last executing test programs: 30.750892363s ago: executing program 0 (id=5980): r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000080)={0x1d, r1, 0x2}, 0x18) sendmsg$IPSET_CMD_GET_BYINDEX(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)={0x14, 0xf, 0x6, 0x101, 0x0, 0x0, {0x6, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x4004040}, 0x0) sendmsg$NL80211_CMD_GET_WOWLAN(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x20, 0x0, 0x0, 0x70bd2c, 0x25dfdbff, {{}, {@void, @void, @val={0xc, 0x99, {0xdf}}}}}, 0x20}, 0x1, 0x0, 0x0, 0x4000}, 0x0) (fail_nth: 2) 29.489004295s ago: executing program 0 (id=5981): r0 = syz_open_dev$ptys(0xc, 0x3, 0x0) r1 = signalfd4(r0, &(0x7f0000000000)={[0x7]}, 0x8, 0x80000) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f0000000040)={{0x1, 0x1, 0x18, r1, {0x80000000}}, './file0\x00'}) close_range(r2, r1, 0x2) r3 = fcntl$getown(r0, 0x9) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000080)={0x100000000, 0xfffffffffffffffd}) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000000c0)) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000140), r1) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000180)={'batadv_slave_1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000240)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x2f, 0x0, 0xe, 0x8, 0x41, @private0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x80, 0x8729, 0xffff1935, 0x3b7}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000000300)={'syztnl0\x00', &(0x7f0000000280)={'syztnl0\x00', 0x0, 0x10, 0x8000, 0x1, 0x1, {{0x13, 0x4, 0x0, 0x7, 0x4c, 0x67, 0x0, 0x4, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@end, @noop, @timestamp_addr={0x44, 0xc, 0x1b, 0x1, 0xc, [{@dev={0xac, 0x14, 0x14, 0x28}, 0xff}]}, @ssrr={0x89, 0x27, 0xfa, [@loopback, @multicast1, @local, @loopback, @empty, @multicast2, @private=0xa010101, @multicast2, @rand_addr=0x64010102]}]}}}}}) getsockname$packet(r2, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000380)=0x14) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000440)={'ip6tnl0\x00', &(0x7f00000003c0)={'ip6_vti0\x00', 0x0, 0x2f, 0xff, 0x6, 0x4, 0x25, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x40, 0x40, 0x2, 0x7}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000540)={'sit0\x00', &(0x7f0000000480)={'erspan0\x00', 0x0, 0x1, 0x20, 0x6, 0x0, {{0x1c, 0x4, 0x3, 0x2, 0x70, 0x68, 0x0, 0x0, 0x4, 0x0, @local, @remote, {[@ra={0x94, 0x4, 0x1}, @ssrr={0x89, 0xf, 0xb4, [@rand_addr=0xff, @rand_addr=0x64010101, @local]}, @lsrr={0x83, 0x7, 0xa0, [@private=0xa010102]}, @timestamp_prespec={0x44, 0x3c, 0x84, 0x3, 0x2, [{@broadcast, 0x72}, {@remote, 0x2}, {@broadcast, 0x4}, {@local, 0x2bcb}, {@private=0xa010102, 0x5}, {@private=0xa010101, 0x2}, {@loopback, 0xfffffffe}]}, @ra={0x94, 0x4}]}}}}}) sendmsg$ETHTOOL_MSG_COALESCE_GET(r2, &(0x7f0000000780)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000740)={&(0x7f0000000580)={0x1a0, r4, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [@HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x84, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dvmrp1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}]}]}, 0x1a0}, 0x1, 0x0, 0x0, 0x8010}, 0x1) bind(r2, &(0x7f00000007c0)=@qipcrtr={0x2a, 0xffffffffffffffff, 0x3fff}, 0x80) r11 = socket(0x26, 0x6, 0x2) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000008c0)={'ip6_vti0\x00', &(0x7f0000000840)={'ip6tnl0\x00', r9, 0x2f, 0x7, 0xd2, 0x0, 0x66, @private2, @empty, 0x8000, 0x1, 0x200, 0x3}}) setsockopt$IPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x41, &(0x7f0000000900)={'nat\x00', 0x2, [{}, {}]}, 0x48) r12 = fcntl$dupfd(r11, 0x406, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r12, 0x402c5342, &(0x7f0000000980)={0x3, 0x80, 0x9067, {0x612000, 0x6}, 0x10}) r13 = socket$igmp(0x2, 0x3, 0x2) ioctl$sock_SIOCETHTOOL(r13, 0x8946, &(0x7f0000000a40)={'tunl0\x00', &(0x7f0000000a00)=@ethtool_pauseparam={0x13, 0x4, 0x6, 0x6}}) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) fcntl$lock(r11, 0x6, &(0x7f0000000a80)={0x0, 0x3, 0xce, 0x9, r3}) tkill(r3, 0x29) r14 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000b00), r2) sendmsg$NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL(r1, &(0x7f0000000c00)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000b40)={0x50, r14, 0x111, 0x70bd27, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x400, 0xb}}}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x1d}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x13}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x24}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x1}]}, 0x50}, 0x1, 0x0, 0x0, 0x4010}, 0x8008) openat$binderfs(0xffffffffffffff9c, &(0x7f0000000c40)='./binderfs/binder0\x00', 0x1000, 0x0) sendmsg$RDMA_NLDEV_CMD_STAT_DEL(r2, &(0x7f0000000d40)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000cc0)={0x38, 0x1412, 0x400, 0x70bd2a, 0x25dfdbfd, "", [@RDMA_NLDEV_ATTR_STAT_COUNTER_ID={0x8, 0x4f, 0x2}, @RDMA_NLDEV_ATTR_STAT_RES={0x8}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x1}, @RDMA_NLDEV_ATTR_STAT_COUNTER_ID={0x8, 0x4f, 0x4}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x20008000}, 0x48180) 28.94391899s ago: executing program 0 (id=5982): r0 = gettid() tkill(r0, 0x7) ptrace$pokeuser(0x6, r0, 0x31, 0xfffffffffffffff7) r1 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/firmware/fdt', 0x0, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) mlockall(0x3) mremap(&(0x7f0000ff5000/0x2000)=nil, 0x2000, 0x5000000, 0x3, &(0x7f0000ffd000/0x1000)=nil) r2 = userfaultfd(0x801) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='cpuacct.stat\x00', 0x26e1, 0x0) close(r4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)) sendmsg$nl_xfrm(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[], 0x33fe0}}, 0x0) r5 = io_uring_setup(0x7ef1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x3}) sendmsg$MPTCP_PM_CMD_ANNOUNCE(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={0x0}, 0x1, 0x0, 0x0, 0x20000000}, 0xc000) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'md5\x00'}, 0x58) close(r5) socket$unix(0x1, 0x1, 0x0) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000ba7000/0x1000)=nil, 0x1000}, 0x4}) userfaultfd(0x0) syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r1, 0x40045730, &(0x7f0000000000)=0x4) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000100)={'wlan0\x00'}) sendmsg$NL80211_CMD_DISASSOCIATE(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="100023bd7000"/26], 0x20}, 0x1, 0x0, 0x0, 0x20040881}, 0x0) 7.673200393s ago: executing program 1 (id=5993): r0 = socket$xdp(0x2c, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r0, 0x8982, &(0x7f0000000000)={0x6, 'bridge_slave_0\x00', {0x8}, 0xfff9}) setsockopt$XDP_UMEM_COMPLETION_RING(r0, 0x11b, 0x6, &(0x7f0000000040)=0x1c00, 0x4) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r1, &(0x7f00000000c0), 0x2, 0x0) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000140)={0x3, &(0x7f0000000100)=[{0xfff7, 0x3, 0x1, 0x7}, {0x6, 0x6, 0x2, 0xfffffffa}, {0x9a6a, 0x7, 0x2, 0x8}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000180)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0x40182103, &(0x7f0000000200)={r3, 0x3, r0, 0x5}) prctl$PR_GET_FPEXC(0xb, &(0x7f0000000240)) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000280)={0x0, 0x9e}, 0x8) prctl$PR_GET_FPEXC(0xb, &(0x7f00000002c0)) r4 = socket(0x25, 0x3, 0x67) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300), 0x408000, 0x0) ioctl$TUNGETIFF(r5, 0x800454d2, &(0x7f0000000340)={'dvmrp1\x00'}) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r4, 0x84, 0x73, &(0x7f0000000380)={0x0, 0x2, 0x10, 0x5, 0x7fff}, &(0x7f00000003c0)=0x18) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r4, 0x84, 0x13, &(0x7f0000000400)={r6, 0x8}, &(0x7f0000000440)=0x8) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000480)=0x10a000, 0x4) mount(&(0x7f00000004c0)=@sg0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='qnx4\x00', 0x80, &(0x7f0000000580)='bridge_slave_0\x00') close(r5) prctl$PR_GET_FPEXC(0xb, &(0x7f00000005c0)) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000a00)={0xa5, 0xb, &(0x7f0000000600)="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"}) r7 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000a40), 0x82000, 0x0) ioctl$FBIOGET_VSCREENINFO(r7, 0x4600, &(0x7f0000000a80)) fsopen(&(0x7f0000000b40)='fuse\x00', 0x0) r8 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000bc0), r4) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r4, &(0x7f0000000cc0)={&(0x7f0000000b80)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000c80)={&(0x7f0000000c00)={0x58, r8, 0x800, 0x70bd2a, 0x25dfdbff, {}, [@ETHTOOL_A_LINKINFO_HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x7}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x400c4}, 0x10) prctl$PR_GET_FPEXC(0xb, &(0x7f0000000d00)) getresgid(&(0x7f0000000d40), &(0x7f0000000d80), &(0x7f0000000dc0)) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000e00)={0x8, 0x0, 0x4, 0x101, 0x2, [{0x7a3f, 0x200, 0x7, '\x00', 0x2002}, {0xfffffffffffffffb, 0x9, 0x1, '\x00', 0x302}]}) sendmsg$IPVS_CMD_GET_INFO(r2, &(0x7f0000001040)={&(0x7f0000000ec0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001000)={&(0x7f0000000f40)={0xb4, 0x0, 0x8, 0x70bd27, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DEST={0x3c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x1ff}, @IPVS_DEST_ATTR_TUN_TYPE={0x5}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e21}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e23}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x8}]}, @IPVS_CMD_ATTR_SERVICE={0x10, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x9, 0x6, 'none\x00'}]}, @IPVS_CMD_ATTR_DAEMON={0x44, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @rand_addr=' \x01\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, '\x00', 0x27}}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x4}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xe28}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40}]}, 0xb4}, 0x1, 0x0, 0x0, 0x4}, 0x4000010) 6.833458495s ago: executing program 1 (id=5994): pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) ioctl$SNDRV_PCM_IOCTL_HW_FREE(r1, 0x4112, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080), r0) sendmsg$TIPC_CMD_ENABLE_BEARER(r2, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x34, r3, 0x100, 0x70bd2d, 0x25dfdbff, {{}, {}, {0x18, 0x17, {0xb, 0x9, @l2={'eth', 0x3a, 'ipvlan1\x00'}}}}, ["", "", "", "", "", "", "", ""]}, 0x34}, 0x1, 0x0, 0x0, 0x4044004}, 0x20004020) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000180)={0x0, 'xfrm0\x00', {0x3}, 0xfffa}) write$P9_RLOCK(r0, &(0x7f00000001c0)={0x8, 0x35, 0x1}, 0x8) r4 = syz_open_pts(r0, 0x224000) ioctl$KDFONTOP_COPY(r4, 0x4b72, &(0x7f0000000600)={0x3, 0x0, 0x7, 0x5, 0xb3, &(0x7f0000000200)}) sendmsg$AUDIT_TRIM(r0, &(0x7f0000000700)={&(0x7f0000000640), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x10, 0x3f6, 0x800, 0x70bd2b, 0x25dfdbfb, "", ["", "", "", "", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x4008001}, 0x4000051) socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_FORWARD(r1, 0x40084149, &(0x7f0000000740)) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000780)={0x0, 0x2c, "e1c5302098145f0907985aa718fe54f059db53d83e26a0de5eb354dea74f9c75d5f3fb9342b0d359399e2494"}) sendmsg$NL80211_CMD_DEL_NAN_FUNCTION(r2, &(0x7f00000008c0)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000880)={&(0x7f0000000800)={0x68, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x8, 0x4b}}}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x45}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x72}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0xb}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x5e}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x43}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x4d}]}, 0x68}, 0x1, 0x0, 0x0, 0x4008010}, 0x0) r5 = accept4(r1, &(0x7f0000000900)=@qipcrtr, &(0x7f0000000980)=0x80, 0x80000) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r4) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r0, &(0x7f0000000ac0)={&(0x7f00000009c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000a80)={&(0x7f0000000a00)={0x60, 0x1405, 0x200, 0x70bd28, 0x25dfdbfd, "", [{{0x8, 0x1, 0x2}, {0x8}}, {{0x8}, {0x8, 0x3, 0x3}}, {{0x8}, {0x8, 0x3, 0x4}}, {{0x8, 0x1, 0x1}, {0x8, 0x3, 0x2}}, {{0x8, 0x1, 0x2}, {0x8, 0x3, 0x2}}]}, 0x60}, 0x1, 0x0, 0x0, 0x10}, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000b00)={0x0, 0x0}) timer_create(0x0, &(0x7f0000000b80)={0x0, 0x41, 0x0, @tid=r6}, &(0x7f0000000bc0)) unlinkat(r0, &(0x7f0000000c00)='./file0\x00', 0x200) close_range(r2, r5, 0x2) socket$packet(0x11, 0x2, 0x300) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000c80), r0) sendmsg$NL80211_CMD_DEL_INTERFACE(r2, &(0x7f0000000d40)={&(0x7f0000000c40)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000d00)={&(0x7f0000000cc0)={0x20, r7, 0x0, 0x70bd2b, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x9, 0x6f}}}}, ["", "", "", "", "", "", "", ""]}, 0x20}}, 0x20008000) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x1c, &(0x7f0000000d80)=""/231, &(0x7f0000000e80)=0xe7) preadv(r2, &(0x7f00000011c0)=[{&(0x7f0000000ec0)=""/220, 0xdc}, {&(0x7f0000000fc0)=""/252, 0xfc}, {&(0x7f00000010c0)=""/213, 0xd5}], 0x3, 0x6, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_PD_GET(r1, &(0x7f00000012c0)={&(0x7f0000001200)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000001280)={&(0x7f0000001240)={0x30, 0x140e, 0x400, 0x70bd28, 0x25dfdbfe, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_RES_PDN={0x8, 0x3c, 0x4}, @RDMA_NLDEV_ATTR_RES_PDN={0x8, 0x3c, 0x3}]}, 0x30}, 0x1, 0x0, 0x0, 0x20004811}, 0x4004) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000001340)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r1, &(0x7f0000001440)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000001400)={&(0x7f0000001380)={0x64, r7, 0x800, 0x70bd29, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r8}, @void}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x45}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x7d}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x5d}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x2e}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x2d}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x18}]}, 0x64}, 0x1, 0x0, 0x0, 0x20000000}, 0x80) ioctl$UI_SET_KEYBIT(r1, 0x40045565, 0x27e) 6.49394199s ago: executing program 1 (id=5995): r0 = fspick(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x1) readv(r0, &(0x7f00000001c0)=[{&(0x7f0000000040)=""/125, 0x7d}, {&(0x7f00000000c0)=""/122, 0x7a}, {&(0x7f0000000140)=""/104, 0x68}], 0x3) r1 = syz_open_dev$audion(&(0x7f0000000200), 0xca7, 0x101080) read$FUSE(0xffffffffffffffff, &(0x7f0000000240)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r1, &(0x7f0000002280)={0x50, 0x0, r2, {0x7, 0x28, 0xf, 0x430010, 0x7, 0x8001, 0xcc}}, 0x50) ioctl$VT_WAITACTIVE(r1, 0x5607) setxattr$trusted_overlay_nlink(&(0x7f0000002300)='./file0\x00', &(0x7f0000002340), &(0x7f0000002380)={'U-', 0xa}, 0x16, 0x3) r6 = fspick(r1, &(0x7f00000023c0)='./file0\x00', 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r6, 0x7, 0x0, 0x0, 0x0) cachestat(r6, &(0x7f0000002400)={0xb2b, 0x6}, &(0x7f0000002440), 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r6, 0x40086607, &(0x7f0000002480)=0x2c76) setsockopt$MRT_ADD_MFC_PROXY(r1, 0x0, 0xd2, &(0x7f00000024c0)={@multicast2, @rand_addr=0x64010101, 0x1, "e9835fe7b7077d3a60d2d0edc3f9d56555c3c974b3ec802cce30940e6f828417", 0x4, 0x8, 0xb699, 0x9}, 0x3c) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000002500)={0x11e800, {{0x2, 0x4e23, @multicast1}}}, 0x88) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f00000025c0), 0x101080, 0x0) fsetxattr$trusted_overlay_redirect(r6, &(0x7f0000002600), &(0x7f0000002640)='./file0\x00', 0x8, 0x2) statx(r1, &(0x7f0000004b40)='./file0\x00', 0x6000, 0x100, &(0x7f0000004b80)={0x0, 0x0, 0x0, 0x0, 0x0}) newfstatat(0xffffffffffffff9c, &(0x7f0000004c80)='./file0\x00', &(0x7f0000004cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) fstat(0xffffffffffffffff, &(0x7f0000004ec0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_fuse_handle_req(r1, &(0x7f0000002680)="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", 0x2000, &(0x7f0000005040)={&(0x7f0000004680)={0x50, 0xfffffffffffffffe, 0x4, {0x7, 0x28, 0x0, 0x11004, 0x1, 0xe, 0x5, 0x1}}, &(0x7f0000004700)={0x18, 0x0, 0xffffffff, {0xffffffffffff65db}}, &(0x7f0000004740)={0x18, 0xffffffffffffffda, 0x10000, {0x7fffffff}}, &(0x7f0000004780)={0x18, 0x0, 0x3, {0x4}}, &(0x7f00000047c0)={0x18, 0xfffffffffffffffe, 0x101}, &(0x7f0000004800)={0x28, 0x0, 0x7, {{0xe, 0xe00000000000000, 0x2, r5}}}, &(0x7f0000004840)={0x60, 0x0, 0x0, {{0x55, 0x1000, 0xe196, 0x2, 0x2f, 0x7, 0x0, 0x9}}}, &(0x7f00000048c0)={0x18, 0x0, 0xffff, {0x4}}, &(0x7f0000004900)={0x12, 0xffffffffffffffda, 0x100000001, {'/\x00'}}, &(0x7f0000004940)={0x20, 0x0, 0x100000000, {0x0, 0x2}}, &(0x7f0000004980)={0x78, 0x0, 0x6, {0x7, 0x4, 0x0, {0x2, 0x7, 0x40, 0xfffffffffffffffc, 0x40, 0x9, 0x0, 0x7, 0x7, 0xa000, 0x1000, 0xee00, 0xffffffffffffffff, 0x4, 0x1}}}, &(0x7f0000004a00)={0x90, 0x0, 0xe8f0, {0x4, 0x3, 0x1, 0x8, 0x1, 0x4, {0x6, 0x1, 0x7, 0xaaa, 0x1, 0x1, 0x2, 0xffff, 0x140000, 0x4000, 0x9, r3, r4, 0x2, 0xfffffffd}}}, &(0x7f0000004ac0)={0x50, 0x0, 0x80, [{0x0, 0x59, 0x2, 0x0, 'U-'}, {0x6, 0x7, 0x4, 0x8, '\xa7*\x17^'}]}, &(0x7f0000004d40)={0x170, 0x0, 0x39, [{{0x1, 0x1, 0x9, 0xff, 0x1, 0x2, {0x0, 0x5, 0x400, 0x8, 0x100, 0x1, 0x0, 0x1, 0x8, 0x6000, 0x1, r3, r4, 0xa, 0xaf8}}, {0x2, 0x6, 0x16, 0x2, 'trusted.overlay.nlink\x00'}}, {{0x3, 0x1, 0x4, 0x2b1, 0x8, 0x3, {0x3, 0x4, 0x0, 0x7e3, 0x10001, 0x2, 0xfffffff0, 0xc, 0xb, 0xc000, 0x70, r7, r8, 0xfffffff8, 0x200}}, {0x5, 0x20, 0x16, 0xff, 'trusted.overlay.nlink\x00'}}]}, &(0x7f0000004f40)={0xa0, 0x0, 0xe4c7, {{0x3, 0x2, 0x1, 0x100000001, 0xfffffffe, 0x4, {0x5, 0x14000000, 0xfff, 0xf, 0x74, 0xf, 0x81, 0x2, 0x1, 0x4000, 0x3, r9, r4, 0x5, 0x7}}, {0x0, 0x9}}}, &(0x7f0000005000)={0x20, 0x0, 0x9, {0x4, 0x0, 0x8, 0x9}}}) getpeername$packet(r1, &(0x7f0000005100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000005140)=0x14) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r1, &(0x7f0000005240)={&(0x7f00000050c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000005200)={&(0x7f0000005180)={0x4c, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r10}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x81}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40000}, 0x4000840) getsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000005280), &(0x7f00000052c0)=0x4) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000005300)={r10, 0x1, 0x6, @remote}, 0x10) io_uring_enter(r1, 0x54f0, 0xccc0, 0x10, &(0x7f0000005340)={[0x6]}, 0x8) syz_open_dev$tty20(0xc, 0x4, 0x1) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000005380)={0xfffff000, {{0x2, 0x4e21, @broadcast}}}, 0x88) r11 = syz_init_net_socket$llc(0x1a, 0x0, 0x0) r12 = fcntl$dupfd(r11, 0x406, r1) sched_setscheduler(r5, 0x3, &(0x7f0000005440)=0x1ff) sendmsg$AUDIT_TTY_SET(r12, &(0x7f0000005540)={&(0x7f0000005480)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000005500)={&(0x7f00000054c0)={0x18, 0x3f9, 0x20, 0x70bd2c, 0x25dfdbfc, {0x1, 0x1}, ["", "", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x40}, 0x4000080) 6.384458511s ago: executing program 1 (id=5996): r0 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000005c0)=@raw={'raw\x00', 0x4001, 0x8000000, 0x218, 0xd0, 0x720d, 0x148, 0xd0, 0x148, 0x180, 0x240, 0x240, 0x180, 0x240, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x5, 0x0, 0x4, 0x1]}, {0x0, [], 0x6, 0x1}}}}, {{@ip={@multicast2, @loopback, 0xffffffff, 0xffffffff, 'geneve1\x00', 'veth1_macvtap\x00', {0xff}, {0xff}, 0xc, 0x0, 0x52}, 0x0, 0x70, 0xb0}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xee8, 0x6, 0xfffff468, 0x5, 0x4, 0x6, 0x81, 0x8]}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x278) sendto$inet(r0, 0x0, 0x0, 0x24000080, 0x0, 0x0) r1 = socket$inet(0x2, 0x2, 0x0) dup3(0xffffffffffffffff, r1, 0x0) r2 = dup(r0) getsockopt$bt_hci(r0, 0x0, 0x0, 0x0, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', 0x0, &(0x7f0000000200)='r\x82\xd7aIJ\xc0t\xee\x9b;+\xb4\x13\xfd\xb3\xe1\xff\x7f\x1dY+\xc9\xdc\x11\x90\x14\xb5\x0fIH^<\xdf\xc6\x82\x9fr\xe4\xf81G5`\x92\xe8E(', 0x30, 0x3) ioctl$HIDIOCGRAWINFO(r2, 0x80084803, &(0x7f0000000080)=""/56) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 1.025678592s ago: executing program 0 (id=5988): r0 = getegid() (async, rerun: 64) read$FUSE(0xffffffffffffffff, &(0x7f0000000000)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) (async, rerun: 64) getgroups(0x4, &(0x7f0000002040)=[0xffffffffffffffff, 0xee00, 0x0, 0x0]) setgroups(0x7, &(0x7f0000002080)=[0xffffffffffffffff, r0, r3, 0x0, 0xffffffffffffffff, 0xee00, r6]) (async) r7 = semget$private(0x0, 0x1, 0x0) semctl$SEM_INFO(r7, 0x1, 0x13, &(0x7f00000020c0)=""/222) (async, rerun: 64) semctl$GETNCNT(r7, 0x1, 0xe, &(0x7f00000021c0)=""/4096) (rerun: 64) r8 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) write$FUSE_INIT(r8, &(0x7f00000031c0)={0x50, 0x0, r1, {0x7, 0x28, 0x7ff, 0x28, 0x7, 0x8, 0x8, 0x5}}, 0x50) setgroups(0x4, &(0x7f0000003240)=[r5, r4, r0, r0]) (async, rerun: 64) writev(r8, &(0x7f00000052c0)=[{&(0x7f0000003280)="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", 0x1000}, {&(0x7f0000004280)="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", 0x1000}, {&(0x7f0000005280)="699b84bf533951ec3c75e4bb8e1593a6847dbe261de0e84a227afb384735966d0f", 0x21}], 0x3) (async, rerun: 64) r9 = semget(0x2, 0x4, 0x200) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r8, 0xc018937b, &(0x7f0000005300)={{0x1, 0x1, 0x18, r8, {r2, r3}}, './file0\x00'}) semctl$IPC_SET(r9, 0x0, 0x1, &(0x7f0000005340)={{0x3, r2, r3, r2, r12, 0x148, 0xffff}, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x4}) semctl$SEM_STAT(r9, 0x1, 0x12, &(0x7f00000053c0)=""/80) (async) ioctl$BTRFS_IOC_START_SYNC(r8, 0x80089418, &(0x7f0000005440)=0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r10, 0x50009418, &(0x7f0000005480)={{r10}, r13, 0x14, @unused=[0x8, 0x4, 0x2, 0x2], @name="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"}) (async) semop(r7, &(0x7f0000006480)=[{0x1, 0x5, 0x1000}], 0x1) (async) semctl$SETALL(r7, 0x0, 0x11, &(0x7f00000064c0)=[0x9, 0x2]) (async) semctl$GETVAL(r7, 0x4, 0xc, &(0x7f0000006500)=""/169) (async) io_setup(0x5, &(0x7f00000065c0)=0x0) io_destroy(r14) (async) r15 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000006600), 0x0, 0x0) ppoll(&(0x7f0000006640)=[{r15, 0x1248}, {r10, 0x2081}, {r8}, {r10, 0x2000}, {r10, 0x2}, {r10, 0x6042}, {r10, 0x20}, {r8, 0xc4}, {r10, 0x2000}], 0x9, &(0x7f00000066c0)={0x77359400}, &(0x7f0000006700)={[0xd]}, 0x8) r16 = syz_open_dev$sndctrl(&(0x7f0000006740), 0x3, 0x189a80) ioctl$BTRFS_IOC_INO_PATHS(r16, 0xc0389423, &(0x7f00000067c0)={0x6, 0x18, [0xfffffffffffff277, 0xbc, 0x7, 0x40], &(0x7f0000006780)=[0x0, 0x0, 0x0]}) (async) semget$private(0x0, 0x4, 0xe) (async) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r8, 0x84, 0xa, &(0x7f0000006800)={0x9, 0xe, 0x202, 0xc, 0x4, 0x3, 0x9e, 0x3, 0x0}, &(0x7f0000006840)=0x20) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r15, 0x84, 0x77, &(0x7f0000006880)={r17, 0x6d9, 0x1, [0xce]}, &(0x7f00000068c0)=0xa) (async) mount$fuseblk(&(0x7f0000006900), &(0x7f0000006940)='./file0\x00', &(0x7f0000006980), 0x4, &(0x7f00000069c0)={{'fd', 0x3d, r15}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r11}, 0x2c, {'group_id', 0x3d, r5}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0x400}}], [{@fowner_gt={'fowner>', r11}}]}}) 852.506526ms ago: executing program 1 (id=5997): setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000000)=0x3, 0x4) (async) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='oom_score_adj\x00') setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080)={0x3be8f156}, 0x4) (async) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000140)={@rxrpc=@in4={0x21, 0x2, 0x2, 0x10, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x16}}}, {&(0x7f00000000c0)=""/64, 0x40}, &(0x7f0000000100), 0x28}, 0xa0) r1 = socket$inet_sctp(0x2, 0x0, 0x84) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000200), &(0x7f0000000240)=0x4) (async) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000280)={'tunl0\x00', {0x2, 0x4e24, @multicast1}}) (async) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000002c0)={0x0}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000340)={r2, 0x5, 0x6, 0x0, 0x1, 0xfffffff8}, &(0x7f0000000380)=0x14) (async) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000003c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r0}}, './file0\x00'}) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000400)={r2, @in={{0x2, 0x4e23, @local}}}, 0x84) epoll_create1(0x80000) ioctl$sock_ifreq(r1, 0x89b0, &(0x7f00000004c0)={'syzkaller1\x00', @ifru_hwaddr}) (async) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000500)={0x2, 0x3, 0x2, 0x100000001, 0xffffffffffffffff}) r5 = socket$nl_generic(0x10, 0x3, 0x10) (async) r6 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000580), r3) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000640)={r4, 0x58, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (async) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000700)={'syztnl1\x00', &(0x7f0000000680)={'ip_vti0\x00', 0x0, 0x8, 0x1, 0x7, 0x6, {{0x13, 0x4, 0x1, 0x3a, 0x4c, 0x68, 0x0, 0x1, 0x29, 0x0, @local, @empty, {[@lsrr={0x83, 0x23, 0xab, [@private=0xa010100, @dev={0xac, 0x14, 0x14, 0x29}, @loopback, @local, @dev={0xac, 0x14, 0x14, 0x1d}, @local, @multicast1, @empty]}, @timestamp_prespec={0x44, 0x14, 0xcc, 0x3, 0x2, [{@local, 0x6}, {@empty, 0x80000000}]}]}}}}}) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a00)={r3, 0xe0, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000740)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000780)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0xbd, &(0x7f0000000800)=[{}, {}], 0x10, 0x10, &(0x7f0000000840), &(0x7f0000000880), 0x8, 0xa6, 0x8, 0x8, &(0x7f00000008c0)}}, 0x10) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r5, &(0x7f0000000b00)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000a40)={0x70, r6, 0x2, 0x70bd25, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_ADDR={0x34, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @loopback}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r7}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r8}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast1}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r9}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @private=0xa010100}]}, @MPTCP_PM_ATTR_TOKEN={0x8, 0x4, 0x46d54835}, @MPTCP_PM_ATTR_LOC_ID={0x5, 0x5, 0x9}, @MPTCP_PM_ATTR_TOKEN={0x8, 0x4, 0x9}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}]}, 0x70}}, 0x20000000) (async) getpeername$inet(r3, &(0x7f0000000b40)={0x2, 0x0, @multicast2}, &(0x7f0000000b80)=0x10) (async) r10 = syz_open_dev$vcsn(&(0x7f0000000bc0), 0x5, 0x6000) io_uring_register$IORING_UNREGISTER_RING_FDS(r10, 0x15, &(0x7f00000054c0)=[{0x3, 0x0, 0x0, &(0x7f0000001c80)=[{&(0x7f0000000c00)=""/1, 0x1}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/4096, 0x1000}], &(0x7f0000001cc0)=[0x6]}, {0x3, 0x0, 0x0, &(0x7f0000001ec0)=[{&(0x7f0000001d00)=""/139, 0x8b}, {&(0x7f0000001dc0)=""/147, 0x93}, {&(0x7f0000001e80)=""/1, 0x1}], &(0x7f0000001f00)=[0x4]}, {0x3, 0x0, 0x0, &(0x7f0000002080)=[{&(0x7f0000001f40)=""/60, 0x3c}, {&(0x7f0000001f80)=""/141, 0x8d}, {&(0x7f0000002040)=""/47, 0x2f}], &(0x7f00000020c0)=[0x1, 0x10001, 0xfffffffffffffffb, 0x8, 0x100, 0x0, 0x1000, 0x7]}, {0x4, 0x1, 0x0, &(0x7f00000023c0)=[{&(0x7f0000002100)=""/184, 0xb8}, {&(0x7f00000021c0)=""/253, 0xfd}, {&(0x7f00000022c0)=""/172, 0xac}, {&(0x7f0000002380)=""/29, 0x1d}], &(0x7f0000002400)=[0x401, 0x5, 0x0, 0x2, 0xb101]}, {0x0, 0x1, 0x0, 0x0, &(0x7f0000002440)=[0x1, 0x8, 0x388, 0x800, 0xa2d0, 0xfffffffffffffffc, 0x18, 0x8000000000000001, 0xd1b]}, {0x7, 0x1, 0x0, &(0x7f0000003840)=[{&(0x7f00000024c0)=""/127, 0x7f}, {&(0x7f0000002540)=""/205, 0xcd}, {&(0x7f0000002640)=""/148, 0x94}, {&(0x7f0000002700)=""/183, 0xb7}, {&(0x7f00000027c0)=""/4096, 0x1000}, {&(0x7f00000037c0)=""/40, 0x28}, {&(0x7f0000003800)=""/37, 0x25}], &(0x7f00000038c0)=[0xd2f, 0x7]}, {0xa, 0x1, 0x0, &(0x7f0000003e80)=[{&(0x7f0000003900)=""/106, 0x6a}, {&(0x7f0000003980)=""/230, 0xe6}, {&(0x7f0000003a80)=""/181, 0xb5}, {&(0x7f0000003b40)=""/83, 0x53}, {&(0x7f0000003bc0)=""/63, 0x3f}, {&(0x7f0000003c00)=""/38, 0x26}, {&(0x7f0000003c40)=""/26, 0x1a}, {&(0x7f0000003c80)=""/133, 0x85}, {&(0x7f0000003d40)=""/173, 0xad}, {&(0x7f0000003e00)=""/67, 0x43}], &(0x7f0000003f40)=[0x35c, 0x9, 0x5, 0x3112daae, 0x6fd3, 0x6, 0x9, 0x4, 0x0]}, {0x8, 0x0, 0x0, &(0x7f0000005400)=[{&(0x7f0000003fc0)=""/130, 0x82}, {&(0x7f0000004080)}, {&(0x7f00000040c0)=""/210, 0xd2}, {&(0x7f00000041c0)=""/4096, 0x1000}, {&(0x7f00000051c0)=""/162, 0xa2}, {&(0x7f0000005280)=""/78, 0x4e}, {&(0x7f0000005300)=""/93, 0x5d}, {&(0x7f0000005380)=""/77, 0x4d}], &(0x7f0000005480)=[0x9, 0xa0b]}], 0x8) (async) r11 = ioctl$TIOCGPTPEER(r3, 0x5441, 0x7) ioctl$KDSKBMETA(r11, 0x4b63, &(0x7f00000055c0)=0x4) (async) socket$unix(0x1, 0x2, 0x0) (async) r12 = syz_genetlink_get_family_id$mptcp(&(0x7f0000005640), r4) sendmsg$MPTCP_PM_CMD_SUBFLOW_DESTROY(r3, &(0x7f0000005780)={&(0x7f0000005600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000005740)={&(0x7f0000005680)={0xa4, r12, 0x200, 0x70bd2c, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_LOC_ID={0x5, 0x5, 0xb}, @MPTCP_PM_ATTR_ADDR={0x48, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r8}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e22}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @dev={0xac, 0x14, 0x14, 0xa}}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}]}, @MPTCP_PM_ATTR_ADDR_REMOTE={0x34, 0x6, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x11}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r9}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r9}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x3e7cd1343cdfdc19}]}, @MPTCP_PM_ATTR_ADDR={0x4}, @MPTCP_PM_ATTR_TOKEN={0x8}]}, 0xa4}, 0x1, 0x0, 0x0, 0x48090}, 0x20004054) (async) r13 = socket$can_j1939(0x1d, 0x2, 0x7) bind$can_j1939(r13, &(0x7f00000057c0)={0x1d, r7, 0x3, {0x1}, 0x1}, 0x18) 472.110649ms ago: executing program 0 (id=5998): r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000680)={0x2, 0x0, @remote}, 0x10) r1 = socket$key(0xf, 0x3, 0x2) accept4(r1, &(0x7f0000000000)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @broadcast}}, &(0x7f0000000080)=0x80, 0x80000) write$cgroup_devices(r0, 0x0, 0x0) 161.841389ms ago: executing program 0 (id=5999): pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) close(r0) r1 = socket(0x1d, 0x2, 0x6) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) r3 = syz_open_dev$dri(&(0x7f0000000000), 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) setreuid(0x0, 0xee00) r5 = socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000040), r5) ioctl$TUNSETIFINDEX(r4, 0x400454da, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000003c0)={'vcan0\x00', 0x0}) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_service_time\x00', 0x26e1, 0x0) socket$kcm(0xa, 0x0, 0x3a) write$cgroup_type(r7, 0x0, 0x8) bind$can_j1939(r0, &(0x7f0000000040)={0x1d, r6, 0x3}, 0x18) sendmsg$RDMA_NLDEV_CMD_SYS_SET(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)=ANY=[@ANYBLOB="0ee8e54aef10"], 0x10}}, 0x0) 0s ago: executing program 1 (id=6000): r0 = add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="669d34ab41f65c7256ae986424687631acb1804e3e16fe7449497a6f97305291e4509c0991882fad7ad1caff757b2dbd6c151b078ae3cb1b6fab5fcba08835e639c864cd658091a795c567575357bedca552b44d37c7035e6e4950b691607757ea36717403c6b7b3f6d1d83c15b86f60ebbd9a420a0d1219c28b8fa40c0386abb9ddc77a699e1a525b05fb8240f64b", 0x8f, 0xfffffffffffffffb) pipe2$watch_queue(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) keyctl$KEYCTL_WATCH_KEY(0x20, r0, r1, 0xba) (async) ioctl$IOMMU_TEST_OP_ACCESS_PAGES$syz(r2, 0x3ba0, &(0x7f0000000180)={0x48, 0x7, r2, 0x0, 0x10000, 0x0, 0x4, 0x23a384, 0x24b894}) (async) ioctl$MON_IOCX_GET(r2, 0x40189206, &(0x7f0000000280)={&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f0000000240)=""/40, 0x28}) (async) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) (async) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f0000000300)='syz0\x00', &(0x7f0000000340)) setsockopt$inet6_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000380)={0x8b}, 0x4) (async) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f00000003c0)={0xf000, 0xc000}) (async) write$P9_RMKDIR(r2, &(0x7f0000000400)={0x14, 0x49, 0x1, {0x4, 0x1, 0x2}}, 0x14) (async) ioctl$TCSETAW(r2, 0x5407, &(0x7f0000000440)={0x1, 0xa, 0xb122, 0x2, 0x13, "f89899d9161892ad"}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r2, 0xc018937d, &(0x7f0000000480)={{0x1, 0x1, 0x18, r1, {0xffff}}, './file0\x00'}) (async) keyctl$assume_authority(0x10, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f00000004c0), 0x4) (async) r5 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000500), 0x18000, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r5, 0xc018937d, &(0x7f0000000540)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) (async) r6 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$instantiate(0xc, r0, &(0x7f0000000580)=@encrypted_update={'update ', 'default', 0x20, 'user:', 'syz0\x00'}, 0x1a, r6) (async) ioctl$SNDCTL_DSP_GETTRIGGER(r4, 0x80045010, &(0x7f0000000640)) (async) ioctl$DMA_HEAP_IOCTL_ALLOC(r2, 0xc0184800, &(0x7f0000000680)={0x7fff, r3, 0x1}) keyctl$invalidate(0x15, r6) (async) syz_open_dev$ptys(0xc, 0x3, 0x1) (async) r7 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0), 0x2, 0x0) write$FUSE_NOTIFY_DELETE(r7, &(0x7f0000000700)={0x2c, 0x6, 0x0, {0x6, 0x2, 0x3, 0x0, 'syz'}}, 0x2c) (async) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000003, 0x20010, r2, 0xc4700000) (async) ioctl$TIOCL_GETKMSGREDIRECT(r2, 0x541c, &(0x7f0000000740)) r8 = memfd_secret(0x80000) bind$netlink(r8, &(0x7f0000000780)={0x10, 0x0, 0x25dfdbfe, 0x200000}, 0xc) accept4$nfc_llcp(r2, &(0x7f00000007c0), &(0x7f0000000840)=0x60, 0x800) (async) process_mrelease(0xffffffffffffffff, 0x0) kernel console output (not intermixed with test programs): 3][ T29] audit: type=1400 audit(3899.010:1614105): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="/" dev="sysfs" ino=1 [ 3899.252061][T25106] hsr_slave_0: entered promiscuous mode [ 3899.310336][T25106] hsr_slave_1: entered promiscuous mode [ 3899.359793][T25106] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 3899.360949][T25106] Cannot create hsr debugfs directory [ 3899.875631][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 0.0.0.0:20002. Sending cookies. [ 3900.398546][T20707] usb 1-1: new high-speed USB device number 56 using dummy_hcd [ 3900.568389][T20707] usb 1-1: Using ep0 maxpacket: 8 [ 3900.607910][T20707] usb 1-1: config 1 contains an unexpected descriptor of type 0x2, skipping [ 3900.608546][T20707] usb 1-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 3900.609175][T20707] usb 1-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 3900.635862][T20707] usb 1-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 3900.636507][T20707] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 3900.636993][T20707] usb 1-1: Product: ᒖꍖ쾣值גּ帿듹【扙䢘靇㚗ꇱ壅ꪅ⬝ㅗꁶ炬⫯勡洞鍎왬꥟ጺ⁙ [ 3900.638597][T20707] usb 1-1: Manufacturer: 栾懊榫펛ັ騜୥垨별順ퟶড়妟빙᜔⿼镩ﲦꉶ쾇 [ 3900.639128][T20707] usb 1-1: SerialNumber: ႄ毩ੋ堙㦤땩癑庾僌绫〗ഘഄ烒髃쉗掁ꤾᘉ㕬꟠ᘅ赇๝擔쪆蛠켧㤁₹점䐶꿢ꬰ䷑㑞쮴젱醡莝鼆 [ 3901.758329][T20707] usb 1-1: 0:2 : does not exist [ 3901.825875][T25106] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 3901.889016][T20707] usb 1-1: USB disconnect, device number 56 [ 3901.920190][T25106] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 3901.961757][T25106] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 3902.006293][T25106] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 3902.378506][T25210] can: request_module (can-proto-5) failed. [ 3902.625776][T25122] udevd[25122]: error opening ATTR{/sys/devices/platform/dummy_hcd.0/usb1/1-1/1-1:1.0/sound/card3/controlC3/../uevent} for writing: No such file or directory [ 3903.839863][T25106] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3904.187917][ T29] kauditd_printk_skb: 13225 callbacks suppressed [ 3904.188011][ T29] audit: type=1400 audit(3904.010:1621629): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=25225 comm="cmp" name="/" dev="vda" ino=2 [ 3904.189557][ T29] audit: type=1400 audit(3904.000:1621624): lsm=SMACK fn=smack_file_ioctl action=granted subject="_" object="*" requested=w pid=25221 comm="syz.0.5652" path="socket:[72023]" dev="sockfs" ino=72023 [ 3904.190430][ T29] audit: type=1400 audit(3904.010:1621630): lsm=SMACK fn=smack_file_ioctl action=granted subject="_" object="*" requested=w pid=25221 comm="syz.0.5652" path="socket:[72023]" dev="sockfs" ino=72023 [ 3904.191345][ T29] audit: type=1400 audit(3904.010:1621631): lsm=SMACK fn=smack_file_ioctl action=granted subject="_" object="*" requested=w pid=25221 comm="syz.0.5652" path="socket:[72023]" dev="sockfs" ino=72023 [ 3904.192221][ T29] audit: type=1400 audit(3904.010:1621632): lsm=SMACK fn=smack_file_ioctl action=granted subject="_" object="*" requested=w pid=25221 comm="syz.0.5652" path="socket:[72023]" dev="sockfs" ino=72023 [ 3904.193713][ T29] audit: type=1400 audit(3904.010:1621633): lsm=SMACK fn=smack_file_ioctl action=granted subject="_" object="*" requested=w pid=25221 comm="syz.0.5652" path="socket:[72023]" dev="sockfs" ino=72023 [ 3904.194598][ T29] audit: type=1400 audit(3904.010:1621634): lsm=SMACK fn=smack_file_ioctl action=granted subject="_" object="*" requested=w pid=25221 comm="syz.0.5652" path="socket:[72023]" dev="sockfs" ino=72023 [ 3904.195420][ T29] audit: type=1400 audit(3904.010:1621635): lsm=SMACK fn=smack_file_ioctl action=granted subject="_" object="*" requested=w pid=25221 comm="syz.0.5652" path="socket:[72023]" dev="sockfs" ino=72023 [ 3904.196322][ T29] audit: type=1400 audit(3904.010:1621636): lsm=SMACK fn=smack_file_ioctl action=granted subject="_" object="*" requested=w pid=25221 comm="syz.0.5652" path="socket:[72023]" dev="sockfs" ino=72023 [ 3904.210354][ T29] audit: type=1400 audit(3904.010:1621637): lsm=SMACK fn=smack_file_ioctl action=granted subject="_" object="*" requested=w pid=25221 comm="syz.0.5652" path="socket:[72023]" dev="sockfs" ino=72023 [ 3905.558948][T25242] 8021q: VLANs not supported on hsr0 [ 3909.197980][ T29] kauditd_printk_skb: 9853 callbacks suppressed [ 3909.198069][ T29] audit: type=1400 audit(3909.030:1630051): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=25273 comm="modprobe" path="/lib/libc.so.6" dev="vda" ino=370 [ 3909.206769][ T29] audit: type=1400 audit(3909.030:1630052): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=25273 comm="modprobe" path="/lib/libc.so.6" dev="vda" ino=370 [ 3909.209402][ T29] audit: type=1400 audit(3909.030:1630053): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=25266 comm="syz.0.5655" name="newroot" dev="tmpfs" ino=2 [ 3909.210320][ T29] audit: type=1400 audit(3909.030:1630054): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=25266 comm="syz.0.5655" name="/" dev="devtmpfs" ino=1 [ 3909.211123][ T29] audit: type=1400 audit(3909.030:1630055): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=25266 comm="syz.0.5655" name="autofs" dev="devtmpfs" ino=91 [ 3909.211975][ T29] audit: type=1400 audit(3909.030:1630056): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=25266 comm="syz.0.5655" path="/dev/autofs" dev="devtmpfs" ino=91 [ 3909.212826][ T29] audit: type=1400 audit(3909.030:1630057): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=25273 comm="modprobe" name="/" dev="vda" ino=2 [ 3909.213784][ T29] audit: type=1400 audit(3909.030:1630058): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=25273 comm="modprobe" name="/" dev="vda" ino=2 [ 3909.214744][ T29] audit: type=1400 audit(3909.030:1630059): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=25273 comm="modprobe" name="lib" dev="vda" ino=195 [ 3909.215676][ T29] audit: type=1400 audit(3909.030:1630060): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=25273 comm="modprobe" name="libresolv.so.2" dev="vda" ino=379 [ 3910.949119][T25106] veth0_vlan: entered promiscuous mode [ 3910.976074][T25106] veth1_vlan: entered promiscuous mode [ 3911.058688][T25106] veth0_macvtap: entered promiscuous mode [ 3911.071685][T25106] veth1_macvtap: entered promiscuous mode [ 3911.171514][T25106] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 3911.172256][T25106] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 3911.172830][T25106] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 3911.173404][T25106] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 3914.208176][ T29] kauditd_printk_skb: 5317 callbacks suppressed [ 3914.208279][ T29] audit: type=1400 audit(3914.030:1634521): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="/" dev="sysfs" ino=1 [ 3914.211712][ T29] audit: type=1400 audit(3914.040:1634522): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="devices" dev="sysfs" ino=4 [ 3914.212570][ T29] audit: type=1400 audit(3914.040:1634523): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="virtual" dev="sysfs" ino=810 [ 3914.213328][ T29] audit: type=1400 audit(3914.040:1634524): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="block" dev="sysfs" ino=11385 [ 3914.214067][ T29] audit: type=1400 audit(3914.040:1634525): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="/" dev="vda" ino=2 [ 3914.214787][ T29] audit: type=1400 audit(3914.040:1634526): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="/" dev="sysfs" ino=1 [ 3914.215501][ T29] audit: type=1400 audit(3914.040:1634527): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="devices" dev="sysfs" ino=4 [ 3914.216329][ T29] audit: type=1400 audit(3914.040:1634528): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="virtual" dev="sysfs" ino=810 [ 3914.221656][ T29] audit: type=1400 audit(3914.040:1634529): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="block" dev="sysfs" ino=11385 [ 3914.222532][ T29] audit: type=1400 audit(3914.040:1634530): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="loop0" dev="sysfs" ino=12999 [ 3919.224998][ T29] kauditd_printk_skb: 9749 callbacks suppressed [ 3919.225102][ T29] audit: type=1400 audit(3919.050:1639811): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="/" dev="vda" ino=2 [ 3919.226295][ T29] audit: type=1400 audit(3919.050:1639812): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="/" dev="sysfs" ino=1 [ 3919.227055][ T29] audit: type=1400 audit(3919.050:1639813): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="devices" dev="sysfs" ino=4 [ 3919.228475][ T29] audit: type=1400 audit(3919.050:1639814): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="virtual" dev="sysfs" ino=810 [ 3919.229378][ T29] audit: type=1400 audit(3919.050:1639815): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="block" dev="sysfs" ino=11385 [ 3919.230131][ T29] audit: type=1400 audit(3919.050:1639816): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=3085 comm="udevd" name="loop0" dev="sysfs" ino=12999 [ 3919.230874][ T29] audit: type=1400 audit(3919.050:1639817): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3085 comm="udevd" path="/sys/devices/virtual/block/loop0" dev="sysfs" ino=12999 [ 3919.231658][ T29] audit: type=1400 audit(3919.050:1639818): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=3085 comm="udevd" path="/sys/devices/virtual/block/loop0" dev="sysfs" ino=12999 [ 3919.232534][ T29] audit: type=1400 audit(3919.050:1639819): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="/" dev="vda" ino=2 [ 3919.233253][ T29] audit: type=1400 audit(3919.050:1639820): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="/" dev="sysfs" ino=1 [ 3925.422121][ T29] kauditd_printk_skb: 6121 callbacks suppressed [ 3925.422211][ T29] audit: type=1400 audit(3925.240:1645752): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22033 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 3925.425702][ T29] audit: type=1400 audit(3925.250:1645753): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22033 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 3925.426602][ T29] audit: type=1400 audit(3925.250:1645754): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3259 comm="syz-executor" saddr=127.0.0.1 src=51750 daddr=127.0.0.1 dest=30006 netif=lo [ 3925.431604][ T29] audit: type=1400 audit(3925.250:1645755): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22033 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 3925.439701][ T29] audit: type=1400 audit(3925.250:1645756): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22033 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 3925.441233][ T29] audit: type=1400 audit(3925.250:1645757): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=22033 comm="syz-executor" name="449" dev="tmpfs" ino=2404 [ 3925.442688][ T29] audit: type=1400 audit(3925.250:1645758): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3257 comm="sshd" saddr=10.0.2.2 src=37458 daddr=10.0.2.15 dest=22 netif=eth0 [ 3925.444282][ T29] audit: type=1400 audit(3925.250:1645759): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=22033 comm="syz-executor" path="/449" dev="tmpfs" ino=2404 [ 3925.445769][ T29] audit: type=1400 audit(3925.250:1645760): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=22033 comm="syz-executor" path="/449" dev="tmpfs" ino=2404 [ 3925.458066][ T29] audit: type=1400 audit(3925.250:1645761): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22033 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 3931.539216][ T29] kauditd_printk_skb: 6604 callbacks suppressed [ 3931.539372][ T29] audit: type=1400 audit(3931.370:1650768): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=25106 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 3931.541668][ T29] audit: type=1400 audit(3931.370:1650769): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=25106 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 3931.543527][ T29] audit: type=1400 audit(3931.370:1650770): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=25106 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 3931.545108][ T29] audit: type=1400 audit(3931.370:1650771): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=25106 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 3931.550064][ T29] audit: type=1400 audit(3931.370:1650772): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=25106 comm="syz-executor" name="16" dev="tmpfs" ino=100 [ 3931.551969][ T29] audit: type=1400 audit(3931.370:1650773): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=25106 comm="syz-executor" path="/16" dev="tmpfs" ino=100 [ 3931.552913][ T29] audit: type=1400 audit(3931.370:1650774): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=25106 comm="syz-executor" path="/16" dev="tmpfs" ino=100 [ 3931.553787][ T29] audit: type=1400 audit(3931.370:1650775): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=25106 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 3931.554685][ T29] audit: type=1400 audit(3931.370:1650776): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=25106 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 3931.555580][ T29] audit: type=1400 audit(3931.370:1650777): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=25106 comm="syz-executor" name="16" dev="tmpfs" ino=100 [ 3936.732634][ T29] kauditd_printk_skb: 4737 callbacks suppressed [ 3936.732737][ T29] audit: type=1400 audit(3936.560:1655515): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22033 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 3936.735726][ T29] audit: type=1400 audit(3936.560:1655516): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22033 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 3936.736566][ T29] audit: type=1400 audit(3936.560:1655517): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3259 comm="syz-executor" saddr=127.0.0.1 src=51750 daddr=127.0.0.1 dest=30006 netif=lo [ 3936.758508][ T29] audit: type=1400 audit(3936.560:1655518): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22033 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 3936.760090][ T29] audit: type=1400 audit(3936.560:1655520): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="kauditd" saddr=10.0.2.2 src=37458 daddr=10.0.2.15 dest=22 netif=eth0 [ 3936.762638][ T29] audit: type=1400 audit(3936.560:1655519): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22033 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 3936.764023][ T29] audit: type=1400 audit(3936.560:1655521): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=22033 comm="syz-executor" name="455" dev="tmpfs" ino=2435 [ 3936.764978][ T29] audit: type=1400 audit(3936.560:1655522): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=22033 comm="syz-executor" path="/455" dev="tmpfs" ino=2435 [ 3936.775507][T22033] audit: audit_backlog=65 > audit_backlog_limit=64 [ 3936.794875][ T29] audit: type=1400 audit(3936.560:1655523): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=22033 comm="syz-executor" path="/455" dev="tmpfs" ino=2435 [ 3941.741756][ T29] kauditd_printk_skb: 5445 callbacks suppressed [ 3941.741858][ T29] audit: type=1400 audit(3941.570:1658813): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=25122 comm="udevd" name="/" dev="vda" ino=2 [ 3941.763179][ T29] audit: type=1400 audit(3941.570:1658814): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=25122 comm="udevd" name="/" dev="tmpfs" ino=1 [ 3941.764865][ T29] audit: type=1400 audit(3941.570:1658815): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=25122 comm="udevd" name="udev" dev="tmpfs" ino=7 [ 3941.766026][ T29] audit: type=1400 audit(3941.570:1658816): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=25122 comm="udevd" name="data" dev="tmpfs" ino=11 [ 3941.767000][ T29] audit: type=1400 audit(3941.580:1658818): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 3941.829294][ T29] audit: type=1400 audit(3941.580:1658819): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 3941.830095][ T29] audit: type=1400 audit(3941.580:1658820): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=25446 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 3941.830935][ T29] audit: type=1400 audit(3941.580:1658821): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=25446 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 3941.831757][ T29] audit: type=1400 audit(3941.580:1658822): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=25446 comm="syz-executor" name="26" dev="tmpfs" ino=154 [ 3941.833228][ T29] audit: type=1400 audit(3941.580:1658823): lsm=SMACK fn=smack_task_setpgid action=granted subject="_" object="_" requested=w pid=25446 comm="syz-executor" opid=25446 ocomm="syz-executor" [ 3946.747639][ T29] kauditd_printk_skb: 9154 callbacks suppressed [ 3946.747731][ T29] audit: type=1400 audit(3946.570:1662544): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3085 comm="udevd" path="/run/udev/queue" dev="tmpfs" ino=19091 [ 3946.748966][ T29] audit: type=1400 audit(3946.580:1662552): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=24656 comm="udevd" path="/run/udev/data" dev="tmpfs" ino=11 [ 3946.749869][ T29] audit: type=1400 audit(3946.580:1662553): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=24656 comm="udevd" name="/" dev="vda" ino=2 [ 3946.750654][ T29] audit: type=1400 audit(3946.580:1662554): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=24656 comm="udevd" name="/" dev="tmpfs" ino=1 [ 3946.751486][ T29] audit: type=1400 audit(3946.580:1662555): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=24656 comm="udevd" name="udev" dev="tmpfs" ino=7 [ 3946.752310][ T29] audit: type=1400 audit(3946.580:1662556): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=24656 comm="udevd" name="data" dev="tmpfs" ino=11 [ 3946.753117][ T29] audit: type=1400 audit(3946.580:1662557): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=24656 comm="udevd" name="data" dev="tmpfs" ino=11 [ 3946.753987][ T29] audit: type=1400 audit(3946.580:1662558): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=24656 comm="udevd" path="/run/udev/data/b7:1.tmp" dev="tmpfs" ino=19092 [ 3946.754903][ T29] audit: type=1400 audit(3946.580:1662559): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=24656 comm="udevd" name="/" dev="vda" ino=2 [ 3946.759038][ T29] audit: type=1400 audit(3946.580:1662560): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=24656 comm="udevd" name="/" dev="tmpfs" ino=1 [ 3951.768048][ T29] kauditd_printk_skb: 4014 callbacks suppressed [ 3951.768232][ T29] audit: type=1400 audit(3951.580:1666575): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=25106 comm="syz-executor" name="32" dev="tmpfs" ino=187 [ 3951.771578][ T29] audit: type=1400 audit(3951.590:1666576): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="devices" dev="sysfs" ino=4 [ 3951.772981][ T29] audit: type=1400 audit(3951.590:1666577): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="virtual" dev="sysfs" ino=810 [ 3951.773819][ T29] audit: type=1400 audit(3951.590:1666578): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="block" dev="sysfs" ino=11385 [ 3951.774882][ T29] audit: type=1400 audit(3951.590:1666579): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="loop0" dev="sysfs" ino=12999 [ 3951.776666][ T29] audit: type=1400 audit(3951.590:1666580): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=25499 comm="syz.0.5715" name="newroot" dev="tmpfs" ino=2 [ 3951.791241][ T29] audit: type=1400 audit(3951.590:1666582): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=25499 comm="syz.0.5715" name="/" dev="proc" ino=1 [ 3951.793224][ T29] audit: type=1400 audit(3951.590:1666581): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=3085 comm="udevd" path="/sys/devices/virtual/block/loop0/uevent" dev="sysfs" ino=13000 [ 3951.795093][ T29] audit: type=1400 audit(3951.590:1666583): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=25499 comm="syz.0.5715" name="/" dev="proc" ino=1 [ 3951.796537][ T29] audit: type=1400 audit(3951.590:1666584): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=25499 comm="syz.0.5715" name="1276" dev="proc" ino=73687 [ 3955.353892][T25521] "syz.0.5722" (25521) uses obsolete ecb(arc4) skcipher [ 3956.777855][ T29] kauditd_printk_skb: 5825 callbacks suppressed [ 3956.778042][ T29] audit: type=1400 audit(3956.580:1672044): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="/" dev="vda" ino=2 [ 3956.779154][ T29] audit: type=1400 audit(3956.580:1672045): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="/" dev="sysfs" ino=1 [ 3956.779913][ T29] audit: type=1400 audit(3956.580:1672046): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="devices" dev="sysfs" ino=4 [ 3956.780821][ T29] audit: type=1400 audit(3956.580:1672047): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="virtual" dev="sysfs" ino=810 [ 3956.782566][ T29] audit: type=1400 audit(3956.580:1672048): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="block" dev="sysfs" ino=11385 [ 3956.783488][ T29] audit: type=1400 audit(3956.580:1672049): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="loop0" dev="sysfs" ino=12999 [ 3956.785182][ T29] audit: type=1400 audit(3956.580:1672050): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="holders" dev="sysfs" ino=13037 [ 3956.786084][ T29] audit: type=1400 audit(3956.580:1672051): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="/" dev="vda" ino=2 [ 3956.786901][ T29] audit: type=1400 audit(3956.580:1672052): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="/" dev="sysfs" ino=1 [ 3956.788668][ T29] audit: type=1400 audit(3956.580:1672053): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="devices" dev="sysfs" ino=4 [ 3957.007731][T18588] usb 1-1: new high-speed USB device number 57 using dummy_hcd [ 3957.142387][T18588] usb 1-1: device descriptor read/64, error -71 [ 3957.377800][T18588] usb 1-1: new high-speed USB device number 58 using dummy_hcd [ 3957.508047][T18588] usb 1-1: device descriptor read/64, error -71 [ 3957.618768][T18588] usb usb1-port1: attempt power cycle [ 3957.958499][T18588] usb 1-1: new high-speed USB device number 59 using dummy_hcd [ 3957.983252][T18588] usb 1-1: device descriptor read/8, error -71 [ 3958.227852][T18588] usb 1-1: new high-speed USB device number 60 using dummy_hcd [ 3958.252757][T18588] usb 1-1: device descriptor read/8, error -71 [ 3958.360251][T18588] usb usb1-port1: unable to enumerate USB device [ 3959.125277][T25533] [U]  [ 3962.575003][ T29] kauditd_printk_skb: 2045 callbacks suppressed [ 3962.575180][ T29] audit: type=1400 audit(3962.400:1674099): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=3085 comm="udevd" opid=25122 ocomm="udevd" [ 3962.581092][ T29] audit: type=1400 audit(3962.400:1674100): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=3085 comm="udevd" opid=24656 ocomm="udevd" [ 3962.591194][ T29] audit: type=1400 audit(3962.410:1674101): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 3962.594017][ T29] audit: type=1400 audit(3962.410:1674102): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3070 comm="syslogd" name="/" dev="vda" ino=2 [ 3962.595483][ T29] audit: type=1400 audit(3962.410:1674103): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3070 comm="syslogd" name="var" dev="vda" ino=1718 [ 3962.596278][ T29] audit: type=1400 audit(3962.410:1674104): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3070 comm="syslogd" name="var" dev="vda" ino=1718 [ 3962.613576][ T29] audit: type=1400 audit(3962.420:1674105): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 3962.615164][ T29] audit: type=1400 audit(3962.420:1674106): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 3962.616018][ T29] audit: type=1400 audit(3962.430:1674107): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=3085 comm="udevd" opid=24531 ocomm="udevd" [ 3962.624119][ T29] audit: type=1400 audit(3962.430:1674108): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=3085 comm="udevd" opid=25034 ocomm="udevd" [ 3968.287821][ T29] kauditd_printk_skb: 1424 callbacks suppressed [ 3968.287917][ T29] audit: type=1400 audit(3968.110:1675533): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22033 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 3968.289376][ T29] audit: type=1400 audit(3968.110:1675534): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22033 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 3968.290464][ T29] audit: type=1400 audit(3968.120:1675535): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3259 comm="syz-executor" saddr=127.0.0.1 src=51750 daddr=127.0.0.1 dest=30006 netif=lo [ 3968.296817][ T29] audit: type=1400 audit(3968.120:1675536): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22033 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 3968.299448][ T29] audit: type=1400 audit(3968.120:1675537): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22033 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 3968.301240][ T29] audit: type=1400 audit(3968.120:1675538): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=22033 comm="syz-executor" name="475" dev="tmpfs" ino=2541 [ 3968.304007][ T29] audit: type=1400 audit(3968.120:1675539): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3257 comm="sshd" saddr=10.0.2.2 src=37458 daddr=10.0.2.15 dest=22 netif=eth0 [ 3968.307951][ T29] audit: type=1400 audit(3968.120:1675540): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=22033 comm="syz-executor" path="/475" dev="tmpfs" ino=2541 [ 3968.311335][ T29] audit: type=1400 audit(3968.120:1675541): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=22033 comm="syz-executor" path="/475" dev="tmpfs" ino=2541 [ 3968.312794][ T29] audit: type=1400 audit(3968.120:1675542): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22033 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 3970.140881][T25566] input: syz0 as /devices/virtual/input/input91 [ 3973.300741][ T29] kauditd_printk_skb: 6467 callbacks suppressed [ 3973.300836][ T29] audit: type=1400 audit(3973.120:1681198): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=25548 comm="udevd" name="udev" dev="tmpfs" ino=7 [ 3973.302054][ T29] audit: type=1400 audit(3973.120:1681199): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=25548 comm="udevd" name="data" dev="tmpfs" ino=11 [ 3973.304386][ T29] audit: type=1400 audit(3973.120:1681200): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=25548 comm="udevd" name="data" dev="tmpfs" ino=11 [ 3973.305273][ T29] audit: type=1400 audit(3973.120:1681201): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=25548 comm="udevd" path="/run/udev/data/b7:1.tmp" dev="tmpfs" ino=19177 [ 3973.306129][ T29] audit: type=1400 audit(3973.120:1681202): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=25548 comm="udevd" path="/run/udev/data/b7:1.tmp" dev="tmpfs" ino=19177 [ 3973.323740][ T29] audit: type=1400 audit(3973.140:1681203): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 3973.324611][ T29] audit: type=1400 audit(3973.140:1681204): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 3973.328055][ T29] audit: type=1400 audit(3973.140:1681205): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 3973.329152][ T29] audit: type=1400 audit(3973.140:1681206): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 3973.330046][ T29] audit: type=1400 audit(3973.140:1681207): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 3976.379049][T25592] FAULT_INJECTION: forcing a failure. [ 3976.379049][T25592] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3976.379829][T25592] CPU: 0 UID: 0 PID: 25592 Comm: syz.1.5739 Tainted: G B 6.11.0-syzkaller-08481-g88264981f208 #0 [ 3976.380460][T25592] Tainted: [B]=BAD_PAGE [ 3976.380763][T25592] Hardware name: linux,dummy-virt (DT) [ 3976.381106][T25592] Call trace: [ 3976.381433][T25592] dump_backtrace+0x94/0xec [ 3976.381819][T25592] show_stack+0x18/0x24 [ 3976.382163][T25592] dump_stack_lvl+0x78/0x90 [ 3976.382531][T25592] dump_stack+0x18/0x24 [ 3976.382874][T25592] should_fail_ex+0x18c/0x1e0 [ 3976.383266][T25592] should_fail+0x14/0x20 [ 3976.383613][T25592] should_fail_usercopy+0x1c/0x28 [ 3976.383986][T25592] preserve_fpsimd_context+0x18/0x1c4 [ 3976.384378][T25592] do_signal+0x614/0x13c0 [ 3976.384729][T25592] do_notify_resume+0xd8/0x164 [ 3976.385089][T25592] el0_svc+0xcc/0xec [ 3976.385632][T25592] el0t_64_sync_handler+0x100/0x12c [ 3976.386018][T25592] el0t_64_sync+0x19c/0x1a0 [ 3978.311809][ T29] kauditd_printk_skb: 4783 callbacks suppressed [ 3978.311895][ T29] audit: type=1400 audit(3978.140:1685739): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=25548 comm="udevd" [ 3978.313550][ T29] audit: type=1400 audit(3978.140:1685740): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="/" dev="sysfs" ino=1 [ 3978.316187][ T29] audit: type=1400 audit(3978.140:1685741): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="devices" dev="sysfs" ino=4 [ 3978.322686][ T29] audit: type=1400 audit(3978.150:1685742): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 3978.323529][ T29] audit: type=1400 audit(3978.150:1685743): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 3978.324265][ T29] audit: type=1400 audit(3978.150:1685744): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 3978.349928][ T29] audit: type=1400 audit(3978.150:1685745): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 3978.350772][ T29] audit: type=1400 audit(3978.160:1685746): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3070 comm="syslogd" name="/" dev="vda" ino=2 [ 3978.351562][ T29] audit: type=1400 audit(3978.160:1685747): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3070 comm="syslogd" name="var" dev="vda" ino=1718 [ 3978.352370][ T29] audit: type=1400 audit(3978.160:1685748): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3070 comm="syslogd" name="var" dev="vda" ino=1718 [ 3983.317781][ T29] kauditd_printk_skb: 1810 callbacks suppressed [ 3983.317869][ T29] audit: type=1400 audit(3983.140:1687292): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="/" dev="vda" ino=2 [ 3983.319152][ T29] audit: type=1400 audit(3983.140:1687294): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=22033 comm="syz-executor" name="479" dev="tmpfs" ino=2561 [ 3983.319921][ T29] audit: type=1400 audit(3983.150:1687295): lsm=SMACK fn=smack_inode_unlink action=granted subject="_" object="_" requested=w pid=22033 comm="syz-executor" name="cgroup.net" dev="tmpfs" ino=2564 [ 3983.320672][ T29] audit: type=1400 audit(3983.150:1687296): lsm=SMACK fn=smack_inode_unlink action=granted subject="_" object="_" requested=w pid=22033 comm="syz-executor" name="479" dev="tmpfs" ino=2561 [ 3983.321664][ T29] audit: type=1400 audit(3983.150:1687297): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22033 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 3983.322498][ T29] audit: type=1400 audit(3983.150:1687298): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22033 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 3983.339929][ T29] audit: type=1400 audit(3983.150:1687299): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22033 comm="syz-executor" name="479" dev="tmpfs" ino=2561 [ 3983.341388][ T29] audit: type=1400 audit(3983.150:1687300): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22033 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 3983.342271][ T29] audit: type=1400 audit(3983.150:1687301): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22033 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 3983.343141][ T29] audit: type=1400 audit(3983.150:1687302): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22033 comm="syz-executor" name="479" dev="tmpfs" ino=2561 [ 3983.487922][T25614] FAULT_INJECTION: forcing a failure. [ 3983.487922][T25614] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3983.488655][T25614] CPU: 0 UID: 0 PID: 25614 Comm: syz.1.5745 Tainted: G B 6.11.0-syzkaller-08481-g88264981f208 #0 [ 3983.489295][T25614] Tainted: [B]=BAD_PAGE [ 3983.489636][T25614] Hardware name: linux,dummy-virt (DT) [ 3983.490021][T25614] Call trace: [ 3983.490382][T25614] dump_backtrace+0x94/0xec [ 3983.490862][T25614] show_stack+0x18/0x24 [ 3983.491282][T25614] dump_stack_lvl+0x78/0x90 [ 3983.491796][T25614] dump_stack+0x18/0x24 [ 3983.492338][T25614] should_fail_ex+0x18c/0x1e0 [ 3983.493193][T25614] should_fail+0x14/0x20 [ 3983.493688][T25614] should_fail_usercopy+0x1c/0x28 [ 3983.494245][T25614] do_signal+0x99c/0x13c0 [ 3983.494797][T25614] do_notify_resume+0xd8/0x164 [ 3983.495280][T25614] el0_svc+0xcc/0xec [ 3983.495764][T25614] el0t_64_sync_handler+0x100/0x12c [ 3983.496839][T25614] el0t_64_sync+0x19c/0x1a0 [ 3986.205811][T25645] FAULT_INJECTION: forcing a failure. [ 3986.205811][T25645] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3986.206516][T25645] CPU: 1 UID: 0 PID: 25645 Comm: syz.1.5754 Tainted: G B 6.11.0-syzkaller-08481-g88264981f208 #0 [ 3986.207327][T25645] Tainted: [B]=BAD_PAGE [ 3986.207839][T25645] Hardware name: linux,dummy-virt (DT) [ 3986.208224][T25645] Call trace: [ 3986.208499][T25645] dump_backtrace+0x94/0xec [ 3986.208865][T25645] show_stack+0x18/0x24 [ 3986.209208][T25645] dump_stack_lvl+0x78/0x90 [ 3986.209642][T25645] dump_stack+0x18/0x24 [ 3986.209998][T25645] should_fail_ex+0x18c/0x1e0 [ 3986.210378][T25645] should_fail+0x14/0x20 [ 3986.210742][T25645] should_fail_usercopy+0x1c/0x28 [ 3986.211113][T25645] do_signal+0x73c/0x13c0 [ 3986.211483][T25645] do_notify_resume+0xd8/0x164 [ 3986.211862][T25645] el0_svc+0xcc/0xec [ 3986.212222][T25645] el0t_64_sync_handler+0x100/0x12c [ 3986.212626][T25645] el0t_64_sync+0x19c/0x1a0 [ 3988.328638][ T29] kauditd_printk_skb: 6946 callbacks suppressed [ 3988.328729][ T29] audit: type=1400 audit(3988.160:1692524): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=25106 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 3988.338146][ T29] audit: type=1400 audit(3988.160:1692525): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=25106 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 3988.339130][ T29] audit: type=1400 audit(3988.160:1692526): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=25106 comm="syz-executor" name="60" dev="tmpfs" ino=338 [ 3988.340253][ T29] audit: type=1400 audit(3988.160:1692527): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=25106 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 3988.341186][ T29] audit: type=1400 audit(3988.160:1692528): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=25106 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 3988.342029][ T29] audit: type=1400 audit(3988.160:1692529): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=25106 comm="syz-executor" name="60" dev="tmpfs" ino=338 [ 3988.343077][ T29] audit: type=1400 audit(3988.160:1692530): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=25106 comm="syz-executor" path="/60/file0" dev="tmpfs" ino=338 [ 3988.344106][ T29] audit: type=1400 audit(3988.160:1692531): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=25106 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 3988.344933][ T29] audit: type=1400 audit(3988.160:1692532): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=25106 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 3988.346248][ T29] audit: type=1400 audit(3988.160:1692533): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=25106 comm="syz-executor" name="60" dev="tmpfs" ino=338 [ 3988.745601][T25660] serio: Serial port pts0 [ 3988.851375][T25448] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3988.934801][T25448] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3989.038591][T25448] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3989.113269][T25448] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3990.413485][T25448] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3990.458734][T25448] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3990.514132][T25448] bond0 (unregistering): Released all slaves [ 3990.675881][T25448] hsr_slave_0: left promiscuous mode [ 3990.722437][T25448] hsr_slave_1: left promiscuous mode [ 3990.810778][T25448] veth1_macvtap: left promiscuous mode [ 3990.811397][T25448] veth0_macvtap: left promiscuous mode [ 3990.812054][T25448] veth1_vlan: left promiscuous mode [ 3990.812593][T25448] veth0_vlan: left promiscuous mode [ 3993.346164][ T29] kauditd_printk_skb: 7816 callbacks suppressed [ 3993.346282][ T29] audit: type=1400 audit(3993.160:1697901): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=25692 comm="dhcpcd-run-hook" name="lib" dev="vda" ino=1622 [ 3993.348341][ T29] audit: type=1400 audit(3993.160:1697902): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=25692 comm="dhcpcd-run-hook" name="lib" dev="vda" ino=1622 [ 3993.349340][ T29] audit: type=1400 audit(3993.160:1697903): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=25692 comm="dhcpcd-run-hook" name="libpcre2-8.so.0.11.0" dev="vda" ino=1631 [ 3993.350329][ T29] audit: type=1400 audit(3993.160:1697904): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=25692 comm="dhcpcd-run-hook" path="/usr/lib/libpcre2-8.so.0.11.0" dev="vda" ino=1631 [ 3993.351312][ T29] audit: type=1400 audit(3993.160:1697905): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=25692 comm="dhcpcd-run-hook" path="/usr/lib/libpcre2-8.so.0.11.0" dev="vda" ino=1631 [ 3993.355310][ T29] audit: type=1400 audit(3993.180:1697906): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=25694 comm="modprobe" name="/" dev="vda" ino=2 [ 3993.356247][ T29] audit: type=1400 audit(3993.180:1697907): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=25694 comm="modprobe" name="etc" dev="vda" ino=95 [ 3993.357528][ T29] audit: type=1400 audit(3993.180:1697908): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=25694 comm="modprobe" name="/" dev="vda" ino=2 [ 3993.359769][ T29] audit: type=1400 audit(3993.190:1697910): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 3993.360661][ T29] audit: type=1400 audit(3993.190:1697911): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3070 comm="syslogd" name="/" dev="vda" ino=2 [ 3995.694412][T25661] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3995.735662][T25661] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3998.347514][ T29] kauditd_printk_skb: 7359 callbacks suppressed [ 3998.347605][ T29] audit: type=1400 audit(3998.170:1704986): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=25732 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 3998.348841][ T29] audit: type=1400 audit(3998.170:1704987): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=25732 comm="syz-executor" name="488" dev="tmpfs" ino=2610 [ 3998.349727][ T29] audit: type=1400 audit(3998.170:1704988): lsm=SMACK fn=smack_task_setpgid action=granted subject="_" object="_" requested=w pid=25732 comm="syz-executor" opid=25732 ocomm="syz-executor" [ 3998.362875][ T29] audit: type=1400 audit(3998.150:1704965): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3085 comm="udevd" path="/sys/devices/virtual/block/loop0/uevent" dev="sysfs" ino=13000 [ 3998.363991][ T29] audit: type=1400 audit(3998.180:1704989): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=3085 comm="udevd" path="/sys/devices/virtual/block/loop0/uevent" dev="sysfs" ino=13000 [ 3998.364904][ T29] audit: type=1400 audit(3998.180:1704990): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="/" dev="vda" ino=2 [ 3998.365782][ T29] audit: type=1400 audit(3998.180:1704991): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="/" dev="devtmpfs" ino=1 [ 3998.376896][T25731] audit: audit_backlog=65 > audit_backlog_limit=64 [ 3998.378208][ T3074] audit: audit_backlog=65 > audit_backlog_limit=64 [ 3998.378306][ T3074] audit: audit_lost=145027 audit_rate_limit=0 audit_backlog_limit=64 [ 3998.520839][T25661] hsr_slave_0: entered promiscuous mode [ 3998.572398][T25661] hsr_slave_1: entered promiscuous mode [ 3998.609786][T25661] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 3998.610560][T25661] Cannot create hsr debugfs directory [ 4000.178605][T25661] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 4000.220001][T25661] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 4000.253818][T25661] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 4000.275221][T25661] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 4002.604769][T25661] 8021q: adding VLAN 0 to HW filter on device bond0 [ 4003.029683][ C0] vkms_vblank_simulate: vblank timer overrun [ 4003.378631][T25757] audit_log_start: 5143 callbacks suppressed [ 4003.378803][T25757] audit: audit_backlog=66 > audit_backlog_limit=64 [ 4003.381026][T25757] audit: audit_lost=145151 audit_rate_limit=0 audit_backlog_limit=64 [ 4003.381974][T25757] audit: backlog limit exceeded [ 4003.382772][T25757] audit: audit_backlog=66 > audit_backlog_limit=64 [ 4003.383601][T25757] audit: audit_lost=145152 audit_rate_limit=0 audit_backlog_limit=64 [ 4003.384458][T25757] audit: backlog limit exceeded [ 4003.385204][T25757] audit: audit_backlog=66 > audit_backlog_limit=64 [ 4003.386007][T25757] audit: audit_lost=145153 audit_rate_limit=0 audit_backlog_limit=64 [ 4003.386866][T25757] audit: backlog limit exceeded [ 4003.389654][T25757] audit: audit_backlog=66 > audit_backlog_limit=64 [ 4008.388867][ T29] kauditd_printk_skb: 9515 callbacks suppressed [ 4008.388966][ T29] audit: type=1400 audit(4008.220:1715700): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="devices" dev="sysfs" ino=4 [ 4008.390242][ T29] audit: type=1400 audit(4008.220:1715701): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="virtual" dev="sysfs" ino=810 [ 4008.391054][ T29] audit: type=1400 audit(4008.220:1715702): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="block" dev="sysfs" ino=11385 [ 4008.391858][ T29] audit: type=1400 audit(4008.220:1715703): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="loop0" dev="sysfs" ino=12999 [ 4008.392713][ T29] audit: type=1400 audit(4008.220:1715704): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=3085 comm="udevd" name="mq" dev="sysfs" ino=13083 [ 4008.393539][ T29] audit: type=1400 audit(4008.220:1715705): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3085 comm="udevd" path="/sys/devices/virtual/block/loop0/mq" dev="sysfs" ino=13083 [ 4008.394420][ T29] audit: type=1400 audit(4008.220:1715706): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=3085 comm="udevd" path="/sys/devices/virtual/block/loop0/mq" dev="sysfs" ino=13083 [ 4008.395291][ T29] audit: type=1400 audit(4008.220:1715707): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="/" dev="vda" ino=2 [ 4008.396064][ T29] audit: type=1400 audit(4008.220:1715708): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="/" dev="sysfs" ino=1 [ 4008.396839][ T29] audit: type=1400 audit(4008.220:1715709): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="devices" dev="sysfs" ino=4 [ 4009.794578][T25661] veth0_vlan: entered promiscuous mode [ 4009.823701][T25661] veth1_vlan: entered promiscuous mode [ 4009.935456][T25661] veth0_macvtap: entered promiscuous mode [ 4009.960564][T25661] veth1_macvtap: entered promiscuous mode [ 4010.063679][T25661] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 4010.064350][T25661] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 4010.064906][T25661] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 4010.065536][T25661] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 4010.852562][T25809] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4010.889028][T25809] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4010.969108][T25809] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4011.018923][T25809] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4013.400106][ T29] kauditd_printk_skb: 6803 callbacks suppressed [ 4013.400196][ T29] audit: type=1400 audit(4013.220:1719310): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=25661 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4013.401448][ T29] audit: type=1400 audit(4013.220:1719311): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=25661 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4013.402369][ T29] audit: type=1400 audit(4013.220:1719312): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=25661 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4013.403209][ T29] audit: type=1400 audit(4013.220:1719313): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=25661 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4013.404082][ T29] audit: type=1400 audit(4013.220:1719314): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=25661 comm="syz-executor" name="3" dev="tmpfs" ino=28 [ 4013.404894][ T29] audit: type=1400 audit(4013.220:1719315): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3259 comm="syz-executor" saddr=127.0.0.1 src=51750 daddr=127.0.0.1 dest=30006 netif=lo [ 4013.418521][ T29] audit: type=1400 audit(4013.220:1719316): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=25661 comm="syz-executor" path="/3" dev="tmpfs" ino=28 [ 4013.419405][ T29] audit: type=1400 audit(4013.230:1719318): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=25803 comm="syz.0.5770" saddr=10.0.2.2 src=37458 daddr=10.0.2.15 dest=22 netif=eth0 [ 4013.420295][ T29] audit: type=1400 audit(4013.240:1719319): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3085 comm="udevd" path="/sys/devices/virtual/block/loop1/queue" dev="sysfs" ino=13150 [ 4013.421142][ T29] audit: type=1400 audit(4013.240:1719320): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=3085 comm="udevd" path="/sys/devices/virtual/block/loop1/queue" dev="sysfs" ino=13150 [ 4018.407473][ T29] kauditd_printk_skb: 9632 callbacks suppressed [ 4018.407569][ T29] audit: type=1400 audit(4018.230:1728037): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=25661 comm="syz-executor" name="/" dev="devtmpfs" ino=1 [ 4018.408852][ T29] audit: type=1400 audit(4018.230:1728038): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=rw pid=25661 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 [ 4018.409706][ T29] audit: type=1400 audit(4018.230:1728039): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=25661 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=638 [ 4018.410522][ T29] audit: type=1400 audit(4018.230:1728040): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="/" dev="vda" ino=2 [ 4018.411307][ T29] audit: type=1400 audit(4018.230:1728041): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="/" dev="sysfs" ino=1 [ 4018.412095][ T29] audit: type=1400 audit(4018.230:1728042): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="devices" dev="sysfs" ino=4 [ 4018.412887][ T29] audit: type=1400 audit(4018.230:1728043): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="virtual" dev="sysfs" ino=810 [ 4018.413724][ T29] audit: type=1400 audit(4018.230:1728044): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="nfc" dev="sysfs" ino=17148 [ 4018.414579][ T29] audit: type=1400 audit(4018.230:1728045): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="/" dev="vda" ino=2 [ 4018.415572][ T29] audit: type=1400 audit(4018.230:1728046): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="/" dev="tmpfs" ino=1 [ 4021.522600][T25895] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4021.558625][T25895] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4023.420062][T25918] audit_log_start: 8254 callbacks suppressed [ 4023.420410][T25918] audit: audit_backlog=66 > audit_backlog_limit=64 [ 4023.421196][T25918] audit: audit_lost=148171 audit_rate_limit=0 audit_backlog_limit=64 [ 4023.421497][ T3085] audit: audit_backlog=66 > audit_backlog_limit=64 [ 4023.421650][T25918] audit: backlog limit exceeded [ 4023.421788][T25918] audit: audit_backlog=66 > audit_backlog_limit=64 [ 4023.422005][ T3085] audit: audit_lost=148172 audit_rate_limit=0 audit_backlog_limit=64 [ 4023.422217][T25918] audit: audit_lost=148173 audit_rate_limit=0 audit_backlog_limit=64 [ 4023.422488][ T3085] audit: backlog limit exceeded [ 4023.422809][T25918] audit: backlog limit exceeded [ 4023.423225][ T3085] audit: audit_backlog=66 > audit_backlog_limit=64 [ 4024.006354][T25927] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4024.058441][T25927] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4024.074119][T25927] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4024.118811][T25927] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4028.427534][ T29] kauditd_printk_skb: 10172 callbacks suppressed [ 4028.427629][ T29] audit: type=1400 audit(4028.250:1743208): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="devices" dev="sysfs" ino=4 [ 4028.428834][ T29] audit: type=1400 audit(4028.260:1743209): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="virtual" dev="sysfs" ino=810 [ 4028.429712][ T29] audit: type=1400 audit(4028.260:1743210): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="block" dev="sysfs" ino=11385 [ 4028.430509][ T29] audit: type=1400 audit(4028.260:1743211): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="loop0" dev="sysfs" ino=12999 [ 4028.431304][ T29] audit: type=1400 audit(4028.260:1743212): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=3085 comm="udevd" path="/sys/devices/virtual/block/loop0/uevent" dev="sysfs" ino=13000 [ 4028.432190][ T29] audit: type=1400 audit(4028.260:1743213): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="/" dev="vda" ino=2 [ 4028.432959][ T29] audit: type=1400 audit(4028.260:1743214): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="/" dev="sysfs" ino=1 [ 4028.433782][ T29] audit: type=1400 audit(4028.260:1743215): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="devices" dev="sysfs" ino=4 [ 4028.434649][ T29] audit: type=1400 audit(4028.260:1743216): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="virtual" dev="sysfs" ino=810 [ 4028.435536][ T29] audit: type=1400 audit(4028.260:1743217): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="block" dev="sysfs" ino=11385 [ 4030.382702][T25974] fuse: Bad value for 'fd' [ 4033.573216][ T29] kauditd_printk_skb: 5225 callbacks suppressed [ 4033.573338][ T29] audit: type=1400 audit(4033.400:1746967): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3116 comm="dhcpcd" [ 4033.574646][ T29] audit: type=1400 audit(4033.400:1746968): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3114 comm="dhcpcd" [ 4033.580879][ T29] audit: type=1400 audit(4033.400:1746969): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3114 comm="dhcpcd" [ 4033.581727][ T29] audit: type=1400 audit(4033.410:1746970): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3115 comm="dhcpcd" name="/" dev="vda" ino=2 [ 4033.582516][ T29] audit: type=1400 audit(4033.410:1746971): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3115 comm="dhcpcd" name="/" dev="proc" ino=1 [ 4033.583567][ T29] audit: type=1400 audit(4033.410:1746972): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3115 comm="dhcpcd" name="sys" dev="proc" ino=4026531856 [ 4033.584607][ T29] audit: type=1400 audit(4033.410:1746973): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3115 comm="dhcpcd" name="net" dev="proc" ino=62554 [ 4033.585851][ T29] audit: type=1400 audit(4033.410:1746974): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3115 comm="dhcpcd" name="ipv6" dev="proc" ino=62555 [ 4033.607646][ T29] audit: type=1400 audit(4033.410:1746975): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3115 comm="dhcpcd" name="conf" dev="proc" ino=62556 [ 4033.608960][ T29] audit: type=1400 audit(4033.410:1746976): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3115 comm="dhcpcd" name="eth0" dev="proc" ino=62557 [ 4038.984967][ T29] kauditd_printk_skb: 1243 callbacks suppressed [ 4038.985069][ T29] audit: type=1400 audit(4038.810:1748220): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3259 comm="syz-executor" saddr=127.0.0.1 src=51750 daddr=127.0.0.1 dest=30006 netif=lo [ 4038.989341][ T29] audit: type=1400 audit(4038.820:1748221): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=25977 comm="syz.0.5814" saddr=10.0.2.2 src=37458 daddr=10.0.2.15 dest=22 netif=eth0 [ 4038.990515][ T29] audit: type=1400 audit(4038.820:1748222): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=25661 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4038.991451][ T29] audit: type=1400 audit(4038.820:1748223): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=25661 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4038.992303][ T29] audit: type=1400 audit(4038.820:1748224): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=25661 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4038.993135][ T29] audit: type=1400 audit(4038.820:1748225): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=25661 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4038.994153][ T29] audit: type=1400 audit(4038.820:1748226): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=25661 comm="syz-executor" name="21" dev="tmpfs" ino=121 [ 4038.995095][ T29] audit: type=1400 audit(4038.820:1748227): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=25661 comm="syz-executor" path="/21" dev="tmpfs" ino=121 [ 4038.995904][ T29] audit: type=1400 audit(4038.820:1748228): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=25661 comm="syz-executor" path="/21" dev="tmpfs" ino=121 [ 4038.996720][ T29] audit: type=1400 audit(4038.820:1748229): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=25661 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4043.059475][T26029] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4043.108911][T26029] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4043.990374][ T29] kauditd_printk_skb: 9798 callbacks suppressed [ 4043.990464][ T29] audit: type=1400 audit(4043.810:1755963): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ksoftirqd/0" saddr=127.0.0.1 src=30006 daddr=127.0.0.1 dest=51750 netif=lo [ 4043.991931][ T29] audit: type=1400 audit(4043.810:1755964): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=25661 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4043.992737][ T29] audit: type=1400 audit(4043.810:1755965): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ksoftirqd/0" saddr=127.0.0.1 src=51750 daddr=127.0.0.1 dest=30006 netif=lo [ 4043.993663][ T29] audit: type=1400 audit(4043.810:1755966): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=25661 comm="syz-executor" name="/" dev="devtmpfs" ino=1 [ 4043.994438][ T29] audit: type=1400 audit(4043.810:1755967): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=rw pid=25661 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 [ 4043.995237][ T29] audit: type=1400 audit(4043.810:1755968): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ksoftirqd/0" saddr=127.0.0.1 src=30006 daddr=127.0.0.1 dest=51750 netif=lo [ 4043.996095][ T29] audit: type=1400 audit(4043.810:1755969): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=25661 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=638 [ 4043.996895][ T29] audit: type=1400 audit(4043.810:1755970): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3257 comm="sshd" saddr=10.0.2.2 src=37458 daddr=10.0.2.15 dest=22 netif=eth0 [ 4044.026825][ T3085] audit: audit_backlog=65 > audit_backlog_limit=64 [ 4044.027877][ T29] audit: type=1400 audit(4043.810:1755971): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="kauditd" saddr=10.0.2.2 src=37458 daddr=10.0.2.15 dest=22 netif=eth0 [ 4044.530196][T26038] fuse: Bad value for 'fd' [ 4045.280988][T26039] coredump: 1442(syz.0.5824): written to core: VMAs: 16, size 38240256; core: 9122569 bytes, pos 38248448 [ 4048.997735][ T29] kauditd_printk_skb: 9611 callbacks suppressed [ 4048.997826][ T29] audit: type=1400 audit(4048.820:1764421): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="/" dev="sysfs" ino=1 [ 4048.999822][ T29] audit: type=1400 audit(4048.830:1764422): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=26092 comm="modprobe" name="lib" dev="vda" ino=1622 [ 4049.006086][ T29] audit: type=1400 audit(4048.830:1764423): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=26092 comm="modprobe" name="/" dev="vda" ino=2 [ 4049.006954][ T29] audit: type=1400 audit(4048.830:1764424): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=26092 comm="modprobe" name="usr" dev="vda" ino=1488 [ 4049.009608][ T29] audit: type=1400 audit(4048.830:1764425): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=26092 comm="modprobe" name="usr" dev="vda" ino=1488 [ 4049.010625][ T29] audit: type=1400 audit(4048.830:1764426): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=26092 comm="modprobe" name="lib" dev="vda" ino=1622 [ 4049.011399][ T29] audit: type=1400 audit(4048.830:1764427): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=26092 comm="modprobe" name="/" dev="vda" ino=2 [ 4049.012158][ T29] audit: type=1400 audit(4048.830:1764428): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=26092 comm="modprobe" name="usr" dev="vda" ino=1488 [ 4049.012920][ T29] audit: type=1400 audit(4048.830:1764429): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=26092 comm="modprobe" name="usr" dev="vda" ino=1488 [ 4049.013908][ T29] audit: type=1400 audit(4048.830:1764430): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=26092 comm="modprobe" name="lib" dev="vda" ino=1622 [ 4051.999253][T26105] coredump: 98(syz.1.5838): written to core: VMAs: 23, size 34758656; core: 5350545 bytes, pos 34766848 [ 4052.255542][T26106] coredump: 99(syz.1.5838): written to core: VMAs: 23, size 34758656; core: 5350545 bytes, pos 34766848 [ 4054.011998][ T29] kauditd_printk_skb: 3672 callbacks suppressed [ 4054.012090][ T29] audit: type=1400 audit(4053.820:1766861): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="block" dev="sysfs" ino=11385 [ 4054.013198][ T29] audit: type=1400 audit(4053.840:1766862): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="loop0" dev="sysfs" ino=12999 [ 4054.013954][ T29] audit: type=1400 audit(4053.840:1766863): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="/" dev="vda" ino=2 [ 4054.014656][ T29] audit: type=1400 audit(4053.840:1766864): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="/" dev="sysfs" ino=1 [ 4054.017956][ T29] audit: type=1400 audit(4053.840:1766865): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="devices" dev="sysfs" ino=4 [ 4054.018884][ T29] audit: type=1400 audit(4053.840:1766866): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="virtual" dev="sysfs" ino=810 [ 4054.020227][ T29] audit: type=1400 audit(4053.840:1766867): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="block" dev="sysfs" ino=11385 [ 4054.021642][ T29] audit: type=1400 audit(4053.840:1766868): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="loop0" dev="sysfs" ino=12999 [ 4054.043288][ T29] audit: type=1400 audit(4053.840:1766869): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=3085 comm="udevd" name="uevent" dev="sysfs" ino=13000 [ 4054.045136][ T29] audit: type=1400 audit(4053.860:1766870): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3085 comm="udevd" path="/sys/devices/virtual/block/loop0/uevent" dev="sysfs" ino=13000 [ 4059.021104][ T29] kauditd_printk_skb: 5163 callbacks suppressed [ 4059.021259][ T29] audit: type=1400 audit(4058.850:1770107): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="/" dev="sysfs" ino=1 [ 4059.023316][ T29] audit: type=1400 audit(4058.850:1770108): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="devices" dev="sysfs" ino=4 [ 4059.024507][ T29] audit: type=1400 audit(4058.850:1770109): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="virtual" dev="sysfs" ino=810 [ 4059.025690][ T29] audit: type=1400 audit(4058.850:1770110): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="block" dev="sysfs" ino=11385 [ 4059.026692][ T29] audit: type=1400 audit(4058.850:1770111): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="loop1" dev="sysfs" ino=13110 [ 4059.047801][ T29] audit: type=1400 audit(4058.850:1770112): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="mq" dev="sysfs" ino=13194 [ 4059.048836][ T29] audit: type=1400 audit(4058.850:1770113): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=3085 comm="udevd" name="0" dev="sysfs" ino=13195 [ 4059.049717][ T29] audit: type=1400 audit(4058.850:1770114): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3085 comm="udevd" path="/sys/devices/virtual/block/loop1/mq/0" dev="sysfs" ino=13195 [ 4059.050616][ T29] audit: type=1400 audit(4058.850:1770115): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=3085 comm="udevd" path="/sys/devices/virtual/block/loop1/mq/0" dev="sysfs" ino=13195 [ 4059.051462][ T29] audit: type=1400 audit(4058.850:1770116): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="/" dev="vda" ino=2 [ 4064.027877][ T29] kauditd_printk_skb: 7134 callbacks suppressed [ 4064.027964][ T29] audit: type=1400 audit(4063.860:1775863): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="/" dev="vda" ino=2 [ 4064.029244][ T29] audit: type=1400 audit(4063.860:1775864): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="/" dev="sysfs" ino=1 [ 4064.030036][ T29] audit: type=1400 audit(4063.860:1775865): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="devices" dev="sysfs" ino=4 [ 4064.030776][ T29] audit: type=1400 audit(4063.860:1775866): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="virtual" dev="sysfs" ino=810 [ 4064.031613][ T29] audit: type=1400 audit(4063.860:1775867): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="block" dev="sysfs" ino=11385 [ 4064.032339][ T29] audit: type=1400 audit(4063.860:1775868): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="loop0" dev="sysfs" ino=12999 [ 4064.033082][ T29] audit: type=1400 audit(4063.860:1775869): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=3085 comm="udevd" name="mq" dev="sysfs" ino=13083 [ 4064.034170][ T29] audit: type=1400 audit(4063.860:1775870): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3085 comm="udevd" path="/sys/devices/virtual/block/loop0/mq" dev="sysfs" ino=13083 [ 4064.034974][ T29] audit: type=1400 audit(4063.860:1775871): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=3085 comm="udevd" path="/sys/devices/virtual/block/loop0/mq" dev="sysfs" ino=13083 [ 4064.058035][ T29] audit: type=1400 audit(4063.860:1775872): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="/" dev="vda" ino=2 [ 4065.998530][T26171] fuse: Unknown parameter '000000000000000000030x0000000000000003' [ 4068.400137][T26192] fuse: Unknown parameter '' [ 4069.044200][ T29] kauditd_printk_skb: 7522 callbacks suppressed [ 4069.044301][ T29] audit: type=1400 audit(4068.860:1782306): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="/" dev="sysfs" ino=1 [ 4069.045392][ T29] audit: type=1400 audit(4068.870:1782307): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="devices" dev="sysfs" ino=4 [ 4069.046126][ T29] audit: type=1400 audit(4068.870:1782308): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="virtual" dev="sysfs" ino=810 [ 4069.046853][ T29] audit: type=1400 audit(4068.870:1782309): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="block" dev="sysfs" ino=11385 [ 4069.048547][ T29] audit: type=1400 audit(4068.870:1782310): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="loop1" dev="sysfs" ino=13110 [ 4069.049255][ T29] audit: type=1400 audit(4068.870:1782311): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=3085 comm="udevd" name="uevent" dev="sysfs" ino=13111 [ 4069.050136][ T29] audit: type=1400 audit(4068.870:1782312): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3085 comm="udevd" path="/sys/devices/virtual/block/loop1/uevent" dev="sysfs" ino=13111 [ 4069.050915][ T29] audit: type=1400 audit(4068.870:1782313): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=3085 comm="udevd" path="/sys/devices/virtual/block/loop1/uevent" dev="sysfs" ino=13111 [ 4069.051697][ T29] audit: type=1400 audit(4068.880:1782314): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 4069.052385][ T29] audit: type=1400 audit(4068.880:1782315): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 4069.673750][T26197] coredump: 130(syz.1.5863): written to core: VMAs: 18, size 34439168; core: 5329785 bytes, pos 34447360 [ 4074.047882][ T29] kauditd_printk_skb: 5619 callbacks suppressed [ 4074.047969][ T29] audit: type=1400 audit(4073.870:1787420): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=25661 comm="syz-executor" path="/45" dev="tmpfs" ino=252 [ 4074.049133][ T29] audit: type=1400 audit(4073.880:1787421): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=25661 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4074.050126][ T29] audit: type=1400 audit(4073.880:1787422): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=25661 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4074.052185][ T29] audit: type=1400 audit(4073.880:1787423): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=25661 comm="syz-executor" name="45" dev="tmpfs" ino=252 [ 4074.053466][ T29] audit: type=1400 audit(4073.880:1787424): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=25661 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4074.055430][ T29] audit: type=1400 audit(4073.880:1787425): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=25661 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4074.056848][ T29] audit: type=1400 audit(4073.880:1787426): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=25661 comm="syz-executor" name="45" dev="tmpfs" ino=252 [ 4074.061642][ T29] audit: type=1400 audit(4073.880:1787427): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=25661 comm="syz-executor" path="/45/cgroup" dev="tmpfs" ino=253 [ 4074.062736][ T29] audit: type=1400 audit(4073.880:1787428): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=25661 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4074.063866][ T29] audit: type=1400 audit(4073.880:1787429): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=25661 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4079.059516][ T29] kauditd_printk_skb: 4181 callbacks suppressed [ 4079.059602][ T29] audit: type=1400 audit(4078.890:1791273): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="/" dev="vda" ino=2 [ 4079.061606][ T29] audit: type=1400 audit(4078.880:1791272): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=26251 comm="syz-executor" name="554" dev="tmpfs" ino=2967 [ 4079.063016][ T29] audit: type=1400 audit(4078.890:1791274): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=26251 comm="syz-executor" name="554" dev="tmpfs" ino=2967 [ 4079.078920][ T29] audit: type=1400 audit(4078.890:1791275): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="/" dev="tmpfs" ino=1 [ 4079.079812][ T29] audit: type=1400 audit(4078.890:1791276): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="udev" dev="tmpfs" ino=7 [ 4079.080575][ T29] audit: type=1400 audit(4078.890:1791277): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="watch" dev="tmpfs" ino=31 [ 4079.081372][ T29] audit: type=1400 audit(4078.890:1791278): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="/" dev="vda" ino=2 [ 4079.082802][ T29] audit: type=1400 audit(4078.890:1791279): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="/" dev="tmpfs" ino=1 [ 4079.083792][ T29] audit: type=1400 audit(4078.900:1791281): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=26032 comm="udevd" name="/" dev="vda" ino=2 [ 4079.084727][ T29] audit: type=1400 audit(4078.900:1791280): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 4082.762247][T26281] binder: 26280:26281 ioctl 4008f50a 200027c0 returned -22 [ 4082.828635][T26281] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4082.879220][T26281] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4084.368076][ T29] kauditd_printk_skb: 4759 callbacks suppressed [ 4084.368172][ T29] audit: type=1400 audit(4084.180:1795960): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3259 comm="syz-executor" saddr=127.0.0.1 src=51750 daddr=127.0.0.1 dest=30006 netif=lo [ 4084.370177][ T29] audit: type=1400 audit(4084.180:1795961): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3257 comm="sshd" saddr=10.0.2.2 src=37458 daddr=10.0.2.15 dest=22 netif=eth0 [ 4084.371577][ T29] audit: type=1400 audit(4084.180:1795962): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22033 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4084.372735][ T29] audit: type=1400 audit(4084.180:1795963): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22033 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4084.374045][ T29] audit: type=1400 audit(4084.180:1795964): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22033 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4084.375223][ T29] audit: type=1400 audit(4084.180:1795965): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22033 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4084.376734][ T29] audit: type=1400 audit(4084.180:1795966): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=22033 comm="syz-executor" name="557" dev="tmpfs" ino=2982 [ 4084.378878][ T29] audit: type=1400 audit(4084.180:1795967): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=22033 comm="syz-executor" path="/557" dev="tmpfs" ino=2982 [ 4084.380120][ T29] audit: type=1400 audit(4084.190:1795968): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=22033 comm="syz-executor" path="/557" dev="tmpfs" ino=2982 [ 4084.381268][ T29] audit: type=1400 audit(4084.190:1795969): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22033 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4084.842338][T26296] netlink: 'syz.0.5894': attribute type 12 has an invalid length. [ 4089.631951][ T29] kauditd_printk_skb: 6538 callbacks suppressed [ 4089.632035][ T29] audit: type=1400 audit(4089.460:1800869): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22033 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4089.633153][ T29] audit: type=1400 audit(4089.460:1800870): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3259 comm="syz-executor" saddr=127.0.0.1 src=51750 daddr=127.0.0.1 dest=30006 netif=lo [ 4089.634087][ T29] audit: type=1400 audit(4089.460:1800871): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22033 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4089.634891][ T29] audit: type=1400 audit(4089.460:1800872): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22033 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4089.642011][ T29] audit: type=1400 audit(4089.460:1800873): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22033 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4089.642835][ T29] audit: type=1400 audit(4089.460:1800874): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=22033 comm="syz-executor" saddr=10.0.2.2 src=37458 daddr=10.0.2.15 dest=22 netif=eth0 [ 4089.643693][ T29] audit: type=1400 audit(4089.460:1800875): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=22033 comm="syz-executor" name="566" dev="tmpfs" ino=3029 [ 4089.644444][ T29] audit: type=1400 audit(4089.460:1800876): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=22033 comm="syz-executor" path="/566" dev="tmpfs" ino=3029 [ 4089.645225][ T29] audit: type=1400 audit(4089.460:1800877): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=22033 comm="syz-executor" path="/566" dev="tmpfs" ino=3029 [ 4089.646018][ T29] audit: type=1400 audit(4089.460:1800878): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22033 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4089.784148][T26333] serio: Serial port pts0 [ 4090.314382][T26341] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4090.358775][T26341] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4090.374435][T26341] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4090.420140][T26341] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4090.431775][T26341] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4090.478857][T26341] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4094.853856][ T29] kauditd_printk_skb: 1735 callbacks suppressed [ 4094.854004][ T29] audit: type=1400 audit(4094.680:1802614): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3114 comm="dhcpcd" [ 4094.862445][ T29] audit: type=1400 audit(4094.690:1802615): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 4094.864250][ T29] audit: type=1400 audit(4094.690:1802616): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3114 comm="dhcpcd" [ 4094.871926][ T29] audit: type=1400 audit(4094.690:1802617): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3070 comm="syslogd" name="/" dev="vda" ino=2 [ 4094.872815][ T29] audit: type=1400 audit(4094.690:1802618): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3070 comm="syslogd" name="var" dev="vda" ino=1718 [ 4094.873742][ T29] audit: type=1400 audit(4094.690:1802619): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3114 comm="dhcpcd" [ 4094.875098][ T29] audit: type=1400 audit(4094.690:1802620): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3115 comm="dhcpcd" [ 4094.876163][ T29] audit: type=1400 audit(4094.700:1802621): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 4094.876881][ T29] audit: type=1400 audit(4094.700:1802622): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3070 comm="syslogd" name="var" dev="vda" ino=1718 [ 4094.878996][ T29] audit: type=1400 audit(4094.700:1802623): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 4099.859360][ T29] kauditd_printk_skb: 1144 callbacks suppressed [ 4099.859526][ T29] audit: type=1400 audit(4099.690:1803759): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=26383 comm="modprobe" name="/" dev="vda" ino=2 [ 4099.862100][ T29] audit: type=1400 audit(4099.690:1803760): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=26383 comm="modprobe" name="etc" dev="vda" ino=95 [ 4099.863708][ T29] audit: type=1400 audit(4099.690:1803761): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=26383 comm="modprobe" name="selinux" dev="vda" ino=130 [ 4099.865468][ T29] audit: type=1400 audit(4099.690:1803762): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=26383 comm="modprobe" name="/" dev="vda" ino=2 [ 4099.879148][ T29] audit: type=1400 audit(4099.690:1803763): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=26383 comm="modprobe" name="lib" dev="vda" ino=195 [ 4099.880911][ T29] audit: type=1400 audit(4099.690:1803764): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=26383 comm="modprobe" name="modules" dev="vda" ino=384 [ 4099.884802][ T29] audit: type=1400 audit(4099.690:1803765): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=26383 comm="modprobe" name="modules" dev="vda" ino=384 [ 4099.886474][ T29] audit: type=1400 audit(4099.700:1803766): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 4099.895773][ T29] audit: type=1400 audit(4099.700:1803767): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 4099.897887][ T29] audit: type=1400 audit(4099.700:1803768): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3070 comm="syslogd" name="/" dev="vda" ino=2 [ 4104.868080][ T29] kauditd_printk_skb: 756 callbacks suppressed [ 4104.868201][ T29] audit: type=1400 audit(4104.700:1804525): lsm=SMACK fn=smack_inode_rmdir action=granted subject="_" object="_" requested=w pid=22033 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4104.869625][ T29] audit: type=1400 audit(4104.700:1804526): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3257 comm="sshd" saddr=127.0.0.1 src=30006 daddr=127.0.0.1 dest=51750 netif=lo [ 4104.871746][ T29] audit: type=1400 audit(4104.700:1804527): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22033 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4104.872535][ T29] audit: type=1400 audit(4104.700:1804528): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=26404 comm="kworker/u8:13" name="/" dev="vda" ino=2 [ 4104.873228][ T29] audit: type=1400 audit(4104.700:1804529): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=26404 comm="kworker/u8:13" name="sbin" dev="vda" ino=1428 [ 4104.873982][ T29] audit: type=1400 audit(4104.700:1804530): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=26404 comm="kworker/u8:13" name="/" dev="vda" ino=2 [ 4104.874941][ T29] audit: type=1400 audit(4104.700:1804531): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=26404 comm="kworker/u8:13" name="lib" dev="vda" ino=195 [ 4104.876065][ T29] audit: type=1400 audit(4104.700:1804532): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=26404 comm="kworker/u8:13" name="ld-linux-aarch64.so.1" dev="vda" ino=362 [ 4104.893700][ T29] audit: type=1400 audit(4104.700:1804533): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=26404 comm="kworker/u8:13" path="/lib/ld-linux-aarch64.so.1" dev="vda" ino=362 [ 4104.895983][ T29] audit: type=1400 audit(4104.700:1804534): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=26404 comm="kworker/u8:13" name="ld-linux-aarch64.so.1" dev="vda" ino=362 [ 4109.879695][ T29] kauditd_printk_skb: 5507 callbacks suppressed [ 4109.879785][ T29] audit: type=1400 audit(4109.710:1809266): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=24 comm="ksoftirqd/1" saddr=127.0.0.1 src=30006 daddr=127.0.0.1 dest=51750 netif=lo [ 4109.881026][ T29] audit: type=1400 audit(4109.710:1809267): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=24 comm="ksoftirqd/1" saddr=127.0.0.1 src=51750 daddr=127.0.0.1 dest=30006 netif=lo [ 4109.881893][ T29] audit: type=1400 audit(4109.710:1809268): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=24 comm="ksoftirqd/1" saddr=127.0.0.1 src=30006 daddr=127.0.0.1 dest=51750 netif=lo [ 4109.883435][ T29] audit: type=1400 audit(4109.710:1809269): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="/" dev="vda" ino=2 [ 4109.884843][ T29] audit: type=1400 audit(4109.710:1809270): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="/" dev="sysfs" ino=1 [ 4109.886421][ T29] audit: type=1400 audit(4109.710:1809271): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="devices" dev="sysfs" ino=4 [ 4109.890185][ T29] audit: type=1400 audit(4109.720:1809272): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="kauditd" saddr=10.0.2.2 src=37458 daddr=10.0.2.15 dest=22 netif=eth0 [ 4109.891324][ T29] audit: type=1400 audit(4109.720:1809273): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="kauditd" saddr=10.0.2.2 src=37458 daddr=10.0.2.15 dest=22 netif=eth0 [ 4109.892291][ T29] audit: type=1400 audit(4109.720:1809274): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 4109.893035][ T29] audit: type=1400 audit(4109.720:1809275): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 4111.188377][T20707] usb 1-1: new high-speed USB device number 61 using dummy_hcd [ 4111.348164][T20707] usb 1-1: Using ep0 maxpacket: 32 [ 4111.362681][T20707] usb 1-1: config 1 has an invalid interface number: 6 but max is 2 [ 4111.363275][T20707] usb 1-1: config 1 has an invalid descriptor of length 145, skipping remainder of the config [ 4111.363746][T20707] usb 1-1: config 1 has 2 interfaces, different from the descriptor's value: 3 [ 4111.364189][T20707] usb 1-1: config 1 has no interface number 1 [ 4111.364893][T20707] usb 1-1: too many endpoints for config 1 interface 6 altsetting 7: 123, using maximum allowed: 30 [ 4111.365501][T20707] usb 1-1: config 1 interface 6 altsetting 7 has 0 endpoint descriptors, different from the interface descriptor's value: 123 [ 4111.366075][T20707] usb 1-1: config 1 interface 6 has no altsetting 0 [ 4111.412189][T20707] usb 1-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 4111.412755][T20707] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 4111.413191][T20707] usb 1-1: Product: syz [ 4111.413542][T20707] usb 1-1: Manufacturer: 䂌탤௓씉ꈢᆨ猊‸㍗㽕杂鳉䨋眳⫕獆뚟᯲⧖餺䢡䶠橎颶鋐⬑폣쯓ꓘᥤ굠魨禸䙧ⲟ蚱숍짿䋺齀噄䟌ꦣꑒ髛㰾皬뿢吏韂챫᳭蚳༖惖搅꯫„ᣄ壦鬬䜼礯滢ꉃ鯋䜤뤆遼饸冺ᣜ璋㇍䯿攖්腹吝鵶鞭낉⩳桐膎䡴邍Ⓦଝ췹儲態ꑸ耀裪ᴩ盝觌츢낂ꢤ㇌⮧砳퀚妓蜍톷 [ 4111.414591][T20707] usb 1-1: SerialNumber: syz [ 4114.902488][ T3085] audit_log_start: 4218 callbacks suppressed [ 4114.902692][ T3085] audit: audit_backlog=65 > audit_backlog_limit=64 [ 4114.903846][ T3085] audit: audit_lost=153390 audit_rate_limit=0 audit_backlog_limit=64 [ 4114.905808][ T3085] audit: backlog limit exceeded [ 4114.907821][ T3085] audit: audit_backlog=65 > audit_backlog_limit=64 [ 4114.907904][ T29] audit: type=1400 audit(4114.700:1813494): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=25661 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4114.908124][ T29] audit: type=1400 audit(4114.700:1813495): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=25661 comm="syz-executor" name="83" dev="tmpfs" ino=447 [ 4114.908421][ T3085] audit: audit_lost=153391 audit_rate_limit=0 audit_backlog_limit=64 [ 4114.910540][ T3085] audit: backlog limit exceeded [ 4114.911181][ T29] audit: type=1400 audit(4114.700:1813496): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=25661 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4114.918701][ T3074] audit: audit_backlog=65 > audit_backlog_limit=64 [ 4115.689456][T26480] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4115.740399][T26480] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4116.532231][T20707] usb 1-1: 0:2 : does not exist [ 4117.030712][T26480] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4117.078283][T26480] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4119.938966][ T29] kauditd_printk_skb: 3449 callbacks suppressed [ 4119.941092][ T29] audit: type=1400 audit(4119.760:1816893): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=26497 comm="kworker/u8:13" name="/" dev="vda" ino=2 [ 4119.946363][ T29] audit: type=1400 audit(4119.770:1816894): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=26497 comm="kworker/u8:13" name="sbin" dev="vda" ino=1428 [ 4119.952219][ T29] audit: type=1400 audit(4119.770:1816895): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=26497 comm="kworker/u8:13" name="modprobe" dev="vda" ino=1462 [ 4119.953705][ T29] audit: type=1400 audit(4119.770:1816896): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=26497 comm="kworker/u8:13" path="/sbin/modprobe" dev="vda" ino=1462 [ 4119.955538][ T29] audit: type=1400 audit(4119.770:1816897): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=26497 comm="kworker/u8:13" name="/" dev="vda" ino=2 [ 4119.958307][ T29] audit: type=1400 audit(4119.770:1816898): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=26497 comm="kworker/u8:13" name="sbin" dev="vda" ino=1428 [ 4119.960440][ T29] audit: type=1400 audit(4119.770:1816899): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=26497 comm="kworker/u8:13" name="/" dev="vda" ino=2 [ 4119.961950][ T29] audit: type=1400 audit(4119.770:1816900): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=26497 comm="kworker/u8:13" name="lib" dev="vda" ino=195 [ 4119.964162][ T29] audit: type=1400 audit(4119.770:1816901): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=26497 comm="kworker/u8:13" name="ld-linux-aarch64.so.1" dev="vda" ino=362 [ 4119.965883][ T29] audit: type=1400 audit(4119.770:1816902): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=26497 comm="kworker/u8:13" path="/lib/ld-linux-aarch64.so.1" dev="vda" ino=362 [ 4121.791116][T23587] usb 1-1: USB disconnect, device number 61 [ 4124.947690][ T29] kauditd_printk_skb: 7976 callbacks suppressed [ 4124.947780][ T29] audit: type=1400 audit(4124.770:1823441): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=25661 comm="syz-executor" path="/97/binderfs" dev="tmpfs" ino=522 [ 4124.948933][ T29] audit: type=1400 audit(4124.780:1823442): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=25661 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4124.949727][ T29] audit: type=1400 audit(4124.780:1823443): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=25661 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4124.950506][ T29] audit: type=1400 audit(4124.780:1823444): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=25661 comm="syz-executor" name="97" dev="tmpfs" ino=518 [ 4124.951358][ T29] audit: type=1400 audit(4124.780:1823445): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=25661 comm="syz-executor" name="97" dev="tmpfs" ino=518 [ 4124.952126][ T29] audit: type=1400 audit(4124.780:1823446): lsm=SMACK fn=smack_inode_unlink action=granted subject="_" object="_" requested=w pid=25661 comm="syz-executor" name="binderfs" dev="tmpfs" ino=522 [ 4124.952957][ T29] audit: type=1400 audit(4124.780:1823447): lsm=SMACK fn=smack_inode_unlink action=granted subject="_" object="_" requested=w pid=25661 comm="syz-executor" name="97" dev="tmpfs" ino=518 [ 4124.953763][ T29] audit: type=1400 audit(4124.780:1823448): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=25661 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4124.954813][ T29] audit: type=1400 audit(4124.780:1823449): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=25661 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4124.955603][ T29] audit: type=1400 audit(4124.780:1823450): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=25661 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4125.938109][T26558] serio: Serial port pts0 [ 4130.279462][ T29] kauditd_printk_skb: 3240 callbacks suppressed [ 4130.279554][ T29] audit: type=1400 audit(4130.110:1826691): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22033 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4130.280708][ T29] audit: type=1400 audit(4130.110:1826692): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3259 comm="syz-executor" saddr=127.0.0.1 src=51750 daddr=127.0.0.1 dest=30006 netif=lo [ 4130.283966][ T29] audit: type=1400 audit(4130.110:1826693): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=22033 comm="syz-executor" saddr=10.0.2.2 src=37458 daddr=10.0.2.15 dest=22 netif=eth0 [ 4130.286135][ T29] audit: type=1400 audit(4130.110:1826694): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22033 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4130.289704][ T29] audit: type=1400 audit(4130.120:1826695): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 4130.291334][ T29] audit: type=1400 audit(4130.120:1826696): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 4130.292177][ T29] audit: type=1400 audit(4130.120:1826697): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 4130.293237][ T29] audit: type=1400 audit(4130.120:1826698): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 4130.294068][ T29] audit: type=1400 audit(4130.120:1826699): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 4130.294876][ T29] audit: type=1400 audit(4130.120:1826700): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 4135.288476][ T29] kauditd_printk_skb: 3796 callbacks suppressed [ 4135.288571][ T29] audit: type=1400 audit(4135.110:1830104): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22033 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4135.289738][ T29] audit: type=1400 audit(4135.110:1830105): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22033 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4135.290499][ T29] audit: type=1400 audit(4135.110:1830106): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22033 comm="syz-executor" name="589" dev="tmpfs" ino=3148 [ 4135.291239][ T29] audit: type=1400 audit(4135.110:1830107): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22033 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4135.291995][ T29] audit: type=1400 audit(4135.110:1830108): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22033 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4135.292743][ T29] audit: type=1400 audit(4135.110:1830109): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22033 comm="syz-executor" name="589" dev="tmpfs" ino=3148 [ 4135.297993][ T29] audit: type=1400 audit(4135.120:1830110): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=22033 comm="syz-executor" path=2F3538392FE91F7189591E9233614B dev="tmpfs" ino=3153 [ 4135.298950][ T29] audit: type=1400 audit(4135.120:1830111): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22033 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4135.300014][ T29] audit: type=1400 audit(4135.120:1830112): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22033 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4135.300811][ T29] audit: type=1400 audit(4135.120:1830113): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22033 comm="syz-executor" name="589" dev="tmpfs" ino=3148 [ 4136.172707][T26610] FAULT_INJECTION: forcing a failure. [ 4136.172707][T26610] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 4136.174110][T26610] CPU: 1 UID: 0 PID: 26610 Comm: syz.0.5973 Tainted: G B 6.11.0-syzkaller-08481-g88264981f208 #0 [ 4136.174916][T26610] Tainted: [B]=BAD_PAGE [ 4136.175256][T26610] Hardware name: linux,dummy-virt (DT) [ 4136.175783][T26610] Call trace: [ 4136.176098][T26610] dump_backtrace+0x94/0xec [ 4136.177094][T26610] show_stack+0x18/0x24 [ 4136.177563][T26610] dump_stack_lvl+0x78/0x90 [ 4136.177953][T26610] dump_stack+0x18/0x24 [ 4136.178301][T26610] should_fail_ex+0x18c/0x1e0 [ 4136.178675][T26610] should_fail+0x14/0x20 [ 4136.179020][T26610] should_fail_usercopy+0x1c/0x28 [ 4136.179384][T26610] copy_msghdr_from_user+0x48/0x110 [ 4136.179781][T26610] ___sys_sendmsg+0x8c/0x100 [ 4136.180136][T26610] __sys_sendmsg+0x84/0xe0 [ 4136.180484][T26610] __arm64_sys_sendmsg+0x24/0x30 [ 4136.180853][T26610] invoke_syscall+0x48/0x110 [ 4136.181209][T26610] el0_svc_common.constprop.0+0x40/0xe0 [ 4136.181634][T26610] do_el0_svc+0x1c/0x28 [ 4136.181997][T26610] el0_svc+0x34/0xec [ 4136.182638][T26610] el0t_64_sync_handler+0x100/0x12c [ 4136.183354][T26610] el0t_64_sync+0x19c/0x1a0 [ 4140.406827][ T29] kauditd_printk_skb: 4112 callbacks suppressed [ 4140.406937][ T29] audit: type=1400 audit(4140.230:1833443): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22033 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4140.409542][ T29] audit: type=1400 audit(4140.230:1833444): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22033 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4140.410457][ T29] audit: type=1400 audit(4140.240:1833445): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22033 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4140.412157][ T29] audit: type=1400 audit(4140.240:1833446): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22033 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4140.413343][ T29] audit: type=1400 audit(4140.240:1833447): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=22033 comm="syz-executor" name="595" dev="tmpfs" ino=3179 [ 4140.414318][ T29] audit: type=1400 audit(4140.240:1833448): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=22033 comm="syz-executor" path="/595" dev="tmpfs" ino=3179 [ 4140.415250][ T29] audit: type=1400 audit(4140.240:1833449): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=22033 comm="syz-executor" path="/595" dev="tmpfs" ino=3179 [ 4140.416114][ T29] audit: type=1400 audit(4140.240:1833450): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3259 comm="syz-executor" saddr=127.0.0.1 src=51750 daddr=127.0.0.1 dest=30006 netif=lo [ 4140.451403][ T29] audit: type=1400 audit(4140.250:1833451): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=26627 comm="syz.1.5978" saddr=10.0.2.2 src=37458 daddr=10.0.2.15 dest=22 netif=eth0 [ 4140.452487][ T29] audit: type=1400 audit(4140.250:1833452): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22033 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4141.751656][T26635] FAULT_INJECTION: forcing a failure. [ 4141.751656][T26635] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 4141.753129][T26635] CPU: 1 UID: 0 PID: 26635 Comm: syz.0.5980 Tainted: G B 6.11.0-syzkaller-08481-g88264981f208 #0 [ 4141.754326][T26635] Tainted: [B]=BAD_PAGE [ 4141.754880][T26635] Hardware name: linux,dummy-virt (DT) [ 4141.755620][T26635] Call trace: [ 4141.756204][T26635] dump_backtrace+0x94/0xec [ 4141.757730][T26635] show_stack+0x18/0x24 [ 4141.758548][T26635] dump_stack_lvl+0x78/0x90 [ 4141.759317][T26635] dump_stack+0x18/0x24 [ 4141.760059][T26635] should_fail_ex+0x18c/0x1e0 [ 4141.760858][T26635] should_fail+0x14/0x20 [ 4141.761995][T26635] should_fail_usercopy+0x1c/0x28 [ 4141.762795][T26635] _copy_from_iter+0x5c/0x68c [ 4141.763626][T26635] isotp_sendmsg+0x1e4/0x7b0 [ 4141.764438][T26635] __sock_sendmsg+0x54/0x60 [ 4141.765227][T26635] ____sys_sendmsg+0x274/0x2ac [ 4141.766041][T26635] ___sys_sendmsg+0xac/0x100 [ 4141.766851][T26635] __sys_sendmsg+0x84/0xe0 [ 4141.768285][T26635] __arm64_sys_sendmsg+0x24/0x30 [ 4141.769056][T26635] invoke_syscall+0x48/0x110 [ 4141.769931][T26635] el0_svc_common.constprop.0+0x40/0xe0 [ 4141.770826][T26635] do_el0_svc+0x1c/0x28 [ 4141.771559][T26635] el0_svc+0x34/0xec [ 4141.772317][T26635] el0t_64_sync_handler+0x100/0x12c [ 4141.773231][T26635] el0t_64_sync+0x19c/0x1a0 [ 4145.151222][T26651] FAULT_INJECTION: forcing a failure. [ 4145.151222][T26651] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 4145.153777][T26651] CPU: 1 UID: 0 PID: 26651 Comm: syz.1.5985 Tainted: G B 6.11.0-syzkaller-08481-g88264981f208 #0 [ 4145.155286][T26651] Tainted: [B]=BAD_PAGE [ 4145.155913][T26651] Hardware name: linux,dummy-virt (DT) [ 4145.156754][T26651] Call trace: [ 4145.157657][T26651] dump_backtrace+0x94/0xec [ 4145.158377][T26651] show_stack+0x18/0x24 [ 4145.159132][T26651] dump_stack_lvl+0x78/0x90 [ 4145.159924][T26651] dump_stack+0x18/0x24 [ 4145.160588][T26651] should_fail_ex+0x18c/0x1e0 [ 4145.161270][T26651] should_fail+0x14/0x20 [ 4145.161965][T26651] should_fail_usercopy+0x1c/0x28 [ 4145.162667][T26651] simple_read_from_buffer+0x68/0x118 [ 4145.163441][T26651] proc_fail_nth_read+0xac/0x12c [ 4145.164146][T26651] vfs_read+0xc0/0x318 [ 4145.164804][T26651] ksys_read+0x70/0x104 [ 4145.165507][T26651] __arm64_sys_read+0x1c/0x28 [ 4145.166217][T26651] invoke_syscall+0x48/0x110 [ 4145.166928][T26651] el0_svc_common.constprop.0+0x40/0xe0 [ 4145.167823][T26651] do_el0_svc+0x1c/0x28 [ 4145.168625][T26651] el0_svc+0x34/0xec [ 4145.169369][T26651] el0t_64_sync_handler+0x100/0x12c [ 4145.170136][T26651] el0t_64_sync+0x19c/0x1a0 [ 4145.407885][ T29] kauditd_printk_skb: 2871 callbacks suppressed [ 4145.408060][ T29] audit: type=1400 audit(4145.230:1836192): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=26654 comm="modprobe" name="/" dev="vda" ino=2 [ 4145.410672][ T29] audit: type=1400 audit(4145.240:1836193): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=26654 comm="modprobe" name="etc" dev="vda" ino=95 [ 4145.412447][ T29] audit: type=1400 audit(4145.240:1836194): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=26654 comm="modprobe" name="/" dev="vda" ino=2 [ 4145.414702][ T29] audit: type=1400 audit(4145.240:1836195): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=26654 comm="modprobe" name="etc" dev="vda" ino=95 [ 4145.416279][ T29] audit: type=1400 audit(4145.240:1836196): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=26654 comm="modprobe" name="/" dev="vda" ino=2 [ 4145.429063][ T29] audit: type=1400 audit(4145.240:1836197): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=26654 comm="modprobe" name="/" dev="vda" ino=2 [ 4145.431889][ T29] audit: type=1400 audit(4145.240:1836198): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=26654 comm="modprobe" name="lib" dev="vda" ino=195 [ 4145.433540][ T29] audit: type=1400 audit(4145.240:1836199): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=26654 comm="modprobe" name="/" dev="vda" ino=2 [ 4145.435077][ T29] audit: type=1400 audit(4145.240:1836200): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=26654 comm="modprobe" name="/" dev="vda" ino=2 [ 4145.436788][ T29] audit: type=1400 audit(4145.240:1836201): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=26654 comm="modprobe" name="lib" dev="vda" ino=195 [ 4149.193087][T20885] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 4149.288495][T20885] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 4149.354546][T20885] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 4149.466703][T20885] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 4150.417729][ T29] kauditd_printk_skb: 2258 callbacks suppressed [ 4150.417828][ T29] audit: type=1400 audit(4150.240:1838232): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=26675 comm="modprobe" name="/" dev="vda" ino=2 [ 4150.419103][ T29] audit: type=1400 audit(4150.240:1838233): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=26675 comm="modprobe" name="lib" dev="vda" ino=195 [ 4150.420402][ T29] audit: type=1400 audit(4150.240:1838234): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=26673 comm="udevd" name="uevent" dev="sysfs" ino=148593 [ 4150.421209][ T29] audit: type=1400 audit(4150.240:1838235): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=26675 comm="modprobe" name="/" dev="vda" ino=2 [ 4150.422028][ T29] audit: type=1400 audit(4150.240:1838236): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=26675 comm="modprobe" name="/" dev="vda" ino=2 [ 4150.422861][ T29] audit: type=1400 audit(4150.240:1838238): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=26675 comm="modprobe" name="lib" dev="vda" ino=195 [ 4150.424298][ T29] audit: type=1400 audit(4150.240:1838237): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=26673 comm="udevd" path="/sys/devices/netdevsim0/net/eth3/uevent" dev="sysfs" ino=148593 [ 4150.425584][ T29] audit: type=1400 audit(4150.250:1838239): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="/" dev="vda" ino=2 [ 4150.426343][ T29] audit: type=1400 audit(4150.250:1838240): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="/" dev="tmpfs" ino=1 [ 4150.447672][ T29] audit: type=1400 audit(4150.250:1838241): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="udev" dev="tmpfs" ino=7 [ 4150.822937][T20885] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 4150.959886][T20885] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 4151.015972][T20885] bond0 (unregistering): Released all slaves [ 4151.331932][T20885] hsr_slave_0: left promiscuous mode [ 4151.390523][T20885] hsr_slave_1: left promiscuous mode [ 4151.484716][T20885] veth1_macvtap: left promiscuous mode [ 4151.485470][T20885] veth0_macvtap: left promiscuous mode [ 4151.486160][T20885] veth1_vlan: left promiscuous mode [ 4151.497826][T20885] veth0_vlan: left promiscuous mode [ 4155.427683][ T29] kauditd_printk_skb: 5371 callbacks suppressed [ 4155.427782][ T29] audit: type=1400 audit(4155.250:1843376): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=26714 comm="kworker/u8:12" name="/" dev="vda" ino=2 [ 4155.429252][ T29] audit: type=1400 audit(4155.250:1843377): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=26714 comm="kworker/u8:12" name="lib" dev="vda" ino=195 [ 4155.431148][ T29] audit: type=1400 audit(4155.250:1843378): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=26714 comm="kworker/u8:12" name="ld-linux-aarch64.so.1" dev="vda" ino=362 [ 4155.432190][ T29] audit: type=1400 audit(4155.250:1843379): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=26714 comm="kworker/u8:12" path="/lib/ld-linux-aarch64.so.1" dev="vda" ino=362 [ 4155.433103][ T29] audit: type=1400 audit(4155.250:1843380): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=26713 comm="modprobe" name="/" dev="vda" ino=2 [ 4155.434026][ T29] audit: type=1400 audit(4155.250:1843381): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=26714 comm="kworker/u8:12" name="ld-linux-aarch64.so.1" dev="vda" ino=362 [ 4155.434954][ T29] audit: type=1400 audit(4155.250:1843382): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=26713 comm="modprobe" name="etc" dev="vda" ino=95 [ 4155.435857][ T29] audit: type=1400 audit(4155.250:1843383): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=26714 comm="kworker/u8:12" name="modprobe" dev="vda" ino=1462 [ 4155.436735][ T29] audit: type=1400 audit(4155.250:1843384): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=26713 comm="modprobe" name="/" dev="vda" ino=2 [ 4155.449962][T26714] audit: audit_backlog=65 > audit_backlog_limit=64 [ 4156.129100][T26663] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 4156.155710][T26663] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 4158.831053][T26663] hsr_slave_0: entered promiscuous mode [ 4158.869971][T26663] hsr_slave_1: entered promiscuous mode [ 4160.437818][ T29] kauditd_printk_skb: 10139 callbacks suppressed [ 4160.437910][ T29] audit: type=1400 audit(4160.260:1848839): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=26756 comm="cmp" name="lib" dev="vda" ino=195 [ 4160.441215][ T29] audit: type=1400 audit(4160.270:1848840): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=26751 comm="udevd" name="devices" dev="sysfs" ino=4 [ 4160.447973][ T29] audit: type=1400 audit(4160.270:1848841): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=26751 comm="udevd" name="netdevsim0" dev="sysfs" ino=153943 [ 4160.450085][ T29] audit: type=1400 audit(4160.270:1848842): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=26751 comm="udevd" name="net" dev="sysfs" ino=153958 [ 4160.457935][ T29] audit: type=1400 audit(4160.270:1848843): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=26751 comm="udevd" [ 4160.459333][ T29] audit: type=1400 audit(4160.280:1848844): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="/" dev="vda" ino=2 [ 4160.460988][ T29] audit: type=1400 audit(4160.280:1848845): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="/" dev="sysfs" ino=1 [ 4160.462736][ T29] audit: type=1400 audit(4160.280:1848846): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="devices" dev="sysfs" ino=4 [ 4160.475843][ T29] audit: type=1400 audit(4160.280:1848848): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=26756 comm="cmp" name="/" dev="vda" ino=2 [ 4160.477882][ T29] audit: type=1400 audit(4160.280:1848849): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=26756 comm="cmp" name="usr" dev="vda" ino=1488 [ 4160.585063][T26663] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 4160.617582][T26663] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 4160.626603][T26663] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 4160.665884][T26663] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 4162.826697][T26663] 8021q: adding VLAN 0 to HW filter on device bond0 [ 4165.452062][ T29] kauditd_printk_skb: 6822 callbacks suppressed [ 4165.452148][ T29] audit: type=1400 audit(4165.280:1854831): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=26795 comm="modprobe" name="/" dev="vda" ino=2 [ 4165.453225][ T29] audit: type=1400 audit(4165.280:1854832): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=26795 comm="modprobe" name="etc" dev="vda" ino=95 [ 4165.454125][ T29] audit: type=1400 audit(4165.280:1854833): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=26795 comm="modprobe" name="/" dev="vda" ino=2 [ 4165.455396][ T29] audit: type=1400 audit(4165.280:1854835): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=26794 comm="dhcpcd-run-hook" name="/" dev="vda" ino=2 [ 4165.456232][ T29] audit: type=1400 audit(4165.280:1854836): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=26794 comm="dhcpcd-run-hook" name="lib" dev="vda" ino=195 [ 4165.457000][ T29] audit: type=1400 audit(4165.280:1854837): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=26794 comm="dhcpcd-run-hook" name="/" dev="vda" ino=2 [ 4165.467839][ T29] audit: type=1400 audit(4165.280:1854838): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=26794 comm="dhcpcd-run-hook" name="/" dev="vda" ino=2 [ 4165.468650][ T29] audit: type=1400 audit(4165.280:1854839): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=26794 comm="dhcpcd-run-hook" name="lib" dev="vda" ino=195 [ 4165.469412][ T29] audit: type=1400 audit(4165.280:1854840): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=26794 comm="dhcpcd-run-hook" name="/" dev="vda" ino=2 [ 4165.470160][ T29] audit: type=1400 audit(4165.290:1854841): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=26794 comm="dhcpcd-run-hook" name="/" dev="vda" ino=2 [ 4169.788959][T26663] veth0_vlan: entered promiscuous mode [ 4169.813850][T26663] veth1_vlan: entered promiscuous mode [ 4169.913224][T26663] veth0_macvtap: entered promiscuous mode [ 4169.929045][T26663] veth1_macvtap: entered promiscuous mode [ 4170.026029][T26663] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 4170.026701][T26663] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 4170.027613][T26663] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 4170.028103][T26663] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 4170.458359][ T29] kauditd_printk_skb: 6859 callbacks suppressed [ 4170.458448][ T29] audit: type=1400 audit(4170.290:1859885): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="/" dev="sysfs" ino=1 [ 4170.460165][ T29] audit: type=1400 audit(4170.290:1859886): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="devices" dev="sysfs" ino=4 [ 4170.461636][ T29] audit: type=1400 audit(4170.290:1859887): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="virtual" dev="sysfs" ino=810 [ 4170.462471][ T29] audit: type=1400 audit(4170.290:1859888): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=26827 comm="syz-executor" name="0" dev="tmpfs" ino=12 [ 4170.463326][ T29] audit: type=1400 audit(4170.290:1859889): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=26827 comm="syz-executor" name="0" dev="tmpfs" ino=12 [ 4170.469041][ T29] audit: type=1400 audit(4170.290:1859890): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=26827 comm="syz-executor" name="0" dev="tmpfs" ino=12 [ 4170.469946][ T29] audit: type=1400 audit(4170.290:1859891): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="block" dev="sysfs" ino=11385 [ 4170.470732][ T29] audit: type=1400 audit(4170.290:1859892): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=26827 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4170.471488][ T29] audit: type=1400 audit(4170.290:1859893): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=26827 comm="syz-executor" name="/" dev="proc" ino=1 [ 4170.472212][ T29] audit: type=1400 audit(4170.290:1859894): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="/" dev="vda" ino=2 [ 4171.554553][T26847] Unable to handle kernel paging request at virtual address 0073766564746560 [ 4171.555712][T26847] Mem abort info: SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 4171.631197][T26847] ESR = 0x0000000096000004 [ 4171.631674][T26847] EC = 0x25: DABT (current EL), IL = 32 bits [ 4171.632152][T26847] SET = 0, FnV = 0 [ 4171.632471][T26847] EA = 0, S1PTW = 0 [ 4171.632833][T26847] FSC = 0x04: level 0 translation fault [ 4171.633202][T26847] Data abort info: [ 4171.647820][T26847] ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000 [ 4171.648383][T26847] CM = 0, WnR = 0, TnD = 0, TagAccess = 0 [ 4171.648773][T26847] GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0 [ 4171.649213][T26847] [0073766564746560] address between user and kernel address ranges [ 4171.649831][T26847] Internal error: Oops: 0000000096000004 [#1] PREEMPT SMP [ 4171.650406][T26847] Modules linked in: [ 4171.651263][T26847] CPU: 1 UID: 0 PID: 26847 Comm: syz.1.6000 Tainted: G B 6.11.0-syzkaller-08481-g88264981f208 #0 [ 4171.651885][T26847] Tainted: [B]=BAD_PAGE [ 4171.652187][T26847] Hardware name: linux,dummy-virt (DT) [ 4171.652638][T26847] pstate: 21400009 (nzCv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--) [ 4171.653212][T26847] pc : __pi_strlen+0x124/0x150 [ 4171.653724][T26847] lr : audit_log_untrustedstring+0x20/0x40 [ 4171.654130][T26847] sp : ffff800083683c00 [ 4171.654451][T26847] x29: ffff800083683c00 x28: fdf0000006ad5b40 x27: 0000000000000000 [ 4171.655349][T26847] x26: 0000000000000000 x25: 0000000000000000 x24: fdf000000768fa80 [ 4171.656028][T26847] x23: 00000000fffffff3 x22: 0000000000000000 x21: ffff80008051ca88 [ 4171.656732][T26847] x20: f0f0000003042540 x19: 697376656474656e x18: ffffffffffffffff [ 4171.657505][T26847] x17: ffff800080027db0 x16: ffff8000804f4360 x15: ffff8000836839e0 [ 4171.658136][T26847] x14: 0000000000000000 x13: fdf0000008c2481f x12: ffff800080027eb8 [ 4171.658920][T26847] x11: ffff800080011558 x10: 000000000000005f x9 : 00000000001c66b6 [ 4171.659584][T26847] x8 : 0101010101010101 x7 : 00000000000006c0 x6 : 000000000000005f [ 4171.660193][T26847] x5 : fdf0000008c2485f x4 : 000000000000000e x3 : 0000000000000067 [ 4171.660814][T26847] x2 : 0000000000000000 x1 : 6973766564746560 x0 : 697376656474656e [ 4171.661545][T26847] Call trace: [ 4171.661834][T26847] __pi_strlen+0x124/0x150 [ 4171.662239][T26847] smack_log_callback+0x7c/0xc8 [ 4171.662653][T26847] common_lsm_audit+0x5c/0x85c [ 4171.663048][T26847] smack_log+0xec/0x140 [ 4171.663418][T26847] smk_access+0x104/0x148 [ 4171.663759][T26847] smack_watch_key+0xe0/0xf8 [ 4171.664102][T26847] security_watch_key+0x58/0x148 [ 4171.664472][T26847] keyctl_watch_key+0xb0/0x1cc [ 4171.664827][T26847] __arm64_sys_keyctl+0x50/0x290 [ 4171.665180][T26847] invoke_syscall+0x48/0x110 [ 4171.665595][T26847] el0_svc_common.constprop.0+0x40/0xe0 [ 4171.665972][T26847] do_el0_svc+0x1c/0x28 [ 4171.666358][T26847] el0_svc+0x34/0xec [ 4171.666742][T26847] el0t_64_sync_handler+0x100/0x12c [ 4171.667157][T26847] el0t_64_sync+0x19c/0x1a0 [ 4171.667728][T26847] Code: fa4008a0 54fffde0 17ffffe6 927cec01 (a9400c22) [ 4171.668465][T26847] ---[ end trace 0000000000000000 ]--- [ 4171.669175][T26847] Kernel panic - not syncing: Oops: Fatal exception [ 4171.669951][T26847] SMP: stopping secondary CPUs [ 4171.670698][T26847] Kernel Offset: disabled [ 4171.671025][T26847] CPU features: 0x00,0000000d,1e2f797c,1767f6bf [ 4171.671661][T26847] Memory Limit: none [ 4171.672156][T26847] Rebooting in 86400 seconds.. VM DIAGNOSIS: 16:00:45 Registers: info registers vcpu 0 CPU#0 PC=ffff800081a3590c X00=ffff800081a35908 X01=0000000000000000 X02=0000000000000001 X03=0000000000000003 X04=0000000000000000 X05=0000000000000000 X06=0000000000000000 X07=0000000000000000 X08=ffff800080003838 X09=0000000000000038 X10=ffff800082723000 X11=0000000000000001 X12=0000000000000000 X13=f9f0000008c218cc X14=f9f0000008c21ec0 X15=ffff8000800034b0 X16=6cf70000a0e1ffff X17=f452652b1b3c2808 X18=ffffffffffffffff X19=ffff800082830108 X20=ffff800082830100 X21=0000000000000000 X22=0000000000000004 X23=ffff800082830108 X24=0000000000000028 X25=fff000007f8d57c0 X26=0000000000000000 X27=ffff800082a5a980 X28=fbf0000006ae8980 X29=ffff8000800035c0 X30=ffff800081a35108 SP=ffff8000800035c0 PSTATE=404000c9 -Z-- EL2h SVCR=00000000 -- BTYPE=0 FPCR=00000000 FPSR=00000000 P00=0000000000000000 P01=0000000000000000 P02=0000000000000000 P03=0000000000000000 P04=0000000000000000 P05=0000000000000000 P06=0000000000000000 P07=0000000000000000 P08=0000000000000000 P09=0000000000000000 P10=0000000000000000 P11=0000000000000000 P12=0000000000000000 P13=0000000000000000 P14=0000000000000000 P15=0000000000000000 FFR=0000000000000000 Z00=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z01=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000ffff850d6418:0000ffff850d6430 Z02=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000ffff850d6428:0000ffff850d6470 Z03=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000ffff85c3ca20:0000ffff850d6410 Z04=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000ffff850d6448:0000ffff850d6420 Z05=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000ffff850d6458:0000ffff850d6450 Z06=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000ffff850d6458:0000ffff850d6450 Z07=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000ffff850d6468:0000ffff850d6460 Z08=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z09=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z10=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z11=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z12=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z13=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z14=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z15=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z16=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000fffff66eca10:0000fffff66eca10 Z17=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:ffffff80ffffffd0:0000fffff66ec9e0 Z18=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z19=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z20=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z21=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z22=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z23=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z24=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z25=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z26=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z27=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z28=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z29=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z30=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z31=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff800081a3590c X00=ffff800081a35908 X01=0000000000000000 X02=0000000000000001 X03=0000000000000001 X04=0000000000000000 X05=0000000000000001 X06=0000000000000001 X07=00000000000006c0 X08=000000003d6f6e69 X09=00000000000068dd X10=ffff800082723000 X11=0000000000000000 X12=0000000000000000 X13=faf000000c0010b0 X14=faf000000c0016c0 X15=ffff80008307b790 X16=0000000000000000 X17=0000000000000000 X18=ffffffffffffffff X19=ffff800082830108 X20=ffff800082830100 X21=0000000000000000 X22=0000000000000004 X23=ffff800082830108 X24=0000000000000028 X25=fff000007f8ee7c0 X26=0000000000000002 X27=f0f000000580f021 X28=00000000fffffff6 X29=ffff80008307b750 X30=ffff800081a35108 SP=ffff80008307b750 PSTATE=414000c9 -Z-- EL2h SVCR=00000000 -- BTYPE=0 FPCR=00000000 FPSR=00000000 P00=0000000000000000 P01=0000000000000000 P02=0000000000000000 P03=0000000000000000 P04=0000000000000000 P05=0000000000000000 P06=0000000000000000 P07=0000000000000000 P08=0000000000000000 P09=0000000000000000 P10=0000000000000000 P11=0000000000000000 P12=0000000000000000 P13=0000000000000000 P14=0000000000000000 P15=0000000000000000 FFR=0000000000000000 Z00=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:6362696c00302e35:332e312e6f732e78 Z01=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:00000000f0000000:0000000000000000 Z02=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:f00ff00ff00ff00f:f00ff00ff00ff00f Z03=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000f00000000000:0000f00000000000 Z04=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:3003300330033003:3003300330033003 Z05=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:f00ff00ff00ff00f:f00ff00ff00ff00f Z06=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000c00000000000:0000c00000000000 Z07=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z08=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z09=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z10=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z11=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z12=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z13=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z14=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z15=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z16=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z17=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z18=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z19=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z20=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z21=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z22=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z23=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z24=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z25=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z26=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z27=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z28=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z29=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z30=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z31=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000