0xc}, @NL80211_ATTR_CQM_RSSI_THOLD={0x18, 0x1, [0x10, 0x5, 0x1, 0xc, 0x2]}, @NL80211_ATTR_CQM_TXE_PKTS={0x8, 0x6, 0xffff}]}, @NL80211_ATTR_CQM={0x70, 0x5e, 0x0, 0x1, [@NL80211_ATTR_CQM_TXE_RATE={0x8, 0x5, 0x58}, @NL80211_ATTR_CQM_RSSI_LEVEL={0x8, 0x9, 0x5}, @NL80211_ATTR_CQM_RSSI_HYST={0x8, 0x2, 0x40}, @NL80211_ATTR_CQM_TXE_RATE={0x8, 0x5, 0x1a}, @NL80211_ATTR_CQM_RSSI_HYST={0x8, 0x2, 0x2}, @NL80211_ATTR_CQM_RSSI_LEVEL={0x8, 0x9, 0x5}, @NL80211_ATTR_CQM_TXE_RATE={0x8, 0x5, 0x3f}, @NL80211_ATTR_CQM_RSSI_THOLD={0x18, 0x1, [0x4, 0x3, 0x1000, 0x9, 0x846]}, @NL80211_ATTR_CQM_RSSI_THOLD={0x1c, 0x1, [0x80000001, 0x10001, 0x5, 0xfffffebc, 0x14, 0xfffffffe]}]}]}, 0xe4}, 0x1, 0x0, 0x0, 0x4}, 0x4000001) r12 = openat$cuse(0xffffffffffffff9c, &(0x7f0000002040), 0x2, 0x0) timer_create(0x6, &(0x7f00000021c0)={0x0, 0x10, 0x0, @thr={&(0x7f0000002080)="a5c54b4a500ca93a6e93196ad07abfb9051330a8abb3d7c5949d879cfc15f4df355c01a15c7cdbbb07b30c9543645c7996ce041a03ff6a6090b3ace1f65183e9976d768bffe639d91922c3aa413354cd5482b4aab286e30a298c6b71212c435c065443fccb8e1f1cfed969f53f8d7b006b9c0d649d2283b5e398ba4583188316808190d8afbc9d5836d38e6ad85cf8599aacdc8633e48668719521a261946e0f8fd66f510882a4f887034580283231c517d85e89d6f86a13930e2e580de88b9768f7e12de544509559f6ec4b6171d71a6bc174217850e85d480f8e28241cf97aa52246a897", &(0x7f0000002180)="205d427b9c949afc5d2849c620887d1adc6c647cbaeeca3b3de6730985f3370f239f562f343c192ea3ae33"}}, &(0x7f0000002200)) setsockopt$inet6_mtu(r7, 0x29, 0x17, &(0x7f0000002240)=0x5, 0x4) write$P9_RLINK(r3, &(0x7f0000002280)={0x7, 0x47, 0x2}, 0x7) syz_clone3(&(0x7f0000003740)={0x100200, &(0x7f00000034c0), &(0x7f0000003500)=0x0, &(0x7f0000003540), {0x19}, &(0x7f0000003580)=""/179, 0xb3, &(0x7f0000003640)=""/162, &(0x7f0000003700)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff], 0x4, {r3}}, 0x58) read$FUSE(r10, &(0x7f00000051c0)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) r15 = syz_clone3(&(0x7f0000007480)={0x102050000, &(0x7f0000007200), &(0x7f0000007240), &(0x7f0000007280), {0x25}, &(0x7f00000072c0)=""/235, 0xeb, &(0x7f00000073c0)=""/114, &(0x7f0000007440)=[0x0], 0x1, {r7}}, 0x58) sendmmsg$unix(r10, &(0x7f0000007540)=[{{&(0x7f00000022c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000002340), 0x0, 0x0, 0x0, 0x2404e084}}, {{&(0x7f0000002380)=@file={0x737e7e11d0bff847, './file0\x00'}, 0x6e, &(0x7f0000003480)=[{&(0x7f0000002400)="e02d2920349f1d3615ec869f08473ed6dea9725d6d559f2ecdcbc47b14c1e8", 0x1f}, {&(0x7f0000002440)="f89943a0a7c34afb29d75f4386d45ba0a2bef252ad3b467b5fe46fc64e3acb522c771498098f3db0e532a7cec8cf581dd8d450128692ef4e51bf", 0x3a}, {&(0x7f0000002480)="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", 0x1000}], 0x3, &(0x7f00000037c0)=[@rights={{0x20, 0x1, 0x1, [r7, r3, r7, r7]}}, @rights={{0x24, 0x1, 0x1, [r0, r12, r12, r0, r7]}}, @cred={{0x1c, 0x1, 0x2, {0x0, r8, r9}}}, @cred={{0x1c, 0x1, 0x2, {r13, r8, r6}}}], 0x88, 0x4000084}}, {{&(0x7f0000003880)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000004e80)=[{&(0x7f0000003900)}, {&(0x7f0000003940)="c2966cf59a90d0e7f9a1af63e08e6c69ebab0e474704d0b7f9523befa5673b15879d68545d8fe8c1e524d7dfa491e9c7de5e6bf365b23798ad75fd66588889330ae048bab7b5416281d3359d65165f67b2187759db01142f19b1dcab2034349c6f763f47b1d4ff2b9db935", 0x6b}, {&(0x7f00000039c0)="50861736198cdb9e6b158dc7f63547d66ced16cd78217bbc8ed4cbc501a9370ebcf2140176dc4b2aed037142f3dfb4e89cb5f786d0f5b5eb3eddc890f1f506922f05c3b49f5cb79eca868ed301a20e7f4acba081a3343d9be584b53958c17277036ee5f4e58ea5319043f7e2c84e9f2abb47d3af92425a74edf07ff1ba35c00d689165c302c1ffb82fcf802ac14ee09627a0bd5cde2fe13d511a247f1fafe9474e4d605d5ba1b96a28ac7e790ee27f9aef690518766776d819a073f90eabb93ba9f1a9a7bb96d1e4f3050591ed8560d8cb6e3cbc1a9873c99dab54934ffca608a33b89c93dae6a22365c93f1a2", 0xed}, {&(0x7f0000003ac0)="fb1356b0a93a72db777aae5bcba51c1ad4e99cae7036ae7d24a6b4514f0a4b2131a31c4a3e3853d479bbef65600bc4250fcfd35b950b7e9f798a9151f9e9e4ef250cfff5a4cec69b2ce2c2562457702c6247e58a3a1df4488e1a4f8c8f9da91c8e6a85450094cf5be007b3ba5cdebd8ccc330e3c309cccb05852bf9357d1d1d3e0616299cd88f8c321e3b52b22bdc77f7abc2f3748d0c918d4b3085cc304a9399b8a13fd94b251647cff6e8b1d3e6df0e96625d947a67f52c5e7193a539224beb3fd9a1647c7523c9be14a429cd94cc18d32d8112654400d26bdc9cec51934b7e7297c007145b48aed84172826a1d4d362bd965293ca9d", 0xf7}, {&(0x7f0000003bc0)="cca25e50b8d07466d2f6bfd73e3a092ffe4254821ce461e7bf65f7f13e439270ccea4a700c58305c860503cdc6973e09ca8c30f49b34e80f02883ea3ea8a6d2730edccb8944e581ab01b154cc0c001fa5dc7ee5eff4456d825774e7fcfdbcb46949f02458ca5c9d2be24d1ebf1f3742bd48512d68af9a3a5a19fd2db323b706dceaaf0a3b5297ae201865eac585b852318c03d8edf8dc6f462d97518b2e5c69325a90ad7a563357242002cfdbb08f69d43f952ca97d83f5f3fb3594b501cea0bd2702e2bbdb8bc8ae7c90d844165d77b2072fcc50a272c99f280a4ecf8e28093c413903b03070861e26b5480c82efea5ae840385269d494cec7fc270fee45a6eaed8760738fc741f1974817408ee26c005ec524897061dd4c32d97794167e788a90c25d41d0b4e67ff36cd6dc957e3056adb9503acb64ada03429bd5b1ba9d449bb81191cd67a324cc1c20b16c8836c2ba80ea72c13889e2e4edca7f6ef71c95ec00546656fb58ad88cfb1c15b475579a25f441f5f608e65812e5b8069169a297c238f5df7bb9dbff0dfd725b0acf660d32eb6b5c9c5f84e3e9692dc4bd2e5167411aa227d059ac6e906a73cb4dfc889ea4a007a0408ab1afc7d1d20464a224629d296fbe62543c5a43f4729a631249ec62f4febb78aebcac71865d93499b7960f7743cd98ea888f32bf089db01ac536bee7d057bb7dc438982a3b1d999ce106027288adbfc1285d49803114d47ae3c8facc16e4f7216299f8601b01c6cdd640fa587f76074b03b8eb0bf4eab5dd4932ca45e67295ab3e2778258a0e7bf015acd42ff4c9bb94dfc7da7487505f9f3eb46cc259e6652f243a775fe7bdbe090d036519d0a242369e5bd9a3c508ba78271bd84082714bb8e2181380c0f004edb72263ecd0517790bc156b84fc2118a71f65b5ad182b92e0cb9f472e83c2b01dd4264d9fe74a0322dfa96953e3539c4dcc43de6370aa66d4ddc03d388677187f265c28ec8f8d1fcdda693fce690f14bb76f7cb3ca821f589cae464771b7a64179ef248b6d20414326ded5125c4be35b9bdcf574c06235b5edeeb68a7d8bb8376adebdfc8bf76baf0f00738c428f72590392400553d2086fe216710a3cc8231bf85b63928f7d49cb3ab4a6305e45c669d48f6b3f71d899e34e4f53990f7edcd35710d455a81e97a9e0c2093cca6523c7995c431d8b51a6705e0cb469de58534b90eec8ce3c992e2d94f3eaff9d3eface4c913f0b76167a9600b6289711d0770a100d028fd15a07c9a1fe24ee0ee8947e7f321fef9f07d07c26abf57065aaddbb5ebba1dc73fe592360598bc68e0f04ae6e08fa73812a8828d04c49634d3514ab9e2b84333cac6a5bf81668feff9e2be6ef9c8bc6c0befedae335b989a4ed225aee4f31a5b99a0dd9249bbc43b9ccb275a777221fe6b9bca0d80ab83e30210901bd031e1016f8328f524c8f210e48c9a4c009836e043c37e660aec8455e56e4248d663f797512345cac3c6a758cd73b3555d4be58813af5f887e7263c8df19f61d34576ef6c4b67426c316b5422da708936b30f415b23c673ed6a44bcfea40ee1d809836ba8574dc8f622a4c78b2ba00178208b9a3c8c1b34572479ecbfa9abc8325c46c6f2d69b3ac18f66d7e5bd2e5b9d3cb150e6faa4bbac19707d8ee69795c94c751f2c3ac11e6894534df56b94c1a69587d76ada415b7717cf7a4269ef958e945a877da54df21e9de685b3c8dca71d4baf9c6a4157e88d794e74fdffdcf76905db58cbd837faac39ee094bc667945139aa033862c80a83291ea47fd4ce9fb81c51209496fbda9b6eaff66369f5d5c5eaf9551abd55705b662007987fc0cc0a92884c66d629158cf4abaed65fa2ab83fa29f9fb846ad10af273dc2d2318a5247a601b78d28e1cc75cf98288715d3b3ed8ba474191f1553122cbe8dfdb11eb67f4bf9b48c6d2d57460e6973c70fd1284281ee73da0c73fdf773cd18fae37985cebb31b07865755f8fd64d832860370579d8bb89f9cb9d97a25186656b290856c6192697f7ea4857db5463ae2a2ae30f20c6a0060d2ab1f1b2cfe319648b735b07f63c4608907d64f52075cb93d283c26bdafc0adf83b4ea83724f8563ac2fcb42fcb70e6620af9d6a2575d5d927e5c2988f56a50ac445ea6a1ba53a41981c65003161e01919628540eff9ca374833c98a29fd24b2ccfcc26e4d1ed3b881593f15a1e25f185195d96c4552fa5b466a0588659590b65b11c5b467e409bf8aa90eab5afd393f95d9f7cb7363d98efa8c02c569a56d5357366278f9b29b381730a4e5cf8c13f742153a1b043ca21997fe1e4eb52b3c770ad33744ca644fe20958a88c39183f9720d636c39ecc9b8bae38d7d0b3444560d7edf3d2f29e2d9d1e7e6b5de8cf7f406ef260ad5794b40c73bc7487bb2fd8d35f281efc26234def184764a85780267beab9141bff4795d464a3f663c09a0408bcd5f0ac94eb6f655056a987d7492a739330cce0f0f0ab5748660396580a27b9b2db713572fd633e52847a8ae98219511babcf2f9efafcf48eb286be7da70f842ed1d30138931f6930a01d0e33a0d87891ede5a0d6a95b6082f32ef90f68867496d96c6e539532f82abdfb623df253143605d46395fba17039cfbda84c8e8465c03e0c88b5bb612677f50ec7d772eedc1101ec4c785fe93b95748e537a2038e94f48cb9c1c7dc49e2557a747d37c989f0863a282feb8c9490cc1984a2bd8d0864530855e01619fcc1601807ed26bd16d41a463c36b1a254370d26cf7025ce99f55c1048c6be491652b293bbf806fbb4500b66e2d6599eb5dc04189e596cb5a32eee8b088e91842784eea71b2957012697d1c65c6fa1814d09d56d081426143f6102ad31e67555cd4609f2d1cbcef0211020ab6c69821278e2262a5402aef9044030c5e9f12b85f8768e9b97dfac4b09f0192c7f4770327f2edf30cf70a3d805c2d7b7057f05b0c07904e352ab11ecea624344491e4286e5adeed558ab9e3fc185a2070ef09d03d3a8d9fd0ee0a2ca79ec7457ffc8180f3a95a408037c5fc24bad9d46f396a4b186a94d4893035d938897e29b411ef16d80b082be00cdd6332f3b0cd180a66087853f21a6df248641866603cfcf8c1dbf0995918c7e92340be28a3a31d5c7506533d7314b73b8415542bb58fdd09c90efd28644a78f1eabce7c51938fa3991b57cf4b568cdc3fdd6637a0824ac4f5484a4f1b126bb24f6dad0ea5771ef586527b5324e09b3b851c2a1b1e871d82ab21b62cf91d426e94b95c3613a2106dceae61040d6860afdc0506b7afe18285de7a78dc32a5f4d7917ffcc6d74f23f5ce0e7687748967ae44134b1138cfa5c61489cb3546e93e48d35d8d880829569b68e4767c1df58783e0cd33517c3294f0fea05c5cbed135d4d9619b1d5709b47b78fa0ea2349774eb3d89d75b5a8be7545e2c5ac9b5dc2ce9999bb4ecf63ea9808a6210f02c8038e1dff307768f98531ad050879b223afc3ba80cdcad8a46dc4b1b42201678f68e09f5c121dd02990f095bb5f41e8b10268325bbcffa473802cf9868eac23800b914b6d835bf028bbbaf9f25bfe88b64db3f99bce5da8aa8e82adb1f351baf332a48e8fc848128eba345a738b6a2605ba00b5143a62f772edfe440f44818df9cd94a65906dac418a94e6c76d543d0825f6ba1c81b835962aea011752a20dbae9b11e3ea2a694a8ad9b83974f4b706cd1818bd45842ac23e6019c3b6a47113f39bafa17c38eada8a385b02d7b6d589238499a32e9c17382421c961c7498d2db5a690581146b8b3683790bebbb693d817556f59f159f9a231181665a0efcd3de993ed7fb767627204a77c7c30147cedf01d8e4700fb48d18869753b7d42420651f39ecde6276c921e23694532a7cb5ca80f9fa59b80cdf6a498ca5ae1d4cad6bd3b339d0c94467ecd28911c105e99b54e60186eaea0760cbe41c621026aaff1a32440fb5db434bde4a7874388a18caad3ba1cc8ce4ef0ecb6ac16aa61c6c8de3bbdf584cb696617874ff6c7520d6de5d871be7f6240ccf4fd13e3e021f2c9f9394f2369772c958c7e0ffef495191bd20169c008bdbb14c0bc79311e612a27060f81d06980e7351333168accdf197402e81984fb363f9a24fb911545e8e8f7ab0f2e825af4991715504c7fb009540db78c0220a857deb42da5a79370a6242edc6f9139b08da36d869c8e7a5e0153433bd0cd20235890e8e4086e5e0bc497d65b45695c9b1b35130cfbd7785f41430e2f19af4134e698fddc2d65dbf9e61dcb15d4f7c37843103675b519dead208e6f28988cd4cc585b64a9686630383e1f6162b9dd7d179f26087091f0eecb2a7b1cd2a166dec1c9288dd92aa9593b668a091b13b35a78dbec1f1a7da741d20aa2af79e0a3ef5141cb0dd998b4497c56fe30edf06abc2b02be31f4b0b80dd53b1f7a8047ec48bf38d4d4401a00bcb0e7e7d40f04a6f750d006cea37bf1d3a4a9cb512cc10f36e5a4e2dea701315b991060a76ecf7cbfdd011104b2cd4afd8b1a2cb8790b7bcf4b7577f37ac4f15ef4da2930bb539ee50bd2c0293e065de008645e2afcf4874f7f34b865abe6b5523003736636d7806f9d5b426a731c637036c19a21f9dfdf0c8a37326e382dc43940a8ce70c3d6aa07537b9f4b6513bd2496b07af5e26b4350b5d13cb3678ecb7f7e9ceecb58bb850c8c34bace6851e5e3604dba0c517f47257e13e7f891d9062b6c0e6c816ec63f34c5e935baabfd94ef8be231e6b12bb259f5f8a9e2c3b3470223a6d4796cb51440fce68849db0229d059dbefb47f4d09d96bcc79caef3676d90f3feb111ea488e8a6736c92b9e7a14445527492a7c9206ec69fc1f3854f919b346b71aa8ce9b694024f0bfa66f7f8f9ada67d467fdf8dfb221ecd0501c6b02b1f7ee425f2c92ee546770b037189c3e5f40ef6fc312414a6a3c7e781e5b7387b41328c64397dc5f1cf6769cc99c27181314a77754e505c7ba5ddf567660532a9591eb9453127623900244f48bf84ad754295b586fdc5f7525f312fccf00da72ecabade566474a5f4de593ec34ff5082981d2df2a9c26dba9641c1c9ed6d7b0f0a7f8231552badbe240b426f3f36952656caf1c9c9b1d08731b5de611e810d88dd6a9ad47bba9ef2b9c062e1e97dd91f422b115fc11f98ae099574a31b14132620e783c516d5ccb207891d4e95cdf2441048b5bbeb2848249b1ce0146bd6340dcabcf5c90a55b23984ab2bedb702c9164a5d71aeb8b2fd908d6cd5ce4921a40754facd76a37e99cb9fde04fc2b5b9d485673ef9646dde11ed1d1b4c4b1d714674cddbe20500d71c6476aa958afcd68bdd250d83b82548b4ab96b24511cdca1d0b9292f1e545cb103a7cb7e1a835b002bec486d73251adf7adaf7717ca0db0e3a14f6cc570da9bab0325205b6ed34eeeaf9328e4da4aecc3242896beeaaa0547392cf43916011c957804a78790bb3a47e6b2411a1cf532c7661a73235e21b8a2930e3b20df7345255beebaa84c24a5356f3d509e90b2fef9a5fcd9b996ad635c0f91117d6eb7970517145325b383972593afc8858ed1b4824a335f8a65c3630b9150710dc984f1b84732e688ac435152ccbfddb60ebb58b41991f395828eb82eb50b7a5087a19f70d5ef5e1637e7bcea99503f6057b840c2088577ab3ff82b93e3c552501708f5c7b8618aad0533bfb68bc6416d8acf2146e203379e1bda8e72c04896b810a2dcddb6faa1acac08c5c4cab10fd971c5d2c632584abce26fe6dc213ca8acc9fb80923d24ba", 0x1000}, {&(0x7f0000004bc0)="d196d7af4568f795ee414eca0ca140260bca30e21f8d1d5810dd938b926358ad1b867984a46a87675d973b55fa0eed95ede3a1046b874b44576bc78a69bbe2e3ce2de529c3c11ea56a98848d1e86985accd4ff", 0x53}, {&(0x7f0000004c40)="030457f3d7fe3b9c088cb68ddee1703b199493406a3331f2fc8a3387cc8bd2ddd849ad96c2fe5a537ecf16c878416c0da8e78d65d3a519f870bd1bde28756d2471b7ab83511fc0122c5f1fad5167217662802b80092d3a90c879191ef8128d91cdb484603b9a5a60081f1d6d976f2110029b8b3e788662d06a69749b615b22d112e5f3ba9194c2130f486cf218986282433f7be5b38457863fc6483b1477897a105b628cc413", 0xa6}, {&(0x7f0000004d00)="9c436c4360360d19a80d6eaf58700699fa9a4563b3924b69cfb153b8f960979e17b2e9ef3d65d7b3660cbc7346d1a43023ca26190c7589af53779714f237a3449e98aba827dc9dd8f83c041b3fa133c993c6707d51ee349bba506dbda5e88c5ae7487b67280ef6f1efc87c1c6ebd25460ed4", 0x72}, {&(0x7f0000004d80)="1a873c362a0c4511bbc2ad36d219390da5efd30a1013b13522b9753671a9d7b3614c81ed0ce8538e4d661d16f28a1b7814fdd670b0507f2ad957c090bc2f3e62e48f2efa8642945c52ee135f9eaccdc1981b628236ce949a24c0246b2aaebd087ceb95f454d3715f0f0f13bbbb405b3f11308d6b9a0c4b842944a1c77621fe92e9e923e2af51d4119b8f6dfbb0e28b53d7e033501d6a123bbfe7059e2f273195b14d160e6fc5cf3a06763958b1250ba5201c1a8b159357f0977b712c8a723186f5767a8f44c3b615f37dadf6e795d828e5e6", 0xd2}], 0x9, &(0x7f0000004f40)=[@rights={{0x2c, 0x1, 0x1, [r10, r10, r1, r12, r4, r3, r3]}}, @rights={{0x24, 0x1, 0x1, [r0, r10, r12, r4, r1]}}, @rights={{0x1c, 0x1, 0x1, [r7, r4, r7]}}, @rights={{0x24, 0x1, 0x1, [r7, r4, r0, r7, r4]}}, @rights={{0x1c, 0x1, 0x1, [r1, r1, r1]}}], 0xc0, 0x4801}}, {{&(0x7f0000005000)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000005180)=[{&(0x7f0000005080)="debd986b22b55596be1b1e5eed4d", 0xe}, {&(0x7f00000050c0)="d29adb532421df8d51b20d24b57bddb4989860e540654fa0b6c35e69935abe40a2d95302389d88ae5aeae8ebf66531e25998e26447f046c29bfa42", 0x3b}, {&(0x7f0000005100)="2e91173f4eba9864b3e1a9c1ce103a415943375efe6fcd0864521bc32e1006caa97ff70ce10ef0b767d76d2c37da344fce80013188fc854b602079de8f727b7623ca2eefa963d901e40b5551769712df0aadb6c5f07597bfbab65dcac639f398896d16056356e65ff1b42a6daf3745f0", 0x70}], 0x3, &(0x7f0000007500)=[@cred={{0x1c, 0x1, 0x2, {r14, 0xee01, r9}}}, @cred={{0x1c, 0x1, 0x2, {r15, r8, r9}}}], 0x40, 0x4}}], 0x4, 0x4008050) setgid(r6) ioctl$RTC_WIE_ON(r0, 0x700f) close(r12) sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000077c0)={&(0x7f0000007640)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000007780)={&(0x7f00000076c0)={0xa4, 0x0, 0x130, 0x70bd26, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7fffffff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}, @IPVS_CMD_ATTR_DEST={0x38, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x67f}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@rand_addr=' \x01\x00'}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x80}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xa70}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}, @IPVS_CMD_ATTR_DAEMON={0x38, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x4}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x3c}}}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}]}]}, 0xa4}, 0x1, 0x0, 0x0, 0x4000084}, 0x4000001) 1.887337077s ago: executing program 1 (id=5000): r0 = socket$nl_generic(0x10, 0x3, 0x10) lseek(r0, 0x2ed9, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000), 0x800, 0x0) ioctl$SOUND_OLD_MIXER_INFO(r2, 0x80304d65, &(0x7f0000000040)) ioctl$SNDCTL_DSP_GETCAPS(r2, 0x8004500f, &(0x7f0000000080)) ioctl$DMA_HEAP_IOCTL_ALLOC(0xffffffffffffffff, 0xc0184800, &(0x7f00000000c0)={0x5, r2, 0x80000}) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CAP_VM_MOVE_ENC_CONTEXT_FROM(r3, 0x4068aea3, &(0x7f0000000100)={0xce, 0x0, r4}) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0), r0) sendmsg$IPVS_CMD_SET_INFO(r3, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0xb4, r5, 0x20, 0x70bd27, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DAEMON={0x40, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @private0={0xfc, 0x0, '\x00', 0x1}}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x6}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}, @IPVS_CMD_ATTR_DEST={0x60, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x3ba}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x9}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e22}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x4}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x81}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5272}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@private0={0xfc, 0x0, '\x00', 0x1}}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x100}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x8}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x3}]}]}, 0xb4}, 0x1, 0x0, 0x0, 0x20000000}, 0x4) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(r3, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x1493f930edcc1982}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)={0xd0, 0x3, 0x8, 0x301, 0x0, 0x0, {0x3}, [@CTA_TIMEOUT_DATA={0x2c, 0x4, 0x0, 0x1, @icmpv6=[@CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x6}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x5}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x1}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x3}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x7}]}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x11}, @CTA_TIMEOUT_DATA={0x54, 0x4, 0x0, 0x1, @icmp=[@CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0xf}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0xe5e2}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0xf5b}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0xfffffffd}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x70bb}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x6}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x8}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x18}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x5}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x9215}]}, @CTA_TIMEOUT_DATA={0x2c, 0x4, 0x0, 0x1, @gre=[@CTA_TIMEOUT_GRE_REPLIED={0x8, 0x2, 0x1, 0x0, 0x6}, @CTA_TIMEOUT_GRE_REPLIED={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x8000}, @CTA_TIMEOUT_GRE_REPLIED={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x202}]}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0xd0}, 0x1, 0x0, 0x0, 0x40040}, 0x4000) bind$rds(r3, &(0x7f0000000500)={0x2, 0x4e21, @empty}, 0x10) ioctl$NS_GET_OWNER_UID(r3, 0xb704, &(0x7f0000000540)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000580)={0x509, 0x8, {0x0}, {r6}, 0x8, 0x5}) ioctl$SNDCTL_DSP_SETFRAGMENT(r3, 0xc004500a, &(0x7f00000005c0)=0xf) write$P9_RLERRORu(r3, &(0x7f0000000600)={0xd, 0x7, 0x1, {{}, 0x4}}, 0xd) fsetxattr$security_smack_transmute(r4, &(0x7f0000000640), &(0x7f0000000680), 0x4, 0x2) ioctl$BTRFS_IOC_BALANCE_V2(r3, 0xc4009420, &(0x7f00000006c0)={0x10, 0x5, {0xffffffffffffffff, @struct={0x9, 0x8f59}, 0x0, 0x1, 0x4, 0x4, 0xa1f7, 0x10, 0x40, @usage=0x598, 0x10, 0xc, [0x41, 0x80, 0x1ff, 0xf7, 0x5, 0x1]}, {0x400000000000000, @struct={0x1, 0x5d0}, 0x0, 0xe, 0x0, 0x8, 0x6, 0x1, 0x2, @struct={0x9, 0x7f}, 0xfffffffa, 0xc, [0x8, 0x773, 0x0, 0x9, 0x3, 0x7ff]}, {0x7, @struct={0x0, 0x4}, 0x0, 0x4, 0x6c, 0x5479, 0xfffffffffffffff8, 0x2, 0x68, @usage=0x1ca87899, 0x9c, 0xd, [0x2, 0x3, 0x1, 0x7, 0x485db512, 0x2188e29e]}, {0x42, 0x4, 0x9}}) ioctl$BTRFS_IOC_SCRUB(r1, 0xc400941b, &(0x7f0000000ac0)={r8, 0x7, 0x23}) fgetxattr(r0, &(0x7f0000000ec0)=@random={'os2.', '\'[\x00'}, &(0x7f0000000f00)=""/193, 0xc1) ioctl$HIDIOCSFEATURE(r3, 0xc0404806, &(0x7f0000001000)="035fe6fd06b07b0975af184f1be41ce23f6204ab377d5e5cf2d337c91ca435c896e47cf59c84308d0f87eef76a0041b13d284db3cc5ad2de9d7765997828a0c198e1662dd50f67cb2c8f0d54f318851d39503e6f77740907ccecea91cc0941b537105073e691cac4379ec243303f658009e1969f10cc660c97358384eefb09e825ba38b4b556b0e294ce11fd2634b31f84c3e92c1540ccc27b0dde25f3b6acf5ebf1f1a601bfaebe") r9 = openat$cgroup_ro(r3, &(0x7f00000010c0)='freezer.state\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x0) ioctl$IOMMU_VFIO_IOMMU_MAP_DMA(r3, 0x3b71, &(0x7f00000011c0)={0x20, 0x1, &(0x7f0000001100)="bd16593606b4422acadabed0ef72e502fe035851ffb435a211428db87e8d48a51fbb76e87c67124691f02ed982c2704d3e31b426ba7251c99875c71a491359fef1543419990d4dc33dd5fa26aa6692afbe5ac4c3b5fb55ea8abf747c438ab902625e89878d4dedf055aaf9de4a173edd1c3f0c37c2035fadb60af99316bc4616bfc4eef00c48b89560c5ee66f30739e79a8097548b2a", 0x8, 0x4}) sendmsg$NFQNL_MSG_VERDICT_BATCH(0xffffffffffffffff, &(0x7f0000001300)={&(0x7f0000001200)={0x10, 0x0, 0x0, 0xa080000}, 0xc, &(0x7f00000012c0)={&(0x7f0000001240)={0x4c, 0x3, 0x3, 0x201, 0x0, 0x0, {0xa, 0x0, 0x6}, [@NFQA_VERDICT_HDR={0xc, 0x2, {0xfffffffffffffffb, 0x6}}, @NFQA_VERDICT_HDR={0xc, 0x2, {0xfffffffffffffffc, 0x7}}, @NFQA_VERDICT_HDR={0xc, 0x2, {0xfffffffffffffffe, 0x7}}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0xa64}, @NFQA_VERDICT_HDR={0xc, 0x2, {0xffffffffffffffff, 0xb}}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc010}, 0x2000) dup3(0xffffffffffffffff, r4, 0x80000) timer_create(0x3, &(0x7f0000001340)={0x0, 0x1e, 0x1, @tid=r7}, &(0x7f0000001380)=0x0) timer_settime(r10, 0x1, &(0x7f00000013c0)={{}, {0x77359400}}, 0x0) signalfd4(r9, &(0x7f0000001400)={[0x3]}, 0x8, 0x800) 601.890924ms ago: executing program 1 (id=5001): pipe2(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) close(r0) (async) socket$nl_netfilter(0x10, 0x3, 0xc) (async) sendmsg$OSF_MSG_ADD(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000400)={0x14}, 0x14}}, 0x0) (async) r1 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000002340), 0x4040, 0x0) (async) socket$unix(0x1, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x5421, &(0x7f0000000080)={'tunl0\x00', 0x0}) 339.645984ms ago: executing program 1 (id=5002): r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, 0x0, 0x0) close(r0) syz_open_dev$ttys(0xc, 0x2, 0x1) write$tcp_congestion(r0, 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) (async) socket$inet6_udplite(0xa, 0x2, 0x88) (async) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, 0x0, 0x0) (async) close(r0) (async) syz_open_dev$ttys(0xc, 0x2, 0x1) (async) write$tcp_congestion(r0, 0x0, 0x0) (async) 0s ago: executing program 1 (id=5003): r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setresuid(0xee01, 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f000000c380)='./file0\x00', 0x44041, 0x29) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) (async) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r2, 0xc0189373, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x200}}, './file0/file0\x00'}) ioctl$SNAPSHOT_FREE(r4, 0x3305) read$FUSE(r3, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r3, &(0x7f0000000040)={0x50, 0x0, r5, {0x7, 0x1f}}, 0x50) syz_fuse_handle_req(r3, &(0x7f000000e3c0)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dc4e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ba045abcd5dfc67d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000230000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000209bfd66eea210560000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001354c4b600", 0x2000, &(0x7f00000062c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000006340)={0x20}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) (async) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = dup3(r7, r6, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r8, &(0x7f00000020c0)={0x0, 0x0, &(0x7f0000002080)={&(0x7f0000002040)={0x14}, 0x14}}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x20c01, 0x0) (async) r9 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x20c01, 0x0) dup3(r1, r3, 0x0) (async) dup3(r1, r3, 0x0) ftruncate(r9, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) (async) r10 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r10, 0x5450, 0x0) ioctl$SNAPSHOT_PLATFORM_SUPPORT(0xffffffffffffffff, 0x330f, 0x0) (async) ioctl$SNAPSHOT_PLATFORM_SUPPORT(0xffffffffffffffff, 0x330f, 0x0) kernel console output (not intermixed with test programs): =2 [ 3603.873132][ T29] kauditd_printk_skb: 2104 callbacks suppressed [ 3603.873270][ T29] audit: type=1400 audit(3603.630:1210249): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21841 comm="syz-executor" name="156" dev="tmpfs" ino=844 [ 3603.875268][ T29] audit: type=1400 audit(3603.630:1210250): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21841 comm="syz-executor" name="156" dev="tmpfs" ino=844 [ 3603.876731][ T29] audit: type=1400 audit(3603.640:1210251): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=21841 comm="syz-executor" name="156" dev="tmpfs" ino=844 [ 3603.878466][ T29] audit: type=1400 audit(3603.640:1210252): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21841 comm="syz-executor" name="156" dev="tmpfs" ino=844 [ 3603.880142][ T29] audit: type=1400 audit(3603.640:1210253): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21841 comm="syz-executor" name="156" dev="tmpfs" ino=844 [ 3603.882097][ T29] audit: type=1400 audit(3603.640:1210254): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=21841 comm="syz-executor" name="156" dev="tmpfs" ino=844 [ 3603.891661][ T29] audit: type=1400 audit(3603.640:1210255): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21841 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 3603.896241][ T29] audit: type=1400 audit(3603.640:1210256): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21841 comm="syz-executor" name="/" dev="proc" ino=1 [ 3603.898926][ T29] audit: type=1400 audit(3603.640:1210257): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21841 comm="syz-executor" name="/" dev="proc" ino=1 [ 3603.900468][ T29] audit: type=1400 audit(3603.650:1210258): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21841 comm="syz-executor" name="470" dev="proc" ino=64824 [ 3603.925324][T21842] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3603.964668][T21842] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3608.218158][T18520] usb 1-1: USB disconnect, device number 37 [ 3608.883600][ T29] kauditd_printk_skb: 3052 callbacks suppressed [ 3608.883778][ T29] audit: type=1400 audit(3608.640:1211847): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=21872 comm="modprobe" path="/lib/libbusybox.so.1.35.0" dev="vda" ino=369 [ 3608.890416][ T29] audit: type=1400 audit(3608.620:1211825): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=21870 comm="modprobe" name="libc.so.6" dev="vda" ino=370 [ 3608.896265][ T29] audit: type=1400 audit(3608.650:1211848): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=21870 comm="modprobe" path="/lib/libc.so.6" dev="vda" ino=370 [ 3608.901877][ T29] audit: type=1400 audit(3608.660:1211849): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21861 comm="udevd" name="udev" dev="tmpfs" ino=7 [ 3608.926901][ T29] audit: type=1400 audit(3608.660:1211850): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21861 comm="udevd" name="data" dev="tmpfs" ino=11 [ 3608.929120][ T29] audit: type=1400 audit(3608.680:1211851): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3086 comm="udevd" name="/" dev="vda" ino=2 [ 3608.964875][ T29] audit: type=1400 audit(3608.680:1211852): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3086 comm="udevd" name="/" dev="tmpfs" ino=1 [ 3608.966345][ T29] audit: type=1400 audit(3608.680:1211853): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3086 comm="udevd" name="udev" dev="tmpfs" ino=7 [ 3608.970987][ T29] audit: type=1400 audit(3608.680:1211854): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=w pid=3086 comm="udevd" name="queue" dev="tmpfs" ino=5085 [ 3608.972370][ T29] audit: type=1400 audit(3608.680:1211855): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3086 comm="udevd" path="/run/udev/queue" dev="tmpfs" ino=5085 [ 3613.925117][ T29] kauditd_printk_skb: 3129 callbacks suppressed [ 3613.925277][ T29] audit: type=1400 audit(3613.650:1214986): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21901 comm="modprobe" name="/" dev="vda" ino=2 [ 3613.930914][ T29] audit: type=1400 audit(3613.650:1214987): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21901 comm="modprobe" name="usr" dev="vda" ino=1488 [ 3613.932673][ T29] audit: type=1400 audit(3613.650:1214988): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21901 comm="modprobe" name="usr" dev="vda" ino=1488 [ 3613.963833][ T29] audit: type=1400 audit(3613.650:1214989): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21901 comm="modprobe" name="lib" dev="vda" ino=1622 [ 3614.000830][T18316] audit: audit_backlog=66 > audit_backlog_limit=64 [ 3614.001166][T21901] audit: audit_backlog=66 > audit_backlog_limit=64 [ 3614.001724][T18316] audit: audit_lost=43148 audit_rate_limit=0 audit_backlog_limit=64 [ 3614.002280][T21901] audit: audit_lost=43149 audit_rate_limit=0 audit_backlog_limit=64 [ 3614.003556][T18316] audit: backlog limit exceeded [ 3614.003767][T18316] audit: audit_backlog=66 > audit_backlog_limit=64 [ 3614.466960][T21899] ./file0: Can't open blockdev [ 3615.414761][T21914] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3615.466244][T21914] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3618.070428][T21922] ./file0: Can't open blockdev [ 3618.934716][ T29] kauditd_printk_skb: 3130 callbacks suppressed [ 3618.934871][ T29] audit: type=1400 audit(3618.700:1218020): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21940 comm="syz-executor" name="358" dev="tmpfs" ino=1933 [ 3618.939551][ T29] audit: type=1400 audit(3618.700:1218021): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21940 comm="syz-executor" name="358" dev="tmpfs" ino=1933 [ 3618.948576][ T29] audit: type=1400 audit(3618.700:1218022): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=21940 comm="syz-executor" name="358" dev="tmpfs" ino=1933 [ 3618.954813][ T29] audit: type=1400 audit(3618.710:1218023): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21940 comm="syz-executor" name="358" dev="tmpfs" ino=1933 [ 3618.956497][ T29] audit: type=1400 audit(3618.710:1218024): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21940 comm="syz-executor" name="358" dev="tmpfs" ino=1933 [ 3618.958149][ T29] audit: type=1400 audit(3618.710:1218025): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="/" dev="vda" ino=2 [ 3618.959920][ T29] audit: type=1400 audit(3618.710:1218026): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="var" dev="vda" ino=1718 [ 3618.983933][ T29] audit: type=1400 audit(3618.720:1218027): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="var" dev="vda" ino=1718 [ 3618.986116][ T29] audit: type=1400 audit(3618.720:1218028): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="/" dev="vda" ino=2 [ 3618.987754][ T29] audit: type=1400 audit(3618.720:1218029): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 3621.892085][T21970] fuse: Unknown parameter 'obj_user' [ 3621.907917][T21970] ./file0: Can't lookup blockdev [ 3623.943736][ T29] kauditd_printk_skb: 2463 callbacks suppressed [ 3623.943907][ T29] audit: type=1400 audit(3623.700:1220493): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3086 comm="udevd" name="udev" dev="tmpfs" ino=7 [ 3623.971818][ T29] audit: type=1400 audit(3623.700:1220494): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21986 comm="modprobe" name="/" dev="vda" ino=2 [ 3623.982611][ T29] audit: type=1400 audit(3623.700:1220495): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21986 comm="modprobe" name="/" dev="vda" ino=2 [ 3623.990187][ T29] audit: type=1400 audit(3623.700:1220496): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=3086 comm="udevd" name="udev" dev="tmpfs" ino=7 [ 3624.000490][ T29] audit: type=1400 audit(3623.700:1220497): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21986 comm="modprobe" name="lib" dev="vda" ino=195 [ 3624.012415][ T29] audit: type=1400 audit(3623.700:1220498): lsm=SMACK fn=smack_inode_unlink action=granted subject="_" object="_" requested=w pid=3086 comm="udevd" name="queue" dev="tmpfs" ino=5093 [ 3624.018345][ T29] audit: type=1400 audit(3623.730:1220499): lsm=SMACK fn=smack_inode_unlink action=granted subject="_" object="_" requested=w pid=3086 comm="udevd" name="udev" dev="tmpfs" ino=7 [ 3624.020650][ T29] audit: type=1400 audit(3623.730:1220500): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21986 comm="modprobe" name="/" dev="vda" ino=2 [ 3624.038549][ T29] audit: type=1400 audit(3623.730:1220501): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21986 comm="modprobe" name="/" dev="vda" ino=2 [ 3624.040227][ T29] audit: type=1400 audit(3623.730:1220502): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21986 comm="modprobe" name="lib" dev="vda" ino=195 [ 3624.884229][T21985] ./file0: Can't open blockdev [ 3628.955208][ T29] kauditd_printk_skb: 1660 callbacks suppressed [ 3628.955379][ T29] audit: type=1400 audit(3628.710:1222163): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22010 comm="modprobe" name="/" dev="vda" ino=2 [ 3629.002766][ T29] audit: type=1400 audit(3628.720:1222164): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22010 comm="modprobe" name="lib" dev="vda" ino=195 [ 3629.006254][ T29] audit: type=1400 audit(3628.720:1222165): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22010 comm="modprobe" name="/" dev="vda" ino=2 [ 3629.009119][ T29] audit: type=1400 audit(3628.720:1222166): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22010 comm="modprobe" name="/" dev="vda" ino=2 [ 3629.011441][ T29] audit: type=1400 audit(3628.720:1222167): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22010 comm="modprobe" name="lib" dev="vda" ino=195 [ 3629.016453][ T29] audit: type=1400 audit(3628.740:1222168): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22010 comm="modprobe" name="/" dev="vda" ino=2 [ 3629.018217][ T29] audit: type=1400 audit(3628.740:1222169): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22010 comm="modprobe" name="/" dev="vda" ino=2 [ 3629.019589][ T29] audit: type=1400 audit(3628.740:1222170): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22010 comm="modprobe" name="lib" dev="vda" ino=195 [ 3629.020977][ T29] audit: type=1400 audit(3628.740:1222171): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22010 comm="modprobe" name="/" dev="vda" ino=2 [ 3629.021649][ T29] audit: type=1400 audit(3628.740:1222172): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22010 comm="modprobe" name="/" dev="vda" ino=2 [ 3631.719154][T22022] ./file0: Can't open blockdev [ 3633.963685][ T29] kauditd_printk_skb: 2716 callbacks suppressed [ 3633.963869][ T29] audit: type=1400 audit(3633.720:1224885): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22043 comm="modprobe" name="/" dev="vda" ino=2 [ 3633.994916][ T29] audit: type=1400 audit(3633.720:1224886): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22043 comm="modprobe" name="lib" dev="vda" ino=195 [ 3634.001604][ T29] audit: type=1400 audit(3633.740:1224887): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22043 comm="modprobe" name="/" dev="vda" ino=2 [ 3634.033748][ T29] audit: type=1400 audit(3633.740:1224888): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22043 comm="modprobe" name="usr" dev="vda" ino=1488 [ 3634.035729][ T29] audit: type=1400 audit(3633.740:1224889): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22043 comm="modprobe" name="usr" dev="vda" ino=1488 [ 3634.037168][ T29] audit: type=1400 audit(3633.740:1224890): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22043 comm="modprobe" name="lib" dev="vda" ino=1622 [ 3634.038361][ T29] audit: type=1400 audit(3633.740:1224891): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22043 comm="modprobe" name="lib" dev="vda" ino=1622 [ 3634.039740][ T29] audit: type=1400 audit(3633.740:1224892): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=22043 comm="modprobe" name="libpcre2-8.so.0.11.0" dev="vda" ino=1631 [ 3634.041257][ T29] audit: type=1400 audit(3633.740:1224893): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=22043 comm="modprobe" path="/usr/lib/libpcre2-8.so.0.11.0" dev="vda" ino=1631 [ 3634.054372][ T29] audit: type=1400 audit(3633.740:1224894): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=22043 comm="modprobe" path="/usr/lib/libpcre2-8.so.0.11.0" dev="vda" ino=1631 [ 3634.566173][T22042] ./file0: Can't open blockdev [ 3635.349211][T22052] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3635.385302][T22052] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3635.407484][T22052] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3635.454923][T22052] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3635.467008][T22052] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3635.516075][T22052] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3635.550054][T22052] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3635.605063][T22052] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3635.634538][T22052] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3635.665916][T22052] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3638.977402][ T29] kauditd_printk_skb: 3126 callbacks suppressed [ 3638.977541][ T29] audit: type=1400 audit(3638.740:1227280): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22066 comm="modprobe" name="lib" dev="vda" ino=195 [ 3639.038067][ T29] audit: type=1400 audit(3638.740:1227281): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22066 comm="modprobe" name="/" dev="vda" ino=2 [ 3639.039942][ T29] audit: type=1400 audit(3638.740:1227283): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22058 comm="modprobe" name="/" dev="vda" ino=2 [ 3639.041675][ T29] audit: type=1400 audit(3638.740:1227284): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22058 comm="modprobe" name="/" dev="sysfs" ino=1 [ 3639.099214][T22066] audit: audit_backlog=65 > audit_backlog_limit=64 [ 3639.100055][T22066] audit: audit_lost=43433 audit_rate_limit=0 audit_backlog_limit=64 [ 3639.100926][T22066] audit: backlog limit exceeded [ 3639.101689][T22066] audit: audit_backlog=65 > audit_backlog_limit=64 [ 3639.102470][T22066] audit: audit_lost=43434 audit_rate_limit=0 audit_backlog_limit=64 [ 3639.104850][T22067] audit: audit_backlog=66 > audit_backlog_limit=64 [ 3644.019579][ T29] kauditd_printk_skb: 5011 callbacks suppressed [ 3644.019701][ T29] audit: type=1400 audit(3643.780:1230377): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22094 comm="kworker/u8:4" name="/" dev="vda" ino=2 [ 3644.022428][ T29] audit: type=1400 audit(3643.780:1230378): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22094 comm="kworker/u8:4" name="sbin" dev="vda" ino=1428 [ 3644.038172][ T29] audit: type=1400 audit(3643.790:1230379): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="/" dev="vda" ino=2 [ 3644.039418][ T29] audit: type=1400 audit(3643.790:1230380): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="var" dev="vda" ino=1718 [ 3644.040292][ T29] audit: type=1400 audit(3643.790:1230381): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="var" dev="vda" ino=1718 [ 3644.041347][ T29] audit: type=1400 audit(3643.790:1230382): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="/" dev="vda" ino=2 [ 3644.042453][ T29] audit: type=1400 audit(3643.790:1230383): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 3644.053874][ T29] audit: type=1400 audit(3643.790:1230384): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3071 comm="syslogd" name="messages" dev="tmpfs" ino=12 [ 3644.055889][ T29] audit: type=1400 audit(3643.800:1230386): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22094 comm="kworker/u8:4" name="modprobe" dev="vda" ino=1462 [ 3644.057544][ T29] audit: type=1400 audit(3643.800:1230387): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=22094 comm="kworker/u8:4" path="/sbin/modprobe" dev="vda" ino=1462 [ 3644.159956][T22089] ./file0: Can't open blockdev [ 3649.023537][ T29] kauditd_printk_skb: 2535 callbacks suppressed [ 3649.023671][ T29] audit: type=1400 audit(3648.780:1232922): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=22113 comm="kworker/u8:7" path="/lib/ld-linux-aarch64.so.1" dev="vda" ino=362 [ 3649.033879][ T29] audit: type=1400 audit(3648.790:1232923): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=22113 comm="kworker/u8:7" name="ld-linux-aarch64.so.1" dev="vda" ino=362 [ 3649.036419][ T29] audit: type=1400 audit(3648.790:1232924): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=22113 comm="kworker/u8:7" name="modprobe" dev="vda" ino=1462 [ 3649.048424][ T29] audit: type=1400 audit(3648.800:1232925): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="/" dev="vda" ino=2 [ 3649.049967][ T29] audit: type=1400 audit(3648.810:1232926): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="var" dev="vda" ino=1718 [ 3649.051509][ T29] audit: type=1400 audit(3648.810:1232927): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="var" dev="vda" ino=1718 [ 3649.063833][ T29] audit: type=1400 audit(3648.810:1232928): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="/" dev="vda" ino=2 [ 3649.065391][ T29] audit: type=1400 audit(3648.810:1232929): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 3649.067752][ T29] audit: type=1400 audit(3648.810:1232930): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3071 comm="syslogd" name="messages" dev="tmpfs" ino=13 [ 3649.069374][ T29] audit: type=1400 audit(3648.810:1232931): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3071 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 [ 3653.095492][T22125] FAULT_INJECTION: forcing a failure. [ 3653.095492][T22125] name failslab, interval 1, probability 0, space 0, times 0 [ 3653.096771][T22125] CPU: 1 UID: 0 PID: 22125 Comm: syz.1.4772 Tainted: G B 6.12.0-rc5-syzkaller-00005-ge42b1a9a2557 #0 [ 3653.097975][T22125] Tainted: [B]=BAD_PAGE [ 3653.098705][T22125] Hardware name: linux,dummy-virt (DT) [ 3653.099779][T22125] Call trace: [ 3653.100264][T22125] dump_backtrace+0x94/0xec [ 3653.101868][T22125] show_stack+0x18/0x24 [ 3653.102989][T22125] dump_stack_lvl+0x78/0x90 [ 3653.105463][T22125] dump_stack+0x18/0x24 [ 3653.106148][T22125] should_fail_ex+0x18c/0x1e0 [ 3653.106855][T22125] should_failslab+0x54/0x80 [ 3653.107263][T22125] __kmalloc_noprof+0xa8/0x360 [ 3653.107685][T22125] tomoyo_encode2+0x7c/0x140 [ 3653.108271][T22125] tomoyo_encode+0x28/0x40 [ 3653.109074][T22125] tomoyo_mount_acl+0x70/0x304 [ 3653.109801][T22125] tomoyo_mount_permission+0xb0/0x1c8 [ 3653.110547][T22125] tomoyo_sb_mount+0x10/0x1c [ 3653.111212][T22125] security_sb_mount+0xa8/0x1f4 [ 3653.111941][T22125] path_mount+0x80/0xa78 [ 3653.112598][T22125] __arm64_sys_mount+0x144/0x2b0 [ 3653.113607][T22125] invoke_syscall+0x48/0x110 [ 3653.114091][T22125] el0_svc_common.constprop.0+0x40/0xe0 [ 3653.114885][T22125] do_el0_svc+0x1c/0x28 [ 3653.115540][T22125] el0_svc+0x34/0xec [ 3653.116246][T22125] el0t_64_sync_handler+0x100/0x12c [ 3653.117147][T22125] el0t_64_sync+0x19c/0x1a0 [ 3653.655601][T22132] input: syz0 as /devices/virtual/input/input104 [ 3654.039485][ T29] kauditd_printk_skb: 1954 callbacks suppressed [ 3654.039627][ T29] audit: type=1400 audit(3653.800:1234886): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22117 comm="udevd" name="udev" dev="tmpfs" ino=7 [ 3654.056564][ T29] audit: type=1400 audit(3653.800:1234887): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22117 comm="udevd" name="data" dev="tmpfs" ino=11 [ 3654.058057][ T29] audit: type=1400 audit(3653.800:1234888): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=22117 comm="udevd" name="data" dev="tmpfs" ino=11 [ 3654.061071][ T29] audit: type=1400 audit(3653.800:1234889): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=22117 comm="udevd" path="/run/udev/data/+input:input104.tmp" dev="tmpfs" ino=5109 [ 3654.062473][ T29] audit: type=1400 audit(3653.820:1234890): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=22117 comm="udevd" path="/run/udev/data/+input:input104.tmp" dev="tmpfs" ino=5109 [ 3654.072323][ T29] audit: type=1400 audit(3653.820:1234891): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22117 comm="udevd" name="/" dev="vda" ino=2 [ 3654.076097][ T29] audit: type=1400 audit(3653.820:1234892): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22117 comm="udevd" name="/" dev="tmpfs" ino=1 [ 3654.077456][ T29] audit: type=1400 audit(3653.820:1234893): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22117 comm="udevd" name="udev" dev="tmpfs" ino=7 [ 3654.078529][ T29] audit: type=1400 audit(3653.820:1234894): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22117 comm="udevd" name="data" dev="tmpfs" ino=11 [ 3654.081517][ T29] audit: type=1400 audit(3653.820:1234895): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22117 comm="udevd" name="/" dev="vda" ino=2 [ 3657.758502][T22152] FAULT_INJECTION: forcing a failure. [ 3657.758502][T22152] name failslab, interval 1, probability 0, space 0, times 0 [ 3657.767110][T22152] CPU: 1 UID: 0 PID: 22152 Comm: syz.0.4778 Tainted: G B 6.12.0-rc5-syzkaller-00005-ge42b1a9a2557 #0 [ 3657.767842][T22152] Tainted: [B]=BAD_PAGE [ 3657.768481][T22152] Hardware name: linux,dummy-virt (DT) [ 3657.769114][T22152] Call trace: [ 3657.769590][T22152] dump_backtrace+0x94/0xec [ 3657.770296][T22152] show_stack+0x18/0x24 [ 3657.770954][T22152] dump_stack_lvl+0x78/0x90 [ 3657.771603][T22152] dump_stack+0x18/0x24 [ 3657.772219][T22152] should_fail_ex+0x18c/0x1e0 [ 3657.772962][T22152] should_failslab+0x54/0x80 [ 3657.773781][T22152] __kmalloc_noprof+0xa8/0x360 [ 3657.774165][T22152] tomoyo_realpath_from_path+0x48/0x1d0 [ 3657.774543][T22152] tomoyo_mount_acl+0x94/0x304 [ 3657.774992][T22152] tomoyo_mount_permission+0xb0/0x1c8 [ 3657.775397][T22152] tomoyo_sb_mount+0x10/0x1c [ 3657.775835][T22152] security_sb_mount+0xa8/0x1f4 [ 3657.776213][T22152] path_mount+0x80/0xa78 [ 3657.776552][T22152] __arm64_sys_mount+0x144/0x2b0 [ 3657.776918][T22152] invoke_syscall+0x48/0x110 [ 3657.777385][T22152] el0_svc_common.constprop.0+0x40/0xe0 [ 3657.777957][T22152] do_el0_svc+0x1c/0x28 [ 3657.778523][T22152] el0_svc+0x34/0xec [ 3657.779236][T22152] el0t_64_sync_handler+0x100/0x12c [ 3657.780357][T22152] el0t_64_sync+0x19c/0x1a0 [ 3657.823661][T22152] ERROR: Out of memory at tomoyo_realpath_from_path. [ 3659.043632][ T29] kauditd_printk_skb: 2622 callbacks suppressed [ 3659.043769][ T29] audit: type=1400 audit(3658.800:1237518): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22156 comm="modprobe" name="/" dev="vda" ino=2 [ 3659.048190][ T29] audit: type=1400 audit(3658.810:1237519): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22156 comm="modprobe" name="/" dev="sysfs" ino=1 [ 3659.082134][ T29] audit: type=1400 audit(3658.820:1237520): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22156 comm="modprobe" name="fs" dev="sysfs" ino=2 [ 3659.095435][ T29] audit: type=1400 audit(3658.820:1237521): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22156 comm="modprobe" name="/" dev="vda" ino=2 [ 3659.096943][ T29] audit: type=1400 audit(3658.830:1237522): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="/" dev="vda" ino=2 [ 3659.117678][ T29] audit: type=1400 audit(3658.830:1237523): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="var" dev="vda" ino=1718 [ 3659.133571][ T29] audit: type=1400 audit(3658.830:1237524): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="var" dev="vda" ino=1718 [ 3659.136899][ T29] audit: type=1400 audit(3658.830:1237525): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="/" dev="vda" ino=2 [ 3659.138240][ T29] audit: type=1400 audit(3658.830:1237526): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 3659.139598][ T29] audit: type=1400 audit(3658.830:1237527): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3071 comm="syslogd" name="messages" dev="tmpfs" ino=13 [ 3659.870438][T22160] sctp: [Deprecated]: syz.0.4780 (pid 22160) Use of struct sctp_assoc_value in delayed_ack socket option. [ 3659.870438][T22160] Use struct sctp_sack_info instead [ 3662.499760][T22167] FAULT_INJECTION: forcing a failure. [ 3662.499760][T22167] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 3662.501353][T22167] CPU: 0 UID: 0 PID: 22167 Comm: syz.0.4782 Tainted: G B 6.12.0-rc5-syzkaller-00005-ge42b1a9a2557 #0 [ 3662.503150][T22167] Tainted: [B]=BAD_PAGE [ 3662.503826][T22167] Hardware name: linux,dummy-virt (DT) [ 3662.504578][T22167] Call trace: [ 3662.505167][T22167] dump_backtrace+0x94/0xec [ 3662.505908][T22167] show_stack+0x18/0x24 [ 3662.506634][T22167] dump_stack_lvl+0x78/0x90 [ 3662.507345][T22167] dump_stack+0x18/0x24 [ 3662.508047][T22167] should_fail_ex+0x18c/0x1e0 [ 3662.508708][T22167] should_fail_alloc_page+0x60/0x78 [ 3662.509371][T22167] __alloc_pages_noprof+0xdc/0xd34 [ 3662.510028][T22167] alloc_pages_mpol_noprof+0x8c/0x230 [ 3662.510692][T22167] folio_alloc_mpol_noprof+0x14/0x64 [ 3662.511440][T22167] vma_alloc_folio_noprof+0x7c/0xcc [ 3662.512234][T22167] vma_alloc_zeroed_movable_folio+0x3c/0x48 [ 3662.513203][T22167] __handle_mm_fault+0x13b4/0x1990 [ 3662.514291][T22167] handle_mm_fault+0x164/0x314 [ 3662.515071][T22167] do_page_fault+0x114/0x4f4 [ 3662.515771][T22167] do_translation_fault+0xac/0xbc [ 3662.516501][T22167] do_mem_abort+0x44/0x94 [ 3662.517181][T22167] el0_da+0x78/0xa8 [ 3662.518132][T22167] el0t_64_sync_handler+0xb8/0x12c [ 3662.519147][T22167] el0t_64_sync+0x19c/0x1a0 [ 3662.560323][T22167] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 3665.348153][ T29] kauditd_printk_skb: 1342 callbacks suppressed [ 3665.348303][ T29] audit: type=1400 audit(3665.110:1238849): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=18316 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 3665.352518][ T29] audit: type=1400 audit(3665.110:1238850): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=18316 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 3665.357339][ T29] audit: type=1400 audit(3665.110:1238851): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=18316 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 3665.358901][ T29] audit: type=1400 audit(3665.110:1238852): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3261 comm="syz-executor" saddr=127.0.0.1 src=49096 daddr=127.0.0.1 dest=30006 netif=lo [ 3665.360619][ T29] audit: type=1400 audit(3665.110:1238853): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=18316 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 3665.362177][ T29] audit: type=1400 audit(3665.110:1238854): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=18316 comm="syz-executor" name="392" dev="tmpfs" ino=2118 [ 3665.368800][ T29] audit: type=1400 audit(3665.110:1238855): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="kauditd" saddr=10.0.2.2 src=47138 daddr=10.0.2.15 dest=22 netif=eth0 [ 3665.370629][ T29] audit: type=1400 audit(3665.110:1238856): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=18316 comm="syz-executor" path="/392" dev="tmpfs" ino=2118 [ 3665.372171][ T29] audit: type=1400 audit(3665.110:1238857): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=18316 comm="syz-executor" path="/392" dev="tmpfs" ino=2118 [ 3665.396538][ T29] audit: type=1400 audit(3665.110:1238858): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=18316 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 3667.931497][T22187] netlink: 4 bytes leftover after parsing attributes in process `syz.0.4789'. [ 3670.359954][ T29] kauditd_printk_skb: 2211 callbacks suppressed [ 3670.360087][ T29] audit: type=1400 audit(3670.120:1241070): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22199 comm="kworker/u8:0" name="/" dev="vda" ino=2 [ 3670.373782][ T29] audit: type=1400 audit(3670.130:1241071): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="/" dev="vda" ino=2 [ 3670.375741][ T29] audit: type=1400 audit(3670.130:1241072): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="var" dev="vda" ino=1718 [ 3670.404206][ T29] audit: type=1400 audit(3670.130:1241073): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="var" dev="vda" ino=1718 [ 3670.406098][ T29] audit: type=1400 audit(3670.140:1241074): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="/" dev="vda" ino=2 [ 3670.407590][ T29] audit: type=1400 audit(3670.140:1241075): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 3670.409311][ T29] audit: type=1400 audit(3670.140:1241076): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3071 comm="syslogd" name="messages" dev="tmpfs" ino=13 [ 3670.411213][ T29] audit: type=1400 audit(3670.140:1241077): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3071 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 [ 3670.433984][ T29] audit: type=1400 audit(3670.140:1241078): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=3071 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 [ 3670.436057][ T29] audit: type=1400 audit(3670.150:1241079): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22199 comm="kworker/u8:0" name="sbin" dev="vda" ino=1428 [ 3675.403673][ T29] kauditd_printk_skb: 3223 callbacks suppressed [ 3675.403836][ T29] audit: type=1400 audit(3675.100:1243806): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20637 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 3675.407430][ T29] audit: type=1400 audit(3675.100:1243807): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20637 comm="syz-executor" name="191" dev="tmpfs" ino=1032 [ 3675.409188][ T29] audit: type=1400 audit(3675.100:1243808): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=20637 comm="syz-executor" path="/191/cgroup.cpu" dev="tmpfs" ino=1034 [ 3675.410695][ T29] audit: type=1400 audit(3675.100:1243809): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20637 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 3675.412315][ T29] audit: type=1400 audit(3675.100:1243810): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20637 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 3675.416001][ T29] audit: type=1400 audit(3675.100:1243811): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20637 comm="syz-executor" name="191" dev="tmpfs" ino=1032 [ 3675.417697][ T29] audit: type=1400 audit(3675.100:1243812): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=20637 comm="syz-executor" name="191" dev="tmpfs" ino=1032 [ 3675.419502][ T29] audit: type=1400 audit(3675.100:1243813): lsm=SMACK fn=smack_inode_unlink action=granted subject="_" object="_" requested=w pid=20637 comm="syz-executor" name="cgroup.cpu" dev="tmpfs" ino=1034 [ 3675.428029][ T29] audit: type=1400 audit(3675.100:1243814): lsm=SMACK fn=smack_inode_unlink action=granted subject="_" object="_" requested=w pid=20637 comm="syz-executor" name="191" dev="tmpfs" ino=1032 [ 3675.429547][ T29] audit: type=1400 audit(3675.110:1243815): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22219 comm="modprobe" name="/" dev="vda" ino=2 [ 3675.463537][T22215] ./file0: Can't open blockdev [ 3677.067062][T22234] input: syz0 as /devices/virtual/input/input105 [ 3680.416426][ T29] kauditd_printk_skb: 3597 callbacks suppressed [ 3680.420444][ T29] audit: type=1400 audit(3680.170:1246589): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=22245 comm="modprobe" path="/lib/libbusybox.so.1.35.0" dev="vda" ino=369 [ 3680.453895][ T29] audit: type=1400 audit(3680.180:1246590): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3115 comm="dhcpcd" [ 3680.455639][ T29] audit: type=1400 audit(3680.190:1246591): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=22245 comm="modprobe" path="/lib/libbusybox.so.1.35.0" dev="vda" ino=369 [ 3680.457441][ T29] audit: type=1400 audit(3680.200:1246592): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3116 comm="dhcpcd" name="/" dev="vda" ino=2 [ 3680.459138][ T29] audit: type=1400 audit(3680.200:1246593): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3116 comm="dhcpcd" name="/" dev="proc" ino=1 [ 3680.460846][ T29] audit: type=1400 audit(3680.200:1246594): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3116 comm="dhcpcd" name="sys" dev="proc" ino=4026531856 [ 3680.486065][ T29] audit: type=1400 audit(3680.200:1246595): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3116 comm="dhcpcd" name="net" dev="proc" ino=2342 [ 3680.489190][ T29] audit: type=1400 audit(3680.200:1246596): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3116 comm="dhcpcd" name="ipv6" dev="proc" ino=3163 [ 3680.492680][ T29] audit: type=1400 audit(3680.210:1246597): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3116 comm="dhcpcd" name="conf" dev="proc" ino=3164 [ 3680.508670][ T29] audit: type=1400 audit(3680.210:1246598): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3116 comm="dhcpcd" name="all" dev="proc" ino=2381 [ 3682.546066][T22248] ./file0: Can't open blockdev [ 3683.646691][ T5418] usb 1-1: new high-speed USB device number 38 using dummy_hcd [ 3683.869518][ T5418] usb 1-1: Using ep0 maxpacket: 8 [ 3683.908092][ T5418] usb 1-1: config 0 has an invalid interface number: 134 but max is 0 [ 3683.909164][ T5418] usb 1-1: config 0 has no interface number 0 [ 3683.910795][ T5418] usb 1-1: config 0 interface 134 altsetting 0 bulk endpoint 0x4 has invalid maxpacket 1023 [ 3683.911999][ T5418] usb 1-1: config 0 interface 134 altsetting 0 bulk endpoint 0xA has invalid maxpacket 1024 [ 3683.913516][ T5418] usb 1-1: config 0 interface 134 altsetting 0 endpoint 0xC has an invalid bInterval 160, changing to 7 [ 3683.914258][ T5418] usb 1-1: config 0 interface 134 altsetting 0 endpoint 0xD has invalid maxpacket 1024, setting to 64 [ 3683.915269][ T5418] usb 1-1: config 0 interface 134 altsetting 0 endpoint 0xE has invalid maxpacket 1120, setting to 64 [ 3683.945409][ T5418] usb 1-1: New USB device found, idVendor=16d8, idProduct=700a, bcdDevice=7a.d4 [ 3683.946076][ T5418] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 3683.946819][ T5418] usb 1-1: Product: Ⰺ [ 3683.947297][ T5418] usb 1-1: Manufacturer: 䠊 [ 3683.947707][ T5418] usb 1-1: SerialNumber: syz [ 3683.967844][ T5418] usb 1-1: config 0 descriptor?? [ 3683.996311][T22253] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 3684.000201][T22253] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 3684.485859][T22253] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3684.546097][T22253] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3685.423633][ T29] kauditd_printk_skb: 1665 callbacks suppressed [ 3685.423791][ T29] audit: type=1400 audit(3685.180:1248262): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=22257 comm="modprobe" path="/lib/libresolv.so.2" dev="vda" ino=379 [ 3685.463952][ T29] audit: type=1400 audit(3685.220:1248263): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="/" dev="vda" ino=2 [ 3685.467848][ T29] audit: type=1400 audit(3685.220:1248264): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="var" dev="vda" ino=1718 [ 3685.496669][ T29] audit: type=1400 audit(3685.220:1248265): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="var" dev="vda" ino=1718 [ 3685.516879][ T29] audit: type=1400 audit(3685.220:1248266): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="/" dev="vda" ino=2 [ 3685.521360][ T29] audit: type=1400 audit(3685.220:1248267): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 3685.543652][ T29] audit: type=1400 audit(3685.220:1248268): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3071 comm="syslogd" name="messages" dev="tmpfs" ino=13 [ 3685.554209][ T29] audit: type=1400 audit(3685.220:1248269): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3071 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 [ 3685.557747][ T29] audit: type=1400 audit(3685.220:1248270): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=3071 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 [ 3685.578322][ T29] audit: type=1400 audit(3685.270:1248271): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22257 comm="modprobe" name="/" dev="vda" ino=2 [ 3686.178266][ T5418] option 1-1:0.134: GSM modem (1-port) converter detected [ 3686.275746][ T5418] usb 1-1: USB disconnect, device number 38 [ 3686.409693][ T5418] option 1-1:0.134: device disconnected [ 3690.438402][ T29] kauditd_printk_skb: 1696 callbacks suppressed [ 3690.438495][ T29] audit: type=1400 audit(3690.200:1249683): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22269 comm="syz-executor" name="410" dev="tmpfs" ino=2216 [ 3690.440254][ T29] audit: type=1400 audit(3690.200:1249684): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22269 comm="syz-executor" name="410" dev="tmpfs" ino=2216 [ 3690.441451][ T29] audit: type=1400 audit(3690.200:1249685): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=22269 comm="syz-executor" name="410" dev="tmpfs" ino=2216 [ 3690.442639][ T29] audit: type=1400 audit(3690.200:1249686): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22269 comm="syz-executor" name="410" dev="tmpfs" ino=2216 [ 3690.466482][ T29] audit: type=1400 audit(3690.200:1249687): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22269 comm="syz-executor" name="410" dev="tmpfs" ino=2216 [ 3690.469726][ T29] audit: type=1400 audit(3690.200:1249688): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=22269 comm="syz-executor" name="410" dev="tmpfs" ino=2216 [ 3690.472483][ T29] audit: type=1400 audit(3690.210:1249689): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22269 comm="syz-executor" name="410" dev="tmpfs" ino=2216 [ 3690.483712][ T29] audit: type=1400 audit(3690.210:1249690): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22269 comm="syz-executor" name="410" dev="tmpfs" ino=2216 [ 3690.485225][ T29] audit: type=1400 audit(3690.210:1249691): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=22269 comm="syz-executor" name="410" dev="tmpfs" ino=2216 [ 3690.486663][ T29] audit: type=1400 audit(3690.210:1249692): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="/" dev="vda" ino=2 [ 3694.760366][T22282] FAULT_INJECTION: forcing a failure. [ 3694.760366][T22282] name failslab, interval 1, probability 0, space 0, times 0 [ 3694.762894][T22282] CPU: 0 UID: 0 PID: 22282 Comm: syz.0.4808 Tainted: G B 6.12.0-rc5-syzkaller-00005-ge42b1a9a2557 #0 [ 3694.765518][T22282] Tainted: [B]=BAD_PAGE [ 3694.766119][T22282] Hardware name: linux,dummy-virt (DT) [ 3694.767301][T22282] Call trace: [ 3694.768041][T22282] dump_backtrace+0x94/0xec [ 3694.769620][T22282] show_stack+0x18/0x24 [ 3694.770340][T22282] dump_stack_lvl+0x78/0x90 [ 3694.771033][T22282] dump_stack+0x18/0x24 [ 3694.771642][T22282] should_fail_ex+0x18c/0x1e0 [ 3694.772291][T22282] should_failslab+0x54/0x80 [ 3694.773698][T22282] kmem_cache_alloc_node_noprof+0x5c/0x2e4 [ 3694.774419][T22282] __alloc_skb+0x150/0x194 [ 3694.776541][T22282] netlink_alloc_large_skb+0x94/0xb8 [ 3694.777201][T22282] netlink_sendmsg+0x10c/0x3f4 [ 3694.777960][T22282] __sock_sendmsg+0x54/0x60 [ 3694.780281][T22282] sock_write_iter+0x98/0xf8 [ 3694.781823][T22282] vfs_write+0x308/0x370 [ 3694.783599][T22282] ksys_write+0xe8/0x104 [ 3694.784935][T22282] __arm64_sys_write+0x1c/0x28 [ 3694.787130][T22282] invoke_syscall+0x48/0x110 [ 3694.789195][T22282] el0_svc_common.constprop.0+0x40/0xe0 [ 3694.791700][T22282] do_el0_svc+0x1c/0x28 [ 3694.793546][T22282] el0_svc+0xac/0xec [ 3694.795800][T22282] el0t_64_sync_handler+0x100/0x12c [ 3694.797659][T22282] el0t_64_sync+0x19c/0x1a0 [ 3695.443488][ T29] kauditd_printk_skb: 1944 callbacks suppressed [ 3695.443631][ T29] audit: type=1400 audit(3695.200:1251583): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22283 comm="udevd" name="udev" dev="tmpfs" ino=7 [ 3695.448195][ T29] audit: type=1400 audit(3695.210:1251584): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22286 comm="modprobe" name="/" dev="vda" ino=2 [ 3695.451084][ T29] audit: type=1400 audit(3695.210:1251585): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22286 comm="modprobe" name="/" dev="vda" ino=2 [ 3695.473682][ T29] audit: type=1400 audit(3695.220:1251586): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22283 comm="udevd" name="watch" dev="tmpfs" ino=46 [ 3695.478620][ T29] audit: type=1400 audit(3695.220:1251587): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22283 comm="udevd" name="/" dev="vda" ino=2 [ 3695.479954][ T29] audit: type=1400 audit(3695.220:1251588): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22283 comm="udevd" name="/" dev="tmpfs" ino=1 [ 3695.503798][ T29] audit: type=1400 audit(3695.220:1251589): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22283 comm="udevd" name="udev" dev="tmpfs" ino=7 [ 3695.505475][ T29] audit: type=1400 audit(3695.220:1251590): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="/" dev="vda" ino=2 [ 3695.507119][ T29] audit: type=1400 audit(3695.220:1251591): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22283 comm="udevd" name="watch" dev="tmpfs" ino=46 [ 3695.508620][ T29] audit: type=1400 audit(3695.220:1251592): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="var" dev="vda" ino=1718 [ 3700.724577][ T29] kauditd_printk_skb: 1877 callbacks suppressed [ 3700.724738][ T29] audit: type=1400 audit(3700.480:1253470): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3261 comm="syz-executor" saddr=127.0.0.1 src=49096 daddr=127.0.0.1 dest=30006 netif=lo [ 3700.732061][ T29] audit: type=1400 audit(3700.480:1253471): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3259 comm="sshd" saddr=10.0.2.2 src=47138 daddr=10.0.2.15 dest=22 netif=eth0 [ 3700.774656][ T29] audit: type=1400 audit(3700.510:1253472): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="/" dev="vda" ino=2 [ 3700.781347][ T29] audit: type=1400 audit(3700.510:1253473): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20637 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 3700.782783][ T29] audit: type=1400 audit(3700.510:1253474): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="var" dev="vda" ino=1718 [ 3700.808196][ T29] audit: type=1400 audit(3700.510:1253475): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20637 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 3700.824678][ T29] audit: type=1400 audit(3700.510:1253476): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="var" dev="vda" ino=1718 [ 3700.826136][ T29] audit: type=1400 audit(3700.510:1253477): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20637 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 3700.827451][ T29] audit: type=1400 audit(3700.510:1253478): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="/" dev="vda" ino=2 [ 3700.828753][ T29] audit: type=1400 audit(3700.510:1253479): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20637 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 3701.658941][T22314] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3701.710462][T22314] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3701.814599][T22314] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3701.885769][T22314] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3704.129788][T22323] input: syz0 as /devices/virtual/input/input106 [ 3707.489203][ T29] kauditd_printk_skb: 2109 callbacks suppressed [ 3707.489363][ T29] audit: type=1400 audit(3707.250:1255589): lsm=SMACK fn=smack_file_ioctl action=granted subject="_" object="_" requested=r pid=22322 comm="syz.0.4818" path="/dev/uinput" dev="devtmpfs" ino=706 [ 3707.505110][ T29] audit: type=1400 audit(3707.270:1255590): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="/" dev="vda" ino=2 [ 3707.523858][ T29] audit: type=1400 audit(3707.280:1255591): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="var" dev="vda" ino=1718 [ 3707.526206][ T29] audit: type=1400 audit(3707.280:1255592): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="var" dev="vda" ino=1718 [ 3707.528137][ T29] audit: type=1400 audit(3707.280:1255593): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="/" dev="vda" ino=2 [ 3707.530821][ T29] audit: type=1400 audit(3707.280:1255594): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 3707.548712][ T29] audit: type=1400 audit(3707.280:1255595): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3071 comm="syslogd" name="messages" dev="tmpfs" ino=13 [ 3707.550550][ T29] audit: type=1400 audit(3707.280:1255596): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3071 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 [ 3707.563817][ T29] audit: type=1400 audit(3707.280:1255597): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=3071 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 [ 3708.208441][ T29] audit: type=1400 audit(3707.970:1255598): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=3086 comm="udevd" opid=22295 ocomm="udevd" [ 3710.341081][T22331] udevd[22331]: setting mode of /dev/vcs23 to 020660 failed: Read-only file system [ 3710.465657][T22331] udevd[22331]: setting owner of /dev/vcs23 to uid=0, gid=5 failed: Read-only file system [ 3710.724178][T22333] udevd[22333]: setting mode of /dev/vcsu23 to 020660 failed: Read-only file system [ 3710.737460][T22333] udevd[22333]: setting owner of /dev/vcsu23 to uid=0, gid=5 failed: Read-only file system [ 3711.021158][T22338] udevd[22338]: setting mode of /dev/vcsa23 to 020660 failed: Read-only file system [ 3711.038800][T22338] udevd[22338]: setting owner of /dev/vcsa23 to uid=0, gid=5 failed: Read-only file system [ 3712.500968][ T29] kauditd_printk_skb: 2590 callbacks suppressed [ 3712.501131][ T29] audit: type=1400 audit(3712.260:1257952): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22338 comm="udevd" name="/" dev="vda" ino=2 [ 3712.516960][ T29] audit: type=1400 audit(3712.270:1257953): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="/" dev="vda" ino=2 [ 3712.521439][ T29] audit: type=1400 audit(3712.270:1257954): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="var" dev="vda" ino=1718 [ 3712.565197][ T29] audit: type=1400 audit(3712.270:1257955): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="var" dev="vda" ino=1718 [ 3712.567295][ T29] audit: type=1400 audit(3712.270:1257956): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="/" dev="vda" ino=2 [ 3712.569175][ T29] audit: type=1400 audit(3712.270:1257957): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 3712.570814][ T29] audit: type=1400 audit(3712.270:1257958): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3071 comm="syslogd" name="messages" dev="tmpfs" ino=13 [ 3712.572717][ T29] audit: type=1400 audit(3712.270:1257959): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3071 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 [ 3712.608973][ T29] audit: type=1400 audit(3712.280:1257960): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22346 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 3712.611073][ T29] audit: type=1400 audit(3712.280:1257961): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22346 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 3715.838874][T22364] input: syz0 as /devices/virtual/input/input107 [ 3719.063593][ T29] kauditd_printk_skb: 2121 callbacks suppressed [ 3719.063775][ T29] audit: type=1400 audit(3718.800:1259996): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=18316 comm="syz-executor" opid=22322 ocomm="syz.0.4818" [ 3719.066991][ T29] audit: type=1400 audit(3718.800:1259997): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=18316 comm="syz-executor" opid=22322 ocomm="syz.0.4818" [ 3719.133671][ T29] audit: type=1400 audit(3718.880:1259998): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="/" dev="vda" ino=2 [ 3719.135872][ T29] audit: type=1400 audit(3718.880:1259999): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="var" dev="vda" ino=1718 [ 3719.138255][ T29] audit: type=1400 audit(3718.880:1260000): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="var" dev="vda" ino=1718 [ 3719.140574][ T29] audit: type=1400 audit(3718.880:1260001): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="/" dev="vda" ino=2 [ 3719.144959][ T29] audit: type=1400 audit(3718.880:1260002): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 3719.147342][ T29] audit: type=1400 audit(3718.880:1260003): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3071 comm="syslogd" name="messages" dev="tmpfs" ino=13 [ 3719.149664][ T29] audit: type=1400 audit(3718.880:1260004): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3071 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 [ 3719.152292][ T29] audit: type=1400 audit(3718.880:1260005): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=3071 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 [ 3724.081224][ T29] kauditd_printk_skb: 64 callbacks suppressed [ 3724.081374][ T29] audit: type=1400 audit(3723.840:1260070): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=27 comm="kdevtmpfs" name="/" dev="devtmpfs" ino=1 [ 3724.104093][ T29] audit: type=1400 audit(3723.850:1260071): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=27 comm="kdevtmpfs" name="input" dev="devtmpfs" ino=703 [ 3724.119207][ T29] audit: type=1400 audit(3723.850:1260072): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=27 comm="kdevtmpfs" path="/input/event1" dev="devtmpfs" ino=1660 [ 3724.120894][ T29] audit: type=1400 audit(3723.860:1260073): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="/" dev="vda" ino=2 [ 3724.144116][ T29] audit: type=1400 audit(3723.860:1260074): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="var" dev="vda" ino=1718 [ 3724.147828][ T29] audit: type=1400 audit(3723.860:1260075): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="var" dev="vda" ino=1718 [ 3724.157430][ T29] audit: type=1400 audit(3723.860:1260076): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3086 comm="udevd" name="/" dev="vda" ino=2 [ 3724.159735][ T29] audit: type=1400 audit(3723.860:1260077): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3086 comm="udevd" name="etc" dev="vda" ino=95 [ 3724.161162][ T29] audit: type=1400 audit(3723.860:1260078): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3086 comm="udevd" name="udev" dev="vda" ino=191 [ 3724.162488][ T29] audit: type=1400 audit(3723.860:1260079): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=3086 comm="udevd" path="/etc/udev/rules.d" dev="vda" ino=193 [ 3730.760902][ T29] kauditd_printk_skb: 242 callbacks suppressed [ 3730.761058][ T29] audit: type=1400 audit(3730.520:1260322): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=20637 comm="syz-executor" opid=22363 ocomm="syz.1.4833" [ 3730.785416][ T29] audit: type=1400 audit(3730.520:1260323): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=20637 comm="syz-executor" opid=22363 ocomm="syz.1.4833" [ 3730.796422][ T29] audit: type=1400 audit(3730.550:1260324): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="/" dev="vda" ino=2 [ 3730.805144][ T29] audit: type=1400 audit(3730.550:1260325): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="var" dev="vda" ino=1718 [ 3730.807375][ T29] audit: type=1400 audit(3730.550:1260326): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="var" dev="vda" ino=1718 [ 3730.808999][ T29] audit: type=1400 audit(3730.560:1260327): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="/" dev="vda" ino=2 [ 3730.810644][ T29] audit: type=1400 audit(3730.560:1260328): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 3730.812381][ T29] audit: type=1400 audit(3730.560:1260329): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3071 comm="syslogd" name="messages" dev="tmpfs" ino=13 [ 3730.829915][ T29] audit: type=1400 audit(3730.560:1260330): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3071 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 [ 3730.841706][ T29] audit: type=1400 audit(3730.580:1260331): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=3071 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 [ 3735.778974][ T29] kauditd_printk_skb: 2077 callbacks suppressed [ 3735.779133][ T29] audit: type=1400 audit(3735.540:1262166): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22393 comm="modprobe" name="/" dev="vda" ino=2 [ 3735.782702][ T29] audit: type=1400 audit(3735.540:1262167): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22393 comm="modprobe" name="/" dev="vda" ino=2 [ 3735.824439][ T29] audit: type=1400 audit(3735.560:1262168): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22393 comm="modprobe" name="lib" dev="vda" ino=195 [ 3735.826200][ T29] audit: type=1400 audit(3735.560:1262169): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22393 comm="modprobe" name="/" dev="vda" ino=2 [ 3735.828017][ T29] audit: type=1400 audit(3735.560:1262170): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="/" dev="vda" ino=2 [ 3735.829795][ T29] audit: type=1400 audit(3735.560:1262171): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="var" dev="vda" ino=1718 [ 3735.831417][ T29] audit: type=1400 audit(3735.560:1262172): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="var" dev="vda" ino=1718 [ 3735.855165][ T29] audit: type=1400 audit(3735.570:1262173): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="/" dev="vda" ino=2 [ 3735.856905][ T29] audit: type=1400 audit(3735.570:1262174): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 3735.866691][ T29] audit: type=1400 audit(3735.570:1262175): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22393 comm="modprobe" name="/" dev="vda" ino=2 [ 3741.041997][ T29] kauditd_printk_skb: 1394 callbacks suppressed [ 3741.042157][ T29] audit: type=1400 audit(3740.800:1263570): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22410 comm="syz.0.4847" name="newroot" dev="tmpfs" ino=2 [ 3741.055301][ T29] audit: type=1400 audit(3740.800:1263571): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22410 comm="syz.0.4847" name="/" dev="proc" ino=1 [ 3741.058110][ T29] audit: type=1400 audit(3740.800:1263572): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22410 comm="syz.0.4847" name="sys" dev="proc" ino=4026531856 [ 3741.061635][ T29] audit: type=1400 audit(3740.800:1263573): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22410 comm="syz.0.4847" name="kernel" dev="proc" ino=59279 [ 3741.067732][ T29] audit: type=1400 audit(3740.800:1263574): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22410 comm="syz.0.4847" name="yama" dev="proc" ino=59280 [ 3741.069193][ T29] audit: type=1400 audit(3740.810:1263575): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=rw pid=22410 comm="syz.0.4847" name="ptrace_scope" dev="proc" ino=59281 [ 3741.070769][ T29] audit: type=1400 audit(3740.810:1263576): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=22410 comm="syz.0.4847" path="/proc/sys/kernel/yama/ptrace_scope" dev="proc" ino=59281 [ 3741.101344][ T29] audit: type=1400 audit(3740.820:1263577): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="/" dev="vda" ino=2 [ 3741.103446][ T29] audit: type=1400 audit(3740.820:1263578): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="var" dev="vda" ino=1718 [ 3741.132190][ T29] audit: type=1400 audit(3740.840:1263579): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="var" dev="vda" ino=1718 [ 3746.052281][ T29] kauditd_printk_skb: 970 callbacks suppressed [ 3746.052434][ T29] audit: type=1400 audit(3745.810:1264550): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3086 comm="udevd" name="/" dev="vda" ino=2 [ 3746.055940][ T29] audit: type=1400 audit(3745.810:1264551): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3086 comm="udevd" name="/" dev="sysfs" ino=1 [ 3746.073635][ T29] audit: type=1400 audit(3745.830:1264553): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="/" dev="vda" ino=2 [ 3746.075580][ T29] audit: type=1400 audit(3745.830:1264554): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="var" dev="vda" ino=1718 [ 3746.077652][ T29] audit: type=1400 audit(3745.830:1264555): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="var" dev="vda" ino=1718 [ 3746.078673][ T29] audit: type=1400 audit(3745.830:1264556): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="/" dev="vda" ino=2 [ 3746.079506][ T29] audit: type=1400 audit(3745.830:1264557): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 3746.080930][ T29] audit: type=1400 audit(3745.830:1264558): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3071 comm="syslogd" name="messages" dev="tmpfs" ino=13 [ 3746.082159][ T29] audit: type=1400 audit(3745.830:1264559): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3071 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 [ 3746.089491][ T29] audit: type=1400 audit(3745.810:1264552): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3086 comm="udevd" name="devices" dev="sysfs" ino=4 [ 3746.295097][T22430] input: syz0 as /devices/virtual/input/input108 [ 3749.428218][T22433] sctp: [Deprecated]: syz.1.4854 (pid 22433) Use of struct sctp_assoc_value in delayed_ack socket option. [ 3749.428218][T22433] Use struct sctp_sack_info instead [ 3752.285966][ T29] kauditd_printk_skb: 898 callbacks suppressed [ 3752.286121][ T29] audit: type=1400 audit(3752.050:1265458): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3261 comm="syz-executor" saddr=127.0.0.1 src=49096 daddr=127.0.0.1 dest=30006 netif=lo [ 3752.288877][ T29] audit: type=1400 audit(3752.050:1265459): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3259 comm="sshd" saddr=10.0.2.2 src=47138 daddr=10.0.2.15 dest=22 netif=eth0 [ 3752.298013][ T29] audit: type=1400 audit(3752.060:1265460): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20637 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 3752.299704][ T29] audit: type=1400 audit(3752.060:1265461): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="/" dev="vda" ino=2 [ 3752.301173][ T29] audit: type=1400 audit(3752.060:1265462): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="var" dev="vda" ino=1718 [ 3752.317021][ T29] audit: type=1400 audit(3752.060:1265463): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="var" dev="vda" ino=1718 [ 3752.325034][ T29] audit: type=1400 audit(3752.060:1265464): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="/" dev="vda" ino=2 [ 3752.328878][ T29] audit: type=1400 audit(3752.060:1265465): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 3752.329772][ T29] audit: type=1400 audit(3752.060:1265466): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3071 comm="syslogd" name="messages" dev="tmpfs" ino=13 [ 3752.330658][ T29] audit: type=1400 audit(3752.060:1265467): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3071 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 [ 3757.333497][ T29] kauditd_printk_skb: 967 callbacks suppressed [ 3757.333663][ T29] audit: type=1400 audit(3757.090:1266435): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22453 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 3757.337487][ T29] audit: type=1400 audit(3757.090:1266436): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22453 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 3757.339207][ T29] audit: type=1400 audit(3757.100:1266437): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22453 comm="syz-executor" name="230" dev="tmpfs" ino=1246 [ 3757.351497][ T29] audit: type=1400 audit(3757.110:1266438): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="/" dev="vda" ino=2 [ 3757.364125][ T29] audit: type=1400 audit(3757.110:1266439): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="var" dev="vda" ino=1718 [ 3757.369562][ T29] audit: type=1400 audit(3757.110:1266440): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="var" dev="vda" ino=1718 [ 3757.413865][ T29] audit: type=1400 audit(3757.120:1266442): lsm=SMACK fn=smack_task_setpgid action=granted subject="_" object="_" requested=w pid=22453 comm="syz-executor" opid=22453 ocomm="syz-executor" [ 3757.418053][ T29] audit: type=1400 audit(3757.110:1266441): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="/" dev="vda" ino=2 [ 3757.419356][ T29] audit: type=1400 audit(3757.130:1266444): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 3757.420684][ T29] audit: type=1400 audit(3757.130:1266445): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3071 comm="syslogd" name="messages" dev="tmpfs" ino=13 [ 3762.348013][ T29] kauditd_printk_skb: 801 callbacks suppressed [ 3762.348159][ T29] audit: type=1400 audit(3762.110:1267247): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3259 comm="sshd" saddr=10.0.2.2 src=47138 daddr=10.0.2.15 dest=22 netif=eth0 [ 3762.358157][ T29] audit: type=1400 audit(3762.100:1267246): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20637 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 3762.359776][ T29] audit: type=1400 audit(3762.110:1267248): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20637 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 3762.362506][ T29] audit: type=1400 audit(3762.110:1267249): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20637 comm="syz-executor" name="235" dev="tmpfs" ino=1274 [ 3762.376003][ T29] audit: type=1400 audit(3762.130:1267250): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20637 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 3762.377602][ T29] audit: type=1400 audit(3762.130:1267251): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20637 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 3762.379007][ T29] audit: type=1400 audit(3762.130:1267252): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20637 comm="syz-executor" name="235" dev="tmpfs" ino=1274 [ 3762.381214][ T29] audit: type=1400 audit(3762.130:1267253): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=20637 comm="syz-executor" path="/235/cgroup" dev="tmpfs" ino=1275 [ 3762.396723][ T29] audit: type=1400 audit(3762.130:1267254): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22479 comm="udevd" name="/" dev="vda" ino=2 [ 3762.398180][ T29] audit: type=1400 audit(3762.130:1267255): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20637 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 3767.410664][ T29] kauditd_printk_skb: 4016 callbacks suppressed [ 3767.410844][ T29] audit: type=1400 audit(3767.170:1269884): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22503 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 3767.446971][ T29] audit: type=1400 audit(3767.170:1269885): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22503 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 3767.448975][ T29] audit: type=1400 audit(3767.180:1269886): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22503 comm="syz-executor" name="432" dev="tmpfs" ino=2334 [ 3767.451027][ T29] audit: type=1400 audit(3767.180:1269888): lsm=SMACK fn=smack_task_setpgid action=granted subject="_" object="_" requested=w pid=22503 comm="syz-executor" opid=22503 ocomm="syz-executor" [ 3767.452699][ T29] audit: type=1400 audit(3767.180:1269887): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="/" dev="vda" ino=2 [ 3767.467345][ T29] audit: type=1400 audit(3767.180:1269889): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="var" dev="vda" ino=1718 [ 3767.469155][ T29] audit: type=1400 audit(3767.180:1269890): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="var" dev="vda" ino=1718 [ 3767.524614][ T29] audit: type=1400 audit(3767.180:1269891): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="/" dev="vda" ino=2 [ 3767.526240][ T29] audit: type=1400 audit(3767.180:1269892): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22503 comm="syz-executor" name="432" dev="tmpfs" ino=2334 [ 3767.527904][ T29] audit: type=1400 audit(3767.180:1269893): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22503 comm="syz-executor" name="432" dev="tmpfs" ino=2334 [ 3771.677465][T22534] x_tables: duplicate underflow at hook 1 [ 3772.414255][ T29] kauditd_printk_skb: 3860 callbacks suppressed [ 3772.414402][ T29] audit: type=1400 audit(3772.170:1273754): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22538 comm="modprobe" name="/" dev="vda" ino=2 [ 3772.416813][ T29] audit: type=1400 audit(3772.170:1273755): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22538 comm="modprobe" name="usr" dev="vda" ino=1488 [ 3772.434023][ T29] audit: type=1400 audit(3772.170:1273756): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22538 comm="modprobe" name="usr" dev="vda" ino=1488 [ 3772.435663][ T29] audit: type=1400 audit(3772.170:1273757): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22538 comm="modprobe" name="lib" dev="vda" ino=1622 [ 3772.438198][ T29] audit: type=1400 audit(3772.170:1273758): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22538 comm="modprobe" name="/" dev="vda" ino=2 [ 3772.439749][ T29] audit: type=1400 audit(3772.170:1273759): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22538 comm="modprobe" name="usr" dev="vda" ino=1488 [ 3772.441030][ T29] audit: type=1400 audit(3772.170:1273760): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22538 comm="modprobe" name="usr" dev="vda" ino=1488 [ 3772.442446][ T29] audit: type=1400 audit(3772.170:1273761): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22538 comm="modprobe" name="lib" dev="vda" ino=1622 [ 3772.461765][T18316] audit: audit_backlog=65 > audit_backlog_limit=64 [ 3772.462333][ T3086] audit: audit_backlog=66 > audit_backlog_limit=64 [ 3773.541586][T22543] udevd[22543]: setting mode of /dev/vcs20 to 020660 failed: Read-only file system [ 3773.574289][T22543] udevd[22543]: setting owner of /dev/vcs20 to uid=0, gid=5 failed: Read-only file system [ 3773.739496][T22549] udevd[22549]: setting mode of /dev/vcsu20 to 020660 failed: Read-only file system [ 3773.749226][T22549] udevd[22549]: setting owner of /dev/vcsu20 to uid=0, gid=5 failed: Read-only file system [ 3773.888835][T22552] udevd[22552]: setting mode of /dev/vcsa20 to 020660 failed: Read-only file system [ 3773.892337][T22552] udevd[22552]: setting owner of /dev/vcsa20 to uid=0, gid=5 failed: Read-only file system [ 3777.439122][ T29] kauditd_printk_skb: 2944 callbacks suppressed [ 3777.439268][ T29] audit: type=1400 audit(3777.200:1276537): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3086 comm="udevd" name="/" dev="vda" ino=2 [ 3777.441504][ T29] audit: type=1400 audit(3777.200:1276538): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3086 comm="udevd" name="etc" dev="vda" ino=95 [ 3777.454345][ T29] audit: type=1400 audit(3777.200:1276539): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3086 comm="udevd" name="udev" dev="vda" ino=191 [ 3777.455960][ T29] audit: type=1400 audit(3777.200:1276540): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=3086 comm="udevd" path="/etc/udev/rules.d" dev="vda" ino=193 [ 3777.457412][ T29] audit: type=1400 audit(3777.200:1276541): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3086 comm="udevd" name="/" dev="vda" ino=2 [ 3777.458918][ T29] audit: type=1400 audit(3777.200:1276542): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3086 comm="udevd" name="lib" dev="vda" ino=195 [ 3777.460381][ T29] audit: type=1400 audit(3777.200:1276543): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3086 comm="udevd" name="udev" dev="vda" ino=1390 [ 3777.461882][ T29] audit: type=1400 audit(3777.210:1276544): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="/" dev="vda" ino=2 [ 3777.486293][ T29] audit: type=1400 audit(3777.210:1276545): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="var" dev="vda" ino=1718 [ 3777.487935][ T29] audit: type=1400 audit(3777.210:1276546): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="var" dev="vda" ino=1718 [ 3784.156252][ T29] kauditd_printk_skb: 1279 callbacks suppressed [ 3784.156387][ T29] audit: type=1400 audit(3783.920:1277826): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3115 comm="dhcpcd" [ 3784.172330][ T29] audit: type=1400 audit(3783.930:1277827): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3115 comm="dhcpcd" [ 3784.189571][ T29] audit: type=1400 audit(3783.940:1277828): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3115 comm="dhcpcd" [ 3784.247029][ T29] audit: type=1400 audit(3783.980:1277829): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="/" dev="vda" ino=2 [ 3784.248603][ T29] audit: type=1400 audit(3783.980:1277830): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="var" dev="vda" ino=1718 [ 3784.250120][ T29] audit: type=1400 audit(3783.980:1277831): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="var" dev="vda" ino=1718 [ 3784.251685][ T29] audit: type=1400 audit(3783.980:1277832): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="/" dev="vda" ino=2 [ 3784.254113][ T29] audit: type=1400 audit(3783.980:1277833): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 3784.255320][ T29] audit: type=1400 audit(3783.990:1277834): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3071 comm="syslogd" name="messages" dev="tmpfs" ino=13 [ 3784.256363][ T29] audit: type=1400 audit(3783.990:1277835): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3071 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 [ 3789.167115][ T29] kauditd_printk_skb: 1475 callbacks suppressed [ 3789.167283][ T29] audit: type=1400 audit(3788.920:1279311): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22593 comm="udevd" name="/" dev="proc" ino=1 [ 3789.175617][ T29] audit: type=1400 audit(3788.940:1279312): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22593 comm="udevd" name="/" dev="proc" ino=1 [ 3789.177696][ T29] audit: type=1400 audit(3788.940:1279313): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="/" dev="vda" ino=2 [ 3789.179488][ T29] audit: type=1400 audit(3788.940:1279314): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="var" dev="vda" ino=1718 [ 3789.181001][ T29] audit: type=1400 audit(3788.940:1279315): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="var" dev="vda" ino=1718 [ 3789.184861][ T29] audit: type=1400 audit(3788.940:1279316): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="/" dev="vda" ino=2 [ 3789.186721][ T29] audit: type=1400 audit(3788.940:1279317): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 3789.188346][ T29] audit: type=1400 audit(3788.940:1279318): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3071 comm="syslogd" name="messages" dev="tmpfs" ino=13 [ 3789.190091][ T29] audit: type=1400 audit(3788.940:1279319): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3071 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 [ 3789.191900][ T29] audit: type=1400 audit(3788.950:1279320): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=3071 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 [ 3794.177087][ T29] kauditd_printk_skb: 1046 callbacks suppressed [ 3794.177237][ T29] audit: type=1400 audit(3793.940:1280367): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22609 comm="modprobe" name="/" dev="vda" ino=2 [ 3794.196846][ T29] audit: type=1400 audit(3793.940:1280368): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22609 comm="modprobe" name="usr" dev="vda" ino=1488 [ 3794.198669][ T29] audit: type=1400 audit(3793.940:1280369): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22609 comm="modprobe" name="usr" dev="vda" ino=1488 [ 3794.200764][ T29] audit: type=1400 audit(3793.940:1280371): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="/" dev="vda" ino=2 [ 3794.202305][ T29] audit: type=1400 audit(3793.940:1280372): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="var" dev="vda" ino=1718 [ 3794.218737][ T29] audit: type=1400 audit(3793.940:1280373): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="var" dev="vda" ino=1718 [ 3794.220428][ T29] audit: type=1400 audit(3793.940:1280374): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="/" dev="vda" ino=2 [ 3794.221992][ T29] audit: type=1400 audit(3793.950:1280375): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 3794.234431][ T29] audit: type=1400 audit(3793.950:1280376): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3071 comm="syslogd" name="messages" dev="tmpfs" ino=13 [ 3794.253970][ T29] audit: type=1400 audit(3793.950:1280377): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3071 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 [ 3799.194232][ T29] kauditd_printk_skb: 3217 callbacks suppressed [ 3799.194377][ T29] audit: type=1400 audit(3798.950:1282934): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=3086 comm="udevd" path="/sys/devices/virtual/block/loop6/queue" dev="sysfs" ino=13722 [ 3799.197035][ T29] audit: type=1400 audit(3798.950:1282935): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3086 comm="udevd" name="/" dev="vda" ino=2 [ 3799.198489][ T29] audit: type=1400 audit(3798.950:1282936): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3086 comm="udevd" name="/" dev="sysfs" ino=1 [ 3799.200023][ T29] audit: type=1400 audit(3798.950:1282937): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3086 comm="udevd" name="devices" dev="sysfs" ino=4 [ 3799.201534][ T29] audit: type=1400 audit(3798.950:1282938): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3086 comm="udevd" name="virtual" dev="sysfs" ino=810 [ 3799.215544][ T29] audit: type=1400 audit(3798.950:1282939): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3086 comm="udevd" name="block" dev="sysfs" ino=11402 [ 3799.217397][ T29] audit: type=1400 audit(3798.950:1282940): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3086 comm="udevd" name="loop6" dev="sysfs" ino=13682 [ 3799.218704][ T29] audit: type=1400 audit(3798.950:1282941): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3086 comm="udevd" name="/" dev="vda" ino=2 [ 3799.219853][ T29] audit: type=1400 audit(3798.950:1282942): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3086 comm="udevd" name="/" dev="sysfs" ino=1 [ 3799.221033][ T29] audit: type=1400 audit(3798.950:1282943): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3086 comm="udevd" name="devices" dev="sysfs" ino=4 [ 3804.231361][ T29] kauditd_printk_skb: 4099 callbacks suppressed [ 3804.231515][ T29] audit: type=1400 audit(3803.990:1286084): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22663 comm="modprobe" name="/" dev="vda" ino=2 [ 3804.253901][ T29] audit: type=1400 audit(3803.990:1286085): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22663 comm="modprobe" name="/" dev="sysfs" ino=1 [ 3804.261076][ T29] audit: type=1400 audit(3804.000:1286086): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22663 comm="modprobe" name="fs" dev="sysfs" ino=2 [ 3804.268890][ T29] audit: type=1400 audit(3804.000:1286087): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22663 comm="modprobe" name="/" dev="vda" ino=2 [ 3804.270764][ T29] audit: type=1400 audit(3804.000:1286088): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="/" dev="vda" ino=2 [ 3804.272425][ T29] audit: type=1400 audit(3804.000:1286089): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="var" dev="vda" ino=1718 [ 3804.293935][ T29] audit: type=1400 audit(3804.000:1286090): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="var" dev="vda" ino=1718 [ 3804.296786][ T29] audit: type=1400 audit(3804.000:1286091): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="/" dev="vda" ino=2 [ 3804.298706][ T29] audit: type=1400 audit(3804.000:1286092): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 3804.300460][ T29] audit: type=1400 audit(3804.000:1286093): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3071 comm="syslogd" name="messages" dev="tmpfs" ino=13 [ 3809.458894][ T29] kauditd_printk_skb: 1531 callbacks suppressed [ 3809.459057][ T29] audit: type=1400 audit(3809.220:1287625): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=18316 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 3809.484400][ T29] audit: type=1400 audit(3809.220:1287626): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3261 comm="syz-executor" saddr=127.0.0.1 src=49096 daddr=127.0.0.1 dest=30006 netif=lo [ 3809.486403][ T29] audit: type=1400 audit(3809.230:1287628): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=18316 comm="syz-executor" saddr=10.0.2.2 src=47138 daddr=10.0.2.15 dest=22 netif=eth0 [ 3809.488101][ T29] audit: type=1400 audit(3809.220:1287627): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=18316 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 3809.489671][ T29] audit: type=1400 audit(3809.230:1287629): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=18316 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 3809.491075][ T29] audit: type=1400 audit(3809.230:1287630): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=18316 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 3809.515822][T18316] audit: audit_backlog=65 > audit_backlog_limit=64 [ 3809.516352][T18316] audit: audit_lost=45886 audit_rate_limit=0 audit_backlog_limit=64 [ 3809.516756][T18316] audit: backlog limit exceeded [ 3809.517534][T18316] audit: audit_backlog=65 > audit_backlog_limit=64 [ 3814.477697][ T29] kauditd_printk_skb: 3864 callbacks suppressed [ 3814.477905][ T29] audit: type=1400 audit(3814.190:1291199): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=18316 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 3814.480502][ T29] audit: type=1400 audit(3814.200:1291200): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=18316 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 3814.482292][ T29] audit: type=1400 audit(3814.200:1291201): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=18316 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 3814.485474][ T29] audit: type=1400 audit(3814.200:1291202): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=18316 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 3814.487180][ T29] audit: type=1400 audit(3814.200:1291203): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=18316 comm="syz-executor" name="/" dev="devtmpfs" ino=1 [ 3814.489083][ T29] audit: type=1400 audit(3814.200:1291204): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=rw pid=18316 comm="syz-executor" name="loop0" dev="devtmpfs" ino=637 [ 3814.495046][ T29] audit: type=1400 audit(3814.210:1291205): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=18316 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 [ 3814.497758][ T29] audit: type=1400 audit(3814.240:1291206): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22715 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 3814.499586][ T29] audit: type=1400 audit(3814.240:1291207): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22715 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 3814.501200][ T29] audit: type=1400 audit(3814.240:1291208): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22715 comm="syz-executor" name="465" dev="tmpfs" ino=2510 [ 3820.267208][ T29] kauditd_printk_skb: 1553 callbacks suppressed [ 3820.267359][ T29] audit: type=1400 audit(3820.030:1292762): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20637 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 3820.270157][ T29] audit: type=1400 audit(3820.030:1292763): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20637 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 3820.271976][ T29] audit: type=1400 audit(3820.030:1292764): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20637 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 3820.321849][T20637] audit: audit_backlog=65 > audit_backlog_limit=64 [ 3820.322476][T20637] audit: audit_lost=45986 audit_rate_limit=0 audit_backlog_limit=64 [ 3820.324969][T20637] audit: backlog limit exceeded [ 3820.326475][T20637] audit: audit_backlog=65 > audit_backlog_limit=64 [ 3820.326973][T20637] audit: audit_lost=45987 audit_rate_limit=0 audit_backlog_limit=64 [ 3820.327458][T20637] audit: backlog limit exceeded [ 3820.327994][T20637] audit: audit_backlog=65 > audit_backlog_limit=64 [ 3825.283921][ T29] kauditd_printk_skb: 3501 callbacks suppressed [ 3825.284077][ T29] audit: type=1400 audit(3825.040:1296078): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=22757 comm="udevd" path="/dev/loop6" dev="devtmpfs" ino=643 [ 3825.286510][ T29] audit: type=1400 audit(3825.040:1296079): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3086 comm="udevd" name="/" dev="vda" ino=2 [ 3825.288144][ T29] audit: type=1400 audit(3825.040:1296080): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3086 comm="udevd" name="/" dev="tmpfs" ino=1 [ 3825.289956][ T29] audit: type=1400 audit(3825.040:1296081): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3086 comm="udevd" name="udev" dev="tmpfs" ino=7 [ 3825.291489][ T29] audit: type=1400 audit(3825.040:1296082): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3086 comm="udevd" name="data" dev="tmpfs" ino=11 [ 3825.314476][ T29] audit: type=1400 audit(3825.040:1296083): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=3086 comm="udevd" name="b7:6" dev="tmpfs" ino=5225 [ 3825.316630][ T29] audit: type=1400 audit(3825.040:1296084): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3086 comm="udevd" path="/run/udev/data/b7:6" dev="tmpfs" ino=5225 [ 3825.337217][ T29] audit: type=1400 audit(3825.060:1296085): lsm=SMACK fn=smack_file_ioctl action=granted subject="_" object="_" requested=r pid=22757 comm="udevd" path="/dev/loop6" dev="devtmpfs" ino=643 [ 3825.338660][ T29] audit: type=1400 audit(3825.060:1296086): lsm=SMACK fn=smack_file_ioctl action=granted subject="_" object="_" requested=r pid=22757 comm="udevd" path="/dev/loop6" dev="devtmpfs" ino=643 [ 3825.339947][ T29] audit: type=1400 audit(3825.060:1296087): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22757 comm="udevd" name="/" dev="vda" ino=2 [ 3827.947905][T22762] sctp: [Deprecated]: syz.0.4930 (pid 22762) Use of int in max_burst socket option. [ 3827.947905][T22762] Use struct sctp_assoc_value instead [ 3830.304389][ T29] kauditd_printk_skb: 1270 callbacks suppressed [ 3830.304538][ T29] audit: type=1400 audit(3830.050:1297358): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22770 comm="modprobe" name="usr" dev="vda" ino=1488 [ 3830.306698][ T29] audit: type=1400 audit(3830.060:1297359): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22770 comm="modprobe" name="usr" dev="vda" ino=1488 [ 3830.308198][ T29] audit: type=1400 audit(3830.060:1297360): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22770 comm="modprobe" name="lib" dev="vda" ino=1622 [ 3830.309745][ T29] audit: type=1400 audit(3830.060:1297361): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22770 comm="modprobe" name="/" dev="vda" ino=2 [ 3830.311296][ T29] audit: type=1400 audit(3830.060:1297362): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22770 comm="modprobe" name="usr" dev="vda" ino=1488 [ 3830.327973][ T29] audit: type=1400 audit(3830.060:1297363): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22770 comm="modprobe" name="usr" dev="vda" ino=1488 [ 3830.329673][ T29] audit: type=1400 audit(3830.060:1297364): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22770 comm="modprobe" name="lib" dev="vda" ino=1622 [ 3830.331204][ T29] audit: type=1400 audit(3830.060:1297365): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22770 comm="modprobe" name="/" dev="vda" ino=2 [ 3830.332696][ T29] audit: type=1400 audit(3830.060:1297366): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22770 comm="modprobe" name="usr" dev="vda" ino=1488 [ 3830.344466][ T29] audit: type=1400 audit(3830.060:1297367): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22770 comm="modprobe" name="usr" dev="vda" ino=1488 [ 3830.754496][T22773] sctp: [Deprecated]: syz.1.4933 (pid 22773) Use of struct sctp_assoc_value in delayed_ack socket option. [ 3830.754496][T22773] Use struct sctp_sack_info instead [ 3837.314495][ T29] kauditd_printk_skb: 2680 callbacks suppressed [ 3837.314686][ T29] audit: type=1400 audit(3837.070:1298392): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3261 comm="syz-executor" saddr=127.0.0.1 src=49096 daddr=127.0.0.1 dest=30006 netif=lo [ 3837.317747][ T29] audit: type=1400 audit(3837.080:1298393): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3259 comm="sshd" saddr=10.0.2.2 src=47138 daddr=10.0.2.15 dest=22 netif=eth0 [ 3837.321403][ T29] audit: type=1400 audit(3837.080:1298394): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=18316 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 3837.340509][ T29] audit: type=1400 audit(3837.080:1298395): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=18316 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 3837.342351][ T29] audit: type=1400 audit(3837.080:1298396): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=18316 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 3837.351549][ T29] audit: type=1400 audit(3837.080:1298397): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=18316 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 3837.358402][ T29] audit: type=1400 audit(3837.090:1298398): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="/" dev="vda" ino=2 [ 3837.360114][ T29] audit: type=1400 audit(3837.090:1298399): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="var" dev="vda" ino=1718 [ 3837.384788][ T29] audit: type=1400 audit(3837.090:1298400): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="var" dev="vda" ino=1718 [ 3837.386815][ T29] audit: type=1400 audit(3837.090:1298401): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="/" dev="vda" ino=2 [ 3839.053809][T20642] usb 1-1: new high-speed USB device number 39 using dummy_hcd [ 3839.274196][T20642] usb 1-1: Using ep0 maxpacket: 32 [ 3839.408945][T20642] usb 1-1: config 1 interface 0 altsetting 2 bulk endpoint 0x82 has invalid maxpacket 1023 [ 3839.410255][T20642] usb 1-1: config 1 interface 0 altsetting 2 has 2 endpoint descriptors, different from the interface descriptor's value: 3 [ 3839.427055][T20642] usb 1-1: config 1 interface 0 has no altsetting 0 [ 3839.488395][T20642] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 3839.489413][T20642] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 3839.490348][T20642] usb 1-1: Product: ꅾ褜쀒篇앎齱嶏앚㻕衰涊遽ꂹ⿩لዃ諗﫰궭巀妴 [ 3839.491306][T20642] usb 1-1: SerialNumber: syz [ 3839.580993][T22794] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 3839.861716][T20642] cdc_ether 1-1:1.0: probe with driver cdc_ether failed with error -71 [ 3839.896825][T20642] usb 1-1: USB disconnect, device number 39 [ 3842.330244][ T29] kauditd_printk_skb: 1748 callbacks suppressed [ 3842.330392][ T29] audit: type=1400 audit(3842.080:1300150): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22805 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 3842.360203][ T29] audit: type=1400 audit(3842.080:1300151): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22805 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 3842.362055][ T29] audit: type=1400 audit(3842.080:1300152): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22805 comm="syz-executor" name="259" dev="tmpfs" ino=1401 [ 3842.364572][ T29] audit: type=1400 audit(3842.080:1300153): lsm=SMACK fn=smack_task_setpgid action=granted subject="_" object="_" requested=w pid=22805 comm="syz-executor" opid=22805 ocomm="syz-executor" [ 3842.366360][ T29] audit: type=1400 audit(3842.100:1300154): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22805 comm="syz-executor" name="259" dev="tmpfs" ino=1401 [ 3842.368174][ T29] audit: type=1400 audit(3842.100:1300155): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22805 comm="syz-executor" name="259" dev="tmpfs" ino=1401 [ 3842.369871][ T29] audit: type=1400 audit(3842.100:1300156): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=22805 comm="syz-executor" name="259" dev="tmpfs" ino=1401 [ 3842.371544][ T29] audit: type=1400 audit(3842.100:1300157): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22805 comm="syz-executor" name="259" dev="tmpfs" ino=1401 [ 3842.378863][ T29] audit: type=1400 audit(3842.100:1300158): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22805 comm="syz-executor" name="259" dev="tmpfs" ino=1401 [ 3842.380806][ T29] audit: type=1400 audit(3842.100:1300159): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=22805 comm="syz-executor" name="259" dev="tmpfs" ino=1401 [ 3842.734489][T22808] input: syz0 as /devices/virtual/input/input110 [ 3848.163195][ T29] kauditd_printk_skb: 1724 callbacks suppressed [ 3848.163344][ T29] audit: type=1400 audit(3847.920:1300930): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3115 comm="dhcpcd" [ 3848.177553][ T29] audit: type=1400 audit(3847.940:1300931): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3115 comm="dhcpcd" [ 3848.181731][ T29] audit: type=1400 audit(3847.940:1300932): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3115 comm="dhcpcd" [ 3848.190044][ T29] audit: type=1400 audit(3847.950:1300933): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="/" dev="vda" ino=2 [ 3848.191820][ T29] audit: type=1400 audit(3847.950:1300934): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="var" dev="vda" ino=1718 [ 3848.196818][ T29] audit: type=1400 audit(3847.950:1300935): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="var" dev="vda" ino=1718 [ 3848.198511][ T29] audit: type=1400 audit(3847.950:1300936): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="/" dev="vda" ino=2 [ 3848.200347][ T29] audit: type=1400 audit(3847.950:1300937): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 3848.201966][ T29] audit: type=1400 audit(3847.950:1300938): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3071 comm="syslogd" name="messages" dev="tmpfs" ino=13 [ 3848.213968][ T29] audit: type=1400 audit(3847.960:1300939): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3071 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 [ 3855.132639][ T29] kauditd_printk_skb: 584 callbacks suppressed [ 3855.132787][ T29] audit: type=1400 audit(3854.890:1301524): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=20637 comm="syz-executor" opid=22807 ocomm="syz.1.4941" [ 3855.154528][ T29] audit: type=1400 audit(3854.890:1301525): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=20637 comm="syz-executor" opid=22807 ocomm="syz.1.4941" [ 3855.156219][ T29] audit: type=1400 audit(3854.900:1301526): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="/" dev="vda" ino=2 [ 3855.157822][ T29] audit: type=1400 audit(3854.900:1301527): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="var" dev="vda" ino=1718 [ 3855.159480][ T29] audit: type=1400 audit(3854.900:1301528): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="var" dev="vda" ino=1718 [ 3855.161107][ T29] audit: type=1400 audit(3854.900:1301529): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="/" dev="vda" ino=2 [ 3855.162753][ T29] audit: type=1400 audit(3854.900:1301530): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 3855.174350][ T29] audit: type=1400 audit(3854.900:1301531): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3071 comm="syslogd" name="messages" dev="tmpfs" ino=13 [ 3855.176234][ T29] audit: type=1400 audit(3854.930:1301532): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3071 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 [ 3855.179174][ T29] audit: type=1400 audit(3854.930:1301533): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=3071 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 [ 3857.017762][T22844] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3857.054343][T22844] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3857.984383][T22852] input: syz0 as /devices/virtual/input/input111 [ 3860.137082][ T29] kauditd_printk_skb: 2284 callbacks suppressed [ 3860.137237][ T29] audit: type=1400 audit(3859.890:1303818): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22864 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 3860.139508][ T29] audit: type=1400 audit(3859.900:1303819): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22864 comm="syz-executor" name="/" dev="proc" ino=1 [ 3860.154017][ T29] audit: type=1400 audit(3859.900:1303820): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22864 comm="syz-executor" name="/" dev="proc" ino=1 [ 3860.158845][ T29] audit: type=1400 audit(3859.900:1303821): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22864 comm="syz-executor" name="793" dev="proc" ino=68033 [ 3860.160472][ T29] audit: type=1400 audit(3859.900:1303822): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=w pid=22864 comm="syz-executor" name="oom_score_adj" dev="proc" ino=68034 [ 3860.162403][ T29] audit: type=1400 audit(3859.900:1303823): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=22864 comm="syz-executor" path="/proc/793/oom_score_adj" dev="proc" ino=68034 [ 3860.169237][ T29] audit: type=1400 audit(3859.900:1303824): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22864 comm="syz-executor" name="267" dev="tmpfs" ino=1444 [ 3860.171398][ T29] audit: type=1400 audit(3859.900:1303825): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22864 comm="syz-executor" name="267" dev="tmpfs" ino=1444 [ 3860.180195][ T29] audit: type=1400 audit(3859.910:1303826): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=22864 comm="syz-executor" name="267" dev="tmpfs" ino=1444 [ 3860.182007][ T29] audit: type=1400 audit(3859.920:1303827): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="/" dev="vda" ino=2 [ 3860.409987][T22867] input: syz0 as /devices/virtual/input/input112 [ 3861.920229][T22869] sctp: [Deprecated]: syz.1.4961 (pid 22869) Use of struct sctp_assoc_value in delayed_ack socket option. [ 3861.920229][T22869] Use struct sctp_sack_info instead [ 3862.545029][T22887] input: syz0 as /devices/virtual/input/input113 [ 3865.148856][ T29] kauditd_printk_skb: 5824 callbacks suppressed [ 3865.149018][ T29] audit: type=1400 audit(3864.910:1308274): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22909 comm="modprobe" name="/" dev="vda" ino=2 [ 3865.164033][ T29] audit: type=1400 audit(3864.910:1308275): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22909 comm="modprobe" name="usr" dev="vda" ino=1488 [ 3865.165688][ T29] audit: type=1400 audit(3864.920:1308276): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22909 comm="modprobe" name="usr" dev="vda" ino=1488 [ 3865.167473][ T29] audit: type=1400 audit(3864.920:1308277): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22909 comm="modprobe" name="lib" dev="vda" ino=1622 [ 3865.169291][ T29] audit: type=1400 audit(3864.920:1308278): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="/" dev="vda" ino=2 [ 3865.172484][ T29] audit: type=1400 audit(3864.920:1308279): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22909 comm="modprobe" name="/" dev="vda" ino=2 [ 3865.183881][ T29] audit: type=1400 audit(3864.920:1308280): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="var" dev="vda" ino=1718 [ 3865.185453][ T29] audit: type=1400 audit(3864.920:1308281): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22909 comm="modprobe" name="usr" dev="vda" ino=1488 [ 3865.192190][ T29] audit: type=1400 audit(3864.920:1308282): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="var" dev="vda" ino=1718 [ 3865.194671][ T29] audit: type=1400 audit(3864.920:1308283): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="/" dev="vda" ino=2 [ 3868.866814][T22924] fuse: Bad value for 'group_id' [ 3868.867730][T22924] fuse: Bad value for 'group_id' [ 3870.153408][ T29] kauditd_printk_skb: 2139 callbacks suppressed [ 3870.153556][ T29] audit: type=1400 audit(3869.910:1310259): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=22929 comm="modprobe" name="libbusybox.so.1.35.0" dev="vda" ino=369 [ 3870.165455][ T29] audit: type=1400 audit(3869.900:1310253): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=22925 comm="syz.1.4975" path="/dev/full" dev="devtmpfs" ino=7 [ 3870.167545][ T29] audit: type=1400 audit(3869.920:1310260): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=22929 comm="modprobe" path="/lib/libbusybox.so.1.35.0" dev="vda" ino=369 [ 3870.169079][ T29] audit: type=1400 audit(3869.920:1310261): lsm=SMACK fn=smack_file_ioctl action=granted subject="_" object="_" requested=w pid=22925 comm="syz.1.4975" path="/dev/full" dev="devtmpfs" ino=7 [ 3870.170927][ T29] audit: type=1400 audit(3869.920:1310262): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=22929 comm="modprobe" path="/lib/libbusybox.so.1.35.0" dev="vda" ino=369 [ 3870.183518][ T29] audit: type=1400 audit(3869.940:1310263): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="/" dev="vda" ino=2 [ 3870.185589][ T29] audit: type=1400 audit(3869.940:1310264): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="var" dev="vda" ino=1718 [ 3870.189478][ T29] audit: type=1400 audit(3869.940:1310265): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="var" dev="vda" ino=1718 [ 3870.191270][ T29] audit: type=1400 audit(3869.940:1310266): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="/" dev="vda" ino=2 [ 3870.192877][ T29] audit: type=1400 audit(3869.940:1310267): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 3873.511838][T22949] fuse: Bad value for 'group_id' [ 3873.512607][T22949] fuse: Bad value for 'group_id' [ 3875.168703][ T29] kauditd_printk_skb: 3261 callbacks suppressed [ 3875.168790][ T29] audit: type=1400 audit(3874.920:1313529): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22960 comm="modprobe" name="/" dev="vda" ino=2 [ 3875.169946][ T29] audit: type=1400 audit(3874.920:1313530): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22960 comm="modprobe" name="lib" dev="vda" ino=195 [ 3875.170783][ T29] audit: type=1400 audit(3874.920:1313531): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22960 comm="modprobe" name="modules" dev="vda" ino=384 [ 3875.171811][ T29] audit: type=1400 audit(3874.920:1313532): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22960 comm="modprobe" name="modules" dev="vda" ino=384 [ 3875.180360][ T29] audit: type=1400 audit(3874.940:1313533): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="/" dev="vda" ino=2 [ 3875.181245][ T29] audit: type=1400 audit(3874.940:1313534): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="var" dev="vda" ino=1718 [ 3875.182464][ T29] audit: type=1400 audit(3874.940:1313535): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="var" dev="vda" ino=1718 [ 3875.184708][ T29] audit: type=1400 audit(3874.940:1313536): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="/" dev="vda" ino=2 [ 3875.185506][ T29] audit: type=1400 audit(3874.940:1313537): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 3875.186282][ T29] audit: type=1400 audit(3874.940:1313538): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3071 comm="syslogd" name="messages" dev="tmpfs" ino=13 [ 3876.648949][T22977] fuse: Bad value for 'group_id' [ 3876.649399][T22977] fuse: Bad value for 'group_id' [ 3879.065383][T23001] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3879.109929][T23001] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3879.148552][T23001] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3879.197142][T23001] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3879.230250][T23001] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3879.295587][T23001] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3879.357186][T23001] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3879.396599][T23001] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3880.180396][ T29] kauditd_printk_skb: 6367 callbacks suppressed [ 3880.180547][ T29] audit: type=1400 audit(3879.940:1318136): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=rw pid=22999 comm="syz.1.4988" name="raw-gadget" dev="devtmpfs" ino=701 [ 3880.187651][ T29] audit: type=1400 audit(3879.940:1318137): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22964 comm="udevd" name="/" dev="vda" ino=2 [ 3880.203847][ T29] audit: type=1400 audit(3879.940:1318138): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22964 comm="udevd" name="/" dev="tmpfs" ino=1 [ 3880.206315][ T29] audit: type=1400 audit(3879.940:1318139): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22964 comm="udevd" name="udev" dev="tmpfs" ino=7 [ 3880.208433][ T29] audit: type=1400 audit(3879.950:1318140): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=22964 comm="udevd" path="/run/udev/data" dev="tmpfs" ino=11 [ 3880.210705][ T29] audit: type=1400 audit(3879.950:1318141): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22964 comm="udevd" name="/" dev="vda" ino=2 [ 3880.212728][ T29] audit: type=1400 audit(3879.950:1318142): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22964 comm="udevd" name="/" dev="tmpfs" ino=1 [ 3880.243929][ T29] audit: type=1400 audit(3879.950:1318143): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22964 comm="udevd" name="udev" dev="tmpfs" ino=7 [ 3880.247191][ T29] audit: type=1400 audit(3879.950:1318144): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22964 comm="udevd" name="data" dev="tmpfs" ino=11 [ 3880.249868][ T29] audit: type=1400 audit(3879.950:1318145): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=22964 comm="udevd" name="data" dev="tmpfs" ino=11 [ 3885.184581][ T29] kauditd_printk_skb: 1883 callbacks suppressed [ 3885.184757][ T29] audit: type=1400 audit(3884.950:1320018): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=23026 comm="modprobe" name="usr" dev="vda" ino=1488 [ 3885.189078][ T29] audit: type=1400 audit(3884.950:1320019): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=23026 comm="modprobe" name="lib" dev="vda" ino=1622 [ 3885.191089][ T29] audit: type=1400 audit(3884.950:1320020): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=23026 comm="modprobe" name="/" dev="vda" ino=2 [ 3885.192759][ T29] audit: type=1400 audit(3884.950:1320021): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=23026 comm="modprobe" name="usr" dev="vda" ino=1488 [ 3885.221409][ T29] audit: type=1400 audit(3884.950:1320022): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=23026 comm="modprobe" name="usr" dev="vda" ino=1488 [ 3885.226970][ T29] audit: type=1400 audit(3884.950:1320023): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=23026 comm="modprobe" name="lib" dev="vda" ino=1622 [ 3885.228542][ T29] audit: type=1400 audit(3884.950:1320024): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=23026 comm="modprobe" name="/" dev="vda" ino=2 [ 3885.230168][ T29] audit: type=1400 audit(3884.950:1320025): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=23026 comm="modprobe" name="usr" dev="vda" ino=1488 [ 3885.255555][ T29] audit: type=1400 audit(3884.950:1320026): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=23026 comm="modprobe" name="usr" dev="vda" ino=1488 [ 3885.258229][ T29] audit: type=1400 audit(3884.950:1320027): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=23026 comm="modprobe" name="lib" dev="vda" ino=1622 [ 3887.154505][T18520] usb 1-1: new high-speed USB device number 40 using dummy_hcd [ 3887.324061][T18520] usb 1-1: Using ep0 maxpacket: 32 [ 3887.400627][T18520] usb 1-1: config 2 has an invalid interface number: 240 but max is 0 [ 3887.401776][T18520] usb 1-1: config 2 has an invalid descriptor of length 0, skipping remainder of the config [ 3887.410443][T18520] usb 1-1: config 2 has no interface number 0 [ 3887.411784][T18520] usb 1-1: config 2 interface 240 altsetting 57 has 0 endpoint descriptors, different from the interface descriptor's value: 12 [ 3887.413923][T18520] usb 1-1: config 2 interface 240 has no altsetting 0 [ 3887.493828][T18520] usb 1-1: New USB device found, idVendor=0424, idProduct=cf30, bcdDevice=cf.f0 [ 3887.495121][T18520] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 3887.496764][T18520] usb 1-1: Product: syz [ 3887.497515][T18520] usb 1-1: Manufacturer: syz [ 3887.498166][T18520] usb 1-1: SerialNumber: syz [ 3887.754971][T23042] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3887.794986][T23042] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3890.196779][ T29] kauditd_printk_skb: 3669 callbacks suppressed [ 3890.196933][ T29] audit: type=1400 audit(3889.950:1323466): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=23068 comm="syz.1.5003" path="/dev/fuse" dev="devtmpfs" ino=92 [ 3890.199181][ T29] audit: type=1400 audit(3889.950:1323467): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=3086 comm="udevd" path="/etc/udev/rules.d" dev="vda" ino=193 [ 3890.200685][ T29] audit: type=1400 audit(3889.950:1323468): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3086 comm="udevd" name="/" dev="vda" ino=2 [ 3890.206195][ T29] audit: type=1400 audit(3889.950:1323469): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3086 comm="udevd" name="lib" dev="vda" ino=195 [ 3890.207678][ T29] audit: type=1400 audit(3889.950:1323470): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3086 comm="udevd" name="udev" dev="vda" ino=1390 [ 3890.209002][ T29] audit: type=1400 audit(3889.950:1323471): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=3086 comm="udevd" path="/lib/udev/rules.d" dev="vda" ino=1395 [ 3890.210461][ T29] audit: type=1400 audit(3889.950:1323472): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3086 comm="udevd" name="/" dev="vda" ino=2 [ 3890.211809][ T29] audit: type=1400 audit(3889.950:1323473): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3086 comm="udevd" name="/" dev="tmpfs" ino=1 [ 3890.244686][ T29] audit: type=1400 audit(3889.970:1323474): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=23068 comm="syz.1.5003" name="294" dev="tmpfs" ino=1582 [ 3890.245427][T18520] usb 1-1: USB disconnect, device number 40 [ 3890.246049][ T29] audit: type=1400 audit(3889.970:1323475): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3086 comm="udevd" name="udev" dev="tmpfs" ino=7 [ 3890.289730][T18520] ------------[ cut here ]------------ [ 3890.290474][T18520] refcount_t: underflow; use-after-free. [ 3890.292011][T18520] WARNING: CPU: 0 PID: 18520 at lib/refcount.c:28 refcount_warn_saturate+0xf4/0x144 [ 3890.293241][T18520] Modules linked in: [ 3890.295078][T18520] CPU: 0 UID: 0 PID: 18520 Comm: kworker/0:0 Tainted: G B 6.12.0-rc5-syzkaller-00005-ge42b1a9a2557 #0 [ 3890.297615][T18520] Tainted: [B]=BAD_PAGE [ 3890.298891][T18520] Hardware name: linux,dummy-virt (DT) [ 3890.300141][T18520] Workqueue: usb_hub_wq hub_event [ 3890.301357][T18520] pstate: 61400009 (nZCv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--) [ 3890.302443][T18520] pc : refcount_warn_saturate+0xf4/0x144 [ 3890.303923][T18520] lr : refcount_warn_saturate+0xf4/0x144 [ 3890.304728][T18520] sp : ffff80008371b990 [ 3890.305307][T18520] x29: ffff80008371b990 x28: 0000000000000000 x27: f6f0000003076400 [ 3890.306721][T18520] x26: fbf0000009581800 x25: fbf00000095818a8 x24: ffff80008291d900 [ 3890.308084][T18520] x23: 0000000000000000 x22: f6f00000030764d0 x21: fdf000000621cb68 [ 3890.309354][T18520] x20: f6f0000003076450 x19: fbf0000003075000 x18: ffffffffffffffff [ 3890.310850][T18520] x17: 312d312f312d312f x16: 316273752f302e64 x15: ffff80008371b3d0 [ 3890.312101][T18520] x14: 0000000000000000 x13: ffff80008274e638 x12: 000000000000307e [ 3890.313646][T18520] x11: 000000000000102a x10: ffff800082816a28 x9 : ffff80008274e638 [ 3890.315081][T18520] x8 : 00000000fffff02a x7 : ffff8000827fe638 x6 : 000000000000102a [ 3890.316295][T18520] x5 : fff000007f8cb3c8 x4 : c0000000fffff02a x3 : fff07ffffd1d6000 [ 3890.317485][T18520] x2 : 0000000000000000 x1 : 0000000000000000 x0 : f6f00000171b8000 [ 3890.318816][T18520] Call trace: [ 3890.319360][T18520] refcount_warn_saturate+0xf4/0x144 [ 3890.320076][T18520] kobject_put+0x110/0x114 [ 3890.320734][T18520] put_device+0x14/0x24 [ 3890.321397][T18520] hdm_disconnect+0x84/0xa0 [ 3890.322017][T18520] usb_unbind_interface+0x78/0x290 [ 3890.322717][T18520] device_remove+0x70/0x80 [ 3890.323464][T18520] device_release_driver_internal+0x1d4/0x230 [ 3890.324238][T18520] device_release_driver+0x18/0x24 [ 3890.324951][T18520] bus_remove_device+0xcc/0x10c [ 3890.325617][T18520] device_del+0x14c/0x380 [ 3890.326263][T18520] usb_disable_device+0xd8/0x1b0 [ 3890.326976][T18520] usb_disconnect+0xd8/0x2bc [ 3890.327636][T18520] hub_event+0x98c/0x1558 [ 3890.328266][T18520] process_one_work+0x15c/0x29c [ 3890.328975][T18520] worker_thread+0x24c/0x354 [ 3890.329662][T18520] kthread+0x114/0x118 [ 3890.330291][T18520] ret_from_fork+0x10/0x20 [ 3890.331169][T18520] ---[ end trace 0000000000000000 ]--- [ 3890.443555][T18520] ------------[ cut here ]------------ [ 3890.444805][T18520] kobject: '(null)' (000000001d5fa2db): is not initialized, yet kobject_put() is being called. [ 3890.450739][T18520] WARNING: CPU: 0 PID: 18520 at lib/kobject.c:734 kobject_put+0xe0/0x114 [ 3890.453014][T18520] Modules linked in: [ 3890.453679][T18520] CPU: 0 UID: 0 PID: 18520 Comm: kworker/0:0 Tainted: G B W 6.12.0-rc5-syzkaller-00005-ge42b1a9a2557 #0 [ 3890.455016][T18520] Tainted: [B]=BAD_PAGE, [W]=WARN [ 3890.455673][T18520] Hardware name: linux,dummy-virt (DT) [ 3890.456340][T18520] Workqueue: usb_hub_wq hub_event [ 3890.457125][T18520] pstate: 61400009 (nZCv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--) [ 3890.458055][T18520] pc : kobject_put+0xe0/0x114 [ 3890.458885][T18520] lr : kobject_put+0xe0/0x114 [ 3890.459536][T18520] sp : ffff80008371b9a0 [ 3890.460080][T18520] x29: ffff80008371b9a0 x28: 0000000000000000 x27: f6f0000003076400 [ 3890.461317][T18520] x26: fbf0000009581800 x25: fbf00000095818a8 x24: ffff80008291d900 [ 3890.462507][T18520] x23: 0000000000000000 x22: f6f00000030764d0 x21: fdf000000621cb68 [ 3890.464092][T18520] x20: f6f0000003076450 x19: fdf000000621c000 x18: 0000000000000000 [ 3890.465355][T18520] x17: 0000000000000000 x16: 0000000000000000 x15: 0000ffffdee50fd8 [ 3890.466837][T18520] x14: 0000000000000287 x13: ffff800082720078 x12: 0000000000000001 [ 3890.468383][T18520] x11: 00000389d0e927a0 x10: fc1179a767fc758c x9 : b943a04bda46a771 [ 3890.469857][T18520] x8 : f6f00000171b91d8 x7 : fff000007f8d5880 x6 : 000000000172832f [ 3890.471415][T18520] x5 : 01ffffffffffffff x4 : 0000000000000001 x3 : 0000000000000000 [ 3890.473552][T18520] x2 : 0000000000000000 x1 : 0000000000000000 x0 : f6f00000171b8000 [ 3890.475028][T18520] Call trace: [ 3890.475549][T18520] kobject_put+0xe0/0x114 [ 3890.476360][T18520] put_device+0x14/0x24 [ 3890.476997][T18520] hdm_disconnect+0x8c/0xa0 [ 3890.477658][T18520] usb_unbind_interface+0x78/0x290 [ 3890.478368][T18520] device_remove+0x70/0x80 [ 3890.479058][T18520] device_release_driver_internal+0x1d4/0x230 [ 3890.479835][T18520] device_release_driver+0x18/0x24 [ 3890.480995][T18520] bus_remove_device+0xcc/0x10c [ 3890.481658][T18520] device_del+0x14c/0x380 [ 3890.482306][T18520] usb_disable_device+0xd8/0x1b0 [ 3890.483352][T18520] usb_disconnect+0xd8/0x2bc [ 3890.484115][T18520] hub_event+0x98c/0x1558 [ 3890.484724][T18520] process_one_work+0x15c/0x29c [ 3890.485438][T18520] worker_thread+0x24c/0x354 [ 3890.486149][T18520] kthread+0x114/0x118 [ 3890.487332][T18520] ret_from_fork+0x10/0x20 [ 3890.488082][T18520] ---[ end trace 0000000000000000 ]--- [ 3911.421396][ T29] kauditd_printk_skb: 1235 callbacks suppressed [ 3911.421555][ T29] audit: type=1400 audit(3911.180:1324711): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3115 comm="dhcpcd" [ 3911.428563][ T29] audit: type=1400 audit(3911.180:1324712): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3115 comm="dhcpcd" [ 3911.430360][ T29] audit: type=1400 audit(3911.180:1324713): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3115 comm="dhcpcd" [ 3911.441955][ T29] audit: type=1400 audit(3911.200:1324714): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="/" dev="vda" ino=2 [ 3911.445299][ T29] audit: type=1400 audit(3911.200:1324715): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="var" dev="vda" ino=1718 [ 3911.447337][ T29] audit: type=1400 audit(3911.200:1324716): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="var" dev="vda" ino=1718 [ 3911.448819][ T29] audit: type=1400 audit(3911.200:1324717): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="/" dev="vda" ino=2 [ 3911.450458][ T29] audit: type=1400 audit(3911.200:1324718): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3071 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 3911.452436][ T29] audit: type=1400 audit(3911.200:1324719): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3071 comm="syslogd" name="messages" dev="tmpfs" ino=13 [ 3911.455190][ T29] audit: type=1400 audit(3911.200:1324720): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3071 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 VM DIAGNOSIS: 03:04:01 Registers: info registers vcpu 0 CPU#0 PC=ffff800080122eac X00=0000000100000004 X01=f6f00000171b8000 X02=fff07ffffd1d6000 X03=00000000ffffffff X04=ffff80008371b1bf X05=ffff80008298fe9f X06=322e30393833205b X07=545b5d3837303539 X08=3032353831203a44 X09=6b203a6d6d6f4320 X10=656c6c616b7a7973 X11=2d35303030302d72 X12=5b5d383730353932 X13=205d303235383154 X14=302f72656b726f77 X15=746e69615420303a X16=20202047203a6465 X17=2020202020204220 X18=ffffffffffffffff X19=ffff80008371b3bb X20=ffff80008298fba8 X21=ffff800082747768 X22=ffff80008371b3c0 X23=0000000000000000 X24=0000000000000000 X25=ffff800082720030 X26=00000000000003c0 X27=ffff800082895f60 X28=f6f00000171b8000 X29=ffff80008371b2c0 X30=ffff800080122ea8 SP=ffff80008371b2c0 PSTATE=624003c9 -ZC- EL2h SVCR=00000000 -- BTYPE=0 FPCR=00000000 FPSR=00000000 P00=0000000000000000 P01=0000000000000000 P02=0000000000000000 P03=0000000000000000 P04=0000000000000000 P05=0000000000000000 P06=0000000000000000 P07=0000000000000000 P08=0000000000000000 P09=0000000000000000 P10=0000000000000000 P11=0000000000000000 P12=0000000000000000 P13=0000000000000000 P14=0000000000000000 P15=0000000000000000 FFR=0000000000000000 Z00=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z01=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z02=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z03=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z04=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z05=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z06=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000ffffb0ad6458:0000ffffb0ad6450 Z07=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000ffffb0ad6468:0000ffffb0ad6460 Z08=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z09=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z10=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z11=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z12=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z13=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z14=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z15=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z16=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000fffff70a6f20:0000fffff70a6f20 Z17=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:ffffff80ffffffd0:0000fffff70a6ef0 Z18=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z19=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z20=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z21=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z22=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z23=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z24=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z25=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z26=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z27=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z28=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z29=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z30=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z31=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff80008029d4e0 X00=f6f00000057f2140 X01=0054000aaaad4e58 X02=0000000aaaad4e58 X03=00e00000928b2cc3 X04=ffffc1ffc0000000 X05=0000ffff829d6ad0 X06=00000000000000c0 X07=0000000000000040 X08=0000aaa07e48c2f8 X09=0000000000000000 X10=0000aaaad4e58710 X11=0000aaaad4e58ff0 X12=0000aaaad4e59010 X13=0000000000000000 X14=0000000000000000 X15=0000000000000041 X16=0000aaaad4e57050 X17=0000aaaad4e58e60 X18=0000ffff825a9fff X19=fff0000005a5b2c0 X20=f0f0000003de0840 X21=0000aaaad4e58000 X22=00e00000928b2cc3 X23=f6f00000057f2140 X24=f6f00000057f2140 X25=ffff800082720340 X26=0000000000001a55 X27=f6f00000057f2140 X28=ffffc1ffc1350a80 X29=ffff80008897bbb0 X30=01cf8000802860c4 SP=ffff80008897bbb0 PSTATE=01400009 ---- EL2h SVCR=00000000 -- BTYPE=0 FPCR=00000000 FPSR=00000000 P00=0000000000000000 P01=0000000000000000 P02=0000000000000000 P03=0000000000000000 P04=0000000000000000 P05=0000000000000000 P06=0000000000000000 P07=0000000000000000 P08=0000000000000000 P09=0000000000000000 P10=0000000000000000 P11=0000000000000000 P12=0000000000000000 P13=0000000000000000 P14=0000000000000000 P15=0000000000000000 FFR=0000000000000000 Z00=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:2c2c2c2c2c2c2c2c:2c2c2c2c2c2c2c2c Z01=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:706d6520676e6970:70696b5300657200 Z02=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:00000000c000000c Z03=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z04=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:3003300330033003:3003300330033003 Z05=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:f00ff00ff00ff00f:f00ff00ff00ff00f Z06=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:000000000000c00c:000000000000c00c Z07=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z08=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z09=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z10=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z11=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z12=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z13=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z14=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z15=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z16=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z17=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z18=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z19=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z20=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z21=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z22=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z23=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z24=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z25=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z26=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z27=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z28=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z29=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z30=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z31=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000