last executing test programs: 11.619981403s ago: executing program 1 (id=8006): r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x80840, 0x0) sendmsg$kcm(r0, &(0x7f0000000680)={&(0x7f0000000040)=@caif=@dbg={0x25, 0x2, 0x7f}, 0x80, &(0x7f0000000540)=[{&(0x7f00000000c0)="0650d1a1f7b402f5d38868d768542c62222a590fa93296735fd76f7e2579ce8dc6118afa463eac77ff98922d65644035613fe0cfa51b32a5e0e2e3f2317d38a59ff2366f9d513c01d680df87f15746f5de84075c882b0019588cea089c04e00f7211cba9562babb143b0bb026a2b44642055121de547f840b8e61db48c4cbd30652fcc20982f7fd5309f1d7db8d7c756425ce588a99590f62ca6b14b368510ff97c0bdda0d40f891b04ffe6dfca59624c4840ab92adb9ba57cb59c119eeb45d5e3b09d7048f6492888e7644a740b9e", 0xcf}, {&(0x7f00000001c0)="bacc20906df095de13a21f90fa625aa9fcdd9be3e05851ef50c8624e71b4b0082a18354d146419d0bd876cd27c0e565e7f77ea8279f713696908f2a3a688dd478276fbcb22f58e41178eeffe2ffa34f121a12700401116d11bb31b8e67b65baebd0ab0ef455c3ff4f87a9d1630941f2b5a8c8b59a1e638ee486b31628811d9b40049d9381e3d732d9ca649f88704ada4cbbb84be5f1a03e41693196d4a1c51c37ad8169321f5a153302221dc4e5673a9a0d82a236d9bca02bf8e847da180c67ac1c6e6c31ef67866f0bdf2c0cb0f084433d6a3949cbc33c61f6c7064201a6f4b9807839983693684124f47911692e8791b8e48", 0xf3}, {&(0x7f00000002c0)="8047a701cd0e6b0d9d7ab7a084c1e9c4c023a511f99b57d2e7e5dd488edc96965102b873ae8fdf9080bab5578156981b72173bc65535b18a87714fae8ec210c0db0b7c3d5602fedcc746856d35968e943de809033baf63b014f8a409213079403d10dca1f08d484d71c19eeb6a869d5d4a251933a835d1d4b1e1f100a609e40092c500d7c6a31f70f72add6c266c9f547de4b63d2542318e62", 0x99}, {&(0x7f0000000380)="fedc2df2c5dc0504fa755aa92e06b474ee1b32bff273623b0de8fa112edbbec117c30b218e338195866211af96537945f35dc94e7daef5f10cbd224073fdea5f1723c5f47758eee11539b5aa9310a0bc01a3adf4491dcebb705173932b3bf5ee322e4bc61af2877d7b8bf637e7fa9601d6414e38809dfb344d8a3fd13c699a50cf04961a64dda05ee8c1f1992ecd6e86de1ed3c33c024eeff8be8e77513d94c29879e8486b7085376cec5a750f912a798a2a678d76781d1b299bd7e18c64b7cd637fbf167ca1337d0fd92ed4a3cfc5c49a8f200f1e50b3fc32ebefa2f66e9f3acf4bdfee4d9aee7b811aea82dcdcf9274dbb6efed14f4c", 0xf7}, {&(0x7f0000000480)="b175cf76a2c7efa064b2bde6eda9e0cccb0fd5e42150c321d2bc33dd6af503296f8f9b50a7db752f2d48910d267dc9749e56bfece66eb15c204a1586ad1fabb6f631db", 0x43}, {&(0x7f0000000500)="9f944302", 0x4}], 0x6, &(0x7f00000005c0)=[{0xa8, 0x11, 0x7, "3560382213fe37da9c3d624f5ecb257a61beb1d95fb1e829bb6dc556a6140b815424ec1a4a14a959c9e169e088d2c12543dc183a402c80b1ee0b064cfe308114eefb0f80559b931eb4d0f9de62a3111a7bdb06895c6ebe5319d9fec2e945175c1be31ecd7dbfccc9837e42ef2a1f73870ac3e7d41e79ea2a94a9755b44043c8e4d437f3921b32c1866ab16b9811853a030267112d6c461"}], 0xa8}, 0x80) socket$can_j1939(0x1d, 0x2, 0x7) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r0) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x2c, r1, 0x100, 0x70bd27, 0x25dfdbff, {}, [@BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x401}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x400}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000800}, 0x28000081) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nfc(&(0x7f0000000840), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000000880)=0x0) sendmsg$NFC_CMD_LLC_SDREQ(r2, &(0x7f0000000ec0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000e80)={&(0x7f00000008c0)={0x5ac, r3, 0x1, 0x70bd2b, 0x25dfdbff, {}, [@NFC_ATTR_LLC_SDP={0x4}, @NFC_ATTR_LLC_SDP={0x20, 0x13, 0x0, 0x1, [{0x1c, 0x0, 0x0, 0x1, [{0xe, 0x1, '/dev/vcsa\x00'}, {0x4}, {0x4}]}]}, @NFC_ATTR_LLC_SDP={0x110, 0x13, 0x0, 0x1, [{0x14, 0x0, 0x0, 0x1, [{0x9, 0x1, '%\\^u,'}, {0x4}]}, {0x4}, {0x30, 0x0, 0x0, 0x1, [{0xe, 0x1, '/dev/vcsa\x00'}, {0xe, 0x1, '}}-^:./\\\x15,'}, {0xb, 0x1, 'batadv\x00'}]}, {0x38, 0x0, 0x0, 0x1, [{0x7, 0x1, '\\%{'}, {0xb, 0x1, 'batadv\x00'}, {0xe, 0x1, '/dev/vcsa\x00'}, {0xe, 0x1, '/dev/vcsa\x00'}]}, {0x30, 0x0, 0x0, 0x1, [{0xb, 0x1, 'batadv\x00'}, {0xe, 0x1, '/dev/vcsa\x00'}, {0x4}, {0x5, 0x1, '\x00'}, {0x4}]}, {0x28, 0x0, 0x0, 0x1, [{0xb, 0x1, 'batadv\x00'}, {0x6, 0x1, ',['}, {0x4}, {0xb, 0x1, 'batadv\x00'}]}, {0x34, 0x0, 0x0, 0x1, [{0x7, 0x1, ':-\x88'}, {0x4}, {0x11, 0x1, '\':},-^(--[^)('}, {0xe, 0x1, '/dev/vcsa\x00'}]}]}, @NFC_ATTR_LLC_SDP={0x108, 0x13, 0x0, 0x1, [{0x48, 0x0, 0x0, 0x1, [{0xe, 0x1, '/dev/vcsa\x00'}, {0xb, 0x1, 'batadv\x00'}, {0x4}, {0x5, 0x1, ']'}, {0xb, 0x1, 'batadv\x00'}, {0xe, 0x1, '/dev/vcsa\x00'}]}, {0x44, 0x0, 0x0, 0x1, [{0xe, 0x1, '/dev/vcsa\x00'}, {0xe, 0x1, '/dev/vcsa\x00'}, {0x8, 0x1, ')/{{'}, {0x6, 0x1, '\'\xdf'}, {0xe, 0x1, '/dev/vcsa\x00'}]}, {0x14, 0x0, 0x0, 0x1, [{0x7, 0x1, '%\\*'}, {0x7, 0x1, '$}_'}]}, {0x20, 0x0, 0x0, 0x1, [{0xb, 0x1, 'batadv\x00'}, {0xe, 0x1, '/dev/vcsa\x00'}]}, {0x28, 0x0, 0x0, 0x1, [{0x6, 0x1, '#.'}, {0xb, 0x1, 'batadv\x00'}, {0xe, 0x1, '/dev/vcsa\x00'}]}, {0x1c, 0x0, 0x0, 0x1, [{0x5, 0x1, '.'}, {0x9, 0x1, '%))&:'}, {0x4}]}]}, @NFC_ATTR_LLC_SDP={0x1d8, 0x13, 0x0, 0x1, [{0x60, 0x0, 0x0, 0x1, [{0xb, 0x1, 'batadv\x00'}, {0xf, 0x1, '/:)[-\xef+^/\\E'}, {0xb, 0x1, 'batadv\x00'}, {0x11, 0x1, '!&+\'\x1d}:*-]#,{'}, {0x5, 0x1, ')'}, {0xb, 0x1, 'batadv\x00'}, {0xb, 0x1, 'batadv\x00'}]}, {0x3c, 0x0, 0x0, 0x1, [{0xe, 0x1, '/dev/vcsa\x00'}, {0x8, 0x1, '/*}$'}, {0x6, 0x1, '*-'}, {0x4}, {0x7, 0x1, '#]@'}, {0xb, 0x1, 'batadv\x00'}]}, {0x2c, 0x0, 0x0, 0x1, [{0xe, 0x1, '/dev/vcsa\x00'}, {0x5, 0x1, '&'}, {0xe, 0x1, '/dev/vcsa\x00'}]}, {0x68, 0x0, 0x0, 0x1, [{0xe, 0x1, '/dev/vcsa\x00'}, {0xe, 0x1, '/dev/vcsa\x00'}, {0xe, 0x1, '/dev/vcsa\x00'}, {0xb, 0x1, 'batadv\x00'}, {0x6, 0x1, '*/'}, {0xe, 0x1, '/dev/vcsa\x00'}, {0xe, 0x1, '/dev/vcsa\x00'}]}, {0x6c, 0x0, 0x0, 0x1, [{0xe, 0x1, '/dev/vcsa\x00'}, {0xe, 0x1, '/dev/vcsa\x00'}, {0x4}, {0xe, 0x1, '/dev/vcsa\x00'}, {0xb, 0x1, 'batadv\x00'}, {0xb, 0x1, 'batadv\x00'}, {0x7, 0x1, '([-'}, {0x5, 0x1, '('}, {0xb, 0x1, 'batadv\x00'}]}, {0x38, 0x0, 0x0, 0x1, [{0x10, 0x1, '+^\'{&,%-^}\\^'}, {0x7, 0x1, '\v!#'}, {0xb, 0x1, 'batadv\x00'}, {0xe, 0x1, '/dev/vcsa\x00'}]}]}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r4}, @NFC_ATTR_LLC_SDP={0x140, 0x13, 0x0, 0x1, [{0x34, 0x0, 0x0, 0x1, [{0x6, 0x1, '],'}, {0xb, 0x1, 'batadv\x00'}, {0xe, 0x1, '/dev/vcsa\x00'}, {0xb, 0x1, 'batadv\x00'}]}, {0x20, 0x0, 0x0, 0x1, [{0xe, 0x1, '/dev/vcsa\x00'}, {0xb, 0x1, 'batadv\x00'}]}, {0x84, 0x0, 0x0, 0x1, [{0x9, 0x1, '&):..'}, {0xc, 0x1, '*+\\!\'*+\\'}, {0x5, 0x1, '{'}, {0xb, 0x1, '\xe2\\)@./0'}, {0xb, 0x1, 'batadv\x00'}, {0xe, 0x1, '/dev/vcsa\x00'}, {0xb, 0x1, 'batadv\x00'}, {0xe, 0x1, '/dev/vcsa\x00'}, {0xa, 0x1, '!](.$^'}, {0xe, 0x1, '/dev/vcsa\x00'}]}, {0x14, 0x0, 0x0, 0x1, [{0xa, 0x1, '/:\x97,!@'}, {0x4}]}, {0x40, 0x0, 0x0, 0x1, [{0xe, 0x1, '/dev/vcsa\x00'}, {0xe, 0x1, '/dev/vcsa\x00'}, {0xa, 0x1, ':!\'\'!+'}, {0xe, 0x1, '/dev/vcsa\x00'}]}, {0x10, 0x0, 0x0, 0x1, [{0xb, 0x1, 'batadv\x00'}]}]}, @NFC_ATTR_LLC_SDP={0x34, 0x13, 0x0, 0x1, [{0x2c, 0x0, 0x0, 0x1, [{0x6, 0x1, '/\\'}, {0x19, 0x1, '&[#*-\x1f--+)&#\'\x9b$):$$^\''}, {0x4}]}, {0x4}]}, @NFC_ATTR_DEVICE_INDEX={0x8}]}, 0x5ac}, 0x1, 0x0, 0x0, 0x61a4b2d53bce86dd}, 0x40800) syz_genetlink_get_family_id$nfc(&(0x7f0000000f00), r2) r5 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000f80), r2) sendmsg$NLBL_CALIPSO_C_ADD(r2, &(0x7f0000001080)={&(0x7f0000000f40)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000001040)={&(0x7f0000000fc0)={0x44, r5, 0x1, 0x70bd2b, 0x25dfdbfe, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}]}, 0x44}}, 0x1) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000010c0)={0x0, 0x6da3fda0, 0x20}, &(0x7f0000001100)=0xc) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000001140)={r6}, 0x8) socketpair(0x1, 0x80000, 0x6, &(0x7f0000001180)={0xffffffffffffffff}) r8 = syz_clone3(&(0x7f0000001400)={0x20000000, &(0x7f00000011c0), &(0x7f0000001200), &(0x7f0000001240), {0x1c}, &(0x7f0000001280)=""/222, 0xde, &(0x7f0000001380)=""/6, &(0x7f00000013c0)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff], 0x3, {r0}}, 0x58) fcntl$setownex(r0, 0xf, &(0x7f0000001480)={0x1, r8}) sendmsg$NFT_MSG_GETOBJ_RESET(r0, &(0x7f0000001580)={&(0x7f00000014c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000001540)={&(0x7f0000001500)={0x28, 0x15, 0xa, 0x3, 0x0, 0x0, {0x2, 0x0, 0xa}, [@NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0xa}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0x8801}, 0x40) r9 = syz_genetlink_get_family_id$nl802154(&(0x7f0000001600), r2) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r2, &(0x7f00000016c0)={&(0x7f00000015c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000001680)={&(0x7f0000001640)={0x20, r9, 0x300, 0x70bd27, 0x25dfdbfe, {}, [@NL802154_ATTR_WPAN_DEV={0xc}]}, 0x20}, 0x1, 0x0, 0x0, 0x801}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000001700)) syz_genetlink_get_family_id$nfc(&(0x7f0000001740), r2) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f00000017c0)={'wpan1\x00', 0x0}) sendmsg$NL802154_CMD_DEL_SEC_DEVKEY(r2, &(0x7f0000001880)={&(0x7f0000001780)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000001840)={&(0x7f0000001800)={0x1c, r9, 0x300, 0x70bd28, 0x25dfdbfe, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r10}]}, 0x1c}, 0x1, 0x0, 0x0, 0x90}, 0x14) getsockopt$IP6T_SO_GET_REVISION_TARGET(r7, 0x29, 0x45, &(0x7f00000018c0)={'TPROXY\x00'}, &(0x7f0000001900)=0x1e) syz_genetlink_get_family_id$ieee802154(&(0x7f0000001940), r2) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000001980), 0x82000, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r2, &(0x7f0000001ac0)={&(0x7f00000019c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000001a80)={&(0x7f0000001a00)={0x58, 0x0, 0x800, 0x70bd29, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'syz_tun\x00'}, @NLBL_UNLABEL_A_SECCTX={0x27, 0x7, 'system_u:object_r:pam_var_run_t:s0\x00'}, @NLBL_UNLABEL_A_ACPTFLG={0x5}]}, 0x58}}, 0x90) sendmsg$NL802154_CMD_DEL_SEC_DEV(r2, &(0x7f0000001bc0)={&(0x7f0000001b00), 0xc, &(0x7f0000001b80)={&(0x7f0000001b40)={0x38, r9, 0x2, 0x70bd28, 0x25dfdbfb, {}, [@NL802154_ATTR_SEC_DEVICE={0x10, 0x2e, 0x0, 0x1, {0xc, 0x4, {0xaaaaaaaaaaaa0202}}}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r10}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000001}, 0xc005) sendmsg$IEEE802154_LIST_IFACE(0xffffffffffffffff, &(0x7f0000001dc0)={&(0x7f0000001c00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000001d80)={&(0x7f0000001d00)={0x50, 0x0, 0x10, 0x70bd27, 0x25dfdbfc, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r10}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r10}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r10}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan4\x00'}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r10}]}, 0x50}, 0x1, 0x0, 0x0, 0x20000001}, 0x4000040) 10.280049898s ago: executing program 1 (id=8007): r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x8000, 0x0, 0x8}, 0x18) utimensat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{}, {0x0, 0x2710}}, 0x0) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000003d00)=[{{&(0x7f0000000100)=@abs, 0x6e, &(0x7f0000002580)=[{&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/183, 0xb7}, {&(0x7f0000001240)=""/128, 0x80}, {&(0x7f00000012c0)=""/197, 0xc5}, {&(0x7f00000013c0)=""/173, 0xad}, {&(0x7f0000001480)=""/130, 0x82}, {&(0x7f0000001540)=""/31, 0x1f}, {&(0x7f0000001580)=""/4096, 0x1000}], 0x8, &(0x7f0000002600)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x10}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xe0}}, {{0x0, 0x0, &(0x7f0000003c40)=[{&(0x7f0000002700)=""/228, 0xe4}, {&(0x7f0000002800)=""/90, 0x5a}, {&(0x7f0000002880)=""/174, 0xae}, {&(0x7f0000002940)=""/242, 0xf2}, {&(0x7f0000002a40)=""/105, 0x69}, {&(0x7f0000002ac0)=""/164, 0xa4}, {&(0x7f0000002b80)=""/97, 0x61}, {&(0x7f0000002c00)=""/37, 0x25}, {&(0x7f0000002c40)=""/4096, 0x1000}], 0x9}}], 0x2, 0x3, &(0x7f0000003d80)) ioctl$SNDRV_PCM_IOCTL_SYNC_PTR(0xffffffffffffffff, 0xc0884123, &(0x7f0000003dc0)={0x3, "97feac999c79f4ebd1c063c008e25eb7a8e6cce03bd62eee75744e9de088134650e798da6e714babc5d466e6ccb9c792936c29e3eafe96886f52d39f221192bc", {0x4, 0x1}}) recvmsg(r2, &(0x7f0000004780)={&(0x7f0000003e80)=@phonet, 0x80, &(0x7f00000046c0)=[{&(0x7f0000003f00)=""/234, 0xea}, {&(0x7f0000004000)=""/200, 0xc8}, {&(0x7f0000004100)=""/30, 0x1e}, {&(0x7f0000004140)=""/229, 0xe5}, {&(0x7f0000004240)=""/108, 0x6c}, {&(0x7f00000042c0)=""/195, 0xc3}, {&(0x7f00000043c0)=""/87, 0x57}, {&(0x7f0000004440)=""/191, 0xbf}, {&(0x7f0000004500)=""/195, 0xc3}, {&(0x7f0000004600)=""/175, 0xaf}], 0xa}, 0x40000000) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r3, 0x89f8, &(0x7f00000048c0)={'gretap0\x00', &(0x7f00000047c0)={'syztnl2\x00', 0x0, 0x700, 0x8, 0x1, 0xfffffffe, {{0x2b, 0x4, 0x3, 0x30, 0xac, 0x68, 0x0, 0x3, 0x2f, 0x0, @multicast1, @local, {[@timestamp_prespec={0x44, 0xc, 0xa2, 0x3, 0x8, [{@rand_addr=0x64010101, 0x6}]}, @timestamp_prespec={0x44, 0x44, 0xb2, 0x3, 0x9, [{@rand_addr=0x64010102, 0x6}, {@empty, 0xfffffff9}, {@remote}, {@multicast2, 0xecb4}, {@multicast1, 0x13b0e0f3}, {@multicast2, 0x4}, {@multicast2, 0xffff}, {@dev={0xac, 0x14, 0x14, 0x1b}, 0xfffffff7}]}, @timestamp={0x44, 0x8, 0xbf, 0x0, 0x5, [0x6393]}, @cipso={0x86, 0x15, 0xffffffffffffffff, [{0x0, 0xf, "ad2096747b1963bc421925a28b"}]}, @end, @timestamp_prespec={0x44, 0xc, 0x3d, 0x3, 0x2, [{@multicast1, 0x6}]}, @timestamp={0x44, 0x1c, 0x50, 0x0, 0x5, [0x80000000, 0x4, 0x4, 0xffff, 0x8, 0x7ff]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000004980)={'ip6gre0\x00', &(0x7f0000004900)={'syztnl0\x00', r9, 0x4, 0x0, 0x4, 0x2, 0x8, @ipv4={'\x00', '\xff\xff', @private=0xa010101}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x8, 0x40, 0x8, 0x7}}) r10 = syz_genetlink_get_family_id$tipc(&(0x7f0000004a00), r7) sendmsg$TIPC_CMD_GET_NODES(r6, &(0x7f0000004ac0)={&(0x7f00000049c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000004a80)={&(0x7f0000004a40)={0x1c, r10, 0x1, 0x70bd26, 0x25dfdbfc, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x90}, 0x8081) ioctl$EXT4_IOC_GETFSUUID(r8, 0x8008662c, &(0x7f0000004b00)) syz_open_dev$sndpcmc(&(0x7f0000004b40), 0xbd6, 0x4c0000) getsockopt$IPT_SO_GET_REVISION_TARGET(r6, 0x0, 0x43, &(0x7f0000004b80)={'NETMAP\x00'}, &(0x7f0000004bc0)=0x1e) setxattr$trusted_overlay_upper(&(0x7f0000004c00)='./file0\x00', &(0x7f0000004c40), &(0x7f0000004c80)={0x0, 0xfb, 0xdd, 0x2, 0x4, "b5f906a1cb6bfd790744b216811459e8", "011a32ca30d0cdb3fc7ace1900f23c945772eee7dfebad9daafb413bb5c4f55e57467eb8a4a458550ada4d791afab9a64588aa2d0229daea4cf7a1a6b8e657f95fd0f9fa1266629dea8690adac15cf4ec15a5bfe0f41fea3ee44c6db633248e0ffc461ed3df74329b69bd15da22d726e703500a3f1b5c09254038f6948bf602f06e8a9ed923d64bce0dd8919e71bbccbd6e89a40494b5fbc0647e7d0c2ece6c23732cdc9471921ca63dc21209d3c2daabe22d8953f506114454755c4a423b82c0c7a5d80ce5ec26c"}, 0xdd, 0x1) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000004d80), 0x10001, 0x0) ioctl$IOC_PR_CLEAR(r7, 0x401070cd, &(0x7f0000004dc0)={0x7}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000004e00), 0x40000, 0x0) r11 = socket$inet6_mptcp(0xa, 0x1, 0x106) fsetxattr$trusted_overlay_opaque(r11, &(0x7f0000004e40), &(0x7f0000004e80), 0x2, 0x1) openat$ptmx(0xffffffffffffff9c, &(0x7f0000004ec0), 0x200, 0x0) ioctl$HIDIOCGCOLLECTIONINFO(r4, 0xc0104811, &(0x7f0000004f00)={0x0, 0xffff0dcd, 0x8, 0x9}) r12 = socket$inet_icmp(0x2, 0x2, 0x1) getpeername$inet(r12, &(0x7f0000004f40)={0x2, 0x0, @dev}, &(0x7f0000004f80)=0x10) ioctl$sock_SIOCBRDELBR(r11, 0x89a1, &(0x7f0000004fc0)='erspan0\x00') r13 = syz_open_dev$loop(&(0x7f0000005000), 0x9, 0xa0003) ioctl$BLKREPORTZONE(r13, 0xc0101282, &(0x7f0000005040)={0x6, 0x3, 0x0, [{0x8000, 0x7ff, 0x10, 0x9, 0x9, 0x1, 0x43, '\x00', 0x5}, {0x605, 0x1, 0x0, 0xff, 0x7, 0x8, 0x6, '\x00', 0x8000}, {0x1c, 0x4, 0x6, 0x3, 0x5, 0x7, 0x2, '\x00', 0x9}]}) clock_gettime(0x0, &(0x7f0000005180)={0x0, 0x0}) utimensat(r2, &(0x7f0000005140)='./file0\x00', &(0x7f00000051c0)={{r14, r15/1000+60000}, {0x77359400}}, 0x100) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r11, 0x400c6615, &(0x7f0000005200)={0x0, @adiantum}) ioctl$F2FS_IOC_MOVE_RANGE(r6, 0xc020f509, &(0x7f0000005240)={r5, 0x8000, 0x3, 0x6}) mknodat$loop(r5, &(0x7f0000005280)='./file1\x00', 0x800, 0x1) 10.04913564s ago: executing program 0 (id=8008): r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x41, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r1, 0x5450, 0x0) close_range(r0, r0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x80002) r3 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000100), 0x1, 0x0) splice(r2, &(0x7f0000000000)=0x8, r3, &(0x7f0000000140), 0x6, 0xc3624b3aa190ee36) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f0000000080)) 9.587467555s ago: executing program 0 (id=8009): r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$nl_audit(0x10, 0x3, 0x9) r2 = dup3(r0, r1, 0x0) timer_create(0x0, &(0x7f0000000680)={0x0, 0x21, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000100)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/devices\x00', 0x0, 0x0) close_range(r3, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) sendmsg$ETHTOOL_MSG_EEE_SET(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}, 0x1, 0x0, 0x0, 0x8010}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x8}, {0x0, 0x989680}}, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='veth1_to_bond\x00', 0x10) connect$l2tp(r2, &(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10) sendmsg$NFT_MSG_GETSET(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000700)={0x0}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) bind$alg(0xffffffffffffffff, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r4 = socket$inet_smc(0x2b, 0x1, 0x0) r5 = accept4$inet(r4, 0x0, &(0x7f0000000040), 0x1000) setsockopt$IPT_SO_SET_REPLACE(r5, 0x4000000000000, 0x40, &(0x7f0000000880)=@raw={'raw\x00', 0x4001, 0x8000000, 0x238, 0xf8, 0x720d, 0x148, 0xf8, 0x148, 0x1c8, 0x240, 0x240, 0x1c8, 0x240, 0x7fffffe, 0x0, {[{{@ip={@remote, @empty, 0x0, 0x0, 'wlan1\x00', 'ip6erspan0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @dev}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x117) sendto$inet(r4, 0x0, 0x0, 0x24000080, 0x0, 0xfffffc61) dup(r4) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x200000005c831, 0xffffffffffffffff, 0x0) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_REMOVE(r6, 0x0, 0x0) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$BTRFS_IOC_RM_DEV(r7, 0x8927, &(0x7f0000001700)={{}, "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"}) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = openat2(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000840)={0x940}, 0x18) dup3(r8, r9, 0x0) getsockopt$sock_cred(r9, 0x1, 0x11, 0x0, &(0x7f0000000800)) 8.983698325s ago: executing program 1 (id=8010): r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/bus/i2c', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup(r1) dup3(r2, r0, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_PD_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="100000000e1400090000000000000000"], 0x10}}, 0x0) 8.634463409s ago: executing program 1 (id=8011): r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$IPCTNL_MSG_EXP_GET(r2, &(0x7f0000003300)={0x0, 0x0, &(0x7f00000032c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="14000000010141"], 0x14}}, 0x0) recvmsg$inet_nvme(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000300)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, 0x0}, 0x40020101) close_range(r3, 0xffffffffffffffff, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000000740)={0x0}, &(0x7f0000000780)=0x10) bind$can_j1939(0xffffffffffffffff, &(0x7f0000000000)={0x1d, 0x0, 0x2}, 0x18) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'vxcan1\x00'}) sendmsg$NL80211_CMD_AUTHENTICATE(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000200)=ANY=[@ANYRES16, @ANYRES16=0x0, @ANYBLOB="000000000000000000002500000008000300", @ANYRES32=0x0, @ANYBLOB="73a2e3a86fb02439a2d08576fa54f5ebc6eb91397933b97b328f32e61c667fd0702ae16bb29d6bfcae7d417352cad7d8c2566aad592f010d485183882aeded90036aef8731569a36e814b31063e9663ea395373f5f38f1bb8581ca913f4e21d62e4566f6d063928e"], 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x14, 0x0, 0xb, 0x0, 0x0, 0x0, {0x0, 0x0, 0xffff}}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x0) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x14100000}, 0xc, &(0x7f0000000340)={&(0x7f0000000640)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="04ff07000000ffdbdf253000000008000300fb115c11e2ca83f6a4428e08cd2ca0f577ec3e2fe57acbab55bde3a659c91479b154dd3120c64dcc99a270e1958ce99ddafba3336003e7e65958fadece399889932274ff8c98172656fd0f63197fd46a3eb27ad07cd94dbb18d5d94d876c5d58e379bdd448ef590f6ade20581383766e5e9facc6d5131004d7f496a839baaac4dd46811cc7623d4275d60bfa7ec7623a095d8d33c16d0d0b817fa9aa31d130c53eafb37c31f9d27461c55b2371a7fd6e2f68a41301fa28433e", @ANYRES32=r6, @ANYBLOB="060036002b000000060036001a000000060036003b000000060036001b000000"], 0x3c}, 0x1, 0x0, 0x0, 0x4048084}, 0x4000000) sendmsg$NL80211_CMD_DEL_PMKSA(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x100, 0x70bd25, 0x25dfdbff, {{}, {@val={0x8, 0x3, r6}, @val={0xc, 0x99, {0x292, 0x61}}}}, [@NL80211_ATTR_FILS_CACHE_ID={0x6, 0xfd, 0xd}, @NL80211_ATTR_SSID={0xa, 0x34, @default_ap_ssid}, @NL80211_ATTR_FILS_CACHE_ID={0x6, 0xfd, 0x1000}]}, 0x44}, 0x1, 0x0, 0x0, 0x24000811}, 0x10) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x4001, 0x8000000, 0x238, 0xf8, 0x720d, 0x148, 0xf8, 0x148, 0x1c8, 0x240, 0x240, 0x1c8, 0x240, 0x7fffffe, 0x0, {[{{@ip={@remote, @empty, 0x0, 0x0, 'wlan1\x00', 'ip6erspan0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @dev}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x298) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000000)) openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r7 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r7, 0x84, 0x1b, &(0x7f0000000040)={r4}, &(0x7f0000000080)=0x8) ioctl$VHOST_SET_OWNER(0xffffffffffffffff, 0xaf01, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000180)={'tunl0\x00', 0x0}) socket$can_raw(0x1d, 0x3, 0x1) sendto$inet(r0, 0x0, 0x0, 0x24000080, 0x0, 0xfffffc61) r8 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000005fc0), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r8, 0xc0505350, &(0x7f0000006180)={{}, {0x3, 0x4}, 0x80000001, 0x2, 0x3}) r9 = dup(r0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r9, 0x84, 0x23, 0x0, 0x0) sendmsg$SMC_PNETID_DEL(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={0x0}, 0x1, 0x0, 0x0, 0x20004091}, 0x40020) 6.683067607s ago: executing program 0 (id=8012): r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) getsockname$netlink(r0, &(0x7f0000000000), &(0x7f0000000040)=0xc) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080), 0x10402, 0x0) setsockopt$inet_mreq(r1, 0x0, 0x24, &(0x7f00000000c0)={@empty, @local}, 0x8) ioctl$FICLONE(r0, 0x40049409, r1) r2 = gettid() fcntl$lock(r0, 0x26, &(0x7f0000000100)={0x2, 0x2, 0x1, 0xa, r2}) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f0000000140)=0xfd) write$P9_RREMOVE(r1, &(0x7f0000000180)={0x7, 0x7b, 0x1}, 0x7) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f00000001c0)=[@in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x2e}}, @in6={0xa, 0x4e23, 0x4, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x9}], 0x2c) r3 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) ioctl$KVM_SET_REGS(r3, 0x4360ae82, &(0x7f0000000200)={[0x3ff, 0x3, 0x0, 0x2, 0x2, 0x8, 0x8, 0x10, 0x5, 0x5, 0x5, 0x40ad, 0x8, 0x6076, 0x9, 0xbaea], 0x2, 0x14804}) r4 = timerfd_create(0x4, 0x800) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000340)={'syztnl1\x00', &(0x7f00000002c0)={'ip6tnl0\x00', 0x0, 0x2f, 0x0, 0xf, 0x4, 0x78, @empty, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x10, 0x7, 0x7}}) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000380)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0x100, '\x00', r5, r1, 0x4, 0x5, 0x1, 0x0, @void, @value, @void, @value}, 0x50) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000400)={0x1, 0x0, 0x8, 0xf3ec}) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x5, 0x100010, r6, 0x3b88f000) syz_clone3(&(0x7f0000000680)={0x800000, &(0x7f0000000440), &(0x7f0000000480)=0x0, &(0x7f00000004c0), {0x1b}, &(0x7f0000000500)=""/211, 0xd3, &(0x7f0000000600)=""/13, &(0x7f0000000640)=[r2, r2], 0x2, {r1}}, 0x58) getpriority(0x1, r7) close(r4) r8 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) sendfile(r6, r8, &(0x7f0000000740)=0x27, 0x2) ioctl$BTRFS_IOC_DEFAULT_SUBVOL(r1, 0x40089413, &(0x7f0000000780)=0xf1e) r9 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f00000007c0)={0x0, @in={{0x2, 0x4e24, @broadcast}}}, &(0x7f0000000880)=0x84) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r9, 0x84, 0x6d, &(0x7f00000008c0)={r10, 0x9d, "309306c6fdf257c1f58affa1f87f2280876d931ad132fd9d51b78f7a2922fdadd3391d4a78baf0ab6c238317dd6d302274770cd1cb57aaccef34fc3d4fb50dff661d93d731cfe2288b02d8444439420ca10485b9cde51c5349f14b9096b845f14c64309ce9ad16b1ed3e702cba818e1acdbf6c472025a61023829d95aad6a6fdb6a7741718755f93583cfc261c88ac82ea6155604a55f31c3183eef880"}, &(0x7f0000000980)=0xa5) getpeername$inet(r9, &(0x7f00000009c0)={0x2, 0x0, @remote}, &(0x7f0000000a00)=0x10) r11 = openat$nci(0xffffffffffffff9c, &(0x7f0000000a40), 0x2, 0x0) write$nci(r11, &(0x7f0000000a80)=@NCI_OP_RF_DEACTIVATE_RSP={0x1, 0x1, 0x2, 0x6, 0x7}, 0x4) ioctl$UI_DEV_SETUP(r1, 0x405c5503, &(0x7f0000000ac0)={{0x1000, 0xff11, 0xfff, 0x3}, 'syz0\x00', 0x2e}) 6.033629155s ago: executing program 0 (id=8013): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_MAC_ACL(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x48, r1, 0x4, 0x70bd2d, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r2}, @val={0xc, 0x99, {0x1, 0x29}}}}, [@NL80211_ATTR_ACL_POLICY={0x8, 0xa5, 0x1}, @NL80211_ATTR_ACL_POLICY={0x8}, @NL80211_ATTR_MAC_ADDRS={0x10, 0xa6, 0x0, 0x1, [{0xa}]}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x10) (async) sendmsg$NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL(r0, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x34, r1, 0x10, 0x70bd27, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r2}, @val={0xc, 0x99, {0x0, 0x26}}}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x57}]}, 0x34}, 0x1, 0x0, 0x0, 0x40}, 0xc0c9) (async, rerun: 32) openat$fb0(0xffffffffffffff9c, &(0x7f00000002c0), 0x200101, 0x0) (async, rerun: 32) recvmsg(r0, &(0x7f0000000800)={&(0x7f0000000300)=@nfc, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000380)=""/5, 0x5}, {&(0x7f00000003c0)=""/155, 0x9b}, {&(0x7f0000000480)=""/159, 0x9f}, {&(0x7f0000000540)=""/54, 0x36}, {&(0x7f0000000580)}, {&(0x7f00000005c0)=""/245, 0xf5}], 0x6, &(0x7f0000000740)=""/129, 0x81}, 0x2) (async, rerun: 32) r3 = syz_open_procfs(0x0, &(0x7f0000000840)='children\x00') (rerun: 32) r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000880), 0x10002, 0x0) ioctl$IOC_PR_PREEMPT(r4, 0x401870cb, &(0x7f00000008c0)={0x7, 0x8, 0x1, 0x2}) (async, rerun: 32) getsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000900), &(0x7f0000000940)=0x4) (async, rerun: 32) sendmsg$NL80211_CMD_DISASSOCIATE(r3, &(0x7f0000000a40)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)={0x24, r1, 0x200, 0x70bd26, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_SSID={0xa, 0x34, @default_ap_ssid}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x24044800}, 0x0) ioctl$EVIOCGRAB(r4, 0x40044590, &(0x7f0000000a80)=0xfffffffb) (async) r5 = socket$nl_generic(0x10, 0x3, 0x10) (async) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000b00), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r5, &(0x7f0000000bc0)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000b80)={&(0x7f0000000b40)={0x34, r6, 0x8, 0x70bd2c, 0x25dfdbfc, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x3}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000001}, 0x1) (async, rerun: 32) r7 = syz_genetlink_get_family_id$devlink(&(0x7f0000000c40), r4) (rerun: 32) sendmsg$DEVLINK_CMD_TRAP_GROUP_SET(r4, &(0x7f0000000dc0)={&(0x7f0000000c00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000d80)={&(0x7f0000000c80)={0xf4, r7, 0x100, 0x70bd26, 0x25dfdbff, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd}, {0x5}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd}, {0x5, 0x83, 0x1}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd}, {0x5, 0x83, 0x1}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd}, {0x5, 0x83, 0x1}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x20004000}, 0x20000000) (async, rerun: 64) r8 = socket$nl_generic(0x10, 0x3, 0x10) (rerun: 64) sendmsg$NL80211_CMD_CHANGE_NAN_CONFIG(r8, &(0x7f0000000ec0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x10010000}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e40)={0x1c, r1, 0x100, 0x70bd26, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_BANDS={0x8, 0xef, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x0) (async) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r3, &(0x7f0000001000)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f40)={0x44, 0x2, 0x7, 0x301, 0x0, 0x0, {0x7, 0x0, 0x7}, [@NFACCT_FILTER={0x1c, 0x7, 0x0, 0x1, [@NFACCT_FILTER_MASK={0x8}, @NFACCT_FILTER_VALUE={0x8}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x6}]}, @NFACCT_FILTER={0x14, 0x7, 0x0, 0x1, [@NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x80000001}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x7}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x8000}, 0x804) (async) r9 = socket$packet(0x11, 0x2, 0x300) (async, rerun: 32) eventfd2(0x6, 0x0) (rerun: 32) r10 = syz_genetlink_get_family_id$mptcp(&(0x7f0000001080), r0) (async, rerun: 64) getsockopt$inet_mreqn(r4, 0x0, 0x20, &(0x7f00000010c0)={@private, @empty, 0x0}, &(0x7f0000001100)=0xc) (rerun: 64) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r8, &(0x7f0000001240)={&(0x7f0000001040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001200)={&(0x7f0000001140)={0x8c, r10, 0x500, 0x70bd25, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x4}, @MPTCP_PM_ATTR_ADDR_REMOTE={0x2c, 0x6, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e24}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x1ff}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r11}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @loopback}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x6}]}, @MPTCP_PM_ATTR_LOC_ID={0x5, 0x5, 0x9}, @MPTCP_PM_ATTR_ADDR={0x34, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x4}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @local}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @remote}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast1}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}]}, @MPTCP_PM_ATTR_TOKEN={0x8, 0x4, 0x8}]}, 0x8c}, 0x1, 0x0, 0x0, 0x80}, 0x1) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r3, 0xc0189379, &(0x7f0000001280)={{0x1, 0x1, 0x18, r5}, './file0\x00'}) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(r12, 0xf504, 0x0) ioctl$BTRFS_IOC_START_SYNC(r4, 0x80089418, &(0x7f00000012c0)) (async, rerun: 64) shutdown(r9, 0x1) (rerun: 64) 1.609274476s ago: executing program 1 (id=8014): r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuset.memory_pressure\x00', 0x0, 0x0) ioctl$TUNSETVNETLE(r1, 0x400454dc, &(0x7f0000000080)=0x1) (async) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f00000000c0)={'wg1\x00', 0x0}) (async, rerun: 32) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x8001, 0x0) (rerun: 32) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'ip6_vti0\x00', r2, 0x29, 0x9, 0x1, 0x9, 0x22, @dev={0xfe, 0x80, '\x00', 0xe}, @private0, 0x7800, 0x80, 0x6, 0x6}}) (async, rerun: 64) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000240)={'team0\x00', 0x0}) (async, rerun: 64) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000280)={'team0\x00', 0x0}) (async) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000002c0)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'erspan0\x00', &(0x7f0000000300)={'syztnl0\x00', r2, 0x8, 0x7, 0x3, 0x8, {{0x19, 0x4, 0x3, 0x10, 0x64, 0x66, 0x0, 0x2, 0x29, 0x0, @private=0xa010101, @empty, {[@timestamp_addr={0x44, 0x14, 0x34, 0x1, 0x1, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x5}, {@empty, 0x4}]}, @noop, @timestamp={0x44, 0x14, 0xd5, 0x0, 0x3, [0x80000000, 0x7, 0x2, 0x4]}, @noop, @lsrr={0x83, 0x13, 0xe1, [@broadcast, @multicast2, @local, @local]}, @ssrr={0x89, 0x13, 0x17, [@multicast2, @local, @empty, @rand_addr=0x64010100]}]}}}}}) sendmsg$TEAM_CMD_NOOP(r3, &(0x7f00000007c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000780)={&(0x7f0000000400)={0x380, 0x0, 0x0, 0x70bd2b, 0x25dfdbff, {}, [{{0x8, 0x1, r4}, {0x1f0, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r2}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r2}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8}}, {0x8, 0x6, r2}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r2}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x9}}, {0x8}}}]}}, {{0x8, 0x1, r6}, {0xe8, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xa0ad}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r2}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x10}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r2}}}]}}, {{0x8, 0x1, r7}, {0x7c, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r2}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r8}}}]}}]}, 0x380}, 0x1, 0x0, 0x0, 0x4}, 0x4) (async) r9 = socket$inet6_mptcp(0xa, 0x1, 0x106) (async) ioctl$sock_inet_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000800)) (async) r10 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000840), 0x894201, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r10, 0xc018937e, &(0x7f0000000880)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) (async) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r3, 0x29, 0x37, &(0x7f00000008c0)={0x5b, 0xd, '\x00', [@generic={0x0, 0x6a, "51b57a9e4fb0a65a5fb54f705e80dc7b049fe554662f7a7e40b3a50a793da42919594a69e41b1ffd59e2604097ea843405fa01e04e480b431ce4571450d1944d395943523fa04fc75c2567c7388a993606db291d18a34bc08a778d5076768ee4e268e55fd8eda3205787"}]}, 0x78) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r9, 0x40189429, &(0x7f0000000940)={0x1, 0x4e05, 0xa}) ioctl$TCSETSF2(r3, 0x402c542d, &(0x7f0000000980)={0x4, 0x0, 0x7, 0xf3, 0x10, "8f8ce41ef4d0cbd03cff7d8d3e1f6ddbc03ac3", 0x5d31, 0x101}) (async) ioctl$SNDCTL_DSP_GETODELAY(r11, 0x80045017, &(0x7f00000009c0)) ioctl$sock_SIOCSIFBR(r9, 0x8941, &(0x7f0000000ac0)=@get={0x1, &(0x7f0000000a00)=""/152, 0x2}) (async) timer_create(0x4, &(0x7f0000001b80)={0x0, 0x24, 0x2, @thr={&(0x7f0000000b00)="6c296d918b9cb607b47f7369ae29a3b9557bd5d44f6ab261dee3ffd4f1cab71fcc449cc50f09527eb170cddd34df44a3520d46cb4e50fa6ab549bf5d4e94152f8e688aff32484e6fc925f2eef2ff2b603a7cf248c6578dec4ef987", &(0x7f0000000b80)="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"}}, &(0x7f0000001bc0)) (async) sendmsg$ETHTOOL_MSG_DEBUG_SET(0xffffffffffffffff, &(0x7f00000020c0)={&(0x7f0000001c00)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002080)={&(0x7f0000001c40)={0x418, 0x0, 0x200, 0x70bd2b, 0x25dfdbff, {}, [@ETHTOOL_A_DEBUG_HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vxcan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x140, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0xb6, 0x4, "3bee1e18b8d50e4cb86024c04a640e9b2377736c88d41ce6ed05199b69dba8e49dfe6df654ce8a4608c1efac8936f9931a1ab5974c63b91e37416748c4a751dc79bb5db9206b0e3d59401e5bfd7d5321767f872aebf72ada8d4ee3c4385ebd0d5ef68233e320ebc789e487c88acd46384df6730256ce2d327fc17339df64e205b8763c892d3f50da495cdc311dd179db2605ea937b5efa9642c5839f8d243613f2852f773ff1f294c1a99c52c0daaab96c42"}, @ETHTOOL_A_BITSET_VALUE={0x83, 0x4, "947efe8e74c0731ba7aa4fcc2e9d04b93fcc6da304cb358c83a2ac881e0606f63e05b8cc3cfa2d5f5e6b2006603c8060255753e0a3e6c586f131ecbf2f49b86cb92029b37bb70e2c3b6f383b1b155733c61fc58c13fdc8beb7b82c630ea3d0fe4312dbaa8690de422139eb5e9008c4261699c43ad40cf904a939079086cfba"}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x11c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x7f}, @ETHTOOL_A_BITSET_BITS={0x110, 0x3, 0x0, 0x1, [{0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x10, 0x2, 'user_linkup\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '/dev/vcsu\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x10, 0x2, '/dev/autofs\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, 'wg1\x00'}]}, {0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x1a, 0x2, 'notify_peers_interval\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x82c}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '{\x00'}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, '/-\'/5+\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x1a, 0x2, 'notify_peers_interval\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'syztnl0\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}]}, @ETHTOOL_A_DEBUG_MSGMASK={0xa4, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0xfff}, @ETHTOOL_A_BITSET_VALUE={0x73, 0x4, "f55033dc177abbcccd3bda82a68a393dc371fcdff11134749afd8866ab717b63ff1c72cd0b64420a8964d184374cdd5370c7227a58656a236805c01e43a900ee983cd50358557ae68e4295d5b64cd0ea1b3da22f0108bd80ed567b33acdd91b76085b23a402a2bd94a34ccb9a7eb62"}, @ETHTOOL_A_BITSET_VALUE={0x24, 0x4, "e9f507d75fc119c8a6ab6c55a5d9147c399800c828165c257f041081f3bb494b"}]}, @ETHTOOL_A_DEBUG_HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}]}, @ETHTOOL_A_DEBUG_HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}]}]}, 0x418}, 0x1, 0x0, 0x0, 0x4080}, 0x80) (async) r12 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000002140), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000002180)={'wpan3\x00', 0x0}) sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(0xffffffffffffffff, &(0x7f0000002240)={&(0x7f0000002100)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000002200)={&(0x7f00000021c0)={0x34, r12, 0x20, 0x70bd25, 0x25dfdbfd, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r13}, @IEEE802154_ATTR_LLSEC_CMD_FRAME_ID={0x5, 0x34, 0x3}, @IEEE802154_ATTR_LLSEC_FRAME_TYPE={0x5, 0x33, 0x8}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x80) (async) r14 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000002280), r14) r15 = syz_io_uring_complete(0x0) ioctl$KVM_SET_CLOCK(r15, 0x4030ae7b, &(0x7f00000022c0)={0x7, 0x2, 0xc, 0x4ee0ecf7, 0x6a30}) ioctl$KVM_GET_API_VERSION(0xffffffffffffffff, 0xae00, 0x0) 1.484313228s ago: executing program 0 (id=8015): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$IPCTNL_MSG_EXP_GET(r2, &(0x7f0000003300)={0x0, 0x0, &(0x7f00000032c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="14000000010281"], 0x14}}, 0x0) recvmsg$inet_nvme(r2, &(0x7f0000005900)={&(0x7f0000003440)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, 0x0}, 0x0) close_range(r3, 0xffffffffffffffff, 0x0) r4 = socket(0x2, 0x80001, 0x0) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x1c}}, 0x4004811) r5 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0xc, &(0x7f0000000140)=@assoc_value={0x0}, &(0x7f0000000500)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000000)={r6}, 0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000040)={r6, 0xfffd, 0x86e8}, &(0x7f0000000100)=0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$F2FS_IOC_MOVE_RANGE(r7, 0x541b, &(0x7f00000000c0)={0xffffffffffffffff}) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) close(r9) socket$nl_generic(0x10, 0x3, 0x10) write$P9_RSTATFS(r9, &(0x7f0000020ec0)={0x43}, 0x43) ioctl$BINDER_GET_FROZEN_INFO(r8, 0x5451, 0x0) 1.380687908s ago: executing program 0 (id=8016): r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$nl_audit(0x10, 0x3, 0x9) r2 = dup3(r0, r1, 0x0) timer_create(0x0, &(0x7f0000000680)={0x0, 0x21, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000100)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/devices\x00', 0x0, 0x0) close_range(r3, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) sendmsg$ETHTOOL_MSG_EEE_SET(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}, 0x1, 0x0, 0x0, 0x8010}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x8}, {0x0, 0x989680}}, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='veth1_to_bond\x00', 0x10) connect$l2tp(r2, &(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10) sendmsg$NFT_MSG_GETSET(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000700)={0x0}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) bind$alg(0xffffffffffffffff, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r4 = socket$inet_smc(0x2b, 0x1, 0x0) r5 = accept4$inet(r4, 0x0, &(0x7f0000000040), 0x1000) setsockopt$IPT_SO_SET_REPLACE(r5, 0x4000000000000, 0x40, &(0x7f0000000880)=@raw={'raw\x00', 0x4001, 0x8000000, 0x238, 0xf8, 0x720d, 0x148, 0xf8, 0x148, 0x1c8, 0x240, 0x240, 0x1c8, 0x240, 0x7fffffe, 0x0, {[{{@ip={@remote, @empty, 0x0, 0x0, 'wlan1\x00', 'ip6erspan0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @dev}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x117) sendto$inet(r4, 0x0, 0x0, 0x24000080, 0x0, 0xfffffc61) dup(r4) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x200000005c831, 0xffffffffffffffff, 0x0) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_REMOVE(r6, 0x0, 0x0) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$BTRFS_IOC_RM_DEV(r7, 0x8927, &(0x7f0000001700)={{}, "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"}) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = openat2(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000840)={0x940}, 0x18) dup3(r8, r9, 0x0) 0s ago: executing program 1 (id=8017): r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = ioctl$TIOCGPTPEER(r1, 0x5450, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r4, 0xc0189371, &(0x7f0000000140)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r5, 0x5450, 0x0) close(r2) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x84881, 0x0) r7 = ioctl$TIOCGPTPEER(r6, 0x5450, 0x0) r8 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/power/pm_async', 0x0, 0x0) close_range(r8, 0xffffffffffffffff, 0x0) pipe2$watch_queue(&(0x7f0000000280), 0x80) r9 = add_key$user(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000500)="a3", 0x1, 0xfffffffffffffffd) keyctl$KEYCTL_WATCH_KEY(0x20, r9, r8, 0x0) r10 = openat$ttyprintk(0xffffff9c, &(0x7f0000000000), 0x2001, 0x0) ioctl$TIOCSERGETLSR(r10, 0x5451, 0x0) r11 = add_key$keyring(&(0x7f0000001d00), &(0x7f0000001d40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_keyring_id(0x0, r11, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000000000000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f2021222307000000000000002c2d2e2f303132333435363738393a3b3c3d3e3f40"], 0x48, r11) read$FUSE(r7, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x40049409, 0x0) kernel console output (not intermixed with test programs): nd action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 4147.139382][ T29] audit: type=1400 audit(4146.960:1574758): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 4147.140650][ T29] audit: type=1400 audit(4146.960:1574759): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 4147.141922][ T29] audit: type=1400 audit(4146.970:1574760): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3070 comm="syslogd" name="/" dev="vda" ino=2 [ 4147.143303][ T29] audit: type=1400 audit(4146.970:1574761): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3070 comm="syslogd" name="var" dev="vda" ino=1718 [ 4147.145107][ T29] audit: type=1400 audit(4146.970:1574762): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3070 comm="syslogd" name="var" dev="vda" ino=1718 [ 4147.145836][ T29] audit: type=1400 audit(4146.970:1574763): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3070 comm="syslogd" name="/" dev="vda" ino=2 [ 4149.790736][T31967] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4149.840835][T31967] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4152.897975][ T29] kauditd_printk_skb: 3193 callbacks suppressed [ 4152.898139][ T29] audit: type=1400 audit(4152.700:1577948): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=3085 comm="udevd" opid=31957 ocomm="udevd" [ 4152.900884][ T29] audit: type=1400 audit(4152.710:1577949): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=3085 comm="udevd" opid=31958 ocomm="udevd" [ 4152.902988][ T29] audit: type=1400 audit(4152.710:1577950): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=3085 comm="udevd" opid=31962 ocomm="udevd" [ 4152.905220][ T29] audit: type=1400 audit(4152.710:1577951): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="/" dev="vda" ino=2 [ 4152.952438][ T29] audit: type=1400 audit(4152.740:1577952): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 4152.953195][ T29] audit: type=1400 audit(4152.740:1577953): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 4152.953893][ T29] audit: type=1400 audit(4152.740:1577954): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 4152.954962][ T29] audit: type=1400 audit(4152.740:1577955): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 4152.956743][ T29] audit: type=1400 audit(4152.740:1577956): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 4152.957959][ T29] audit: type=1400 audit(4152.750:1577957): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3070 comm="syslogd" name="/" dev="vda" ino=2 [ 4156.218783][T31096] usb 1-1: new high-speed USB device number 24 using dummy_hcd [ 4156.425099][T31096] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 4156.427070][T31096] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 4156.435379][T31096] usb 1-1: New USB device found, idVendor=05ac, idProduct=0262, bcdDevice= 0.00 [ 4156.436676][T31096] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 4156.463016][T31096] usb 1-1: config 0 descriptor?? [ 4156.923280][T31096] hid-generic 0003:05AC:0262.0005: unbalanced delimiter at end of report description [ 4156.925820][T31096] hid-generic 0003:05AC:0262.0005: probe with driver hid-generic failed with error -22 [ 4157.121276][T31096] usb 1-1: USB disconnect, device number 24 [ 4157.886459][T32002] netlink: 24 bytes leftover after parsing attributes in process `syz.0.7605'. [ 4157.909799][ T29] kauditd_printk_skb: 2274 callbacks suppressed [ 4157.909885][ T29] audit: type=1400 audit(4157.730:1580232): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=26928 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4157.914748][ T29] audit: type=1400 audit(4157.730:1580233): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=26928 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4157.915612][ T29] audit: type=1400 audit(4157.740:1580234): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3257 comm="syz-executor" saddr=127.0.0.1 src=38462 daddr=127.0.0.1 dest=30006 netif=lo [ 4157.916696][ T29] audit: type=1400 audit(4157.740:1580235): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=26928 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4157.921318][ T29] audit: type=1400 audit(4157.740:1580236): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=26928 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4157.922679][ T29] audit: type=1400 audit(4157.740:1580237): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=26928 comm="syz-executor" name="570" dev="tmpfs" ino=2976 [ 4157.923440][ T29] audit: type=1400 audit(4157.740:1580238): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=26928 comm="syz-executor" path="/570" dev="tmpfs" ino=2976 [ 4157.924179][ T29] audit: type=1400 audit(4157.740:1580239): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=26928 comm="syz-executor" path="/570" dev="tmpfs" ino=2976 [ 4157.925429][ T29] audit: type=1400 audit(4157.740:1580240): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=26928 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4157.926303][ T29] audit: type=1400 audit(4157.740:1580241): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=26928 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4159.087036][T32009] binder: 32007:32009 got transaction to invalid handle, 1 [ 4159.094374][T32009] binder: 32009:32007 cannot find target node [ 4159.095514][T32009] binder: 32007:32009 transaction call to 0:0 failed 18/29201/-22, size 0-0 line 3144 [ 4159.150390][T32009] binder: 32007:32009 BC_FREE_BUFFER u0000000000000000 no match [ 4160.845916][T25036] binder: undelivered TRANSACTION_ERROR: 29201 [ 4162.918114][T32017] audit_log_start: 2462 callbacks suppressed [ 4162.918202][T32017] audit: audit_backlog=65 > audit_backlog_limit=64 [ 4162.919139][T32017] audit: audit_lost=45670 audit_rate_limit=0 audit_backlog_limit=64 [ 4162.919550][T32017] audit: backlog limit exceeded [ 4162.920230][T32017] audit: audit_backlog=65 > audit_backlog_limit=64 [ 4162.920626][T32017] audit: audit_lost=45671 audit_rate_limit=0 audit_backlog_limit=64 [ 4162.921038][T32017] audit: backlog limit exceeded [ 4162.921487][ T29] audit: type=1400 audit(4162.610:1581375): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=32016 comm="syz.0.7611" [ 4162.921713][T32017] audit: audit_backlog=65 > audit_backlog_limit=64 [ 4162.922625][T32017] audit: audit_lost=45672 audit_rate_limit=0 audit_backlog_limit=64 [ 4162.923036][T32017] audit: backlog limit exceeded [ 4164.569162][T32028] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4164.608628][T32028] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4165.212375][T32039] binder: 32037:32039 ioctl c018620c 20000340 returned -1 [ 4167.929649][ T29] kauditd_printk_skb: 24424 callbacks suppressed [ 4167.929731][ T29] audit: type=1400 audit(4167.750:1584179): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32056 comm="modprobe" name="lib" dev="vda" ino=1622 [ 4167.931230][ T29] audit: type=1400 audit(4167.750:1584180): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="udev" dev="tmpfs" ino=7 [ 4167.931980][ T29] audit: type=1400 audit(4167.750:1584181): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="/" dev="vda" ino=2 [ 4167.932794][ T29] audit: type=1400 audit(4167.750:1584182): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="/" dev="tmpfs" ino=1 [ 4167.933514][ T29] audit: type=1400 audit(4167.750:1584183): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="udev" dev="tmpfs" ino=7 [ 4167.934482][ T29] audit: type=1400 audit(4167.750:1584184): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32056 comm="modprobe" name="/" dev="vda" ino=2 [ 4167.935280][ T29] audit: type=1400 audit(4167.750:1584185): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32056 comm="modprobe" name="usr" dev="vda" ino=1488 [ 4167.936091][ T29] audit: type=1400 audit(4167.750:1584186): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32056 comm="modprobe" name="usr" dev="vda" ino=1488 [ 4167.936819][ T29] audit: type=1400 audit(4167.750:1584187): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32056 comm="modprobe" name="lib" dev="vda" ino=1622 [ 4167.962156][ T29] audit: type=1400 audit(4167.770:1584188): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=32056 comm="modprobe" name="libselinux.so.1" dev="vda" ino=1636 [ 4172.953327][ T29] kauditd_printk_skb: 3609 callbacks suppressed [ 4172.953463][ T29] audit: type=1400 audit(4172.780:1587798): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=26928 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4172.968318][ T29] audit: type=1400 audit(4172.780:1587799): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3257 comm="syz-executor" saddr=127.0.0.1 src=38462 daddr=127.0.0.1 dest=30006 netif=lo [ 4172.969889][ T29] audit: type=1400 audit(4172.780:1587800): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=26928 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4172.971425][ T29] audit: type=1400 audit(4172.780:1587801): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=26928 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4172.972773][ T29] audit: type=1400 audit(4172.780:1587802): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=26928 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4172.974178][ T29] audit: type=1400 audit(4172.780:1587803): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=26928 comm="syz-executor" saddr=10.0.2.2 src=46096 daddr=10.0.2.15 dest=22 netif=eth0 [ 4172.976650][ T29] audit: type=1400 audit(4172.790:1587804): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=26928 comm="syz-executor" name="587" dev="tmpfs" ino=3062 [ 4172.992801][ T29] audit: type=1400 audit(4172.790:1587805): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=26928 comm="syz-executor" path="/587" dev="tmpfs" ino=3062 [ 4172.994388][ T29] audit: type=1400 audit(4172.790:1587806): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=26928 comm="syz-executor" path="/587" dev="tmpfs" ino=3062 [ 4172.995914][ T29] audit: type=1400 audit(4172.790:1587807): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 4173.564870][T32121] smc: net device bond0 applied user defined pnetid SYZ0 [ 4173.566660][T32121] smc: net device bond0 erased user defined pnetid SYZ0 [ 4173.933292][ C0] TCP: request_sock_subflow_v4: Possible SYN flooding on port [::]:20002. Sending cookies. [ 4174.370956][T32135] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4174.469737][T32135] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4174.852266][T32145] netlink: 'syz.1.7664': attribute type 32 has an invalid length. [ 4174.895607][T29205] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 4174.975548][T29205] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 4175.030779][T29205] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 4175.140094][T29205] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 4176.302915][T29205] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 4176.358228][T29205] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 4176.395290][T29205] bond0 (unregistering): Released all slaves [ 4176.664488][T29205] hsr_slave_0: left promiscuous mode [ 4176.720119][T29205] hsr_slave_1: left promiscuous mode [ 4176.809015][T29205] veth1_macvtap: left promiscuous mode [ 4176.809746][T29205] veth0_macvtap: left promiscuous mode [ 4176.810450][T29205] veth1_vlan: left promiscuous mode [ 4176.811067][T29205] veth0_vlan: left promiscuous mode [ 4177.958183][ T29] kauditd_printk_skb: 6218 callbacks suppressed [ 4177.958340][ T29] audit: type=1400 audit(4177.780:1593873): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32171 comm="modprobe" name="usr" dev="vda" ino=1488 [ 4177.960557][ T29] audit: type=1400 audit(4177.780:1593874): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32171 comm="modprobe" name="lib" dev="vda" ino=1622 [ 4177.962220][ T29] audit: type=1400 audit(4177.780:1593875): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32171 comm="modprobe" name="/" dev="vda" ino=2 [ 4177.963394][ T29] audit: type=1400 audit(4177.780:1593876): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32171 comm="modprobe" name="usr" dev="vda" ino=1488 [ 4177.964204][ T29] audit: type=1400 audit(4177.790:1593877): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32140 comm="syz-executor" name="/" dev="vda" ino=2 [ 4177.965686][ T29] audit: type=1400 audit(4177.790:1593878): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32140 comm="syz-executor" name="/" dev="proc" ino=1 [ 4177.966491][ T29] audit: type=1400 audit(4177.790:1593879): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32140 comm="syz-executor" name="sys" dev="proc" ino=4026531856 [ 4177.978977][ T29] audit: type=1400 audit(4177.790:1593880): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32140 comm="syz-executor" name="net" dev="proc" ino=467 [ 4177.980609][ T29] audit: type=1400 audit(4177.790:1593881): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32140 comm="syz-executor" name="ipv6" dev="proc" ino=103511 [ 4177.982109][ T29] audit: type=1400 audit(4177.790:1593882): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32140 comm="syz-executor" name="conf" dev="proc" ino=103512 [ 4181.249161][T32140] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 4181.258330][T32140] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 4182.970115][ T29] kauditd_printk_skb: 7332 callbacks suppressed [ 4182.970268][ T29] audit: type=1400 audit(4182.790:1600682): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32217 comm="modprobe" name="/" dev="vda" ino=2 [ 4182.984539][ T29] audit: type=1400 audit(4182.790:1600683): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32217 comm="modprobe" name="/" dev="vda" ino=2 [ 4182.986368][ T29] audit: type=1400 audit(4182.790:1600684): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32217 comm="modprobe" name="lib" dev="vda" ino=195 [ 4182.994826][ T29] audit: type=1400 audit(4182.790:1600685): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32217 comm="modprobe" name="/" dev="vda" ino=2 [ 4182.995636][ T29] audit: type=1400 audit(4182.790:1600686): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32217 comm="modprobe" name="/" dev="vda" ino=2 [ 4182.996394][ T29] audit: type=1400 audit(4182.790:1600687): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32217 comm="modprobe" name="lib" dev="vda" ino=195 [ 4182.997131][ T29] audit: type=1400 audit(4182.790:1600688): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32217 comm="modprobe" name="/" dev="vda" ino=2 [ 4183.005670][T32213] audit: audit_backlog=65 > audit_backlog_limit=64 [ 4183.006095][ T3074] audit: audit_backlog=65 > audit_backlog_limit=64 [ 4183.006141][T32213] audit: audit_lost=53109 audit_rate_limit=0 audit_backlog_limit=64 [ 4183.593068][T32140] hsr_slave_0: entered promiscuous mode [ 4183.629265][T32140] hsr_slave_1: entered promiscuous mode [ 4184.423197][T32230] binder: 32229:32230 tried to acquire reference to desc 0, got 1 instead [ 4184.426167][T32230] binder_alloc: 32229: binder_alloc_buf, no vma [ 4184.426613][T32230] binder: cannot allocate buffer: vma cleared, target dead or dying [ 4184.427010][T32230] binder: 32229:32230 transaction call to 32229:0 failed 23/29189/-3, size 0-0 line 3332 [ 4184.443610][ T25] binder: undelivered TRANSACTION_ERROR: 29189 [ 4185.324193][T32140] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 4185.362216][T32140] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 4185.375752][T32140] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 4185.424249][T32140] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 4187.687025][T32140] 8021q: adding VLAN 0 to HW filter on device bond0 [ 4187.977750][T32264] audit_panic: 8263 callbacks suppressed [ 4187.977845][T32264] audit: backlog limit exceeded [ 4187.978575][T32264] audit: audit_backlog=65 > audit_backlog_limit=64 [ 4187.979017][T32264] audit: audit_lost=53421 audit_rate_limit=0 audit_backlog_limit=64 [ 4187.979492][T32264] audit: backlog limit exceeded [ 4187.979910][T32264] audit: audit_backlog=65 > audit_backlog_limit=64 [ 4187.980272][T32264] audit: audit_lost=53422 audit_rate_limit=0 audit_backlog_limit=64 [ 4187.980714][T32264] audit: backlog limit exceeded [ 4187.981330][T32264] audit: audit_backlog=65 > audit_backlog_limit=64 [ 4187.981790][T32264] audit: audit_lost=53423 audit_rate_limit=0 audit_backlog_limit=64 [ 4187.982275][T32264] audit: backlog limit exceeded [ 4192.987958][ T29] kauditd_printk_skb: 10855 callbacks suppressed [ 4192.988040][ T29] audit: type=1400 audit(4192.810:1615499): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32323 comm="modprobe" name="/" dev="vda" ino=2 [ 4192.989183][ T29] audit: type=1400 audit(4192.810:1615500): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32323 comm="modprobe" name="/" dev="vda" ino=2 [ 4192.989996][ T29] audit: type=1400 audit(4192.810:1615501): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=32324 comm="syz-executor" name="477" dev="tmpfs" ino=2481 [ 4192.990797][ T29] audit: type=1400 audit(4192.810:1615502): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32323 comm="modprobe" name="lib" dev="vda" ino=195 [ 4192.991737][ T29] audit: type=1400 audit(4192.810:1615503): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32323 comm="modprobe" name="/" dev="vda" ino=2 [ 4192.992465][ T29] audit: type=1400 audit(4192.810:1615504): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32323 comm="modprobe" name="/" dev="vda" ino=2 [ 4192.993228][ T29] audit: type=1400 audit(4192.810:1615505): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32323 comm="modprobe" name="lib" dev="vda" ino=195 [ 4192.993999][ T29] audit: type=1400 audit(4192.810:1615506): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=32323 comm="modprobe" name="libbusybox.so.1.35.0" dev="vda" ino=369 [ 4192.994863][ T29] audit: type=1400 audit(4192.810:1615507): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=32323 comm="modprobe" path="/lib/libbusybox.so.1.35.0" dev="vda" ino=369 [ 4192.995671][ T29] audit: type=1400 audit(4192.810:1615508): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=32323 comm="modprobe" path="/lib/libbusybox.so.1.35.0" dev="vda" ino=369 [ 4194.174888][T32140] veth0_vlan: entered promiscuous mode [ 4194.256397][T32140] veth1_vlan: entered promiscuous mode [ 4194.363430][T32140] veth0_macvtap: entered promiscuous mode [ 4194.384906][T32140] veth1_macvtap: entered promiscuous mode [ 4194.489339][T32140] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 4194.490376][T32140] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 4194.491474][T32140] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 4194.492522][T32140] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 4194.503075][T32342] FAULT_INJECTION: forcing a failure. [ 4194.503075][T32342] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 4194.505330][T32342] CPU: 1 UID: 0 PID: 32342 Comm: syz.1.7692 Tainted: G B 6.11.0-syzkaller-08833-gde5cb0dcb74c #0 [ 4194.506734][T32342] Tainted: [B]=BAD_PAGE [ 4194.507327][T32342] Hardware name: linux,dummy-virt (DT) [ 4194.508544][T32342] Call trace: [ 4194.509330][T32342] dump_backtrace+0x94/0xec [ 4194.510995][T32342] show_stack+0x18/0x24 [ 4194.511708][T32342] dump_stack_lvl+0x78/0x90 [ 4194.512548][T32342] dump_stack+0x18/0x24 [ 4194.513194][T32342] should_fail_ex+0x18c/0x1e0 [ 4194.513835][T32342] should_fail+0x14/0x20 [ 4194.514527][T32342] should_fail_usercopy+0x1c/0x28 [ 4194.515275][T32342] sk_getsockopt+0x138/0xd30 [ 4194.516136][T32342] do_sock_getsockopt+0x210/0x288 [ 4194.516801][T32342] __sys_getsockopt+0x78/0xd0 [ 4194.517203][T32342] __arm64_sys_getsockopt+0x24/0x34 [ 4194.517694][T32342] invoke_syscall+0x48/0x110 [ 4194.518258][T32342] el0_svc_common.constprop.0+0x40/0xe0 [ 4194.518638][T32342] do_el0_svc+0x1c/0x28 [ 4194.518976][T32342] el0_svc+0x34/0xec [ 4194.519303][T32342] el0t_64_sync_handler+0x100/0x12c [ 4194.519666][T32342] el0t_64_sync+0x19c/0x1a0 [ 4195.997274][T32358] FAULT_INJECTION: forcing a failure. [ 4195.997274][T32358] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 4196.000295][T32358] CPU: 0 UID: 0 PID: 32358 Comm: syz.0.7696 Tainted: G B 6.11.0-syzkaller-08833-gde5cb0dcb74c #0 [ 4196.000966][T32358] Tainted: [B]=BAD_PAGE [ 4196.001262][T32358] Hardware name: linux,dummy-virt (DT) [ 4196.001592][T32358] Call trace: [ 4196.001859][T32358] dump_backtrace+0x94/0xec [ 4196.002233][T32358] show_stack+0x18/0x24 [ 4196.002553][T32358] dump_stack_lvl+0x78/0x90 [ 4196.002897][T32358] dump_stack+0x18/0x24 [ 4196.003223][T32358] should_fail_ex+0x18c/0x1e0 [ 4196.003565][T32358] should_fail+0x14/0x20 [ 4196.003932][T32358] should_fail_usercopy+0x1c/0x28 [ 4196.004293][T32358] simple_read_from_buffer+0x68/0x118 [ 4196.004662][T32358] proc_fail_nth_read+0xac/0x12c [ 4196.005027][T32358] vfs_read+0xc0/0x318 [ 4196.005358][T32358] ksys_read+0x70/0x104 [ 4196.005684][T32358] __arm64_sys_read+0x1c/0x28 [ 4196.006042][T32358] invoke_syscall+0x48/0x110 [ 4196.006384][T32358] el0_svc_common.constprop.0+0x40/0xe0 [ 4196.006750][T32358] do_el0_svc+0x1c/0x28 [ 4196.007082][T32358] el0_svc+0x34/0xec [ 4196.007420][T32358] el0t_64_sync_handler+0x100/0x12c [ 4196.007919][T32358] el0t_64_sync+0x19c/0x1a0 [ 4197.998111][ T29] kauditd_printk_skb: 4243 callbacks suppressed [ 4197.998201][ T29] audit: type=1400 audit(4197.820:1619752): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32382 comm="modprobe" name="usr" dev="vda" ino=1488 [ 4197.999401][ T29] audit: type=1400 audit(4197.820:1619753): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32382 comm="modprobe" name="lib" dev="vda" ino=1622 [ 4198.000131][ T29] audit: type=1400 audit(4197.820:1619754): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32382 comm="modprobe" name="/" dev="vda" ino=2 [ 4198.000844][ T29] audit: type=1400 audit(4197.820:1619755): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32382 comm="modprobe" name="usr" dev="vda" ino=1488 [ 4198.001584][ T29] audit: type=1400 audit(4197.820:1619756): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32382 comm="modprobe" name="usr" dev="vda" ino=1488 [ 4198.002968][ T29] audit: type=1400 audit(4197.820:1619757): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32382 comm="modprobe" name="lib" dev="vda" ino=1622 [ 4198.003714][ T29] audit: type=1400 audit(4197.820:1619758): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32382 comm="modprobe" name="/" dev="vda" ino=2 [ 4198.015633][ T29] audit: type=1400 audit(4197.820:1619759): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32382 comm="modprobe" name="usr" dev="vda" ino=1488 [ 4198.016460][ T29] audit: type=1400 audit(4197.820:1619760): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32382 comm="modprobe" name="usr" dev="vda" ino=1488 [ 4198.017209][ T29] audit: type=1400 audit(4197.820:1619761): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32382 comm="modprobe" name="lib" dev="vda" ino=1622 [ 4199.407850][T32396] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4199.469043][T32396] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4203.008175][ T29] kauditd_printk_skb: 1160 callbacks suppressed [ 4203.008327][ T29] audit: type=1400 audit(4202.830:1620922): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32409 comm="modprobe" name="/" dev="vda" ino=2 [ 4203.010404][ T29] audit: type=1400 audit(4202.840:1620924): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32408 comm="kworker/u8:14" name="/" dev="vda" ino=2 [ 4203.011741][ T29] audit: type=1400 audit(4202.840:1620925): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32408 comm="kworker/u8:14" name="sbin" dev="vda" ino=1428 [ 4203.016262][ T29] audit: type=1400 audit(4202.840:1620926): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32408 comm="kworker/u8:14" name="/" dev="vda" ino=2 [ 4203.024377][ T29] audit: type=1400 audit(4202.840:1620927): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32408 comm="kworker/u8:14" name="lib" dev="vda" ino=195 [ 4203.025228][ T29] audit: type=1400 audit(4202.840:1620928): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32408 comm="kworker/u8:14" name="ld-linux-aarch64.so.1" dev="vda" ino=362 [ 4203.029397][ T29] audit: type=1400 audit(4202.840:1620929): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=32408 comm="kworker/u8:14" path="/lib/ld-linux-aarch64.so.1" dev="vda" ino=362 [ 4203.031963][ T29] audit: type=1400 audit(4202.840:1620930): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=32408 comm="kworker/u8:14" name="ld-linux-aarch64.so.1" dev="vda" ino=362 [ 4203.033707][ T29] audit: type=1400 audit(4202.840:1620931): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=32408 comm="kworker/u8:14" name="modprobe" dev="vda" ino=1462 [ 4203.034855][ T29] audit: type=1400 audit(4202.830:1620923): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32409 comm="modprobe" name="etc" dev="vda" ino=95 [ 4208.018632][ T29] kauditd_printk_skb: 1316 callbacks suppressed [ 4208.018724][ T29] audit: type=1400 audit(4207.840:1622248): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32423 comm="syz-executor" name="15" dev="tmpfs" ino=91 [ 4208.020826][ T29] audit: type=1400 audit(4207.840:1622249): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32423 comm="syz-executor" name="15" dev="tmpfs" ino=91 [ 4208.023210][ T29] audit: type=1400 audit(4207.840:1622250): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=32423 comm="syz-executor" name="15" dev="tmpfs" ino=91 [ 4208.025623][ T29] audit: type=1400 audit(4207.840:1622251): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32423 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4208.030175][ T29] audit: type=1400 audit(4207.840:1622252): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32423 comm="syz-executor" name="/" dev="proc" ino=1 [ 4208.031034][ T29] audit: type=1400 audit(4207.840:1622253): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32423 comm="syz-executor" name="/" dev="proc" ino=1 [ 4208.031809][ T29] audit: type=1400 audit(4207.860:1622254): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32423 comm="syz-executor" name="53" dev="proc" ino=103980 [ 4208.033121][ T29] audit: type=1400 audit(4207.860:1622255): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 4208.034664][ T29] audit: type=1400 audit(4207.860:1622256): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 4208.036150][ T29] audit: type=1400 audit(4207.860:1622257): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 4212.463075][ T25] usb 1-1: new high-speed USB device number 25 using dummy_hcd [ 4212.630947][ T25] usb 1-1: config 1 has too many interfaces: 66, using maximum allowed: 32 [ 4212.632679][ T25] usb 1-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 4212.633954][ T25] usb 1-1: config 1 has 1 interface, different from the descriptor's value: 66 [ 4212.635071][ T25] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 4212.651936][ T25] usb 1-1: New USB device found, idVendor=7d25, idProduct=a415, bcdDevice= 0.40 [ 4212.653143][ T25] usb 1-1: New USB device strings: Mfr=1, Product=4, SerialNumber=0 [ 4212.654228][ T25] usb 1-1: Product: syz [ 4212.654966][ T25] usb 1-1: Manufacturer: syz [ 4212.705709][ T25] cdc_wdm 1-1:1.0: skipping garbage [ 4212.706791][ T25] cdc_wdm 1-1:1.0: skipping garbage [ 4212.729272][ T25] cdc_wdm 1-1:1.0: cdc-wdm0: USB WDM device [ 4213.030251][ T29] kauditd_printk_skb: 1561 callbacks suppressed [ 4213.030331][ T29] audit: type=1400 audit(4212.860:1623819): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32446 comm="udevd" name="/" dev="devtmpfs" ino=1 [ 4213.031637][ T29] audit: type=1400 audit(4212.860:1623820): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32446 comm="udevd" name="char" dev="devtmpfs" ino=756 [ 4213.032369][ T29] audit: type=1400 audit(4212.860:1623821): lsm=SMACK fn=smack_inode_setattr action=granted subject="_" object="_" requested=w pid=32446 comm="udevd" name="189:24" dev="devtmpfs" ino=1773 [ 4213.033572][ T29] audit: type=1400 audit(4212.860:1623822): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32446 comm="udevd" name="/" dev="vda" ino=2 [ 4213.034870][ T29] audit: type=1400 audit(4212.860:1623823): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32446 comm="udevd" name="/" dev="tmpfs" ino=1 [ 4213.035732][ T29] audit: type=1400 audit(4212.860:1623824): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32446 comm="udevd" name="udev" dev="tmpfs" ino=7 [ 4213.036473][ T29] audit: type=1400 audit(4212.860:1623825): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=32446 comm="udevd" path="/run/udev/data" dev="tmpfs" ino=11 [ 4213.037195][ T29] audit: type=1400 audit(4212.860:1623826): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32446 comm="udevd" name="/" dev="vda" ino=2 [ 4213.045527][ T29] audit: type=1400 audit(4212.860:1623827): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32446 comm="udevd" name="/" dev="tmpfs" ino=1 [ 4213.046617][ T29] audit: type=1400 audit(4212.860:1623828): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32446 comm="udevd" name="udev" dev="tmpfs" ino=7 [ 4213.406884][T32439] usb 1-1: USB disconnect, device number 25 [ 4218.039497][ T29] kauditd_printk_skb: 2658 callbacks suppressed [ 4218.039668][ T29] audit: type=1400 audit(4217.860:1626487): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=28892 comm="syz-executor" name="496" dev="tmpfs" ino=2584 [ 4218.041632][ T29] audit: type=1400 audit(4217.870:1626488): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=28892 comm="syz-executor" name="496" dev="tmpfs" ino=2584 [ 4218.043512][ T29] audit: type=1400 audit(4217.870:1626489): lsm=SMACK fn=smack_inode_unlink action=granted subject="_" object="_" requested=w pid=28892 comm="syz-executor" name="cgroup.cpu" dev="tmpfs" ino=2586 [ 4218.044900][ T29] audit: type=1400 audit(4217.870:1626490): lsm=SMACK fn=smack_inode_unlink action=granted subject="_" object="_" requested=w pid=28892 comm="syz-executor" name="496" dev="tmpfs" ino=2584 [ 4218.046192][ T29] audit: type=1400 audit(4217.870:1626491): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=28892 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4218.057247][ T29] audit: type=1400 audit(4217.870:1626492): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=28892 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4218.066403][ T29] audit: type=1400 audit(4217.870:1626493): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=28892 comm="syz-executor" name="496" dev="tmpfs" ino=2584 [ 4218.075477][ T29] audit: type=1400 audit(4217.870:1626494): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=28892 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4218.089204][ T29] audit: type=1400 audit(4217.870:1626495): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=28892 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4218.090091][ T29] audit: type=1400 audit(4217.870:1626496): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=28892 comm="syz-executor" name="496" dev="tmpfs" ino=2584 [ 4223.664549][ T29] kauditd_printk_skb: 729 callbacks suppressed [ 4223.664793][ T29] audit: type=1400 audit(4223.490:1627226): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=32140 comm="syz-executor" opid=32442 ocomm="syz.0.7718" [ 4223.668838][ T29] audit: type=1400 audit(4223.490:1627227): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=32140 comm="syz-executor" opid=32442 ocomm="syz.0.7718" [ 4223.676925][ T29] audit: type=1400 audit(4223.500:1627228): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 4223.680435][ T29] audit: type=1400 audit(4223.500:1627229): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3070 comm="syslogd" name="/" dev="vda" ino=2 [ 4223.683438][ T29] audit: type=1400 audit(4223.510:1627230): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3070 comm="syslogd" name="var" dev="vda" ino=1718 [ 4223.686730][ T29] audit: type=1400 audit(4223.510:1627231): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3070 comm="syslogd" name="var" dev="vda" ino=1718 [ 4223.691530][ T29] audit: type=1400 audit(4223.510:1627232): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3070 comm="syslogd" name="/" dev="vda" ino=2 [ 4223.694541][ T29] audit: type=1400 audit(4223.510:1627233): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3070 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 4223.699581][ T29] audit: type=1400 audit(4223.510:1627234): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3070 comm="syslogd" name="messages" dev="tmpfs" ino=17 [ 4223.702991][ T29] audit: type=1400 audit(4223.510:1627235): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3070 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=17 [ 4228.710162][ T29] kauditd_printk_skb: 2497 callbacks suppressed [ 4228.710309][ T29] audit: type=1400 audit(4228.530:1629592): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=28892 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4228.713286][ T29] audit: type=1400 audit(4228.530:1629593): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=28892 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4228.715163][ T29] audit: type=1400 audit(4228.530:1629594): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=28892 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4228.716644][ T29] audit: type=1400 audit(4228.540:1629595): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=28892 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4228.737338][ T29] audit: type=1400 audit(4228.540:1629597): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=28892 comm="syz-executor" name="503" dev="tmpfs" ino=2620 [ 4228.743585][ T29] audit: type=1400 audit(4228.540:1629596): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3257 comm="syz-executor" saddr=127.0.0.1 src=38462 daddr=127.0.0.1 dest=30006 netif=lo [ 4228.745733][ T29] audit: type=1400 audit(4228.540:1629598): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=28892 comm="syz-executor" path="/503" dev="tmpfs" ino=2620 [ 4228.746884][T28892] audit: audit_backlog=65 > audit_backlog_limit=64 [ 4228.750912][T28892] audit: audit_lost=54599 audit_rate_limit=0 audit_backlog_limit=64 [ 4228.751378][T28892] audit: backlog limit exceeded [ 4233.718156][ T29] kauditd_printk_skb: 3155 callbacks suppressed [ 4233.718249][ T29] audit: type=1400 audit(4233.540:1632733): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32577 comm="modprobe" name="usr" dev="vda" ino=1488 [ 4233.719293][ T29] audit: type=1400 audit(4233.550:1632734): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32577 comm="modprobe" name="lib" dev="vda" ino=1622 [ 4233.720051][ T29] audit: type=1400 audit(4233.550:1632735): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32577 comm="modprobe" name="/" dev="vda" ino=2 [ 4233.720778][ T29] audit: type=1400 audit(4233.550:1632736): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32577 comm="modprobe" name="usr" dev="vda" ino=1488 [ 4233.721721][ T29] audit: type=1400 audit(4233.550:1632737): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32577 comm="modprobe" name="usr" dev="vda" ino=1488 [ 4233.722451][ T29] audit: type=1400 audit(4233.550:1632738): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32577 comm="modprobe" name="lib" dev="vda" ino=1622 [ 4233.723232][ T29] audit: type=1400 audit(4233.550:1632739): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32577 comm="modprobe" name="/" dev="vda" ino=2 [ 4233.723952][ T29] audit: type=1400 audit(4233.550:1632740): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32577 comm="modprobe" name="usr" dev="vda" ino=1488 [ 4233.724687][ T29] audit: type=1400 audit(4233.550:1632741): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32577 comm="modprobe" name="usr" dev="vda" ino=1488 [ 4233.725429][ T29] audit: type=1400 audit(4233.550:1632742): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32577 comm="modprobe" name="lib" dev="vda" ino=1622 [ 4238.728127][ T29] kauditd_printk_skb: 7122 callbacks suppressed [ 4238.728213][ T29] audit: type=1400 audit(4238.550:1639710): lsm=SMACK fn=smk_curacc_shm action=granted subject="_" object="_" requested=rw pid=32650 comm="syz.0.7766" ipc_key=0 [ 4238.729426][ T29] audit: type=1400 audit(4238.550:1639711): lsm=SMACK fn=smk_curacc_shm action=granted subject="_" object="_" requested=rw pid=32650 comm="syz.0.7766" ipc_key=0 [ 4238.730131][ T29] audit: type=1400 audit(4238.550:1639712): lsm=SMACK fn=smack_inode_unlink action=granted subject="_" object="_" requested=w pid=28892 comm="syz-executor" name="518" dev="tmpfs" ino=2700 [ 4238.730910][ T29] audit: type=1400 audit(4238.550:1639713): lsm=SMACK fn=smk_curacc_shm action=granted subject="_" object="_" requested=rw pid=32650 comm="syz.0.7766" ipc_key=0 [ 4238.731660][ T29] audit: type=1400 audit(4238.550:1639714): lsm=SMACK fn=smk_curacc_shm action=granted subject="_" object="_" requested=rw pid=32650 comm="syz.0.7766" ipc_key=0 [ 4238.732395][ T29] audit: type=1400 audit(4238.550:1639715): lsm=SMACK fn=smk_curacc_shm action=granted subject="_" object="_" requested=rw pid=32650 comm="syz.0.7766" ipc_key=0 [ 4238.733070][ T29] audit: type=1400 audit(4238.550:1639716): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=28892 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4238.733802][ T29] audit: type=1400 audit(4238.550:1639717): lsm=SMACK fn=smk_curacc_shm action=granted subject="_" object="_" requested=rw pid=32650 comm="syz.0.7766" ipc_key=0 [ 4238.734507][ T29] audit: type=1400 audit(4238.550:1639718): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=28892 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4238.735249][ T29] audit: type=1400 audit(4238.550:1639719): lsm=SMACK fn=smk_curacc_shm action=granted subject="_" object="_" requested=rw pid=32650 comm="syz.0.7766" ipc_key=0 [ 4239.841840][ T25] usb 1-1: new full-speed USB device number 26 using dummy_hcd [ 4240.024057][ T25] usb 1-1: not running at top speed; connect to a high speed hub [ 4240.030926][ T25] usb 1-1: config 1 interface 0 altsetting 9 endpoint 0x81 has invalid maxpacket 512, setting to 64 [ 4240.031695][ T25] usb 1-1: config 1 interface 0 altsetting 9 has 2 endpoint descriptors, different from the interface descriptor's value: 1 [ 4240.032309][ T25] usb 1-1: config 1 interface 0 has no altsetting 0 [ 4240.067888][ T25] usb 1-1: New USB device found, idVendor=1532, idProduct=010d, bcdDevice= 0.40 [ 4240.068485][ T25] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 4240.068937][ T25] usb 1-1: Product: 㹎납カ슷ꓽ裹懒Ṭ맛屺ヱ꒤뇹天洠뀊㩍乶᎝猏㔿疭헗瞛뀋銅到▕降馾픃ྋ厅⃅䛤幠鷋ﯿᘳ䦈䇇 [ 4240.069577][ T25] usb 1-1: Manufacturer: Ц [ 4240.069955][ T25] usb 1-1: SerialNumber: ї [ 4240.103125][T32668] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 4240.368404][T32673] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4240.436076][T32673] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4240.469485][T32675] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4240.525386][T32675] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4240.592133][ T25] usbhid 1-1:1.0: can't add hid device: -71 [ 4240.592836][ T25] usbhid 1-1:1.0: probe with driver usbhid failed with error -71 [ 4240.609312][ T25] usb 1-1: USB disconnect, device number 26 [ 4243.822616][ T29] kauditd_printk_skb: 3167 callbacks suppressed [ 4243.822767][ T29] audit: type=1400 audit(4243.650:1642296): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=3085 comm="udevd" opid=32669 ocomm="udevd" [ 4243.848675][ T29] audit: type=1400 audit(4243.660:1642297): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 4243.849497][ T29] audit: type=1400 audit(4243.660:1642298): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3070 comm="syslogd" name="/" dev="vda" ino=2 [ 4243.850611][ T29] audit: type=1400 audit(4243.660:1642299): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3070 comm="syslogd" name="var" dev="vda" ino=1718 [ 4243.852488][ T29] audit: type=1400 audit(4243.660:1642300): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3070 comm="syslogd" name="var" dev="vda" ino=1718 [ 4243.853989][ T29] audit: type=1400 audit(4243.660:1642301): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3070 comm="syslogd" name="/" dev="vda" ino=2 [ 4243.855565][ T29] audit: type=1400 audit(4243.660:1642302): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3070 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 4243.856798][ T29] audit: type=1400 audit(4243.660:1642303): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3070 comm="syslogd" name="messages" dev="tmpfs" ino=17 [ 4243.885921][ T29] audit: type=1400 audit(4243.660:1642304): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3070 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=17 [ 4243.886771][ T29] audit: type=1400 audit(4243.670:1642306): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=3085 comm="udevd" opid=32670 ocomm="udevd" [ 4249.347923][ T29] kauditd_printk_skb: 993 callbacks suppressed [ 4249.348004][ T29] audit: type=1400 audit(4249.150:1643299): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=28892 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4249.349843][ T29] audit: type=1400 audit(4249.150:1643300): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=28892 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4249.350835][ T29] audit: type=1400 audit(4249.150:1643301): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=28892 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4249.351605][ T29] audit: type=1400 audit(4249.150:1643302): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=28892 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4249.352370][ T29] audit: type=1400 audit(4249.150:1643303): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=28892 comm="syz-executor" name="525" dev="tmpfs" ino=2737 [ 4249.353135][ T29] audit: type=1400 audit(4249.150:1643304): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=28892 comm="syz-executor" path="/525" dev="tmpfs" ino=2737 [ 4249.353939][ T29] audit: type=1400 audit(4249.150:1643305): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=28892 comm="syz-executor" path="/525" dev="tmpfs" ino=2737 [ 4249.354879][ T29] audit: type=1400 audit(4249.170:1643306): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=28892 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4249.355900][ T29] audit: type=1400 audit(4249.170:1643307): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=28892 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4249.356659][ T29] audit: type=1400 audit(4249.170:1643308): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=28892 comm="syz-executor" name="525" dev="tmpfs" ino=2737 [ 4249.921339][T32728] Restarting kernel threads ... done. [ 4252.708126][T31096] usb 1-1: new full-speed USB device number 27 using dummy_hcd [ 4252.913310][T31096] usb 1-1: not running at top speed; connect to a high speed hub [ 4252.968979][T31096] usb 1-1: config 3 has an invalid interface number: 23 but max is 3 [ 4252.970062][T31096] usb 1-1: config 3 has an invalid interface number: 199 but max is 3 [ 4252.971089][T31096] usb 1-1: config 3 has an invalid descriptor of length 1, skipping remainder of the config [ 4252.972162][T31096] usb 1-1: config 3 has 2 interfaces, different from the descriptor's value: 4 [ 4252.973225][T31096] usb 1-1: config 3 has no interface number 0 [ 4252.974043][T31096] usb 1-1: config 3 has no interface number 1 [ 4252.974810][T31096] usb 1-1: config 3 interface 23 altsetting 9 endpoint 0x7 has invalid maxpacket 512, setting to 64 [ 4252.975381][T31096] usb 1-1: config 3 interface 23 altsetting 9 has an invalid descriptor for endpoint zero, skipping [ 4252.975950][T31096] usb 1-1: config 3 interface 23 altsetting 9 endpoint 0xC has invalid maxpacket 1024, setting to 64 [ 4252.976499][T31096] usb 1-1: config 3 interface 23 altsetting 9 endpoint 0x3 has invalid wMaxPacketSize 0 [ 4252.977009][T31096] usb 1-1: config 3 interface 23 altsetting 9 has an invalid descriptor for endpoint zero, skipping [ 4252.977677][T31096] usb 1-1: config 3 interface 23 altsetting 9 has an invalid descriptor for endpoint zero, skipping [ 4252.988859][T31096] usb 1-1: config 3 interface 23 altsetting 9 endpoint 0xD has invalid maxpacket 1023, setting to 64 [ 4252.989508][T31096] usb 1-1: config 3 interface 23 altsetting 9 has a duplicate endpoint with address 0xD, skipping [ 4252.990785][T31096] usb 1-1: config 3 interface 199 altsetting 121 has 0 endpoint descriptors, different from the interface descriptor's value: 7 [ 4252.991624][T31096] usb 1-1: config 3 interface 23 has no altsetting 0 [ 4252.992056][T31096] usb 1-1: config 3 interface 199 has no altsetting 0 [ 4253.031237][T31096] usb 1-1: New USB device found, idVendor=1608, idProduct=0302, bcdDevice=a0.07 [ 4253.031840][T31096] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 4253.032281][T31096] usb 1-1: Product: 醹蕽ꑥ⪴ꤜ㴫觶䅧炢잮ᾝ타RퟗṘ뻧溈ﵠ瀢盗데琭춄퀌锵ꊝ燈힣堍滒Ⰰᅮ厊ᄄꡎ䖊㓧̤テ䆂Ź健媮斉翯䣠碳㣏㳗ආϏꫭ﷡぀浜퇐鹦有〵ퟶ᭚ [ 4253.033050][T31096] usb 1-1: Manufacturer: 쯉⦦Ԡ돯Ѱ㡳紵顚禝촩ل稝㌮曊蚥㹪狊䆯儂幏홢ꃍ斚㔱똨툽堞뫁ṫ㮶髌㷛Šම꣕㤋塜㆐禞楺೰픺狭層魿㕘ຽ肑톚ෞ鏸⬧딀붝ᠪᲀᜑꃼ뚇ﻄ뀆聛ꁆ鎯衈ޟ㕍壼涉뚕鈧蛉㩃ꀿ [ 4253.034126][T31096] usb 1-1: SerialNumber: 纞턠䂻䡒༅瀓ꆙ塕䒶蜔筶ᥕ鋶洯뙆띌틇乶㎌鲰壞칄⌹య䬂覅米㤣㍥⣓聟䤸瞛違⭰⺑䊋瀟䣇캎۫ᢸ䏕鋗惨␫蹨芵펦䷯鷘姐Ắ쁺ꐋ䭜忍㤽ᾪ彄芢澻蘭龜죸罩髦컣숽뉪׈遥쓢쀯狓쁿ਤ籅뗣빁廵橡騵ې趡쁊姫೬ࢇ鉳ᪧẸ㿩鍽襮눋鴦륗䇼戛 [ 4253.993875][T32755] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4254.030261][T32755] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4254.041869][T31096] io_ti 1-1:3.23: required endpoints missing [ 4254.072518][T31096] io_ti 1-1:3.199: required endpoints missing [ 4254.089290][T31096] usb 1-1: USB disconnect, device number 27 [ 4254.358236][ T29] kauditd_printk_skb: 4043 callbacks suppressed [ 4254.358317][ T29] audit: type=1400 audit(4254.180:1647082): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32731 comm="udevd" name="/" dev="vda" ino=2 [ 4254.368137][ T29] audit: type=1400 audit(4254.190:1647083): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32731 comm="udevd" name="/" dev="tmpfs" ino=1 [ 4254.368953][ T29] audit: type=1400 audit(4254.190:1647084): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32731 comm="udevd" name="udev" dev="tmpfs" ino=7 [ 4254.369683][ T29] audit: type=1400 audit(4254.190:1647085): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32731 comm="udevd" name="data" dev="tmpfs" ino=11 [ 4254.378457][ T29] audit: type=1400 audit(4254.190:1647086): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32731 comm="udevd" name="/" dev="vda" ino=2 [ 4254.379242][ T29] audit: type=1400 audit(4254.190:1647087): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32731 comm="udevd" name="/" dev="tmpfs" ino=1 [ 4254.380062][ T29] audit: type=1400 audit(4254.190:1647088): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32731 comm="udevd" name="udev" dev="tmpfs" ino=7 [ 4254.385532][ T29] audit: type=1400 audit(4254.190:1647089): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32731 comm="udevd" name="data" dev="tmpfs" ino=11 [ 4254.386341][ T29] audit: type=1400 audit(4254.190:1647090): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=32731 comm="udevd" name="data" dev="tmpfs" ino=11 [ 4254.387083][ T29] audit: type=1400 audit(4254.190:1647091): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=32731 comm="udevd" name="data" dev="tmpfs" ino=11 [ 4256.786363][ T312] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4256.828986][ T312] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4257.100934][ T312] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4257.148982][ T312] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4258.524182][ T335] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4258.560203][ T335] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4258.596173][ T335] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4258.639629][ T335] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4258.814033][ T338] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4258.858963][ T338] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4259.104472][ T338] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4259.160410][ T338] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4259.367916][ T29] kauditd_printk_skb: 4491 callbacks suppressed [ 4259.368007][ T29] audit: type=1400 audit(4259.190:1651439): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=28892 comm="syz-executor" name="540" dev="tmpfs" ino=2815 [ 4259.369125][ T29] audit: type=1400 audit(4259.190:1651440): lsm=SMACK fn=smack_inode_unlink action=granted subject="_" object="_" requested=w pid=28892 comm="syz-executor" name="cgroup.cpu" dev="tmpfs" ino=2817 [ 4259.369896][ T29] audit: type=1400 audit(4259.190:1651441): lsm=SMACK fn=smack_inode_unlink action=granted subject="_" object="_" requested=w pid=28892 comm="syz-executor" name="540" dev="tmpfs" ino=2815 [ 4259.370672][ T29] audit: type=1400 audit(4259.190:1651442): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=28892 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4259.371434][ T29] audit: type=1400 audit(4259.190:1651443): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=28892 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4259.372205][ T29] audit: type=1400 audit(4259.190:1651444): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=28892 comm="syz-executor" name="540" dev="tmpfs" ino=2815 [ 4259.372959][ T29] audit: type=1400 audit(4259.190:1651445): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=28892 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4259.374298][ T29] audit: type=1400 audit(4259.190:1651446): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=28892 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4259.375873][ T29] audit: type=1400 audit(4259.190:1651447): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=28892 comm="syz-executor" name="540" dev="tmpfs" ino=2815 [ 4259.390307][ T29] audit: type=1400 audit(4259.210:1651449): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 4264.377834][ T29] kauditd_printk_skb: 2864 callbacks suppressed [ 4264.377939][ T29] audit: type=1400 audit(4264.200:1654292): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=383 comm="modprobe" name="/" dev="vda" ino=2 [ 4264.381282][ T29] audit: type=1400 audit(4264.210:1654293): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=383 comm="modprobe" name="lib" dev="vda" ino=195 [ 4264.382125][ T29] audit: type=1400 audit(4264.210:1654294): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=383 comm="modprobe" name="/" dev="vda" ino=2 [ 4264.382879][ T29] audit: type=1400 audit(4264.210:1654295): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=383 comm="modprobe" name="/" dev="vda" ino=2 [ 4264.383613][ T29] audit: type=1400 audit(4264.210:1654296): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=383 comm="modprobe" name="lib" dev="vda" ino=195 [ 4264.384375][ T29] audit: type=1400 audit(4264.210:1654297): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=383 comm="modprobe" name="/" dev="vda" ino=2 [ 4264.385354][ T29] audit: type=1400 audit(4264.210:1654298): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=383 comm="modprobe" name="/" dev="vda" ino=2 [ 4264.386278][ T29] audit: type=1400 audit(4264.210:1654299): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=383 comm="modprobe" name="lib" dev="vda" ino=195 [ 4264.418116][ T29] audit: type=1400 audit(4264.210:1654300): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=383 comm="modprobe" name="/" dev="vda" ino=2 [ 4264.419593][ T29] audit: type=1400 audit(4264.220:1654301): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 4269.414118][ T29] kauditd_printk_skb: 3348 callbacks suppressed [ 4269.414210][ T29] audit: type=1400 audit(4269.240:1657167): lsm=SMACK fn=smack_file_ioctl action=granted subject="_" object="*" requested=r pid=430 comm="syz.0.7838" path="socket:[105435]" dev="sockfs" ino=105435 [ 4269.416144][ T29] audit: type=1400 audit(4269.240:1657168): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=430 comm="syz.0.7838" name="newroot" dev="tmpfs" ino=2 [ 4269.421984][ T29] audit: type=1400 audit(4269.240:1657169): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=430 comm="syz.0.7838" name="/" dev="devtmpfs" ino=1 [ 4269.423120][ T29] audit: type=1400 audit(4269.250:1657170): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 4269.424079][ T29] audit: type=1400 audit(4269.250:1657171): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3070 comm="syslogd" name="/" dev="vda" ino=2 [ 4269.425113][ T29] audit: type=1400 audit(4269.250:1657172): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3070 comm="syslogd" name="var" dev="vda" ino=1718 [ 4269.426165][ T29] audit: type=1400 audit(4269.250:1657173): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3070 comm="syslogd" name="var" dev="vda" ino=1718 [ 4269.427242][ T29] audit: type=1400 audit(4269.250:1657174): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3070 comm="syslogd" name="/" dev="vda" ino=2 [ 4269.433355][ T29] audit: type=1400 audit(4269.250:1657175): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3070 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 4269.434250][ T29] audit: type=1400 audit(4269.250:1657176): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3070 comm="syslogd" name="messages" dev="tmpfs" ino=17 [ 4271.929384][ T469] coredump: 1(syz.0.7848): coredump has not been created, error -17 [ 4272.148078][ T475] coredump: 1(syz.0.7848): coredump has not been created, error -17 [ 4272.288213][ T477] coredump: 1(syz.0.7848): coredump has not been created, error -17 [ 4272.752283][ T485] coredump: 1(syz.0.7848): coredump has not been created, error -17 [ 4272.760920][ T484] coredump: 1(syz.0.7848): coredump has not been created, error -17 [ 4273.093481][ T491] coredump: 1(syz.0.7848): coredump has not been created, error -17 [ 4274.185082][ T464] coredump: 1(syz.0.7848): written to core: VMAs: 18, size 34439168; core: 5198713 bytes, pos 34447360 [ 4274.431781][ T29] kauditd_printk_skb: 1967 callbacks suppressed [ 4274.431866][ T29] audit: type=1400 audit(4274.260:1659144): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3257 comm="syz-executor" saddr=127.0.0.1 src=38462 daddr=127.0.0.1 dest=30006 netif=lo [ 4274.434727][ T29] audit: type=1400 audit(4274.260:1659145): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3255 comm="sshd" saddr=10.0.2.2 src=46096 daddr=10.0.2.15 dest=22 netif=eth0 [ 4274.438185][ T29] audit: type=1400 audit(4274.260:1659146): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32140 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4274.439027][ T29] audit: type=1400 audit(4274.260:1659147): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32140 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4274.440022][ T29] audit: type=1400 audit(4274.270:1659148): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 4274.440730][ T29] audit: type=1400 audit(4274.270:1659149): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 4274.441467][ T29] audit: type=1400 audit(4274.270:1659150): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 4274.442249][ T29] audit: type=1400 audit(4274.270:1659151): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 4274.442994][ T29] audit: type=1400 audit(4274.270:1659152): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 4274.443699][ T29] audit: type=1400 audit(4274.270:1659153): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 4274.453899][ T466] coredump: 1(syz.0.7848): written to core: VMAs: 18, size 34439168; core: 5198713 bytes, pos 34447360 [ 4274.690680][ T467] coredump: 1(syz.0.7848): written to core: VMAs: 18, size 34439168; core: 5198713 bytes, pos 34447360 [ 4274.784263][ T465] coredump: 1(syz.0.7848): written to core: VMAs: 18, size 34439168; core: 5198713 bytes, pos 34447360 [ 4275.040787][ T471] coredump: 1(syz.0.7848): written to core: VMAs: 18, size 34439168; core: 5198713 bytes, pos 34447360 [ 4275.372251][ T468] coredump: 1(syz.0.7848): written to core: VMAs: 18, size 34439168; core: 5198713 bytes, pos 34447360 [ 4275.597110][ T472] coredump: 1(syz.0.7848): written to core: VMAs: 18, size 34439168; core: 5198713 bytes, pos 34447360 [ 4275.606461][ T474] coredump: 1(syz.0.7848): written to core: VMAs: 18, size 34439168; core: 5198713 bytes, pos 34447360 [ 4275.655330][ T473] coredump: 1(syz.0.7848): written to core: VMAs: 18, size 34439168; core: 5198713 bytes, pos 34447360 [ 4275.689246][ T470] coredump: 1(syz.0.7848): written to core: VMAs: 18, size 34439168; core: 5198713 bytes, pos 34447360 [ 4278.825280][ T522] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4278.859549][ T522] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4279.438330][ T29] kauditd_printk_skb: 2641 callbacks suppressed [ 4279.438421][ T29] audit: type=1400 audit(4279.270:1661795): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=532 comm="syz-executor" name="82" dev="tmpfs" ino=458 [ 4279.439546][ T29] audit: type=1400 audit(4279.270:1661796): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=532 comm="syz-executor" name="82" dev="tmpfs" ino=458 [ 4279.440286][ T29] audit: type=1400 audit(4279.270:1661797): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=532 comm="syz-executor" name="82" dev="tmpfs" ino=458 [ 4279.441025][ T29] audit: type=1400 audit(4279.270:1661798): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=532 comm="syz-executor" name="82" dev="tmpfs" ino=458 [ 4279.441800][ T29] audit: type=1400 audit(4279.270:1661799): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=532 comm="syz-executor" name="82" dev="tmpfs" ino=458 [ 4279.448961][ T29] audit: type=1400 audit(4279.270:1661800): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=532 comm="syz-executor" name="82" dev="tmpfs" ino=458 [ 4279.449989][ T29] audit: type=1400 audit(4279.270:1661801): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=532 comm="syz-executor" name="82" dev="tmpfs" ino=458 [ 4279.450979][ T29] audit: type=1400 audit(4279.270:1661802): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=532 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4279.451941][ T29] audit: type=1400 audit(4279.270:1661803): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=532 comm="syz-executor" name="/" dev="proc" ino=1 [ 4279.452756][ T29] audit: type=1400 audit(4279.270:1661804): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=532 comm="syz-executor" name="/" dev="proc" ino=1 [ 4284.696912][ T29] kauditd_printk_skb: 1110 callbacks suppressed [ 4284.697059][ T29] audit: type=1400 audit(4284.520:1662915): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=28892 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4284.716182][ T29] audit: type=1400 audit(4284.520:1662916): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3257 comm="syz-executor" saddr=127.0.0.1 src=38462 daddr=127.0.0.1 dest=30006 netif=lo [ 4284.738649][ T29] audit: type=1400 audit(4284.530:1662917): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=28892 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4284.740170][ T29] audit: type=1400 audit(4284.530:1662918): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=28892 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4284.741613][ T29] audit: type=1400 audit(4284.540:1662919): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3255 comm="sshd" saddr=10.0.2.2 src=46096 daddr=10.0.2.15 dest=22 netif=eth0 [ 4284.743144][ T29] audit: type=1400 audit(4284.540:1662920): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 4284.745554][ T29] audit: type=1400 audit(4284.550:1662921): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=28892 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4284.771751][ T29] audit: type=1400 audit(4284.550:1662922): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=28892 comm="syz-executor" name="566" dev="tmpfs" ino=2949 [ 4284.775892][ T29] audit: type=1400 audit(4284.550:1662923): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=28892 comm="syz-executor" path="/566" dev="tmpfs" ino=2949 [ 4284.782305][ T29] audit: type=1400 audit(4284.550:1662924): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3070 comm="syslogd" name="/" dev="vda" ino=2 [ 4290.907986][ T29] kauditd_printk_skb: 1910 callbacks suppressed [ 4290.908070][ T29] audit: type=1400 audit(4290.730:1664836): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3257 comm="syz-executor" saddr=127.0.0.1 src=38462 daddr=127.0.0.1 dest=30006 netif=lo [ 4290.909402][ T29] audit: type=1400 audit(4290.720:1664835): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32140 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4290.910927][ T29] audit: type=1400 audit(4290.730:1664837): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32140 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4290.911730][ T29] audit: type=1400 audit(4290.730:1664838): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32140 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4290.912478][ T29] audit: type=1400 audit(4290.730:1664839): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32140 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4290.913230][ T29] audit: type=1400 audit(4290.730:1664840): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=32140 comm="syz-executor" name="90" dev="tmpfs" ino=499 [ 4290.913972][ T29] audit: type=1400 audit(4290.730:1664841): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=32140 comm="syz-executor" path="/90" dev="tmpfs" ino=499 [ 4290.914720][ T29] audit: type=1400 audit(4290.730:1664842): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=32140 comm="syz-executor" path="/90" dev="tmpfs" ino=499 [ 4290.915514][ T29] audit: type=1400 audit(4290.730:1664843): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3255 comm="sshd" saddr=10.0.2.2 src=46096 daddr=10.0.2.15 dest=22 netif=eth0 [ 4290.916386][ T29] audit: type=1400 audit(4290.730:1664844): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32140 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4291.843297][ T596] do_coredump: 11 callbacks suppressed [ 4291.843472][ T596] coredump: 1591(syz.1.7878): written to core: VMAs: 16, size 38240256; core: 9249545 bytes, pos 38248448 [ 4295.918916][ T29] kauditd_printk_skb: 784 callbacks suppressed [ 4295.919063][ T29] audit: type=1400 audit(4295.740:1665629): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32140 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4295.921088][ T29] audit: type=1400 audit(4295.750:1665630): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=605 comm="syz.1.7882" name="newroot" dev="tmpfs" ino=2 [ 4295.922713][ T29] audit: type=1400 audit(4295.750:1665631): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=605 comm="syz.1.7882" name="/" dev="devtmpfs" ino=1 [ 4295.924318][ T29] audit: type=1400 audit(4295.750:1665632): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=605 comm="syz.1.7882" name="net" dev="devtmpfs" ino=687 [ 4295.927209][ T29] audit: type=1400 audit(4295.750:1665633): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=605 comm="syz.1.7882" name="tun" dev="devtmpfs" ino=688 [ 4295.931694][ T29] audit: type=1400 audit(4295.750:1665634): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=605 comm="syz.1.7882" path="/dev/net/tun" dev="devtmpfs" ino=688 [ 4295.933213][ T29] audit: type=1400 audit(4295.750:1665635): lsm=SMACK fn=smack_task_setscheduler action=granted subject="_" object="_" requested=w pid=605 comm="syz.1.7882" opid=605 ocomm="syz.1.7882" [ 4295.934609][ T29] audit: type=1400 audit(4295.750:1665636): lsm=SMACK fn=smack_task_setscheduler action=granted subject="_" object="_" requested=w pid=605 comm="syz.1.7882" opid=605 ocomm="syz.1.7882" [ 4295.936042][ T29] audit: type=1400 audit(4295.750:1665637): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32140 comm="syz-executor" name="91" dev="tmpfs" ino=505 [ 4295.993799][ T3070] audit: audit_backlog=65 > audit_backlog_limit=64 [ 4296.381579][ T607] coredump: 1600(syz.1.7882): written to core: VMAs: 16, size 38240256; core: 9249545 bytes, pos 38248448 [ 4297.502896][ T629] serio: Serial port pts0 [ 4298.184428][ T623] ======================================================= [ 4298.184428][ T623] WARNING: The mand mount option has been deprecated and [ 4298.184428][ T623] and is ignored by this kernel. Remove the mand [ 4298.184428][ T623] option from the mount to silence this warning. [ 4298.184428][ T623] ======================================================= [ 4310.460496][ T29] kauditd_printk_skb: 2155 callbacks suppressed [ 4310.460590][ T29] audit: type=1400 audit(4310.290:1667773): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=32140 comm="syz-executor" opid=645 ocomm="syz.0.7891" [ 4310.463266][ T29] audit: type=1400 audit(4310.290:1667774): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=32140 comm="syz-executor" opid=645 ocomm="syz.0.7891" [ 4310.469703][ T29] audit: type=1400 audit(4310.300:1667775): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 4310.472672][ T29] audit: type=1400 audit(4310.300:1667776): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 4310.473435][ T29] audit: type=1400 audit(4310.300:1667777): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3070 comm="syslogd" name="/" dev="vda" ino=2 [ 4310.474249][ T29] audit: type=1400 audit(4310.300:1667778): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3070 comm="syslogd" name="var" dev="vda" ino=1718 [ 4310.475003][ T29] audit: type=1400 audit(4310.300:1667779): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3070 comm="syslogd" name="var" dev="vda" ino=1718 [ 4310.475737][ T29] audit: type=1400 audit(4310.300:1667780): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3070 comm="syslogd" name="/" dev="vda" ino=2 [ 4310.476485][ T29] audit: type=1400 audit(4310.300:1667781): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3070 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 4310.477217][ T29] audit: type=1400 audit(4310.300:1667782): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3070 comm="syslogd" name="messages" dev="tmpfs" ino=17 [ 4315.431043][T18064] usb 1-1: new full-speed USB device number 28 using dummy_hcd [ 4315.512948][ T29] kauditd_printk_skb: 4211 callbacks suppressed [ 4315.513095][ T29] audit: type=1400 audit(4315.340:1671994): lsm=SMACK fn=smack_file_ioctl action=granted subject="_" object="_" requested=r pid=708 comm="syz.0.7910" path="/dev/raw-gadget" dev="devtmpfs" ino=701 [ 4315.521316][ T29] audit: type=1400 audit(4315.350:1671995): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 4315.526824][ T29] audit: type=1400 audit(4315.350:1671996): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 4315.529833][ T29] audit: type=1400 audit(4315.350:1671997): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 4315.534798][ T29] audit: type=1400 audit(4315.360:1671998): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 4315.545463][ T29] audit: type=1400 audit(4315.370:1671999): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 4315.549124][ T29] audit: type=1400 audit(4315.380:1672000): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 4315.551367][ T29] audit: type=1400 audit(4315.380:1672001): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 4315.553750][ T29] audit: type=1400 audit(4315.380:1672002): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 4315.557298][ T29] audit: type=1400 audit(4315.380:1672003): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 4315.708352][T18064] usb 1-1: config 1 has an invalid interface number: 4 but max is 2 [ 4315.709396][T18064] usb 1-1: config 1 contains an unexpected descriptor of type 0x1, skipping [ 4315.710247][T18064] usb 1-1: config 1 contains an unexpected descriptor of type 0x2, skipping [ 4315.712716][T18064] usb 1-1: config 1 has an invalid descriptor of length 193, skipping remainder of the config [ 4315.713240][T18064] usb 1-1: config 1 has 2 interfaces, different from the descriptor's value: 3 [ 4315.713731][T18064] usb 1-1: config 1 has no interface number 1 [ 4315.714316][T18064] usb 1-1: config 1 interface 4 altsetting 124 has 0 endpoint descriptors, different from the interface descriptor's value: 14 [ 4315.714943][T18064] usb 1-1: config 1 interface 4 has no altsetting 0 [ 4315.742438][T18064] usb 1-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 4315.743012][T18064] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 4315.743457][T18064] usb 1-1: Product: syz [ 4315.743784][T18064] usb 1-1: Manufacturer: syz [ 4315.744127][T18064] usb 1-1: SerialNumber: syz [ 4317.278685][T18064] usb 1-1: 0:2 : does not exist [ 4317.340250][T18064] usb 1-1: USB disconnect, device number 28 [ 4317.913086][ T680] udevd[680]: error opening ATTR{/sys/devices/platform/dummy_hcd.0/usb1/1-1/1-1:1.0/sound/card3/controlC3/../uevent} for writing: No such file or directory [ 4318.348448][ T680] udevd[680]: setting owner of /dev/loop0 to uid=0, gid=6 failed: No such file or directory [ 4318.383106][ T680] udevd[680]: inotify_add_watch(7, /dev/loop0, 10) failed: No such file or directory [ 4320.286844][ T738] coredump: 1641(syz.1.7916): written to core: VMAs: 16, size 38240256; core: 9126665 bytes, pos 38248448 [ 4320.523713][ T29] kauditd_printk_skb: 5601 callbacks suppressed [ 4320.523800][ T29] audit: type=1400 audit(4320.340:1677320): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=749 comm="modprobe" name="/" dev="vda" ino=2 [ 4320.525523][ T29] audit: type=1400 audit(4320.340:1677321): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=749 comm="modprobe" name="lib" dev="vda" ino=195 [ 4320.529510][ T29] audit: type=1400 audit(4320.340:1677322): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=749 comm="modprobe" name="modules" dev="vda" ino=384 [ 4320.530534][ T29] audit: type=1400 audit(4320.360:1677323): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=749 comm="modprobe" name="modules" dev="vda" ino=384 [ 4320.546940][ T29] audit: type=1400 audit(4320.370:1677324): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 4320.556448][ T29] audit: type=1400 audit(4320.380:1677325): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 4320.561895][ T29] audit: type=1400 audit(4320.390:1677326): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 4320.562980][ T29] audit: type=1400 audit(4320.390:1677327): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 4320.563679][ T29] audit: type=1400 audit(4320.390:1677328): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 4320.564385][ T29] audit: type=1400 audit(4320.390:1677329): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 4325.997906][ T29] kauditd_printk_skb: 7509 callbacks suppressed [ 4325.997988][ T29] audit: type=1400 audit(4325.820:1684569): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=792 comm="syz.1.7930" name="newroot" dev="tmpfs" ino=2 [ 4326.001700][ T29] audit: type=1400 audit(4325.830:1684570): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=792 comm="syz.1.7930" name="/" dev="devtmpfs" ino=1 [ 4326.002939][ T29] audit: type=1400 audit(4325.830:1684571): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=792 comm="syz.1.7930" name="dlm-control" dev="devtmpfs" ino=87 [ 4326.004378][ T29] audit: type=1400 audit(4325.830:1684572): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=792 comm="syz.1.7930" path="/dev/dlm-control" dev="devtmpfs" ino=87 [ 4326.023316][ T29] audit: type=1400 audit(4325.840:1684573): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 4326.024086][ T29] audit: type=1400 audit(4325.840:1684574): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 4326.025235][ T29] audit: type=1400 audit(4325.840:1684575): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 4326.026265][ T29] audit: type=1400 audit(4325.840:1684576): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 4326.026951][ T29] audit: type=1400 audit(4325.840:1684577): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 4326.031085][ T29] audit: type=1400 audit(4325.840:1684578): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3070 comm="syslogd" name="/" dev="vda" ino=2 [ 4328.500974][T29205] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 4328.590474][T29205] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 4328.874814][T29205] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 4328.960942][T29205] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 4330.435614][T29205] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 4330.490364][T29205] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 4330.548849][T29205] bond0 (unregistering): Released all slaves [ 4330.686497][T29205] hsr_slave_0: left promiscuous mode [ 4330.738952][T29205] hsr_slave_1: left promiscuous mode [ 4330.851007][T29205] veth1_macvtap: left promiscuous mode [ 4330.852045][T29205] veth0_macvtap: left promiscuous mode [ 4330.853189][T29205] veth1_vlan: left promiscuous mode [ 4330.854372][T29205] veth0_vlan: left promiscuous mode [ 4331.110769][T29205] pim6reg (unregistering): left allmulticast mode [ 4331.122055][ T29] kauditd_printk_skb: 4906 callbacks suppressed [ 4331.122266][ T29] audit: type=1400 audit(4330.950:1688367): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 4331.129653][ T29] audit: type=1400 audit(4330.960:1688368): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 4331.132453][ T29] audit: type=1400 audit(4330.960:1688369): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 4331.135761][ T29] audit: type=1400 audit(4330.960:1688370): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 4331.145948][ T29] audit: type=1400 audit(4330.970:1688371): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=27 comm="kdevtmpfs" name="/" dev="devtmpfs" ino=1 [ 4331.147026][ T29] audit: type=1400 audit(4330.970:1688372): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=27 comm="kdevtmpfs" path="/tap58" dev="devtmpfs" ino=1770 [ 4331.148483][ T29] audit: type=1400 audit(4330.970:1688373): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 4331.151204][ T29] audit: type=1400 audit(4330.980:1688374): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 4331.153405][ T29] audit: type=1400 audit(4330.980:1688375): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 4331.156016][ T29] audit: type=1400 audit(4330.980:1688376): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 4335.876055][ T819] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 4335.895657][ T819] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 4336.128074][ T29] kauditd_printk_skb: 7833 callbacks suppressed [ 4336.128163][ T29] audit: type=1400 audit(4335.950:1694642): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=887 comm="modprobe" name="usr" dev="vda" ino=1488 [ 4336.130064][ T29] audit: type=1400 audit(4335.950:1694643): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=885 comm="dhcpcd-run-hook" name="lib" dev="vda" ino=1622 [ 4336.131666][ T29] audit: type=1400 audit(4335.950:1694644): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=887 comm="modprobe" name="usr" dev="vda" ino=1488 [ 4336.133144][ T29] audit: type=1400 audit(4335.950:1694645): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=887 comm="modprobe" name="lib" dev="vda" ino=1622 [ 4336.134499][ T29] audit: type=1400 audit(4335.950:1694646): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=885 comm="dhcpcd-run-hook" name="/" dev="vda" ino=2 [ 4336.135624][ T29] audit: type=1400 audit(4335.950:1694647): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=887 comm="modprobe" name="/" dev="vda" ino=2 [ 4336.136844][ T29] audit: type=1400 audit(4335.950:1694648): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=885 comm="dhcpcd-run-hook" name="usr" dev="vda" ino=1488 [ 4336.158846][ T29] audit: type=1400 audit(4335.950:1694649): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=887 comm="modprobe" name="usr" dev="vda" ino=1488 [ 4336.159777][ T29] audit: type=1400 audit(4335.950:1694650): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=885 comm="dhcpcd-run-hook" name="usr" dev="vda" ino=1488 [ 4336.161018][ T29] audit: type=1400 audit(4335.950:1694651): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=887 comm="modprobe" name="usr" dev="vda" ino=1488 [ 4339.294933][ T819] hsr_slave_0: entered promiscuous mode [ 4339.340459][ T819] hsr_slave_1: entered promiscuous mode [ 4339.431211][ T819] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 4339.431824][ T819] Cannot create hsr debugfs directory [ 4341.140033][ T29] kauditd_printk_skb: 8601 callbacks suppressed [ 4341.140119][ T29] audit: type=1400 audit(4340.930:1701744): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=938 comm="modprobe" name="/" dev="vda" ino=2 [ 4341.141269][ T29] audit: type=1400 audit(4340.950:1701770): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=938 comm="modprobe" name="usr" dev="vda" ino=1488 [ 4341.142046][ T939] audit: audit_backlog=65 > audit_backlog_limit=64 [ 4341.142049][ T29] audit: type=1400 audit(4340.950:1701771): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=938 comm="modprobe" name="usr" dev="vda" ino=1488 [ 4341.142449][ T939] audit: audit_lost=56745 audit_rate_limit=0 audit_backlog_limit=64 [ 4341.143069][ T29] audit: type=1400 audit(4340.950:1701772): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=938 comm="modprobe" name="lib" dev="vda" ino=1622 [ 4341.143307][ T939] audit: backlog limit exceeded [ 4341.143913][ T29] audit: type=1400 audit(4340.950:1701773): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=938 comm="modprobe" name="/" dev="vda" ino=2 [ 4341.145018][ T29] audit: type=1400 audit(4340.950:1701774): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=938 comm="modprobe" name="usr" dev="vda" ino=1488 [ 4341.145509][ T939] audit: audit_backlog=65 > audit_backlog_limit=64 [ 4341.245876][ T819] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 4341.284453][ T819] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 4341.295988][ T819] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 4341.362942][ T819] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 4341.910665][T18064] usb 1-1: new low-speed USB device number 29 using dummy_hcd [ 4342.091406][T18064] usb 1-1: Invalid ep0 maxpacket: 16 [ 4342.228278][T18064] usb 1-1: new low-speed USB device number 30 using dummy_hcd [ 4342.378271][T18064] usb 1-1: Invalid ep0 maxpacket: 16 [ 4342.379649][T18064] usb usb1-port1: attempt power cycle [ 4342.718752][T18064] usb 1-1: new low-speed USB device number 31 using dummy_hcd [ 4342.754797][T18064] usb 1-1: Invalid ep0 maxpacket: 16 [ 4342.898641][T18064] usb 1-1: new low-speed USB device number 32 using dummy_hcd [ 4342.930684][T18064] usb 1-1: Invalid ep0 maxpacket: 16 [ 4342.931955][T18064] usb usb1-port1: unable to enumerate USB device [ 4343.253540][ T819] 8021q: adding VLAN 0 to HW filter on device bond0 [ 4344.380483][ T819] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 4346.148174][ T29] kauditd_printk_skb: 9387 callbacks suppressed [ 4346.148259][ T29] audit: type=1400 audit(4345.970:1710653): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=983 comm="rm" name="lib" dev="vda" ino=195 [ 4346.149499][ T29] audit: type=1400 audit(4345.980:1710654): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=983 comm="rm" name="/" dev="vda" ino=2 [ 4346.150352][ T29] audit: type=1400 audit(4345.980:1710655): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=983 comm="rm" name="/" dev="vda" ino=2 [ 4346.165946][ T29] audit: type=1400 audit(4345.980:1710656): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=983 comm="rm" name="lib" dev="vda" ino=195 [ 4346.166786][ T29] audit: type=1400 audit(4345.980:1710657): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=983 comm="rm" name="/" dev="vda" ino=2 [ 4346.169656][ T29] audit: type=1400 audit(4345.980:1710658): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=983 comm="rm" name="/" dev="vda" ino=2 [ 4346.170491][ T29] audit: type=1400 audit(4345.980:1710659): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=983 comm="rm" name="lib" dev="vda" ino=195 [ 4346.171265][ T29] audit: type=1400 audit(4345.980:1710660): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=983 comm="rm" name="/" dev="vda" ino=2 [ 4346.172088][ T29] audit: type=1400 audit(4345.980:1710661): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=984 comm="modprobe" name="/" dev="vda" ino=2 [ 4346.172871][ T29] audit: type=1400 audit(4345.980:1710663): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=984 comm="modprobe" name="lib" dev="vda" ino=195 [ 4348.356579][ T819] veth0_vlan: entered promiscuous mode [ 4348.383637][ T819] veth1_vlan: entered promiscuous mode [ 4348.500925][ T819] veth0_macvtap: entered promiscuous mode [ 4348.522538][ T819] veth1_macvtap: entered promiscuous mode [ 4348.636827][ T819] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 4348.638278][ T819] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 4348.638903][ T819] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 4348.639453][ T819] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 4350.739694][T17093] usb 1-1: new low-speed USB device number 33 using dummy_hcd [ 4350.898137][T17093] usb 1-1: Invalid ep0 maxpacket: 16 [ 4351.028706][T17093] usb 1-1: new low-speed USB device number 34 using dummy_hcd [ 4351.188398][T17093] usb 1-1: Invalid ep0 maxpacket: 16 [ 4351.190729][T17093] usb usb1-port1: attempt power cycle [ 4351.191873][ T29] kauditd_printk_skb: 4220 callbacks suppressed [ 4351.192027][ T29] audit: type=1400 audit(4351.020:1714877): lsm=SMACK fn=smack_file_ioctl action=granted subject="_" object="_" requested=r pid=943 comm="syz.0.7945" path="/dev/raw-gadget" dev="devtmpfs" ino=701 [ 4351.196103][ T29] audit: type=1400 audit(4351.020:1714878): lsm=SMACK fn=smack_file_ioctl action=granted subject="_" object="_" requested=r pid=943 comm="syz.0.7945" path="/dev/raw-gadget" dev="devtmpfs" ino=701 [ 4351.201415][ T29] audit: type=1400 audit(4351.030:1714879): lsm=SMACK fn=smack_file_ioctl action=granted subject="_" object="_" requested=r pid=943 comm="syz.0.7945" path="/dev/raw-gadget" dev="devtmpfs" ino=701 [ 4351.202997][ T29] audit: type=1400 audit(4351.030:1714880): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 4351.209073][ T29] audit: type=1400 audit(4351.030:1714881): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 4351.210447][ T29] audit: type=1400 audit(4351.030:1714882): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3070 comm="syslogd" name="/" dev="vda" ino=2 [ 4351.211754][ T29] audit: type=1400 audit(4351.030:1714883): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3070 comm="syslogd" name="var" dev="vda" ino=1718 [ 4351.213693][ T29] audit: type=1400 audit(4351.030:1714884): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 4351.215152][ T29] audit: type=1400 audit(4351.030:1714886): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 4351.216441][ T29] audit: type=1400 audit(4351.030:1714885): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3070 comm="syslogd" name="var" dev="vda" ino=1718 [ 4351.538552][T17093] usb 1-1: new low-speed USB device number 35 using dummy_hcd [ 4351.571265][T17093] usb 1-1: Invalid ep0 maxpacket: 16 [ 4351.699166][T17093] usb 1-1: new low-speed USB device number 36 using dummy_hcd [ 4351.902912][ T1023] FAULT_INJECTION: forcing a failure. [ 4351.902912][ T1023] name failslab, interval 1, probability 0, space 0, times 0 [ 4351.904133][ T1023] CPU: 0 UID: 0 PID: 1023 Comm: syz.0.7948 Tainted: G B 6.11.0-syzkaller-08833-gde5cb0dcb74c #0 [ 4351.905102][ T1023] Tainted: [B]=BAD_PAGE [ 4351.905423][ T1023] Hardware name: linux,dummy-virt (DT) [ 4351.905890][ T1023] Call trace: [ 4351.906249][ T1023] dump_backtrace+0x94/0xec [ 4351.907153][ T1023] show_stack+0x18/0x24 [ 4351.907513][ T1023] dump_stack_lvl+0x78/0x90 [ 4351.907911][ T1023] dump_stack+0x18/0x24 [ 4351.908246][ T1023] should_fail_ex+0x18c/0x1e0 [ 4351.908591][ T1023] should_failslab+0x54/0x80 [ 4351.908929][ T1023] __kmalloc_noprof+0xa8/0x360 [ 4351.909280][ T1023] tomoyo_realpath_from_path+0x48/0x1d0 [ 4351.909647][ T1023] tomoyo_path_number_perm+0xd8/0x224 [ 4351.909980][ T1023] tomoyo_file_ioctl+0x1c/0x28 [ 4351.910345][ T1023] security_file_ioctl+0x8c/0x19c [ 4351.910686][ T1023] __arm64_sys_ioctl+0x4c/0xf0 [ 4351.911026][ T1023] invoke_syscall+0x48/0x110 [ 4351.911360][ T1023] el0_svc_common.constprop.0+0x40/0xe0 [ 4351.911739][ T1023] do_el0_svc+0x1c/0x28 [ 4351.912066][ T1023] el0_svc+0x34/0xec [ 4351.912385][ T1023] el0t_64_sync_handler+0x100/0x12c [ 4351.912741][ T1023] el0t_64_sync+0x19c/0x1a0 [ 4351.914316][ T1023] ERROR: Out of memory at tomoyo_realpath_from_path. [ 4352.062545][T17093] usb 1-1: device not accepting address 36, error -71 [ 4352.070904][T17093] usb usb1-port1: unable to enumerate USB device [ 4352.366705][ T1034] binder: 1033:1034 ioctl 660c 0 returned -22 [ 4352.829156][ T1041] FAULT_INJECTION: forcing a failure. [ 4352.829156][ T1041] name failslab, interval 1, probability 0, space 0, times 0 [ 4352.829828][ T1041] CPU: 1 UID: 0 PID: 1041 Comm: syz.0.7953 Tainted: G B 6.11.0-syzkaller-08833-gde5cb0dcb74c #0 [ 4352.830494][ T1041] Tainted: [B]=BAD_PAGE [ 4352.830783][ T1041] Hardware name: linux,dummy-virt (DT) [ 4352.831132][ T1041] Call trace: [ 4352.831391][ T1041] dump_backtrace+0x94/0xec [ 4352.831752][ T1041] show_stack+0x18/0x24 [ 4352.832102][ T1041] dump_stack_lvl+0x78/0x90 [ 4352.832462][ T1041] dump_stack+0x18/0x24 [ 4352.832789][ T1041] should_fail_ex+0x18c/0x1e0 [ 4352.833146][ T1041] should_failslab+0x54/0x80 [ 4352.833490][ T1041] __kmalloc_noprof+0xa8/0x360 [ 4352.833837][ T1041] tomoyo_encode2+0x7c/0x140 [ 4352.834237][ T1041] tomoyo_realpath_from_path+0x9c/0x1d0 [ 4352.834612][ T1041] tomoyo_path_number_perm+0xd8/0x224 [ 4352.834977][ T1041] tomoyo_file_ioctl+0x1c/0x28 [ 4352.835324][ T1041] security_file_ioctl+0x8c/0x19c [ 4352.835678][ T1041] __arm64_sys_ioctl+0x4c/0xf0 [ 4352.836054][ T1041] invoke_syscall+0x48/0x110 [ 4352.836395][ T1041] el0_svc_common.constprop.0+0x40/0xe0 [ 4352.836759][ T1041] do_el0_svc+0x1c/0x28 [ 4352.837133][ T1041] el0_svc+0x34/0xec [ 4352.837492][ T1041] el0t_64_sync_handler+0x100/0x12c [ 4352.837948][ T1041] el0t_64_sync+0x19c/0x1a0 [ 4352.860014][ T1041] ERROR: Out of memory at tomoyo_realpath_from_path. [ 4356.213051][ T29] kauditd_printk_skb: 7694 callbacks suppressed [ 4356.213201][ T29] audit: type=1400 audit(4356.040:1722201): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32140 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4356.218265][ T29] audit: type=1400 audit(4356.040:1722202): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3257 comm="syz-executor" saddr=127.0.0.1 src=38462 daddr=127.0.0.1 dest=30006 netif=lo [ 4356.219626][ T29] audit: type=1400 audit(4356.040:1722203): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3255 comm="sshd" saddr=10.0.2.2 src=46096 daddr=10.0.2.15 dest=22 netif=eth0 [ 4356.228410][ T29] audit: type=1400 audit(4356.040:1722204): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32140 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4356.230119][ T29] audit: type=1400 audit(4356.050:1722205): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 4356.231408][ T29] audit: type=1400 audit(4356.050:1722206): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 4356.232637][ T29] audit: type=1400 audit(4356.050:1722207): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 4356.234472][ T29] audit: type=1400 audit(4356.050:1722208): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3070 comm="syslogd" name="/" dev="vda" ino=2 [ 4356.236277][ T29] audit: type=1400 audit(4356.050:1722209): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 4356.246497][ T29] audit: type=1400 audit(4356.050:1722210): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3070 comm="syslogd" name="var" dev="vda" ino=1718 [ 4357.607371][ T1073] kvm [1073]: Failed to find VMA for hva 0x20ffc000 [ 4357.997213][ T1080] sctp: [Deprecated]: syz.0.7961 (pid 1080) Use of struct sctp_assoc_value in delayed_ack socket option. [ 4357.997213][ T1080] Use struct sctp_sack_info instead [ 4361.989959][ T29] kauditd_printk_skb: 6273 callbacks suppressed [ 4361.990163][ T29] audit: type=1400 audit(4361.810:1726415): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3257 comm="syz-executor" saddr=127.0.0.1 src=38462 daddr=127.0.0.1 dest=30006 netif=lo [ 4362.000008][ T29] audit: type=1400 audit(4361.810:1726416): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32140 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4362.001737][ T29] audit: type=1400 audit(4361.810:1726417): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32140 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4362.018270][ T29] audit: type=1400 audit(4361.810:1726418): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32140 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4362.019562][ T29] audit: type=1400 audit(4361.810:1726419): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32140 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4362.020710][ T29] audit: type=1400 audit(4361.830:1726421): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1090 comm="syz.1.7965" saddr=10.0.2.2 src=46096 daddr=10.0.2.15 dest=22 netif=eth0 [ 4362.022261][ T29] audit: type=1400 audit(4361.810:1726420): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=32140 comm="syz-executor" name="148" dev="tmpfs" ino=801 [ 4362.023119][ T29] audit: type=1400 audit(4361.830:1726422): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=32140 comm="syz-executor" path="/148" dev="tmpfs" ino=801 [ 4362.024188][ T29] audit: type=1400 audit(4361.830:1726424): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 4362.025538][ T29] audit: type=1400 audit(4361.840:1726425): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 4368.863678][ T29] kauditd_printk_skb: 3519 callbacks suppressed [ 4368.863849][ T29] audit: type=1400 audit(4368.670:1729080): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=3085 comm="udevd" opid=1021 ocomm="udevd" [ 4368.869438][ T29] audit: type=1400 audit(4368.700:1729081): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=3085 comm="udevd" opid=1015 ocomm="udevd" [ 4368.870879][ T29] audit: type=1400 audit(4368.700:1729082): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="/" dev="vda" ino=2 [ 4368.872159][ T29] audit: type=1400 audit(4368.700:1729083): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="etc" dev="vda" ino=95 [ 4368.874956][ T29] audit: type=1400 audit(4368.700:1729084): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="udev" dev="vda" ino=191 [ 4368.898090][ T29] audit: type=1400 audit(4368.700:1729085): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=3085 comm="udevd" path="/etc/udev/rules.d" dev="vda" ino=193 [ 4368.909320][ T29] audit: type=1400 audit(4368.700:1729086): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="/" dev="vda" ino=2 [ 4368.910908][ T29] audit: type=1400 audit(4368.700:1729087): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="lib" dev="vda" ino=195 [ 4368.912422][ T29] audit: type=1400 audit(4368.700:1729088): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="udev" dev="vda" ino=1390 [ 4368.913914][ T29] audit: type=1400 audit(4368.700:1729089): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=3085 comm="udevd" path="/lib/udev/rules.d" dev="vda" ino=1395 [ 4374.848961][ T29] kauditd_printk_skb: 2507 callbacks suppressed [ 4374.849112][ T29] audit: type=1400 audit(4374.680:1730585): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3257 comm="syz-executor" saddr=127.0.0.1 src=38462 daddr=127.0.0.1 dest=30006 netif=lo [ 4374.853290][ T29] audit: type=1400 audit(4374.680:1730586): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32140 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4374.854855][ T29] audit: type=1400 audit(4374.680:1730587): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32140 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4374.856257][ T29] audit: type=1400 audit(4374.680:1730589): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32140 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4374.876007][T32140] audit: audit_backlog=65 > audit_backlog_limit=64 [ 4374.876336][ T3070] audit: audit_backlog=65 > audit_backlog_limit=64 [ 4374.876564][ T3070] audit: audit_lost=58361 audit_rate_limit=0 audit_backlog_limit=64 [ 4374.876703][T32140] audit: audit_lost=58362 audit_rate_limit=0 audit_backlog_limit=64 [ 4374.876777][T32140] audit: backlog limit exceeded [ 4374.877295][ T3070] audit: backlog limit exceeded [ 4378.103980][ T1147] FAULT_INJECTION: forcing a failure. [ 4378.103980][ T1147] name fail_futex, interval 1, probability 0, space 0, times 1 [ 4378.105470][ T1147] CPU: 0 UID: 0 PID: 1147 Comm: syz.1.7979 Tainted: G B 6.11.0-syzkaller-08833-gde5cb0dcb74c #0 [ 4378.106887][ T1147] Tainted: [B]=BAD_PAGE [ 4378.107532][ T1147] Hardware name: linux,dummy-virt (DT) [ 4378.108305][ T1147] Call trace: [ 4378.108828][ T1147] dump_backtrace+0x94/0xec [ 4378.109525][ T1147] show_stack+0x18/0x24 [ 4378.110158][ T1147] dump_stack_lvl+0x78/0x90 [ 4378.110791][ T1147] dump_stack+0x18/0x24 [ 4378.111426][ T1147] should_fail_ex+0x18c/0x1e0 [ 4378.112080][ T1147] should_fail+0x14/0x20 [ 4378.112670][ T1147] get_futex_key+0x1c4/0x45c [ 4378.113289][ T1147] futex_wake+0x58/0x1c4 [ 4378.114003][ T1147] do_futex+0xe0/0x1a0 [ 4378.114686][ T1147] mm_release+0xb0/0xc4 [ 4378.115340][ T1147] exit_mm_release+0x28/0x38 [ 4378.116053][ T1147] do_exit+0x208/0x994 [ 4378.116767][ T1147] do_group_exit+0x34/0x90 [ 4378.117462][ T1147] copy_siginfo_to_user+0x0/0xec [ 4378.118286][ T1147] do_signal+0xf0/0x13c0 [ 4378.118956][ T1147] do_notify_resume+0xd8/0x164 [ 4378.119602][ T1147] el0_svc+0xcc/0xec [ 4378.120182][ T1147] el0t_64_sync_handler+0x100/0x12c [ 4378.120878][ T1147] el0t_64_sync+0x19c/0x1a0 [ 4379.879226][ T29] kauditd_printk_skb: 1698 callbacks suppressed [ 4379.879501][ T29] audit: type=1400 audit(4379.690:1732287): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=1161 comm="modprobe" name="/" dev="vda" ino=2 [ 4379.882037][ T29] audit: type=1400 audit(4379.690:1732288): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=1161 comm="modprobe" name="/" dev="vda" ino=2 [ 4379.883358][ T29] audit: type=1400 audit(4379.690:1732289): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=1161 comm="modprobe" name="lib" dev="vda" ino=195 [ 4379.885537][ T29] audit: type=1400 audit(4379.690:1732290): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=1161 comm="modprobe" name="/" dev="vda" ino=2 [ 4379.887344][ T29] audit: type=1400 audit(4379.690:1732291): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=1161 comm="modprobe" name="usr" dev="vda" ino=1488 [ 4379.889663][ T29] audit: type=1400 audit(4379.700:1732292): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=1161 comm="modprobe" name="usr" dev="vda" ino=1488 [ 4379.891374][ T29] audit: type=1400 audit(4379.700:1732293): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=1161 comm="modprobe" name="lib" dev="vda" ino=1622 [ 4379.893026][ T29] audit: type=1400 audit(4379.700:1732294): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=1161 comm="modprobe" name="lib" dev="vda" ino=1622 [ 4379.894721][ T29] audit: type=1400 audit(4379.700:1732295): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=1161 comm="modprobe" name="libpcre2-8.so.0.11.0" dev="vda" ino=1631 [ 4379.896225][ T29] audit: type=1400 audit(4379.700:1732296): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=1161 comm="modprobe" path="/usr/lib/libpcre2-8.so.0.11.0" dev="vda" ino=1631 [ 4384.888472][ T29] kauditd_printk_skb: 2286 callbacks suppressed [ 4384.888620][ T29] audit: type=1400 audit(4384.710:1734583): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="/" dev="vda" ino=2 [ 4384.890588][ T29] audit: type=1400 audit(4384.720:1734584): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="/" dev="sysfs" ino=1 [ 4384.891914][ T29] audit: type=1400 audit(4384.720:1734585): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="devices" dev="sysfs" ino=4 [ 4384.895680][ T29] audit: type=1400 audit(4384.720:1734586): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="virtual" dev="sysfs" ino=810 [ 4384.897082][ T29] audit: type=1400 audit(4384.720:1734587): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="block" dev="sysfs" ino=11385 [ 4384.906945][ T29] audit: type=1400 audit(4384.720:1734588): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="loop0" dev="sysfs" ino=171034 [ 4384.909384][ T29] audit: type=1400 audit(4384.720:1734589): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="/" dev="vda" ino=2 [ 4384.910821][ T29] audit: type=1400 audit(4384.720:1734590): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="/" dev="sysfs" ino=1 [ 4384.912223][ T29] audit: type=1400 audit(4384.720:1734591): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="devices" dev="sysfs" ino=4 [ 4384.913719][ T29] audit: type=1400 audit(4384.720:1734592): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="virtual" dev="sysfs" ino=810 [ 4385.028322][T32439] usb 1-1: new low-speed USB device number 37 using dummy_hcd [ 4385.218405][T32439] usb 1-1: Invalid ep0 maxpacket: 32 [ 4385.348438][T32439] usb 1-1: new low-speed USB device number 38 using dummy_hcd [ 4385.505032][T32439] usb 1-1: Invalid ep0 maxpacket: 32 [ 4385.510438][T32439] usb usb1-port1: attempt power cycle [ 4385.871190][T32439] usb 1-1: new low-speed USB device number 39 using dummy_hcd [ 4385.893723][T32439] usb 1-1: Invalid ep0 maxpacket: 32 [ 4386.048584][T32439] usb 1-1: new low-speed USB device number 40 using dummy_hcd [ 4386.073187][T32439] usb 1-1: Invalid ep0 maxpacket: 32 [ 4386.078738][T32439] usb usb1-port1: unable to enumerate USB device [ 4390.060013][ T29] kauditd_printk_skb: 877 callbacks suppressed [ 4390.060175][ T29] audit: type=1400 audit(4389.890:1735470): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=819 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4390.063621][ T29] audit: type=1400 audit(4389.890:1735471): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3257 comm="syz-executor" saddr=127.0.0.1 src=38462 daddr=127.0.0.1 dest=30006 netif=lo [ 4390.072762][ T29] audit: type=1400 audit(4389.890:1735472): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3255 comm="sshd" saddr=10.0.2.2 src=46096 daddr=10.0.2.15 dest=22 netif=eth0 [ 4390.074534][ T29] audit: type=1400 audit(4389.900:1735473): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=819 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4390.076396][ T29] audit: type=1400 audit(4389.900:1735474): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=819 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4390.084632][ T29] audit: type=1400 audit(4389.900:1735475): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=819 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4390.086277][ T29] audit: type=1400 audit(4389.900:1735476): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=819 comm="syz-executor" name="21" dev="tmpfs" ino=119 [ 4390.098696][ T29] audit: type=1400 audit(4389.900:1735477): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=819 comm="syz-executor" path="/21" dev="tmpfs" ino=119 [ 4390.100301][ T29] audit: type=1400 audit(4389.900:1735478): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 4390.102548][ T29] audit: type=1400 audit(4389.900:1735479): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3070 comm="syslogd" name="/" dev="vda" ino=2 [ 4395.078116][ T29] kauditd_printk_skb: 573 callbacks suppressed [ 4395.078207][ T29] audit: type=1400 audit(4394.890:1736053): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=1206 comm="udevd" [ 4395.079305][ T29] audit: type=1400 audit(4394.890:1736054): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=1207 comm="udevd" name="1207" dev="proc" ino=108227 [ 4395.080207][ T29] audit: type=1400 audit(4394.900:1736055): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=w pid=1207 comm="udevd" name="oom_score_adj" dev="proc" ino=108228 [ 4395.081053][ T29] audit: type=1400 audit(4394.900:1736056): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=1207 comm="udevd" path="/proc/1207/oom_score_adj" dev="proc" ino=108228 [ 4395.081828][ T29] audit: type=1400 audit(4394.900:1736057): lsm=SMACK fn=smack_inode_setattr action=granted subject="_" object="_" requested=w pid=1207 comm="udevd" name="oom_score_adj" dev="proc" ino=108228 [ 4395.082676][ T29] audit: type=1400 audit(4394.900:1736058): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=1207 comm="udevd" path="/proc/1207/oom_score_adj" dev="proc" ino=108228 [ 4395.083466][ T29] audit: type=1400 audit(4394.900:1736059): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=1208 comm="syz.0.7995" name="newroot" dev="tmpfs" ino=2 [ 4395.084217][ T29] audit: type=1400 audit(4394.900:1736060): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=1208 comm="syz.0.7995" name="/" dev="proc" ino=1 [ 4395.084960][ T29] audit: type=1400 audit(4394.900:1736061): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=1207 comm="udevd" name="/" dev="vda" ino=2 [ 4395.085741][ T29] audit: type=1400 audit(4394.900:1736062): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=1208 comm="syz.0.7995" name="/" dev="proc" ino=1 [ 4398.071540][ T1222] fuse: Bad value for 'fd' [ 4400.092548][ T29] kauditd_printk_skb: 3052 callbacks suppressed [ 4400.092716][ T29] audit: type=1400 audit(4399.910:1739116): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=1231 comm="syz.0.8001" name="newroot" dev="tmpfs" ino=2 [ 4400.109766][ T29] audit: type=1400 audit(4399.920:1739117): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=1231 comm="syz.0.8001" name="/" dev="devtmpfs" ino=1 [ 4400.111582][ T29] audit: type=1400 audit(4399.920:1739118): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=rw pid=1231 comm="syz.0.8001" name="raw-gadget" dev="devtmpfs" ino=701 [ 4400.113338][ T29] audit: type=1400 audit(4399.920:1739119): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=1231 comm="syz.0.8001" path="/dev/raw-gadget" dev="devtmpfs" ino=701 [ 4400.114769][ T29] audit: type=1400 audit(4399.920:1739120): lsm=SMACK fn=smack_file_ioctl action=granted subject="_" object="_" requested=w pid=1231 comm="syz.0.8001" path="/dev/raw-gadget" dev="devtmpfs" ino=701 [ 4400.116440][ T29] audit: type=1400 audit(4399.920:1739121): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="/" dev="vda" ino=2 [ 4400.148201][ T29] audit: type=1400 audit(4399.920:1739122): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="/" dev="tmpfs" ino=1 [ 4400.149532][ T29] audit: type=1400 audit(4399.920:1739123): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="udev" dev="tmpfs" ino=7 [ 4400.150840][ T29] audit: type=1400 audit(4399.920:1739124): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="data" dev="tmpfs" ino=11 [ 4400.158587][ T29] audit: type=1400 audit(4399.920:1739125): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=3085 comm="udevd" name="b7:0" dev="tmpfs" ino=7410 [ 4405.115952][ T29] kauditd_printk_skb: 3466 callbacks suppressed [ 4405.116044][ T29] audit: type=1400 audit(4404.940:1742591): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=1261 comm="kworker/u8:14" name="/" dev="vda" ino=2 [ 4405.117225][ T29] audit: type=1400 audit(4404.940:1742592): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=1261 comm="kworker/u8:14" name="sbin" dev="vda" ino=1428 [ 4405.120811][ T29] audit: type=1400 audit(4404.940:1742593): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=1261 comm="kworker/u8:14" name="modprobe" dev="vda" ino=1462 [ 4405.129164][ T29] audit: type=1400 audit(4404.940:1742594): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=1261 comm="kworker/u8:14" path="/sbin/modprobe" dev="vda" ino=1462 [ 4405.130480][ T29] audit: type=1400 audit(4404.950:1742595): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 4405.131564][ T29] audit: type=1400 audit(4404.950:1742596): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3070 comm="syslogd" name="/" dev="vda" ino=2 [ 4405.132324][ T29] audit: type=1400 audit(4404.960:1742598): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 4405.142259][ T29] audit: type=1400 audit(4404.960:1742599): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 4405.143716][ T29] audit: type=1400 audit(4404.960:1742600): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3074 comm="klogd" path="/dev/log" [ 4405.145016][ T29] audit: type=1400 audit(4404.960:1742601): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=1261 comm="kworker/u8:14" name="/" dev="vda" ino=2 [ 4410.133629][ T29] kauditd_printk_skb: 3150 callbacks suppressed [ 4410.133779][ T29] audit: type=1400 audit(4409.940:1745751): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=1288 comm="modprobe" name="/" dev="vda" ino=2 [ 4410.136271][ T29] audit: type=1400 audit(4409.960:1745752): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=3085 comm="udevd" path="/sys/devices/virtual/block/loop0/mq/0/cpu1" dev="sysfs" ino=171124 [ 4410.160884][ T29] audit: type=1400 audit(4409.960:1745753): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="/" dev="vda" ino=2 [ 4410.162589][ T29] audit: type=1400 audit(4409.960:1745754): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="/" dev="sysfs" ino=1 [ 4410.164845][ T29] audit: type=1400 audit(4409.960:1745755): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="devices" dev="sysfs" ino=4 [ 4410.166817][ T29] audit: type=1400 audit(4409.960:1745756): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="virtual" dev="sysfs" ino=810 [ 4410.188523][ T1288] audit: audit_backlog=65 > audit_backlog_limit=64 [ 4410.189041][ T3085] audit: audit_backlog=66 > audit_backlog_limit=64 [ 4410.189232][ T3085] audit: audit_lost=58363 audit_rate_limit=0 audit_backlog_limit=64 [ 4410.189776][ T1288] audit: audit_lost=58364 audit_rate_limit=0 audit_backlog_limit=64 [ 4415.138444][ T29] kauditd_printk_skb: 4262 callbacks suppressed [ 4415.138609][ T29] audit: type=1400 audit(4414.950:1748215): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=1305 comm="kworker/u8:1" name="modprobe" dev="vda" ino=1462 [ 4415.140906][ T29] audit: type=1400 audit(4414.950:1748216): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=1305 comm="kworker/u8:1" path="/sbin/modprobe" dev="vda" ino=1462 [ 4415.142454][ T29] audit: type=1400 audit(4414.950:1748217): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=1301 comm="modprobe" name="/" dev="vda" ino=2 [ 4415.143910][ T29] audit: type=1400 audit(4414.950:1748218): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=1301 comm="modprobe" name="lib" dev="vda" ino=195 [ 4415.145307][ T29] audit: type=1400 audit(4414.960:1748220): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="/" dev="tmpfs" ino=1 [ 4415.146485][ T29] audit: type=1400 audit(4414.960:1748221): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="udev" dev="tmpfs" ino=7 [ 4415.198332][ T29] audit: type=1400 audit(4414.960:1748223): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="watch" dev="tmpfs" ino=36 [ 4415.199973][ T29] audit: type=1400 audit(4414.960:1748222): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=1305 comm="kworker/u8:1" name="/" dev="vda" ino=2 [ 4415.201735][ T29] audit: type=1400 audit(4414.960:1748225): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="/" dev="vda" ino=2 [ 4415.203658][ T29] audit: type=1400 audit(4414.960:1748226): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3085 comm="udevd" name="/" dev="sysfs" ino=1 [ 4416.035767][ T1308] Unable to handle kernel paging request at virtual address 0000316e61637870 [ 4416.036385][ T1308] Mem abort info: SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 4416.093466][ T1308] ESR = 0x0000000096000004 [ 4416.094623][ T1308] EC = 0x25: DABT (current EL), IL = 32 bits [ 4416.095908][ T1308] SET = 0, FnV = 0 [ 4416.096996][ T1308] EA = 0, S1PTW = 0 [ 4416.101157][ T1308] FSC = 0x04: level 0 translation fault [ 4416.101800][ T1308] Data abort info: [ 4416.102305][ T1308] ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000 [ 4416.103041][ T1308] CM = 0, WnR = 0, TnD = 0, TagAccess = 0 [ 4416.103768][ T1308] GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0 [ 4416.104653][ T1308] user pgtable: 4k pages, 52-bit VAs, pgdp=0000000046138400 [ 4416.105518][ T1308] [0000316e61637870] pgd=08000000830af003, p4d=0000000000000000 [ 4416.107626][ T1308] Internal error: Oops: 0000000096000004 [#1] PREEMPT SMP [ 4416.108807][ T1308] Modules linked in: [ 4416.110384][ T1308] CPU: 0 UID: 0 PID: 1308 Comm: syz.1.8017 Tainted: G B 6.11.0-syzkaller-08833-gde5cb0dcb74c #0 [ 4416.112693][ T1308] Tainted: [B]=BAD_PAGE [ 4416.113783][ T1308] Hardware name: linux,dummy-virt (DT) [ 4416.115125][ T1308] pstate: 21400009 (nzCv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--) [ 4416.116861][ T1308] pc : __pi_strlen+0x124/0x150 [ 4416.117955][ T1308] lr : audit_log_untrustedstring+0x20/0x40 [ 4416.118957][ T1308] sp : ffff8000837c3c00 [ 4416.120160][ T1308] x29: ffff8000837c3c00 x28: f8f0000021348000 x27: 0000000000000000 [ 4416.121495][ T1308] x26: 0000000000000000 x25: 0000000000000000 x24: fbf00000092f3940 [ 4416.122954][ T1308] x23: 00000000fffffff3 x22: 0000000000000000 x21: ffff80008051ca88 [ 4416.124203][ T1308] x20: fcf0000003042f20 x19: 0000316e61637876 x18: ffffffffffffffff [ 4416.125493][ T1308] x17: ffff800080027db0 x16: ffff8000804f4360 x15: ffff8000837c39e0 [ 4416.126767][ T1308] x14: 0000000000000000 x13: fdf000002c1ce01f x12: ffff800080027eb8 [ 4416.128286][ T1308] x11: ffff800080011558 x10: 000000000000005f x9 : 00000000001aaef4 [ 4416.130189][ T1308] x8 : 0101010101010101 x7 : 00000000000006c0 x6 : 000000000000005f [ 4416.132268][ T1308] x5 : fdf000002c1ce05f x4 : 0000000000000006 x3 : 0000000000000067 [ 4416.134372][ T1308] x2 : 0000000000000000 x1 : 0000316e61637870 x0 : 0000316e61637876 [ 4416.136723][ T1308] Call trace: [ 4416.137492][ T1308] __pi_strlen+0x124/0x150 [ 4416.138644][ T1308] smack_log_callback+0x7c/0xc8 [ 4416.139842][ T1308] common_lsm_audit+0x5c/0x85c [ 4416.140831][ T1308] smack_log+0xec/0x140 [ 4416.141520][ T1308] smk_access+0x104/0x148 [ 4416.142228][ T1308] smack_watch_key+0xe0/0xf8 [ 4416.142940][ T1308] security_watch_key+0x58/0x148 [ 4416.143642][ T1308] keyctl_watch_key+0xb0/0x1cc [ 4416.144383][ T1308] __arm64_sys_keyctl+0x50/0x290 [ 4416.145161][ T1308] invoke_syscall+0x48/0x110 [ 4416.145991][ T1308] el0_svc_common.constprop.0+0x40/0xe0 [ 4416.147037][ T1308] do_el0_svc+0x1c/0x28 [ 4416.148047][ T1308] el0_svc+0x34/0xec [ 4416.149294][ T1308] el0t_64_sync_handler+0x100/0x12c [ 4416.150727][ T1308] el0t_64_sync+0x19c/0x1a0 [ 4416.152202][ T1308] Code: fa4008a0 54fffde0 17ffffe6 927cec01 (a9400c22) [ 4416.153474][ T1308] ---[ end trace 0000000000000000 ]--- [ 4416.154501][ T1308] Kernel panic - not syncing: Oops: Fatal exception [ 4416.155352][ T1308] SMP: stopping secondary CPUs [ 4416.156426][ T1308] Kernel Offset: disabled [ 4416.157624][ T1308] CPU features: 0x00,0000000d,1e2f797c,1767f6bf [ 4416.159831][ T1308] Memory Limit: none [ 4416.161348][ T1308] Rebooting in 86400 seconds.. VM DIAGNOSIS: 08:15:46 Registers: info registers vcpu 0 CPU#0 PC=ffff800081a3590c X00=ffff800081a35908 X01=0000000000000000 X02=0000000000000001 X03=0000000000000003 X04=0000000000000000 X05=f1f0000003400000 X06=0000000000000000 X07=0000000000000000 X08=f1f0000003400028 X09=ffff80008274a4a8 X10=ffff80008274a4b0 X11=0000000000000040 X12=0000000000000001 X13=0000000000000001 X14=0000000000000246 X15=ffff8000837c3380 X16=736572646461206c X17=3133303030302073 X18=ffffffffffffffff X19=ffff800082830108 X20=ffff800082830100 X21=0000000000000000 X22=0000000000000006 X23=ffff800082830108 X24=0000000000000028 X25=fff000007f8d57c0 X26=fff000007f8d5180 X27=ffff8000827179c0 X28=ffff800082b43d08 X29=ffff800082b43ad0 X30=ffff800081a35108 SP=ffff800082b43ad0 PSTATE=404000c9 -Z-- EL2h SVCR=00000000 -- BTYPE=0 FPCR=00000000 FPSR=00000000 P00=0000000000000000 P01=0000000000000000 P02=0000000000000000 P03=0000000000000000 P04=0000000000000000 P05=0000000000000000 P06=0000000000000000 P07=0000000000000000 P08=0000000000000000 P09=0000000000000000 P10=0000000000000000 P11=0000000000000000 P12=0000000000000000 P13=0000000000000000 P14=0000000000000000 P15=0000000000000000 FFR=0000000000000000 Z00=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0200000000000000:0200000000000000 Z01=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000200000000:0000000000000000 Z02=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000002:0000000000000000 Z03=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:00d000a800000000:0000000000000000 Z04=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000002 Z05=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000002:0000000000000002 Z06=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:6edc4d3a2914b135:d8e9c869e2695c88 Z07=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:b20fae707afde253:388e9c6c4fa85ca0 Z08=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z09=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z10=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z11=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z12=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z13=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z14=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z15=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z16=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000ffffd023a6a0:0000ffffd023a6a0 Z17=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:ffffff80ffffffd0:0000ffffd023a670 Z18=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z19=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z20=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z21=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z22=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z23=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z24=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z25=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z26=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z27=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z28=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z29=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z30=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z31=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff8000806b3bc8 X00=ffff8000828567c0 X01=0000000000000001 X02=000ffffffffffffe X03=0000000000000000 X04=0000000000400040 X05=0000000000400040 X06=0000ffffe5a6cec0 X07=0000000000000000 X08=0000000000000000 X09=0000000000000000 X10=0000000000000000 X11=0000000000000000 X12=0000000000000000 X13=0000000000000000 X14=0000000000000000 X15=fbf0000009143090 X16=000000005a544e01 X17=0000000054504902 X18=00000000504f4530 X19=ffff800083743eb0 X20=0000000000000000 X21=0000000000000021 X22=0000000000000000 X23=0000000000000000 X24=0000ffffe5a6ca60 X25=0000ffffe5a6cae0 X26=0000ffffe5a6cec0 X27=0000000000000000 X28=fbf0000009142480 X29=ffff800083743ce0 X30=ffff8000806b3c04 SP=ffff800083743ce0 PSTATE=81400009 N--- EL2h SVCR=00000000 -- BTYPE=0 FPCR=00000000 FPSR=00000000 P00=0000000000000000 P01=0000000000000000 P02=0000000000000000 P03=0000000000000000 P04=0000000000000000 P05=0000000000000000 P06=0000000000000000 P07=0000000000000000 P08=0000000000000000 P09=0000000000000000 P10=0000000000000000 P11=0000000000000000 P12=0000000000000000 P13=0000000000000000 P14=0000000000000000 P15=0000000000000000 FFR=0000000000000000 Z00=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z01=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000ffffbb8d6418:0000ffffbb8d6430 Z02=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000ffffbb8d6428:0000ffffbb8d6470 Z03=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000ffffbc43ca20:0000ffffbb8d6410 Z04=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000ffffbb8d6448:0000ffffbb8d6420 Z05=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000ffffbb8d6458:0000ffffbb8d6450 Z06=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000ffffbb8d6458:0000ffffbb8d6450 Z07=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000ffffbb8d6468:0000ffffbb8d6460 Z08=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z09=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z10=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z11=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z12=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z13=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z14=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z15=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z16=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000ffffe5a6ded0:0000ffffe5a6ded0 Z17=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:ffffff80ffffffd0:0000ffffe5a6dea0 Z18=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z19=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z20=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z21=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z22=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z23=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z24=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z25=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z26=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z27=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z28=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z29=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z30=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z31=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000