last executing test programs: 4.110966963s ago: executing program 0 (id=11766): r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDENABIO(r0, 0x4b36) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) 3.864018755s ago: executing program 0 (id=11768): r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000001080), 0x2002, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000040)={0x1, 0xf}, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.io_service_bytes\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000240), 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x280000b, 0x28011, r1, 0x2000) getrandom(&(0x7f0000000240)=""/286, 0xffffff9a, 0x0) 3.143700789s ago: executing program 1 (id=11771): openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000040)) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, 0x0, 0x0) r0 = landlock_create_ruleset(&(0x7f0000000040)={0x0, 0x3}, 0x10, 0x0) landlock_restrict_self(r0, 0x0) 2.996350003s ago: executing program 1 (id=11772): socketpair$unix(0x1, 0x0, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r0 = mq_open(&(0x7f0000000080)='eth0\x00#\x13\xaeu\xe0\xfbu0*\xf3\x11i\xdd\xd9\xc6\x87\xde\xbf_\xa0\xf6\xdfk\xbf.\"\xa6\xc0#p\xcd\x1c/\xa6\xf2\xbcyL\x85a\xb5\xbb~+>\xbc\x93\xf8\xab\x9a3\x85l\x1d\x15\x11\x1a{@!2\xb6!\xae\xf79k\x90\x88\v8I$\xfdQ\x1d\x90=r\xd8\xc0\xd8\t/\x8dv\xb8\x93\xc3C\xae\x9dc\xd1T\xdd\x14\xd3\xe1\xbe_$A=z\xee\xbd/X\xbemOX)s\x94\xde\xbe_\v\x01\xbe\xeb\xbb\x91\x11z\xc2|d\x1b\x04\xd2\xf9yx\xb2\x1b\bLTrw\x88\x9e0\t\xc6\xe2\x9c\xed\\\xd8[\xc8\x04 \xf3\xac]V\x1d:\xfc\xc3\x9e\x02\ax\xef\xfe\x1c.TT\xcf\xbf\xf5\x80a%\xdcQ\xb3CuT\xcc7\x8avs\xb2\a\xfe\xb3j*\xad\x18I\xcc\xe9\xaa{]\xef\xb7\xf2\xee*\xf95\bJt\xd0s\xc4\xaa\xc8\x13~\xb2\xf20\xbdf\xdb\xaeG\xe3\xfb\xef\x94\xef:Q\x1b\xe3\xa3\xa4}\xef`e\xcdL\xab\xdb\r\xf2y\x9fg1\xf4\t\x18i/!\x13\xf1,\x8cu\xaa\xbf~)\x94\x1b2\x93\x86\xe7\x9a\xf2j\xa8\x96\xa6\xa2\xfcN\x81\xafTh\xb3\x1bo:\xe8\vq7S\xe4H\xf3L\xa0\x9c\x97B\x12\x10\x9d\xaa\x7fq\x06\xb9(\xf6\x1c\x83\xb1J\xec\x926\xb5a0\xa0B\xae|', 0x42, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mq_timedsend(r0, 0x0, 0x0, 0x0, 0x0) 2.726699417s ago: executing program 1 (id=11773): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) close(r0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="8fedcb5d07081196f37538e486dd6372ce22667f2c"], 0xfdef) 2.441037252s ago: executing program 1 (id=11774): syz_open_pts(0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 2.185461865s ago: executing program 1 (id=11775): r0 = socket(0x2a, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=@newqdisc={0x24}, 0x24}}, 0x0) getsockname$packet(r0, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000540)=@newqdisc={0x2c, 0x24, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_drr={0x8}]}, 0x2c}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000006940)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {}, {0x2}}, [@filter_kind_options=@f_flow={{0x9}, {0x8, 0x2, [@TCA_FLOW_ACT={0x4}]}}]}, 0x38}}, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r2, &(0x7f00000002c0), 0x40000000000009f, 0x0) 1.481300798s ago: executing program 1 (id=11776): prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f00000000c0)={0x0, 0x0}) r0 = openat$smackfs_cipsonum(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x40, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000013c0)={0x18, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000000)='syzkaller\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='contention_end\x00', r5}, 0x10) ioctl$KVM_SET_IRQCHIP(r4, 0xc048aec8, &(0x7f0000000080)={0x2, 0x0, @ioapic}) read$FUSE(r2, &(0x7f0000006200)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r2, &(0x7f0000000040)={0x50, 0x0, r6, {0x7, 0x1f, 0x0, 0x2808b08}}, 0x50) syz_fuse_handle_req(r2, &(0x7f0000004200)="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", 0x2000, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)={0x20}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r7 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='./file0\x00', 0x4001, 0x0) writev(r7, &(0x7f0000000000)=[{&(0x7f0000000cc0)="e1", 0x56000}], 0x2) r8 = dup3(r1, r2, 0x0) r9 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040), 0x2) r10 = socket$can_j1939(0x1d, 0x2, 0x7) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r8, 0x84, 0xc, &(0x7f00000002c0), &(0x7f0000000340)=0x4) r11 = dup3(r10, r9, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r11, 0x8933, &(0x7f0000000180)={'vxcan1\x00'}) bind$can_j1939(r11, &(0x7f0000000240)={0x1d, 0x0, 0x100000000000, {0x0, 0x1}, 0xff}, 0x18) r12 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r13) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000380)="bf", 0x1}], 0x1) madvise(&(0x7f0000095000/0x1000)=nil, 0x1000, 0xb) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) futex(&(0x7f000000cffc), 0x5, 0x0, 0x0, 0x0, 0x0) 1.062678685s ago: executing program 0 (id=11777): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0xe4}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) sendmmsg$inet(r0, &(0x7f0000002440)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f0000000a40)="0036d551863e1902129da79f5986e05288f50e5398660c1a29b0f45c0cc36902e0251c8d34197b357b32b161f9ad72d55a0eab976aae24ed805271b43f0ce2fea5e764494873e0d82a172b3bb54f59b458fd35039c7d81e9ab07f2fb4dad61bd500a119b54c74a12e4569e47b69a95f92c6380af2bd003fa56f06a23bbd1c76d7756", 0x82}, {&(0x7f0000000f00)="f5e022a4d2ed0cf5f8b2e9857cb9af98da7aa60f7a1582aadeaef336f9139f6768452f868624c7e6ce0948f33f1a63e0fcf0f2df283b3ca3f1f4de26a8b575ccb465985e48f65b9a7fcc93c0a5be8b16774f7c7c", 0x54}], 0x2}}, {{0x0, 0x0, &(0x7f0000000c80)=[{&(0x7f0000001080)="63c3b174ab06077f6ee67ac1310d86586b13d2c9e203a9da866b81e20e9fe5c43219396d489c1459ce9cd14fa3b43a0b9b6004118a35444790d70af5c873561aad55af7f9f8551103f694e2a22346ca675898ce02a665ecc07e153e3949b954c1d74b105c14411925a8ae24778d4111d2d9743b682d653bcf35d53fd33489a3a405042c0de5ec2cb4b991a31e1d76db8609d0bf66d8d723a6c28a50d42ab169de383345fbee97bea33e8bfb5d705852d360ab703fc956c1ea86157aedcff00cffb32f7237d33d65762a885bd02b86eb1fdf96dafa2ea0bdc3776c6f3", 0xdc}], 0x1}}], 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xdfa, 0x4) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x20c8, 0x11, 0x0, 0x27) 572.440029ms ago: executing program 0 (id=11778): r0 = socket$unix(0x1, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vxcan1\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000200)={&(0x7f0000000340)={0x1d, r1, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="01000000d7ec"], 0x20000600}}, 0x0) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="0401020028000b05d25a806f8c6394f90524fc600d00030009000100ff3582c137153e370248018010001700d1bd", 0x33fe0}], 0x1}, 0x0) 262.291626ms ago: executing program 0 (id=11779): r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc0405519, &(0x7f0000000080)={{0x7, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 0s ago: executing program 0 (id=11780): r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x3, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000004000000000000000000190095"], &(0x7f00000001c0)='syzkaller\x00'}, 0x90) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000001840)={r0, r2, 0x25, 0x0, @val=@netfilter}, 0x40) syz_emit_ethernet(0x1e, &(0x7f00000003c0)={@empty, @remote, @val, {@llc={0x4, {@snap={0x0, 0x0, "ce", "9662ed"}}}}}, 0x0) kernel console output (not intermixed with test programs): 30618][ T29] audit: type=1400 audit(134223206.098:610718): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3000 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 [ 5478.332421][ T29] audit: type=1400 audit(134223206.098:610719): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=3000 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 [ 5478.733413][ T29] audit: type=1400 audit(134223206.508:610720): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32530 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 5483.416805][ T29] kauditd_printk_skb: 1170 callbacks suppressed [ 5483.416997][ T29] audit: type=1400 audit(134223211.188:611889): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32530 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 5483.432562][ T29] audit: type=1400 audit(134223211.188:611890): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3190 comm="syz-executor" saddr=127.0.0.1 src=42428 daddr=127.0.0.1 dest=30006 netif=lo [ 5483.435035][ T29] audit: type=1400 audit(134223211.198:611891): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32530 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 5483.451367][ T3000] audit: audit_backlog=65 > audit_backlog_limit=64 [ 5483.451583][T32530] audit: audit_backlog=65 > audit_backlog_limit=64 [ 5483.452231][ T3000] audit: audit_lost=804 audit_rate_limit=0 audit_backlog_limit=64 [ 5483.452538][T32530] audit: audit_lost=805 audit_rate_limit=0 audit_backlog_limit=64 [ 5483.453221][ T3000] audit: backlog limit exceeded [ 5483.453624][T32530] audit: backlog limit exceeded [ 5483.455035][T32530] audit: audit_backlog=65 > audit_backlog_limit=64 [ 5488.534792][ T29] kauditd_printk_skb: 1915 callbacks suppressed [ 5488.534970][ T29] audit: type=1400 audit(134223216.308:613802): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3818 comm="syz.0.11270" name="532" dev="tmpfs" ino=2864 [ 5488.538993][ T29] audit: type=1400 audit(134223216.308:613803): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3818 comm="syz.0.11270" name="532" dev="tmpfs" ino=2864 [ 5488.541052][ T29] audit: type=1400 audit(134223216.308:613804): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=3818 comm="syz.0.11270" name="532" dev="tmpfs" ino=2864 [ 5488.543011][ T29] audit: type=1400 audit(134223216.318:613805): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3818 comm="syz.0.11270" path="/532/file0" dev="tmpfs" ino=2870 [ 5488.548477][ T29] audit: type=1400 audit(134223216.328:613806): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="/" dev="vda" ino=2 [ 5488.550308][ T29] audit: type=1400 audit(134223216.328:613807): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="var" dev="vda" ino=1718 [ 5488.552051][ T29] audit: type=1400 audit(134223216.328:613808): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="var" dev="vda" ino=1718 [ 5488.553943][ T29] audit: type=1400 audit(134223216.328:613809): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="/" dev="vda" ino=2 [ 5488.555053][ T29] audit: type=1400 audit(134223216.328:613810): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 5488.556806][ T29] audit: type=1400 audit(134223216.328:613811): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3000 comm="syslogd" name="messages" dev="tmpfs" ino=15 [ 5493.541431][ T29] kauditd_printk_skb: 754 callbacks suppressed [ 5493.541584][ T29] audit: type=1400 audit(134223221.318:614566): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3835 comm="udevd" path="/proc/3835/oom_score_adj" dev="proc" ino=121296 [ 5493.557896][ T29] audit: type=1400 audit(134223221.328:614567): lsm=SMACK fn=smack_inode_setattr action=granted subject="_" object="_" requested=w pid=3835 comm="udevd" name="oom_score_adj" dev="proc" ino=121296 [ 5493.560443][ T29] audit: type=1400 audit(134223221.328:614568): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=3835 comm="udevd" path="/proc/3835/oom_score_adj" dev="proc" ino=121296 [ 5493.588471][ T29] audit: type=1400 audit(134223221.358:614569): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3835 comm="udevd" name="/" dev="vda" ino=2 [ 5493.607710][ T29] audit: type=1400 audit(134223221.368:614570): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3835 comm="udevd" name="/" dev="sysfs" ino=1 [ 5493.609929][ T29] audit: type=1400 audit(134223221.368:614571): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3835 comm="udevd" name="devices" dev="sysfs" ino=4 [ 5493.621068][ T29] audit: type=1400 audit(134223221.368:614572): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3835 comm="udevd" name="virtual" dev="sysfs" ino=809 [ 5493.623415][ T29] audit: type=1400 audit(134223221.368:614573): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3835 comm="udevd" name="bdi" dev="sysfs" ino=11428 [ 5493.646691][ T29] audit: type=1400 audit(134223221.378:614575): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="/" dev="vda" ino=2 [ 5493.647843][ T29] audit: type=1400 audit(134223221.378:614576): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="var" dev="vda" ino=1718 [ 5498.547393][ T29] kauditd_printk_skb: 2595 callbacks suppressed [ 5498.547570][ T29] audit: type=1400 audit(134223226.318:617171): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3865 comm="modprobe" name="/" dev="vda" ino=2 [ 5498.552781][ T29] audit: type=1400 audit(134223226.328:617172): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3865 comm="modprobe" name="/" dev="vda" ino=2 [ 5498.567757][ T29] audit: type=1400 audit(134223226.328:617173): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3865 comm="modprobe" name="lib" dev="vda" ino=195 [ 5498.570110][ T29] audit: type=1400 audit(134223226.338:617174): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3865 comm="modprobe" name="/" dev="vda" ino=2 [ 5498.572031][ T29] audit: type=1400 audit(134223226.338:617175): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3865 comm="modprobe" name="usr" dev="vda" ino=1488 [ 5498.574113][ T29] audit: type=1400 audit(134223226.338:617176): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3865 comm="modprobe" name="usr" dev="vda" ino=1488 [ 5498.587605][ T29] audit: type=1400 audit(134223226.338:617177): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3865 comm="modprobe" name="lib" dev="vda" ino=1622 [ 5498.589742][ T29] audit: type=1400 audit(134223226.338:617178): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3865 comm="modprobe" name="lib" dev="vda" ino=1622 [ 5498.592043][ T29] audit: type=1400 audit(134223226.338:617179): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=3865 comm="modprobe" name="libpcre2-8.so.0.11.0" dev="vda" ino=1631 [ 5498.594462][ T29] audit: type=1400 audit(134223226.338:617180): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3865 comm="modprobe" path="/usr/lib/libpcre2-8.so.0.11.0" dev="vda" ino=1631 [ 5502.721258][ T3886] fuse: Bad value for 'fd' [ 5503.579032][ T29] kauditd_printk_skb: 1627 callbacks suppressed [ 5503.579182][ T29] audit: type=1400 audit(134223231.358:618808): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32530 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 5503.582888][ T29] audit: type=1400 audit(134223231.358:618809): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3190 comm="syz-executor" saddr=127.0.0.1 src=42428 daddr=127.0.0.1 dest=30006 netif=lo [ 5503.598304][ T29] audit: type=1400 audit(134223231.368:618810): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32530 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 5503.600418][ T29] audit: type=1400 audit(134223231.368:618811): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32530 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 5503.604882][ T29] audit: type=1400 audit(134223231.368:618812): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32530 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 5503.613878][ T29] audit: type=1400 audit(134223231.368:618813): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="/" dev="vda" ino=2 [ 5503.620438][ T29] audit: type=1400 audit(134223231.368:618814): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=32530 comm="syz-executor" name="539" dev="tmpfs" ino=2905 [ 5503.622499][ T29] audit: type=1400 audit(134223231.368:618815): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="var" dev="vda" ino=1718 [ 5503.624219][ T29] audit: type=1400 audit(134223231.368:618816): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=32530 comm="syz-executor" path="/539" dev="tmpfs" ino=2905 [ 5503.638101][ T29] audit: type=1400 audit(134223231.368:618817): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="var" dev="vda" ino=1718 [ 5508.587450][ T29] kauditd_printk_skb: 2813 callbacks suppressed [ 5508.587644][ T29] audit: type=1400 audit(134223236.358:621631): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3939 comm="modprobe" path="/lib/libresolv.so.2" dev="vda" ino=379 [ 5508.595792][ T29] audit: type=1400 audit(134223236.368:621632): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=3939 comm="modprobe" path="/lib/libresolv.so.2" dev="vda" ino=379 [ 5508.617651][ T29] audit: type=1400 audit(134223236.368:621633): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3939 comm="modprobe" name="/" dev="vda" ino=2 [ 5508.620577][ T29] audit: type=1400 audit(134223236.378:621634): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3939 comm="modprobe" name="/" dev="vda" ino=2 [ 5508.622642][ T29] audit: type=1400 audit(134223236.378:621635): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3939 comm="modprobe" name="lib" dev="vda" ino=195 [ 5508.624570][ T29] audit: type=1400 audit(134223236.378:621636): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3939 comm="modprobe" name="/" dev="vda" ino=2 [ 5508.654637][ T29] audit: type=1400 audit(134223236.378:621637): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3939 comm="modprobe" name="usr" dev="vda" ino=1488 [ 5508.659639][ T3939] audit: audit_backlog=65 > audit_backlog_limit=64 [ 5508.661097][ T3939] audit: audit_lost=808 audit_rate_limit=0 audit_backlog_limit=64 [ 5508.662498][ T3939] audit: backlog limit exceeded [ 5513.597700][ T29] kauditd_printk_skb: 2120 callbacks suppressed [ 5513.597911][ T29] audit: type=1400 audit(134223241.368:623749): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3966 comm="modprobe" name="lib" dev="vda" ino=195 [ 5513.602957][ T29] audit: type=1400 audit(134223241.368:623750): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3966 comm="modprobe" name="/" dev="vda" ino=2 [ 5513.605581][ T29] audit: type=1400 audit(134223241.368:623751): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3966 comm="modprobe" name="/" dev="vda" ino=2 [ 5513.627544][ T29] audit: type=1400 audit(134223241.368:623752): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3966 comm="modprobe" name="lib" dev="vda" ino=195 [ 5513.629341][ T29] audit: type=1400 audit(134223241.368:623753): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3966 comm="modprobe" name="/" dev="vda" ino=2 [ 5513.631393][ T29] audit: type=1400 audit(134223241.368:623754): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3966 comm="modprobe" name="/" dev="vda" ino=2 [ 5513.633691][ T29] audit: type=1400 audit(134223241.368:623755): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3966 comm="modprobe" name="lib" dev="vda" ino=195 [ 5513.635603][ T29] audit: type=1400 audit(134223241.368:623756): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3966 comm="modprobe" name="/" dev="vda" ino=2 [ 5513.651187][ T29] audit: type=1400 audit(134223241.368:623757): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3966 comm="modprobe" name="/" dev="vda" ino=2 [ 5513.653342][ T29] audit: type=1400 audit(134223241.388:623758): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3966 comm="modprobe" name="lib" dev="vda" ino=195 [ 5518.609192][ T29] kauditd_printk_skb: 1658 callbacks suppressed [ 5518.609359][ T29] audit: type=1400 audit(134223246.378:625417): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3991 comm="syz.1.11320" name="ns" dev="proc" ino=122167 [ 5518.617144][ T29] audit: type=1400 audit(134223246.388:625418): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=3991 comm="syz.1.11320" dev="nsfs" ino=4026532762 [ 5518.618183][ T29] audit: type=1400 audit(134223246.388:625419): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3991 comm="syz.1.11320" path="net:[4026532762]" dev="nsfs" ino=4026532762 [ 5518.624478][ T29] audit: type=1400 audit(134223246.398:625421): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3991 comm="syz.1.11320" name="newroot" dev="tmpfs" ino=2 [ 5518.625674][ T29] audit: type=1400 audit(134223246.398:625420): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="/" dev="vda" ino=2 [ 5518.628225][ T29] audit: type=1400 audit(134223246.398:625422): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3991 comm="syz.1.11320" name="/" dev="devtmpfs" ino=1 [ 5518.629719][ T29] audit: type=1400 audit(134223246.398:625423): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="var" dev="vda" ino=1718 [ 5518.631057][ T29] audit: type=1400 audit(134223246.398:625424): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=3991 comm="syz.1.11320" name="full" dev="devtmpfs" ino=7 [ 5518.632879][ T29] audit: type=1400 audit(134223246.398:625425): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3991 comm="syz.1.11320" path="/dev/full" dev="devtmpfs" ino=7 [ 5518.634737][ T29] audit: type=1400 audit(134223246.398:625426): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="var" dev="vda" ino=1718 [ 5521.900840][ T4004] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 5521.903660][ T4004] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 5523.620794][ T29] kauditd_printk_skb: 1471 callbacks suppressed [ 5523.621244][ T29] audit: type=1400 audit(134223251.398:626898): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=4014 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 5523.622940][ T29] audit: type=1400 audit(134223251.398:626899): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=4014 comm="syz-executor" name="/" dev="proc" ino=1 [ 5523.623995][ T29] audit: type=1400 audit(134223251.398:626900): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=4014 comm="syz-executor" name="/" dev="proc" ino=1 [ 5523.630653][ T29] audit: type=1400 audit(134223251.398:626901): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=4014 comm="syz-executor" name="315" dev="proc" ino=122214 [ 5523.635578][ T29] audit: type=1400 audit(134223251.398:626902): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=w pid=4014 comm="syz-executor" name="oom_score_adj" dev="proc" ino=122215 [ 5523.653279][ T29] audit: type=1400 audit(134223251.398:626903): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=4014 comm="syz-executor" path="/proc/315/oom_score_adj" dev="proc" ino=122215 [ 5523.655350][ T29] audit: type=1400 audit(134223251.408:626904): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=4014 comm="syz-executor" name="111" dev="tmpfs" ino=606 [ 5523.672571][ T29] audit: type=1400 audit(134223251.408:626905): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=4014 comm="syz-executor" name="111" dev="tmpfs" ino=606 [ 5523.677093][ T29] audit: type=1400 audit(134223251.408:626906): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=4014 comm="syz-executor" name="111" dev="tmpfs" ino=606 [ 5523.680071][ T29] audit: type=1400 audit(134223251.418:626907): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="/" dev="vda" ino=2 [ 5524.660910][ T4021] serio: Serial port pts0 [ 5528.714415][ T29] kauditd_printk_skb: 682 callbacks suppressed [ 5528.714578][ T29] audit: type=1400 audit(134223256.488:627590): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3124 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 5528.720850][ T29] audit: type=1400 audit(134223256.488:627591): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3124 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 5528.723059][ T29] audit: type=1400 audit(134223256.488:627592): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3124 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 5528.724875][ T29] audit: type=1400 audit(134223256.488:627593): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3190 comm="syz-executor" saddr=127.0.0.1 src=42428 daddr=127.0.0.1 dest=30006 netif=lo [ 5528.734747][ T29] audit: type=1400 audit(134223256.488:627594): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3124 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 5528.757969][ T29] audit: type=1400 audit(134223256.488:627595): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=3124 comm="syz-executor" name="112" dev="tmpfs" ino=611 [ 5528.760043][ T29] audit: type=1400 audit(134223256.498:627597): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3188 comm="sshd" saddr=10.0.2.2 src=40222 daddr=10.0.2.15 dest=22 netif=eth0 [ 5528.762274][ T29] audit: type=1400 audit(134223256.488:627596): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3124 comm="syz-executor" path="/112" dev="tmpfs" ino=611 [ 5528.765135][ T29] audit: type=1400 audit(134223256.508:627598): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=3124 comm="syz-executor" path="/112" dev="tmpfs" ino=611 [ 5528.781255][ T29] audit: type=1400 audit(134223256.508:627599): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3124 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 5533.179636][ T4050] serio: Serial port pts0 [ 5533.717765][ T29] kauditd_printk_skb: 1965 callbacks suppressed [ 5533.717898][ T29] audit: type=1400 audit(134223261.498:629565): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=4056 comm="syz.0.11339" name="tun" dev="devtmpfs" ino=690 [ 5533.719196][ T29] audit: type=1400 audit(134223261.498:629566): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=4056 comm="syz.0.11339" path="/dev/net/tun" dev="devtmpfs" ino=690 [ 5533.733917][ T29] audit: type=1400 audit(134223261.508:629567): lsm=SMACK fn=smack_file_ioctl action=granted subject="_" object="*" requested=w pid=4056 comm="syz.0.11339" path="socket:[122293]" dev="sockfs" ino=122293 [ 5533.736159][ T29] audit: type=1400 audit(134223261.508:629568): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="/" dev="vda" ino=2 [ 5533.739277][ T29] audit: type=1400 audit(134223261.508:629569): lsm=SMACK fn=smack_file_ioctl action=granted subject="_" object="*" requested=r pid=4056 comm="syz.0.11339" path="socket:[122293]" dev="sockfs" ino=122293 [ 5533.740344][ T29] audit: type=1400 audit(134223261.508:629570): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="var" dev="vda" ino=1718 [ 5533.741291][ T29] audit: type=1400 audit(134223261.508:629571): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="var" dev="vda" ino=1718 [ 5533.742329][ T29] audit: type=1400 audit(134223261.508:629572): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="/" dev="vda" ino=2 [ 5533.743318][ T29] audit: type=1400 audit(134223261.508:629573): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 5533.744569][ T29] audit: type=1400 audit(134223261.508:629574): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3000 comm="syslogd" name="messages" dev="tmpfs" ino=15 [ 5537.404340][T31982] usb 1-1: new high-speed USB device number 89 using dummy_hcd [ 5538.743653][ T29] kauditd_printk_skb: 486 callbacks suppressed [ 5538.751639][ T29] audit: type=1400 audit(134223266.448:630061): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="/" dev="vda" ino=2 [ 5538.782209][T31982] usb 1-1: Using ep0 maxpacket: 8 [ 5538.814734][ T29] audit: type=1400 audit(134223266.478:630062): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=4065 comm="syz.1.11342" name="/" dev="sysfs" ino=1 [ 5540.457327][ T29] audit: type=1400 audit(134223266.578:630064): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 5540.460225][ T29] audit: type=1400 audit(134223267.258:630065): lsm=SMACK fn=smack_file_ioctl action=granted subject="_" object="_" requested=w pid=4058 comm="syz.0.11340" path="/dev/raw-gadget" dev="devtmpfs" ino=703 [ 5540.462118][ T29] audit: type=1400 audit(134223267.628:630066): lsm=SMACK fn=smack_file_ioctl action=granted subject="_" object="_" requested=r pid=4058 comm="syz.0.11340" path="/dev/raw-gadget" dev="devtmpfs" ino=703 [ 5540.464739][ T29] audit: type=1400 audit(134223268.198:630067): lsm=SMACK fn=smack_file_ioctl action=granted subject="_" object="_" requested=w pid=4058 comm="syz.0.11340" path="/dev/raw-gadget" dev="devtmpfs" ino=703 [ 5540.465698][ T29] audit: type=1400 audit(134223268.198:630068): lsm=SMACK fn=smack_file_ioctl action=granted subject="_" object="_" requested=r pid=4058 comm="syz.0.11340" path="/dev/raw-gadget" dev="devtmpfs" ino=703 [ 5540.467607][T31982] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 5540.480048][T31982] usb 1-1: New USB device found, idVendor=05ac, idProduct=8501, bcdDevice=20.9d [ 5540.481256][T31982] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=105 [ 5540.482137][T31982] usb 1-1: SerialNumber: syz [ 5540.518206][ T29] audit: type=1400 audit(134223268.208:630069): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3000 comm="syslogd" name="messages" dev="tmpfs" ino=15 [ 5540.522142][ T29] audit: type=1400 audit(134223268.208:630070): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3000 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 [ 5540.523881][T31982] usb 1-1: config 0 descriptor?? [ 5540.523999][ T29] audit: type=1400 audit(134223268.208:630071): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=3000 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 [ 5543.999967][ T29] kauditd_printk_skb: 1131 callbacks suppressed [ 5544.000138][ T29] audit: type=1400 audit(134223271.778:631202): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=4079 comm="syz.1.11345" name="newroot" dev="tmpfs" ino=2 [ 5544.012393][ T29] audit: type=1400 audit(134223271.778:631203): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=4079 comm="syz.1.11345" name="/" dev="devtmpfs" ino=1 [ 5544.015476][ T29] audit: type=1400 audit(134223271.778:631204): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=4079 comm="syz.1.11345" name="zero" dev="devtmpfs" ino=6 [ 5544.037856][ T29] audit: type=1400 audit(134223271.778:631205): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=4079 comm="syz.1.11345" path="/dev/zero" dev="devtmpfs" ino=6 [ 5544.040764][ T29] audit: type=1400 audit(134223271.788:631206): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=4079 comm="syz.1.11345" name="newroot" dev="tmpfs" ino=2 [ 5544.044799][ T29] audit: type=1400 audit(134223271.798:631207): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=4079 comm="syz.1.11345" name="/" dev="devtmpfs" ino=1 [ 5544.045497][ T29] audit: type=1400 audit(134223271.798:631208): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=rw pid=4079 comm="syz.1.11345" name="fuse" dev="devtmpfs" ino=92 [ 5544.054311][ T29] audit: type=1400 audit(134223271.798:631209): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=4079 comm="syz.1.11345" path="/dev/fuse" dev="devtmpfs" ino=92 [ 5544.059775][ T29] audit: type=1400 audit(134223271.798:631210): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="/" dev="vda" ino=2 [ 5544.062832][ T29] audit: type=1400 audit(134223271.798:631211): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=4079 comm="syz.1.11345" name="122" dev="tmpfs" ino=664 [ 5549.067190][ T29] kauditd_printk_skb: 326 callbacks suppressed [ 5549.067325][ T29] audit: type=1400 audit(134223276.728:631538): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=32530 comm="syz-executor" opid=4058 ocomm="syz.0.11340" [ 5549.069904][ T29] audit: type=1400 audit(134223276.738:631539): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3015 comm="udevd" name="/" dev="vda" ino=2 [ 5549.071753][ T29] audit: type=1400 audit(134223276.738:631540): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3015 comm="udevd" name="etc" dev="vda" ino=95 [ 5549.073466][ T29] audit: type=1400 audit(134223276.738:631541): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3015 comm="udevd" name="udev" dev="vda" ino=191 [ 5549.075156][ T29] audit: type=1400 audit(134223276.738:631542): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=3015 comm="udevd" path="/etc/udev/rules.d" dev="vda" ino=193 [ 5549.124304][ T29] audit: type=1400 audit(134223276.748:631543): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3015 comm="udevd" name="/" dev="vda" ino=2 [ 5549.144186][ T29] audit: type=1400 audit(134223276.748:631544): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3015 comm="udevd" name="lib" dev="vda" ino=195 [ 5549.181618][ T4086] audit: audit_backlog=65 > audit_backlog_limit=64 [ 5549.182613][ T4086] audit: audit_lost=812 audit_rate_limit=0 audit_backlog_limit=64 [ 5549.183610][ T4086] audit: backlog limit exceeded [ 5549.325509][ T3329] usb 1-1: USB disconnect, device number 89 [ 5551.947661][ T4104] FAULT_INJECTION: forcing a failure. [ 5551.947661][ T4104] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 5551.949904][ T4104] CPU: 0 PID: 4104 Comm: syz.0.11353 Not tainted 6.10.0-rc7-syzkaller-00141-g43db1e03c086 #0 [ 5551.951405][ T4104] Hardware name: linux,dummy-virt (DT) [ 5551.952237][ T4104] Call trace: [ 5551.952818][ T4104] dump_backtrace+0x94/0xec [ 5551.953631][ T4104] show_stack+0x18/0x24 [ 5551.954380][ T4104] dump_stack_lvl+0x78/0x90 [ 5551.955110][ T4104] dump_stack+0x18/0x24 [ 5551.955915][ T4104] should_fail_ex+0x18c/0x1e0 [ 5551.957104][ T4104] should_fail+0x14/0x20 [ 5551.958043][ T4104] should_fail_usercopy+0x1c/0x28 [ 5551.959077][ T4104] copy_msghdr_from_user+0x48/0x110 [ 5551.960499][ T4104] ___sys_sendmsg+0x8c/0x100 [ 5551.961535][ T4104] __sys_sendmsg+0x84/0xe0 [ 5551.962352][ T4104] __arm64_sys_sendmsg+0x24/0x30 [ 5551.963374][ T4104] invoke_syscall+0x48/0x118 [ 5551.964279][ T4104] el0_svc_common.constprop.0+0x40/0xe0 [ 5551.965199][ T4104] do_el0_svc+0x1c/0x28 [ 5551.966171][ T4104] el0_svc+0x34/0xf8 [ 5551.967075][ T4104] el0t_64_sync_handler+0x100/0x12c [ 5551.968041][ T4104] el0t_64_sync+0x19c/0x1a0 [ 5554.115906][ T29] kauditd_printk_skb: 2021 callbacks suppressed [ 5554.121560][ T29] audit: type=1400 audit(134223281.888:633554): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=4118 comm="syz.0.11359" name="/" dev="fuse" ino=1 [ 5554.130106][ T29] audit: type=1400 audit(134223281.908:633555): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=4118 comm="syz.0.11359" name="/" dev="fuse" ino=1 [ 5554.132110][ T29] audit: type=1400 audit(134223281.908:633556): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="/" dev="vda" ino=2 [ 5554.134154][ T29] audit: type=1400 audit(134223281.908:633557): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="var" dev="vda" ino=1718 [ 5554.138687][ T29] audit: type=1400 audit(134223281.908:633558): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="var" dev="vda" ino=1718 [ 5554.141757][ T29] audit: type=1400 audit(134223281.908:633559): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="/" dev="vda" ino=2 [ 5554.143909][ T29] audit: type=1400 audit(134223281.908:633560): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 5554.156790][ T29] audit: type=1400 audit(134223281.928:633561): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3000 comm="syslogd" name="messages" dev="tmpfs" ino=15 [ 5554.161652][ T29] audit: type=1400 audit(134223281.928:633562): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3000 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 [ 5554.163731][ T29] audit: type=1400 audit(134223281.928:633563): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=3000 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 [ 5559.174471][ T29] kauditd_printk_skb: 1645 callbacks suppressed [ 5559.174647][ T29] audit: type=1400 audit(134223286.948:635209): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3124 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 5559.191759][ T29] audit: type=1400 audit(134223286.948:635210): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3190 comm="syz-executor" saddr=127.0.0.1 src=42428 daddr=127.0.0.1 dest=30006 netif=lo [ 5559.194015][ T29] audit: type=1400 audit(134223286.958:635211): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3124 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 5559.195677][ T29] audit: type=1400 audit(134223286.958:635212): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3124 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 5559.204735][ T29] audit: type=1400 audit(134223286.958:635213): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3124 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 5559.210566][ T29] audit: type=1400 audit(134223286.958:635214): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=3124 comm="syz-executor" name="135" dev="tmpfs" ino=731 [ 5559.213894][ T29] audit: type=1400 audit(134223286.958:635215): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3188 comm="sshd" saddr=10.0.2.2 src=40222 daddr=10.0.2.15 dest=22 netif=eth0 [ 5559.215676][ T29] audit: type=1400 audit(134223286.968:635216): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3124 comm="syz-executor" path="/135" dev="tmpfs" ino=731 [ 5559.221738][ T29] audit: type=1400 audit(134223286.968:635217): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=3124 comm="syz-executor" path="/135" dev="tmpfs" ino=731 [ 5559.241575][ T29] audit: type=1400 audit(134223286.968:635218): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="/" dev="vda" ino=2 [ 5564.491858][ T29] kauditd_printk_skb: 1426 callbacks suppressed [ 5564.492015][ T29] audit: type=1400 audit(134223292.268:636645): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32530 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 5564.497808][ T29] audit: type=1400 audit(134223292.268:636646): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3190 comm="syz-executor" saddr=127.0.0.1 src=42428 daddr=127.0.0.1 dest=30006 netif=lo [ 5564.506877][ T29] audit: type=1400 audit(134223292.278:636647): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="/" dev="vda" ino=2 [ 5564.509137][ T29] audit: type=1400 audit(134223292.278:636648): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="var" dev="vda" ino=1718 [ 5564.511649][ T29] audit: type=1400 audit(134223292.278:636649): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="var" dev="vda" ino=1718 [ 5564.514553][ T29] audit: type=1400 audit(134223292.278:636650): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="/" dev="vda" ino=2 [ 5564.524794][ T29] audit: type=1400 audit(134223292.278:636651): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 5564.528849][ T29] audit: type=1400 audit(134223292.278:636652): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3188 comm="sshd" saddr=10.0.2.2 src=40222 daddr=10.0.2.15 dest=22 netif=eth0 [ 5564.535329][ T29] audit: type=1400 audit(134223292.288:636653): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32530 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 5564.551217][ T29] audit: type=1400 audit(134223292.288:636654): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32530 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 5569.692303][ T29] kauditd_printk_skb: 2192 callbacks suppressed [ 5569.692461][ T29] audit: type=1400 audit(134223297.468:638847): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=4191 comm="syz.0.11382" name="newroot" dev="tmpfs" ino=2 [ 5569.703399][ T29] audit: type=1400 audit(134223297.478:638848): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=4191 comm="syz.0.11382" name="/" dev="devtmpfs" ino=1 [ 5569.705429][ T29] audit: type=1400 audit(134223297.478:638849): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="/" dev="vda" ino=2 [ 5569.713260][ T29] audit: type=1400 audit(134223297.478:638850): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="var" dev="vda" ino=1718 [ 5569.717975][ T29] audit: type=1400 audit(134223297.488:638851): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="var" dev="vda" ino=1718 [ 5569.722148][ T29] audit: type=1400 audit(134223297.488:638852): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="/" dev="vda" ino=2 [ 5569.724174][ T29] audit: type=1400 audit(134223297.498:638853): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 5569.729181][ T29] audit: type=1400 audit(134223297.498:638854): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3000 comm="syslogd" name="messages" dev="tmpfs" ino=15 [ 5569.731516][ T29] audit: type=1400 audit(134223297.498:638855): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3000 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 [ 5569.740630][ T29] audit: type=1400 audit(134223297.498:638856): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=3000 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 [ 5571.534723][ T4212] fuse: Bad value for 'fd' [ 5572.183750][ T4216] FAULT_INJECTION: forcing a failure. [ 5572.183750][ T4216] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 5572.185352][ T4216] CPU: 1 PID: 4216 Comm: syz.1.11390 Not tainted 6.10.0-rc7-syzkaller-00141-g43db1e03c086 #0 [ 5572.187121][ T4216] Hardware name: linux,dummy-virt (DT) [ 5572.188146][ T4216] Call trace: [ 5572.188816][ T4216] dump_backtrace+0x94/0xec [ 5572.189682][ T4216] show_stack+0x18/0x24 [ 5572.190531][ T4216] dump_stack_lvl+0x78/0x90 [ 5572.191392][ T4216] dump_stack+0x18/0x24 [ 5572.192102][ T4216] should_fail_ex+0x18c/0x1e0 [ 5572.192787][ T4216] should_fail+0x14/0x20 [ 5572.193462][ T4216] should_fail_usercopy+0x1c/0x28 [ 5572.194283][ T4216] copy_msghdr_from_user+0x48/0x110 [ 5572.195233][ T4216] ___sys_sendmsg+0x8c/0x100 [ 5572.196283][ T4216] __sys_sendmsg+0x84/0xe0 [ 5572.197446][ T4216] __arm64_sys_sendmsg+0x24/0x30 [ 5572.198313][ T4216] invoke_syscall+0x48/0x118 [ 5572.199333][ T4216] el0_svc_common.constprop.0+0x40/0xe0 [ 5572.200777][ T4216] do_el0_svc+0x1c/0x28 [ 5572.201551][ T4216] el0_svc+0x34/0xf8 [ 5572.202255][ T4216] el0t_64_sync_handler+0x100/0x12c [ 5572.203028][ T4216] el0t_64_sync+0x19c/0x1a0 [ 5574.735700][ T29] kauditd_printk_skb: 2062 callbacks suppressed [ 5574.750131][ T29] audit: type=1400 audit(134223302.508:640917): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32530 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 5574.751396][ T29] audit: type=1400 audit(134223302.518:640918): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3190 comm="syz-executor" saddr=127.0.0.1 src=42428 daddr=127.0.0.1 dest=30006 netif=lo [ 5574.752523][ T29] audit: type=1400 audit(134223302.528:640919): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32530 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 5574.754348][ T29] audit: type=1400 audit(134223302.528:640920): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=40222 daddr=10.0.2.15 dest=22 netif=eth0 [ 5574.755443][ T29] audit: type=1400 audit(134223302.528:640921): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32530 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 5574.764945][ T29] audit: type=1400 audit(134223302.528:640922): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32530 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 5574.766828][ T29] audit: type=1400 audit(134223302.528:640923): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=32530 comm="syz-executor" name="591" dev="tmpfs" ino=3182 [ 5574.767767][ T29] audit: type=1400 audit(134223302.528:640924): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=32530 comm="syz-executor" path="/591" dev="tmpfs" ino=3182 [ 5574.768757][ T29] audit: type=1400 audit(134223302.528:640925): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=32530 comm="syz-executor" path="/591" dev="tmpfs" ino=3182 [ 5574.769723][ T29] audit: type=1400 audit(134223302.538:640926): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32530 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 5579.737286][ T29] kauditd_printk_skb: 2720 callbacks suppressed [ 5579.737480][ T29] audit: type=1400 audit(134223307.498:643647): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=4274 comm="syz-executor" name="154" dev="tmpfs" ino=832 [ 5579.741568][ T29] audit: type=1400 audit(134223307.498:643648): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32530 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 5579.743656][ T29] audit: type=1400 audit(134223307.498:643649): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32530 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 5579.745626][ T29] audit: type=1400 audit(134223307.498:643650): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32530 comm="syz-executor" name="598" dev="tmpfs" ino=3220 [ 5579.768510][ T29] audit: type=1400 audit(134223307.498:643651): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32530 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 5579.770984][ T29] audit: type=1400 audit(134223307.498:643652): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32530 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 5579.772952][ T29] audit: type=1400 audit(134223307.498:643653): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32530 comm="syz-executor" name="598" dev="tmpfs" ino=3220 [ 5579.775036][ T29] audit: type=1400 audit(134223307.498:643654): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=32530 comm="syz-executor" path="/598/binderfs" dev="tmpfs" ino=3224 [ 5579.800608][ T29] audit: type=1400 audit(134223307.498:643655): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32530 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 5579.805099][ T29] audit: type=1400 audit(134223307.498:643656): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32530 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 5584.755323][ T29] kauditd_printk_skb: 1903 callbacks suppressed [ 5584.755418][ T29] audit: type=1400 audit(134223312.528:645560): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=4300 comm="kworker/u8:5" name="/" dev="vda" ino=2 [ 5584.764621][ T29] audit: type=1400 audit(134223312.538:645561): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="/" dev="vda" ino=2 [ 5584.765771][ T29] audit: type=1400 audit(134223312.538:645562): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="var" dev="vda" ino=1718 [ 5584.778036][ T29] audit: type=1400 audit(134223312.538:645563): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="var" dev="vda" ino=1718 [ 5584.779074][ T29] audit: type=1400 audit(134223312.538:645564): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="/" dev="vda" ino=2 [ 5584.780015][ T29] audit: type=1400 audit(134223312.538:645565): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 5584.780996][ T29] audit: type=1400 audit(134223312.538:645566): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3000 comm="syslogd" name="messages" dev="tmpfs" ino=15 [ 5584.782052][ T29] audit: type=1400 audit(134223312.538:645567): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3000 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 [ 5584.783241][ T29] audit: type=1400 audit(134223312.538:645568): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=3000 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 [ 5584.784174][ T29] audit: type=1400 audit(134223312.548:645569): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=4300 comm="kworker/u8:5" name="sbin" dev="vda" ino=1428 [ 5589.768986][ T29] kauditd_printk_skb: 1180 callbacks suppressed [ 5589.769161][ T29] audit: type=1400 audit(134223317.548:646750): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=4315 comm="syz.1.11420" name="newroot" dev="tmpfs" ino=2 [ 5589.774523][ T29] audit: type=1400 audit(134223317.548:646751): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=4315 comm="syz.1.11420" name="/" dev="proc" ino=1 [ 5589.789853][ T29] audit: type=1400 audit(134223317.558:646752): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=4315 comm="syz.1.11420" name="/" dev="proc" ino=1 [ 5589.791972][ T29] audit: type=1400 audit(134223317.558:646753): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="/" dev="vda" ino=2 [ 5589.794029][ T29] audit: type=1400 audit(134223317.558:646754): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="var" dev="vda" ino=1718 [ 5589.803370][ T29] audit: type=1400 audit(134223317.558:646755): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="var" dev="vda" ino=1718 [ 5589.805734][ T29] audit: type=1400 audit(134223317.558:646756): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="/" dev="vda" ino=2 [ 5589.810287][ T29] audit: type=1400 audit(134223317.558:646757): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 5589.812409][ T29] audit: type=1400 audit(134223317.568:646758): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3000 comm="syslogd" name="messages" dev="tmpfs" ino=15 [ 5589.817434][ T29] audit: type=1400 audit(134223317.568:646759): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3000 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 [ 5595.603103][ T29] kauditd_printk_skb: 1200 callbacks suppressed [ 5595.603275][ T29] audit: type=1400 audit(134223323.378:647960): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=4334 comm="syz.0.11427" name="newroot" dev="tmpfs" ino=2 [ 5595.618441][ T29] audit: type=1400 audit(134223323.378:647961): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=4334 comm="syz.0.11427" name="/" dev="proc" ino=1 [ 5595.620725][ T29] audit: type=1400 audit(134223323.378:647962): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=4334 comm="syz.0.11427" name="/" dev="proc" ino=1 [ 5595.622770][ T29] audit: type=1400 audit(134223323.378:647963): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=4334 comm="syz.0.11427" name="1605" dev="proc" ino=122850 [ 5595.624798][ T29] audit: type=1400 audit(134223323.378:647964): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=4334 comm="syz.0.11427" name="net" dev="proc" ino=122852 [ 5595.632176][ T29] audit: type=1400 audit(134223323.378:647965): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=4334 comm="syz.0.11427" name="pfkey" dev="proc" ino=4026533028 [ 5595.634466][ T29] audit: type=1400 audit(134223323.378:647966): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=4334 comm="syz.0.11427" path="/proc/1605/net/pfkey" dev="proc" ino=4026533028 [ 5595.654790][ T29] audit: type=1400 audit(134223323.388:647967): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="/" dev="vda" ino=2 [ 5595.664573][ T29] audit: type=1400 audit(134223323.388:647968): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="var" dev="vda" ino=1718 [ 5595.668233][ T29] audit: type=1400 audit(134223323.388:647969): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="var" dev="vda" ino=1718 [ 5601.447861][ T29] kauditd_printk_skb: 1205 callbacks suppressed [ 5601.448017][ T29] audit: type=1400 audit(134223329.218:649175): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32530 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 5601.451262][ T29] audit: type=1400 audit(134223329.218:649176): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3190 comm="syz-executor" saddr=127.0.0.1 src=42428 daddr=127.0.0.1 dest=30006 netif=lo [ 5601.459523][ T29] audit: type=1400 audit(134223329.228:649178): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="kauditd" saddr=10.0.2.2 src=40222 daddr=10.0.2.15 dest=22 netif=eth0 [ 5601.467323][ T29] audit: type=1400 audit(134223329.218:649177): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32530 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 5601.487493][ T29] audit: type=1400 audit(134223329.248:649179): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="/" dev="vda" ino=2 [ 5601.490066][ T29] audit: type=1400 audit(134223329.248:649180): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="var" dev="vda" ino=1718 [ 5601.493937][ T29] audit: type=1400 audit(134223329.248:649181): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="var" dev="vda" ino=1718 [ 5601.514360][ T29] audit: type=1400 audit(134223329.258:649182): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="/" dev="vda" ino=2 [ 5601.530108][ T29] audit: type=1400 audit(134223329.258:649183): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 5601.533414][ T29] audit: type=1400 audit(134223329.258:649184): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3000 comm="syslogd" name="messages" dev="tmpfs" ino=15 [ 5606.473423][ T29] kauditd_printk_skb: 2280 callbacks suppressed [ 5606.473569][ T29] audit: type=1400 audit(134223334.248:651465): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=4401 comm="modprobe" name="/" dev="vda" ino=2 [ 5606.480505][ T29] audit: type=1400 audit(134223334.258:651466): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=4401 comm="modprobe" name="etc" dev="vda" ino=95 [ 5606.488073][ T29] audit: type=1400 audit(134223334.258:651467): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=4401 comm="modprobe" name="/" dev="vda" ino=2 [ 5606.490153][ T29] audit: type=1400 audit(134223334.268:651468): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="/" dev="vda" ino=2 [ 5606.492228][ T29] audit: type=1400 audit(134223334.268:651469): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="var" dev="vda" ino=1718 [ 5606.513638][ T29] audit: type=1400 audit(134223334.278:651470): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="var" dev="vda" ino=1718 [ 5606.515732][ T29] audit: type=1400 audit(134223334.278:651472): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3124 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 5606.529073][ T29] audit: type=1400 audit(134223334.278:651473): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3124 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 5606.531341][ T29] audit: type=1400 audit(134223334.278:651474): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3124 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 5606.533560][ T29] audit: type=1400 audit(134223334.278:651475): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3124 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 5609.187839][ T4419] fuse: Bad value for 'fd' [ 5613.879045][ T29] kauditd_printk_skb: 1979 callbacks suppressed [ 5613.879202][ T29] audit: type=1400 audit(134223341.658:653415): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3190 comm="syz-executor" saddr=127.0.0.1 src=42428 daddr=127.0.0.1 dest=30006 netif=lo [ 5613.883152][ T29] audit: type=1400 audit(134223341.658:653416): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3124 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 5613.885583][ T29] audit: type=1400 audit(134223341.658:653417): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3124 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 5613.908892][ T29] audit: type=1400 audit(134223341.658:653418): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3124 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 5613.911078][ T29] audit: type=1400 audit(134223341.658:653419): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3124 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 5613.912783][ T29] audit: type=1400 audit(134223341.668:653420): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3188 comm="sshd" saddr=10.0.2.2 src=40222 daddr=10.0.2.15 dest=22 netif=eth0 [ 5613.915154][ T29] audit: type=1400 audit(134223341.688:653421): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=3124 comm="syz-executor" name="182" dev="tmpfs" ino=978 [ 5613.928026][ T29] audit: type=1400 audit(134223341.688:653422): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3124 comm="syz-executor" path="/182" dev="tmpfs" ino=978 [ 5613.930091][ T29] audit: type=1400 audit(134223341.688:653423): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=3124 comm="syz-executor" path="/182" dev="tmpfs" ino=978 [ 5613.932293][ T29] audit: type=1400 audit(134223341.688:653424): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3124 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 5618.890445][ T29] kauditd_printk_skb: 1429 callbacks suppressed [ 5618.890614][ T29] audit: type=1400 audit(134223346.668:654854): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=4465 comm="syz-executor" name="192" dev="tmpfs" ino=1030 [ 5618.893296][ T29] audit: type=1400 audit(134223346.668:654855): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=4465 comm="syz-executor" name="192" dev="tmpfs" ino=1030 [ 5618.908535][ T29] audit: type=1400 audit(134223346.668:654856): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=4465 comm="syz-executor" name="192" dev="tmpfs" ino=1030 [ 5618.910679][ T29] audit: type=1400 audit(134223346.668:654857): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=4465 comm="syz-executor" name="192" dev="tmpfs" ino=1030 [ 5618.913377][ T29] audit: type=1400 audit(134223346.668:654858): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=4465 comm="syz-executor" name="192" dev="tmpfs" ino=1030 [ 5618.923853][ T29] audit: type=1400 audit(134223346.668:654859): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=4465 comm="syz-executor" name="192" dev="tmpfs" ino=1030 [ 5618.930501][ T29] audit: type=1400 audit(134223346.678:654860): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=4465 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 5618.932515][ T29] audit: type=1400 audit(134223346.678:654861): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=4465 comm="syz-executor" name="/" dev="proc" ino=1 [ 5618.934414][ T29] audit: type=1400 audit(134223346.678:654862): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=4465 comm="syz-executor" name="/" dev="proc" ino=1 [ 5618.942674][ T29] audit: type=1400 audit(134223346.678:654863): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="/" dev="vda" ino=2 [ 5624.073735][ T29] kauditd_printk_skb: 1477 callbacks suppressed [ 5624.073914][ T29] audit: type=1400 audit(134223351.848:656341): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=4492 comm="syz.0.11486" name="newroot" dev="tmpfs" ino=2 [ 5624.087492][ T29] audit: type=1400 audit(134223351.858:656342): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="/" dev="vda" ino=2 [ 5624.089623][ T29] audit: type=1400 audit(134223351.858:656343): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=4492 comm="syz.0.11486" name="/" dev="devtmpfs" ino=1 [ 5624.091677][ T29] audit: type=1400 audit(134223351.868:656344): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=4492 comm="syz.0.11486" name="ptmx" dev="devtmpfs" ino=609 [ 5624.094639][ T29] audit: type=1400 audit(134223351.868:656345): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=4492 comm="syz.0.11486" path="/dev/ptmx" dev="devtmpfs" ino=609 [ 5624.118081][ T29] audit: type=1400 audit(134223351.878:656346): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="var" dev="vda" ino=1718 [ 5624.120576][ T29] audit: type=1400 audit(134223351.878:656347): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="var" dev="vda" ino=1718 [ 5624.134864][ T29] audit: type=1400 audit(134223351.878:656348): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="/" dev="vda" ino=2 [ 5624.141016][ T29] audit: type=1400 audit(134223351.878:656349): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 5624.142993][ T29] audit: type=1400 audit(134223351.878:656350): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3000 comm="syslogd" name="messages" dev="tmpfs" ino=15 [ 5624.159994][ T4494] serio: Serial port pts0 [ 5629.084416][ T29] kauditd_printk_skb: 1146 callbacks suppressed [ 5629.084581][ T29] audit: type=1400 audit(134223356.848:657497): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3124 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 5629.112362][ T29] audit: type=1400 audit(134223356.858:657498): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3124 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 5629.115626][ T29] audit: type=1400 audit(134223356.858:657499): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3124 comm="syz-executor" name="195" dev="tmpfs" ino=1046 [ 5629.123312][ T29] audit: type=1400 audit(134223356.858:657500): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=3124 comm="syz-executor" name="195" dev="tmpfs" ino=1046 [ 5629.127226][ T29] audit: type=1400 audit(134223356.858:657501): lsm=SMACK fn=smack_inode_unlink action=granted subject="_" object="_" requested=w pid=3124 comm="syz-executor" name="cgroup.net" dev="tmpfs" ino=1049 [ 5629.129408][ T29] audit: type=1400 audit(134223356.858:657502): lsm=SMACK fn=smack_inode_unlink action=granted subject="_" object="_" requested=w pid=3124 comm="syz-executor" name="195" dev="tmpfs" ino=1046 [ 5629.131694][ T29] audit: type=1400 audit(134223356.858:657504): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3124 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 5629.133562][ T29] audit: type=1400 audit(134223356.858:657503): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ksoftirqd/0" saddr=127.0.0.1 src=30006 daddr=127.0.0.1 dest=42428 netif=lo [ 5629.136725][ T29] audit: type=1400 audit(134223356.858:657505): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3124 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 5629.139813][ T29] audit: type=1400 audit(134223356.858:657506): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3124 comm="syz-executor" name="195" dev="tmpfs" ino=1046 [ 5635.587721][ T29] kauditd_printk_skb: 1950 callbacks suppressed [ 5635.587942][ T29] audit: type=1400 audit(134223363.358:659457): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3124 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 5635.597168][ T29] audit: type=1400 audit(134223363.368:659458): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3190 comm="syz-executor" saddr=127.0.0.1 src=42428 daddr=127.0.0.1 dest=30006 netif=lo [ 5635.602321][ T29] audit: type=1400 audit(134223363.368:659459): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3124 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 5635.604181][ T29] audit: type=1400 audit(134223363.368:659460): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3124 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 5635.621572][ T29] audit: type=1400 audit(134223363.368:659461): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3124 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 5635.625135][ T29] audit: type=1400 audit(134223363.378:659462): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="kauditd" saddr=10.0.2.2 src=40222 daddr=10.0.2.15 dest=22 netif=eth0 [ 5635.632760][ T29] audit: type=1400 audit(134223363.378:659463): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="/" dev="vda" ino=2 [ 5635.634885][ T29] audit: type=1400 audit(134223363.378:659464): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="var" dev="vda" ino=1718 [ 5635.655389][ T29] audit: type=1400 audit(134223363.378:659465): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="var" dev="vda" ino=1718 [ 5635.665428][ T29] audit: type=1400 audit(134223363.378:659466): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="/" dev="vda" ino=2 [ 5640.600324][ T29] kauditd_printk_skb: 1935 callbacks suppressed [ 5640.600475][ T29] audit: type=1400 audit(134223368.368:661402): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3124 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 5640.603387][ T29] audit: type=1400 audit(134223368.368:661403): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3124 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 5640.605487][ T29] audit: type=1400 audit(134223368.368:661404): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=3124 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 5640.620252][ T29] audit: type=1400 audit(134223368.368:661405): lsm=SMACK fn=smack_inode_rmdir action=granted subject="_" object="_" requested=w pid=3124 comm="syz-executor" name="211" dev="tmpfs" ino=1130 [ 5640.622452][ T29] audit: type=1400 audit(134223368.368:661406): lsm=SMACK fn=smack_inode_rmdir action=granted subject="_" object="_" requested=w pid=3124 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 5640.624333][ T29] audit: type=1400 audit(134223368.368:661407): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3124 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 5640.629163][ T29] audit: type=1400 audit(134223368.368:661408): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3124 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 5640.631801][ T29] audit: type=1400 audit(134223368.378:661409): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="kauditd" saddr=10.0.2.2 src=40222 daddr=10.0.2.15 dest=22 netif=eth0 [ 5640.634404][ T29] audit: type=1400 audit(134223368.378:661410): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=3124 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 5640.637592][ T29] audit: type=1400 audit(134223368.378:661411): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3124 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 5640.807932][ T4575] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 5640.810663][ T4575] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 5645.624943][ T29] kauditd_printk_skb: 2982 callbacks suppressed [ 5645.625030][ T29] audit: type=1400 audit(134223373.398:664394): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=4615 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 5645.628890][ T29] audit: type=1400 audit(134223373.408:664395): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=4615 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 5645.635441][ T29] audit: type=1400 audit(134223373.408:664396): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=4615 comm="syz-executor" name="648" dev="tmpfs" ino=3484 [ 5645.637988][ T29] audit: type=1400 audit(134223373.408:664397): lsm=SMACK fn=smack_task_setpgid action=granted subject="_" object="_" requested=w pid=4615 comm="syz-executor" opid=4615 ocomm="syz-executor" [ 5645.639127][ T29] audit: type=1400 audit(134223373.408:664399): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=4615 comm="syz-executor" name="648" dev="tmpfs" ino=3484 [ 5645.640114][ T29] audit: type=1400 audit(134223373.408:664398): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="/" dev="vda" ino=2 [ 5645.641303][ T29] audit: type=1400 audit(134223373.408:664400): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=4615 comm="syz-executor" name="648" dev="tmpfs" ino=3484 [ 5645.643505][ T29] audit: type=1400 audit(134223373.408:664401): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="var" dev="vda" ino=1718 [ 5645.645611][ T29] audit: type=1400 audit(134223373.418:664402): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="var" dev="vda" ino=1718 [ 5645.657015][ T29] audit: type=1400 audit(134223373.418:664403): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="/" dev="vda" ino=2 [ 5648.620650][T27492] usb 1-1: new full-speed USB device number 90 using dummy_hcd [ 5648.889314][T27492] usb 1-1: device descriptor read/64, error -71 [ 5649.180437][T27492] usb 1-1: new full-speed USB device number 91 using dummy_hcd [ 5649.386912][T27492] usb 1-1: device descriptor read/64, error -71 [ 5649.509081][T27492] usb usb1-port1: attempt power cycle [ 5649.946848][T27492] usb 1-1: new full-speed USB device number 92 using dummy_hcd [ 5649.981991][T27492] usb 1-1: device descriptor read/8, error -71 [ 5650.257174][T27492] usb 1-1: new full-speed USB device number 93 using dummy_hcd [ 5650.311663][T27492] usb 1-1: device descriptor read/8, error -71 [ 5650.429014][T27492] usb usb1-port1: unable to enumerate USB device [ 5650.626540][ T29] kauditd_printk_skb: 3324 callbacks suppressed [ 5650.626692][ T29] audit: type=1400 audit(134223378.398:667728): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=4651 comm="modprobe" name="/" dev="vda" ino=2 [ 5650.629077][ T29] audit: type=1400 audit(134223378.408:667729): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=4651 comm="modprobe" name="usr" dev="vda" ino=1488 [ 5650.635106][ T29] audit: type=1400 audit(134223378.408:667730): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=4651 comm="modprobe" name="usr" dev="vda" ino=1488 [ 5650.641811][ T29] audit: type=1400 audit(134223378.408:667731): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=4651 comm="modprobe" name="lib" dev="vda" ino=1622 [ 5650.645096][ T29] audit: type=1400 audit(134223378.408:667732): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=4651 comm="modprobe" name="/" dev="vda" ino=2 [ 5650.648063][ T29] audit: type=1400 audit(134223378.408:667733): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=4651 comm="modprobe" name="usr" dev="vda" ino=1488 [ 5650.649885][ T29] audit: type=1400 audit(134223378.408:667734): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=4651 comm="modprobe" name="usr" dev="vda" ino=1488 [ 5650.653563][ T29] audit: type=1400 audit(134223378.408:667735): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=4651 comm="modprobe" name="lib" dev="vda" ino=1622 [ 5650.656979][ T29] audit: type=1400 audit(134223378.408:667736): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=4651 comm="modprobe" name="/" dev="vda" ino=2 [ 5650.658746][ T29] audit: type=1400 audit(134223378.408:667737): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=4651 comm="modprobe" name="usr" dev="vda" ino=1488 [ 5655.627511][ T4682] fuse: Bad value for 'fd' [ 5655.636584][ T29] kauditd_printk_skb: 3946 callbacks suppressed [ 5655.636737][ T29] audit: type=1400 audit(134223383.408:671684): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=4680 comm="modprobe" name="lib" dev="vda" ino=1622 [ 5655.639111][ T29] audit: type=1400 audit(134223383.408:671685): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=4680 comm="modprobe" name="lib" dev="vda" ino=1622 [ 5655.640290][ T29] audit: type=1400 audit(134223383.408:671686): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=4680 comm="modprobe" name="libpcre2-8.so.0.11.0" dev="vda" ino=1631 [ 5655.641461][ T29] audit: type=1400 audit(134223383.408:671687): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=4680 comm="modprobe" path="/usr/lib/libpcre2-8.so.0.11.0" dev="vda" ino=1631 [ 5655.654662][ T29] audit: type=1400 audit(134223383.408:671688): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=4680 comm="modprobe" path="/usr/lib/libpcre2-8.so.0.11.0" dev="vda" ino=1631 [ 5655.660488][ T29] audit: type=1400 audit(134223383.418:671689): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="/" dev="vda" ino=2 [ 5655.663100][ T29] audit: type=1400 audit(134223383.418:671690): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="var" dev="vda" ino=1718 [ 5655.677395][ T29] audit: type=1400 audit(134223383.418:671691): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="var" dev="vda" ino=1718 [ 5655.680834][ T29] audit: type=1400 audit(134223383.418:671692): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="/" dev="vda" ino=2 [ 5655.683481][ T29] audit: type=1400 audit(134223383.418:671693): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 5659.578508][ T4713] fuse: Bad value for 'fd' [ 5660.647116][ T29] kauditd_printk_skb: 3491 callbacks suppressed [ 5660.647262][ T29] audit: type=1400 audit(134223388.418:675184): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3015 comm="udevd" name="devices" dev="sysfs" ino=4 [ 5660.650265][ T29] audit: type=1400 audit(134223388.418:675186): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=4723 comm="modprobe" name="/" dev="vda" ino=2 [ 5660.655353][ T29] audit: type=1400 audit(134223388.418:675187): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3015 comm="udevd" name="virtual" dev="sysfs" ino=809 [ 5660.670805][ T4724] fuse: Bad value for 'fd' [ 5660.688153][ T29] audit: type=1400 audit(134223388.418:675188): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=4723 comm="modprobe" name="lib" dev="vda" ino=195 [ 5660.692541][ T29] audit: type=1400 audit(134223388.418:675189): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3015 comm="udevd" name="block" dev="sysfs" ino=11351 [ 5660.712120][ T29] audit: type=1400 audit(134223388.418:675190): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=4723 comm="modprobe" name="/" dev="vda" ino=2 [ 5660.713698][ T3015] audit: audit_backlog=65 > audit_backlog_limit=64 [ 5660.714579][ T29] audit: type=1400 audit(134223388.418:675191): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3015 comm="udevd" name="loop9" dev="sysfs" ino=13864 [ 5660.715348][ T3015] audit: audit_lost=831 audit_rate_limit=0 audit_backlog_limit=64 [ 5660.724445][ T4723] audit: audit_backlog=65 > audit_backlog_limit=64 [ 5665.739632][ T29] kauditd_printk_skb: 3007 callbacks suppressed [ 5665.739791][ T29] audit: type=1400 audit(134223393.518:678193): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3045 comm="dhcpcd" [ 5665.742838][ T29] audit: type=1400 audit(134223393.518:678194): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3045 comm="dhcpcd" [ 5665.757266][ T29] audit: type=1400 audit(134223393.518:678195): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3045 comm="dhcpcd" [ 5665.760248][ T29] audit: type=1400 audit(134223393.528:678196): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="/" dev="vda" ino=2 [ 5665.763203][ T29] audit: type=1400 audit(134223393.528:678197): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="var" dev="vda" ino=1718 [ 5665.765542][ T29] audit: type=1400 audit(134223393.528:678198): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="var" dev="vda" ino=1718 [ 5665.770163][ T29] audit: type=1400 audit(134223393.528:678199): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="/" dev="vda" ino=2 [ 5665.772195][ T29] audit: type=1400 audit(134223393.528:678200): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 5665.774334][ T29] audit: type=1400 audit(134223393.528:678201): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3000 comm="syslogd" name="messages" dev="tmpfs" ino=15 [ 5665.779085][ T29] audit: type=1400 audit(134223393.528:678202): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3000 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 [ 5665.795244][ T4761] netlink: 8 bytes leftover after parsing attributes in process `syz.0.11555'. [ 5666.872419][ C0] TCP: request_sock_subflow_v4: Possible SYN flooding on port [::]:20002. Sending cookies. [ 5667.371376][ T4767] fuse: Bad value for 'group_id' [ 5668.431083][ T4777] fuse: Bad value for 'group_id' [ 5668.849429][ T4780] netlink: 8 bytes leftover after parsing attributes in process `syz.0.11564'. [ 5670.747406][ T29] kauditd_printk_skb: 1619 callbacks suppressed [ 5670.747560][ T29] audit: type=1400 audit(134223398.518:679822): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=4786 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 5670.749571][ T29] audit: type=1400 audit(134223398.518:679823): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=4786 comm="syz-executor" name="/" dev="proc" ino=1 [ 5670.751236][ T29] audit: type=1400 audit(134223398.518:679824): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=4786 comm="syz-executor" name="/" dev="proc" ino=1 [ 5670.753508][ T29] audit: type=1400 audit(134223398.528:679825): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=4786 comm="syz-executor" name="669" dev="proc" ino=124530 [ 5670.755306][ T29] audit: type=1400 audit(134223398.528:679826): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=w pid=4786 comm="syz-executor" name="oom_score_adj" dev="proc" ino=124531 [ 5670.760381][ T29] audit: type=1400 audit(134223398.528:679827): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=4786 comm="syz-executor" path="/proc/669/oom_score_adj" dev="proc" ino=124531 [ 5670.762867][ T29] audit: type=1400 audit(134223398.528:679828): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=4786 comm="syz-executor" name="245" dev="tmpfs" ino=1313 [ 5670.764308][ T29] audit: type=1400 audit(134223398.528:679829): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=4786 comm="syz-executor" name="245" dev="tmpfs" ino=1313 [ 5670.765566][ T29] audit: type=1400 audit(134223398.538:679831): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="/" dev="vda" ino=2 [ 5670.768449][ T29] audit: type=1400 audit(134223398.538:679832): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="var" dev="vda" ino=1718 [ 5674.428617][ T4813] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 5674.431841][ T4813] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 5674.527781][ T4813] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 5674.530954][ T4813] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 5674.553144][ T4814] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 5674.554610][ T4814] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 5675.212422][ T4823] fuse: Bad value for 'fd' [ 5675.766828][ T29] kauditd_printk_skb: 3173 callbacks suppressed [ 5675.766987][ T29] audit: type=1400 audit(134223403.538:683005): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=4826 comm="modprobe" name="libresolv.so.2" dev="vda" ino=379 [ 5675.770206][ T29] audit: type=1400 audit(134223403.538:683006): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=4826 comm="modprobe" path="/lib/libresolv.so.2" dev="vda" ino=379 [ 5675.772493][ T29] audit: type=1400 audit(134223403.538:683007): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=4826 comm="modprobe" path="/lib/libresolv.so.2" dev="vda" ino=379 [ 5675.775067][ T29] audit: type=1400 audit(134223403.538:683008): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=4828 comm="modprobe" name="/" dev="vda" ino=2 [ 5675.797485][ T29] audit: type=1400 audit(134223403.538:683009): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=4828 comm="modprobe" name="/" dev="vda" ino=2 [ 5675.799817][ T29] audit: type=1400 audit(134223403.538:683010): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=4828 comm="modprobe" name="lib" dev="vda" ino=195 [ 5675.802274][ T29] audit: type=1400 audit(134223403.538:683011): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=4828 comm="modprobe" name="libresolv.so.2" dev="vda" ino=379 [ 5675.804353][ T29] audit: type=1400 audit(134223403.538:683012): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=4828 comm="modprobe" path="/lib/libresolv.so.2" dev="vda" ino=379 [ 5675.827885][ T29] audit: type=1400 audit(134223403.548:683013): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=4828 comm="modprobe" path="/lib/libresolv.so.2" dev="vda" ino=379 [ 5675.830257][ T29] audit: type=1400 audit(134223403.548:683014): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=4828 comm="modprobe" name="/" dev="vda" ino=2 [ 5677.994895][ T4843] fuse: Bad value for 'fd' [ 5678.333752][ T4845] netlink: 8 bytes leftover after parsing attributes in process `syz.0.11586'. [ 5679.091255][ T4851] fuse: Unknown parameter 'group_i00000000000000000000' [ 5679.501195][ T4854] fuse: Bad value for 'fd' [ 5679.610839][ T4855] netlink: 8 bytes leftover after parsing attributes in process `syz.1.11591'. [ 5680.137545][ T4861] fuse: Unknown parameter 'group_i00000000000000000000' [ 5680.780442][ T29] kauditd_printk_skb: 3124 callbacks suppressed [ 5680.780662][ T29] audit: type=1400 audit(134223408.558:686139): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=4869 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 5680.784433][ T29] audit: type=1400 audit(134223408.558:686140): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=4869 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 5680.807201][ T29] audit: type=1400 audit(134223408.558:686141): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=4869 comm="syz-executor" name="682" dev="tmpfs" ino=3673 [ 5680.814555][ T29] audit: type=1400 audit(134223408.558:686142): lsm=SMACK fn=smack_task_setpgid action=granted subject="_" object="_" requested=w pid=4869 comm="syz-executor" opid=4869 ocomm="syz-executor" [ 5680.825142][ T29] audit: type=1400 audit(134223408.558:686143): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=4869 comm="syz-executor" name="682" dev="tmpfs" ino=3673 [ 5680.832123][ T29] audit: type=1400 audit(134223408.558:686144): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=4869 comm="syz-executor" name="682" dev="tmpfs" ino=3673 [ 5680.835742][ T29] audit: type=1400 audit(134223408.558:686145): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=4869 comm="syz-executor" name="682" dev="tmpfs" ino=3673 [ 5680.842385][ T29] audit: type=1400 audit(134223408.568:686146): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=4869 comm="syz-executor" name="682" dev="tmpfs" ino=3673 [ 5680.844853][ T29] audit: type=1400 audit(134223408.568:686147): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=4869 comm="syz-executor" name="682" dev="tmpfs" ino=3673 [ 5680.851247][ T29] audit: type=1400 audit(134223408.568:686148): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=4869 comm="syz-executor" name="682" dev="tmpfs" ino=3673 [ 5682.192237][ T4874] fuse: Unknown parameter 'group_i00000000000000000000' [ 5685.491478][ T4888] fuse: Unknown parameter 'group_id00000000000000000000' [ 5685.799096][ T29] kauditd_printk_skb: 1198 callbacks suppressed [ 5685.799259][ T29] audit: type=1400 audit(134223413.578:687347): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32530 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 5685.811134][ T29] audit: type=1400 audit(134223413.578:687348): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3190 comm="syz-executor" saddr=127.0.0.1 src=42428 daddr=127.0.0.1 dest=30006 netif=lo [ 5685.814339][ T29] audit: type=1400 audit(134223413.578:687349): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32530 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 5685.827032][ T29] audit: type=1400 audit(134223413.578:687350): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32530 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 5685.829189][ T29] audit: type=1400 audit(134223413.588:687351): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=32530 comm="syz-executor" saddr=10.0.2.2 src=40222 daddr=10.0.2.15 dest=22 netif=eth0 [ 5685.832009][ T29] audit: type=1400 audit(134223413.588:687352): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32530 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 5685.845008][ T29] audit: type=1400 audit(134223413.588:687353): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=32530 comm="syz-executor" name="687" dev="tmpfs" ino=3701 [ 5685.859430][ T29] audit: type=1400 audit(134223413.588:687354): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=32530 comm="syz-executor" path="/687" dev="tmpfs" ino=3701 [ 5685.861317][ T29] audit: type=1400 audit(134223413.608:687355): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=32530 comm="syz-executor" path="/687" dev="tmpfs" ino=3701 [ 5685.863134][ T29] audit: type=1400 audit(134223413.608:687356): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32530 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 5687.622882][ T4902] fuse: Unknown parameter 'group_id00000000000000000000' [ 5687.927766][ T4904] netlink: 4580 bytes leftover after parsing attributes in process `syz.1.11610'. [ 5690.806934][ T29] kauditd_printk_skb: 952 callbacks suppressed [ 5690.807110][ T29] audit: type=1400 audit(134223418.578:688309): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3015 comm="udevd" name="/" dev="tmpfs" ino=1 [ 5690.814754][ T29] audit: type=1400 audit(134223418.578:688310): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3015 comm="udevd" name="udev" dev="tmpfs" ino=7 [ 5690.829814][ T29] audit: type=1400 audit(134223418.578:688311): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=3015 comm="udevd" name="udev" dev="tmpfs" ino=7 [ 5690.832098][ T29] audit: type=1400 audit(134223418.588:688313): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=4912 comm="udevd" name="/" dev="vda" ino=2 [ 5690.834523][ T29] audit: type=1400 audit(134223418.588:688314): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=4912 comm="udevd" name="/" dev="proc" ino=1 [ 5690.850718][ T29] audit: type=1400 audit(134223418.588:688315): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=4912 comm="udevd" name="/" dev="proc" ino=1 [ 5690.853011][ T29] audit: type=1400 audit(134223418.588:688316): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=4912 comm="udevd" name="4912" dev="proc" ino=124802 [ 5690.855067][ T29] audit: type=1400 audit(134223418.588:688317): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=w pid=4912 comm="udevd" name="oom_score_adj" dev="proc" ino=124803 [ 5690.875003][ T29] audit: type=1400 audit(134223418.588:688318): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=4912 comm="udevd" path="/proc/4912/oom_score_adj" dev="proc" ino=124803 [ 5690.884258][ T29] audit: type=1400 audit(134223418.588:688319): lsm=SMACK fn=smack_inode_setattr action=granted subject="_" object="_" requested=w pid=4912 comm="udevd" name="oom_score_adj" dev="proc" ino=124803 [ 5693.028123][ T4918] fuse: Unknown parameter 'group_id00000000000000000000' [ 5697.027054][ T29] kauditd_printk_skb: 920 callbacks suppressed [ 5697.027222][ T29] audit: type=1400 audit(134223424.798:689239): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3124 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 5697.029845][ T29] audit: type=1400 audit(134223424.808:689240): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3124 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 5697.031827][ T29] audit: type=1400 audit(134223424.808:689241): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3124 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 5697.033946][ T29] audit: type=1400 audit(134223424.808:689242): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3124 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 5697.035653][ T29] audit: type=1400 audit(134223424.808:689243): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=3124 comm="syz-executor" name="270" dev="tmpfs" ino=1446 [ 5697.057850][ T29] audit: type=1400 audit(134223424.808:689244): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3124 comm="syz-executor" path="/270" dev="tmpfs" ino=1446 [ 5697.062554][ T29] audit: type=1400 audit(134223424.808:689245): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=3124 comm="syz-executor" path="/270" dev="tmpfs" ino=1446 [ 5697.064855][ T29] audit: type=1400 audit(134223424.818:689246): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3190 comm="syz-executor" saddr=127.0.0.1 src=42428 daddr=127.0.0.1 dest=30006 netif=lo [ 5697.075134][ T29] audit: type=1400 audit(134223424.828:689247): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3124 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 5697.078824][ T29] audit: type=1400 audit(134223424.828:689248): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3124 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 5697.310729][ T4930] fuse: Bad value for 'user_id' [ 5698.439940][ T4940] fuse: Bad value for 'user_id' [ 5698.728129][ T4942] fuse: Bad value for 'group_id' [ 5700.180506][ T4951] fuse: Bad value for 'user_id' [ 5700.373810][ T4953] fuse: Bad value for 'group_id' [ 5703.438254][ T29] kauditd_printk_skb: 1697 callbacks suppressed [ 5703.438428][ T29] audit: type=1400 audit(134223431.208:690946): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3124 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 5703.441528][ T29] audit: type=1400 audit(134223431.208:690947): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3124 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 5703.444086][ T29] audit: type=1400 audit(134223431.208:690948): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3190 comm="syz-executor" saddr=127.0.0.1 src=42428 daddr=127.0.0.1 dest=30006 netif=lo [ 5703.480028][ T3124] audit: audit_backlog=65 > audit_backlog_limit=64 [ 5703.480541][ T3124] audit: audit_lost=834 audit_rate_limit=0 audit_backlog_limit=64 [ 5703.480521][ C1] audit: audit_backlog=65 > audit_backlog_limit=64 [ 5703.480989][ T3124] audit: backlog limit exceeded [ 5703.481953][ T3124] audit: audit_backlog=65 > audit_backlog_limit=64 [ 5703.482193][ C1] audit: audit_lost=835 audit_rate_limit=0 audit_backlog_limit=64 [ 5703.482382][ T3124] audit: audit_lost=836 audit_rate_limit=0 audit_backlog_limit=64 [ 5703.871038][ T4962] fuse: Bad value for 'user_id' [ 5704.190512][ T4964] fuse: Bad value for 'group_id' [ 5705.897638][ T4973] fuse: Bad value for 'fd' [ 5706.161511][ T4976] fuse: Bad value for 'user_id' [ 5707.210760][ T4987] fuse: Bad value for 'fd' [ 5707.482460][ T4990] fuse: Bad value for 'user_id' [ 5708.567509][ T29] kauditd_printk_skb: 2259 callbacks suppressed [ 5708.567677][ T29] audit: type=1400 audit(134223436.348:693182): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=4993 comm="syz.1.11647" name="newroot" dev="tmpfs" ino=2 [ 5708.572384][ T29] audit: type=1400 audit(134223436.348:693183): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=4993 comm="syz.1.11647" name="/" dev="devtmpfs" ino=1 [ 5708.574304][ T29] audit: type=1400 audit(134223436.348:693184): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=4993 comm="syz.1.11647" name="vsock" dev="devtmpfs" ino=747 [ 5708.577894][ T29] audit: type=1400 audit(134223436.348:693185): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=4993 comm="syz.1.11647" path="/dev/vsock" dev="devtmpfs" ino=747 [ 5708.583836][ T29] audit: type=1400 audit(134223436.358:693186): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="/" dev="vda" ino=2 [ 5708.584876][ T29] audit: type=1400 audit(134223436.358:693187): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="var" dev="vda" ino=1718 [ 5708.585865][ T29] audit: type=1400 audit(134223436.358:693188): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="var" dev="vda" ino=1718 [ 5708.588906][ T29] audit: type=1400 audit(134223436.358:693189): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="/" dev="vda" ino=2 [ 5708.590045][ T29] audit: type=1400 audit(134223436.368:693190): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 5708.591111][ T29] audit: type=1400 audit(134223436.368:693191): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3000 comm="syslogd" name="messages" dev="tmpfs" ino=15 [ 5709.013552][ T5001] fuse: Invalid rootmode [ 5709.726600][ T5008] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 5709.728319][ T5008] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 5710.314455][ T5016] fuse: Invalid rootmode [ 5710.811715][ T5020] netlink: 8 bytes leftover after parsing attributes in process `syz.1.11656'. [ 5712.118259][ T5028] fuse: Invalid rootmode [ 5713.576982][ T29] kauditd_printk_skb: 2628 callbacks suppressed [ 5713.577172][ T29] audit: type=1400 audit(134223441.348:695820): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5035 comm="modprobe" name="/" dev="vda" ino=2 [ 5713.581009][ T29] audit: type=1400 audit(134223441.348:695821): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5035 comm="modprobe" name="lib" dev="vda" ino=195 [ 5713.582921][ T29] audit: type=1400 audit(134223441.348:695822): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=5035 comm="modprobe" name="libresolv.so.2" dev="vda" ino=379 [ 5713.584918][ T29] audit: type=1400 audit(134223441.348:695823): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=5035 comm="modprobe" path="/lib/libresolv.so.2" dev="vda" ino=379 [ 5713.596744][ T29] audit: type=1400 audit(134223441.348:695824): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5035 comm="modprobe" path="/lib/libresolv.so.2" dev="vda" ino=379 [ 5713.599429][ T29] audit: type=1400 audit(134223441.368:695825): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="/" dev="vda" ino=2 [ 5713.607696][ T29] audit: type=1400 audit(134223441.378:695826): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5035 comm="modprobe" name="/" dev="vda" ino=2 [ 5713.609630][ T29] audit: type=1400 audit(134223441.378:695827): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="var" dev="vda" ino=1718 [ 5713.612549][ T29] audit: type=1400 audit(134223441.378:695828): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5035 comm="modprobe" name="/" dev="vda" ino=2 [ 5713.614425][ T29] audit: type=1400 audit(134223441.378:695829): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="var" dev="vda" ino=1718 [ 5713.800031][ T5034] can: request_module (can-proto-0) failed. [ 5714.704800][ T5040] fuse: Bad value for 'rootmode' [ 5718.427861][ T5049] can: request_module (can-proto-0) failed. [ 5718.586767][ T29] kauditd_printk_skb: 1462 callbacks suppressed [ 5718.586932][ T29] audit: type=1400 audit(134223446.358:697292): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=5051 comm="modprobe" path="/lib/libc.so.6" dev="vda" ino=370 [ 5718.589738][ T29] audit: type=1400 audit(134223446.368:697293): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5051 comm="modprobe" path="/lib/libc.so.6" dev="vda" ino=370 [ 5718.594564][ T29] audit: type=1400 audit(134223446.368:697294): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5051 comm="modprobe" name="/" dev="vda" ino=2 [ 5718.598340][ T29] audit: type=1400 audit(134223446.368:697295): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5051 comm="modprobe" name="/" dev="vda" ino=2 [ 5718.600366][ T29] audit: type=1400 audit(134223446.368:697296): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5051 comm="modprobe" name="lib" dev="vda" ino=195 [ 5718.602331][ T29] audit: type=1400 audit(134223446.368:697297): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=5051 comm="modprobe" name="libresolv.so.2" dev="vda" ino=379 [ 5718.607365][ T29] audit: type=1400 audit(134223446.378:697298): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=5051 comm="modprobe" path="/lib/libresolv.so.2" dev="vda" ino=379 [ 5718.609090][ T29] audit: type=1400 audit(134223446.378:697299): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5051 comm="modprobe" path="/lib/libresolv.so.2" dev="vda" ino=379 [ 5718.613193][ T29] audit: type=1400 audit(134223446.388:697300): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5051 comm="modprobe" name="/" dev="vda" ino=2 [ 5718.622028][ T29] audit: type=1400 audit(134223446.388:697301): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5051 comm="modprobe" name="/" dev="vda" ino=2 [ 5721.535316][ T5064] can: request_module (can-proto-0) failed. [ 5724.510189][ T29] kauditd_printk_skb: 1962 callbacks suppressed [ 5724.510337][ T29] audit: type=1400 audit(134223452.288:699264): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3124 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 5724.516873][ T29] audit: type=1400 audit(134223452.288:699265): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3190 comm="syz-executor" saddr=127.0.0.1 src=42428 daddr=127.0.0.1 dest=30006 netif=lo [ 5724.519135][ T29] audit: type=1400 audit(134223452.288:699266): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="kauditd" saddr=10.0.2.2 src=40222 daddr=10.0.2.15 dest=22 netif=eth0 [ 5724.527774][ T29] audit: type=1400 audit(134223452.288:699267): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3124 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 5724.529864][ T29] audit: type=1400 audit(134223452.298:699268): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3124 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 5724.531804][ T29] audit: type=1400 audit(134223452.298:699269): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3124 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 5724.533655][ T29] audit: type=1400 audit(134223452.298:699270): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=3124 comm="syz-executor" name="322" dev="tmpfs" ino=1734 [ 5724.535594][ T29] audit: type=1400 audit(134223452.298:699271): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3124 comm="syz-executor" path="/322" dev="tmpfs" ino=1734 [ 5724.560758][ T29] audit: type=1400 audit(134223452.298:699272): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=3124 comm="syz-executor" path="/322" dev="tmpfs" ino=1734 [ 5724.562943][ T29] audit: type=1400 audit(134223452.298:699273): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3124 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 5728.775146][ T5100] serio: Serial port pts1 [ 5731.863199][ T29] kauditd_printk_skb: 1666 callbacks suppressed [ 5731.863408][ T29] audit: type=1400 audit(134223459.638:700940): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=3015 comm="udevd" opid=5092 ocomm="udevd" [ 5731.872816][ T29] audit: type=1400 audit(134223459.648:700941): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3015 comm="udevd" name="/" dev="vda" ino=2 [ 5731.875133][ T29] audit: type=1400 audit(134223459.648:700942): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3015 comm="udevd" name="etc" dev="vda" ino=95 [ 5731.888002][ T29] audit: type=1400 audit(134223459.648:700943): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3015 comm="udevd" name="udev" dev="vda" ino=191 [ 5731.890679][ T29] audit: type=1400 audit(134223459.648:700944): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=3015 comm="udevd" path="/etc/udev/rules.d" dev="vda" ino=193 [ 5731.908642][ T29] audit: type=1400 audit(134223459.648:700945): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3015 comm="udevd" name="/" dev="vda" ino=2 [ 5731.911102][ T29] audit: type=1400 audit(134223459.648:700946): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3015 comm="udevd" name="lib" dev="vda" ino=195 [ 5731.913236][ T29] audit: type=1400 audit(134223459.648:700947): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3015 comm="udevd" name="udev" dev="vda" ino=1390 [ 5731.927442][ T29] audit: type=1400 audit(134223459.658:700948): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="/" dev="vda" ino=2 [ 5731.929509][ T29] audit: type=1400 audit(134223459.658:700949): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="var" dev="vda" ino=1718 [ 5734.729702][ T5109] fuse: Unknown parameter 'group_id00000000000000000000' [ 5735.481172][ T5115] fuse: Unknown parameter 'user_id00000000000000000000' [ 5736.304823][ T5120] fuse: Bad value for 'user_id' [ 5736.976051][ T29] kauditd_printk_skb: 1404 callbacks suppressed [ 5736.976210][ T29] audit: type=1400 audit(134223464.748:702354): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=3015 comm="udevd" opid=5104 ocomm="udevd" [ 5736.982489][ T29] audit: type=1400 audit(134223464.758:702355): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3015 comm="udevd" name="/" dev="vda" ino=2 [ 5736.997999][ T29] audit: type=1400 audit(134223464.758:702356): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3015 comm="udevd" name="etc" dev="vda" ino=95 [ 5736.999884][ T29] audit: type=1400 audit(134223464.768:702357): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3015 comm="udevd" name="udev" dev="vda" ino=191 [ 5737.002200][ T29] audit: type=1400 audit(134223464.768:702358): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=3015 comm="udevd" path="/etc/udev/rules.d" dev="vda" ino=193 [ 5737.004088][ T29] audit: type=1400 audit(134223464.768:702359): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3015 comm="udevd" name="/" dev="vda" ino=2 [ 5737.005801][ T29] audit: type=1400 audit(134223464.768:702360): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3015 comm="udevd" name="lib" dev="vda" ino=195 [ 5737.011352][ T29] audit: type=1400 audit(134223464.768:702361): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3015 comm="udevd" name="udev" dev="vda" ino=1390 [ 5737.013166][ T29] audit: type=1400 audit(134223464.768:702362): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=3015 comm="udevd" path="/lib/udev/rules.d" dev="vda" ino=1395 [ 5737.015171][ T29] audit: type=1400 audit(134223464.768:702363): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3015 comm="udevd" name="/" dev="vda" ino=2 [ 5738.084269][ T5126] fuse: Unknown parameter 'user_id00000000000000000000' [ 5740.504759][ T5141] fuse: Bad value for 'fd' [ 5741.124585][ T5150] fuse: Unknown parameter '0x0000000000000003' [ 5741.986713][ T29] kauditd_printk_skb: 2074 callbacks suppressed [ 5741.986874][ T29] audit: type=1400 audit(134223469.758:704438): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5157 comm="modprobe" name="lib" dev="vda" ino=195 [ 5741.993245][ T29] audit: type=1400 audit(134223469.768:704439): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5157 comm="modprobe" name="/" dev="vda" ino=2 [ 5741.995563][ T29] audit: type=1400 audit(134223469.768:704440): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5157 comm="modprobe" name="/" dev="vda" ino=2 [ 5742.000121][ T29] audit: type=1400 audit(134223469.768:704441): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5157 comm="modprobe" name="lib" dev="vda" ino=195 [ 5742.002326][ T29] audit: type=1400 audit(134223469.768:704442): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5157 comm="modprobe" name="/" dev="vda" ino=2 [ 5742.004774][ T29] audit: type=1400 audit(134223469.768:704443): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5157 comm="modprobe" name="/" dev="vda" ino=2 [ 5742.007242][ T29] audit: type=1400 audit(134223469.768:704444): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5157 comm="modprobe" name="lib" dev="vda" ino=195 [ 5742.009101][ T29] audit: type=1400 audit(134223469.768:704445): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5157 comm="modprobe" name="/" dev="vda" ino=2 [ 5742.016922][ T29] audit: type=1400 audit(134223469.768:704446): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5157 comm="modprobe" name="/" dev="vda" ino=2 [ 5742.018741][ T29] audit: type=1400 audit(134223469.768:704447): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5157 comm="modprobe" name="lib" dev="vda" ino=195 [ 5743.773559][ T5169] fuse: Unknown parameter '0x0000000000000003' [ 5744.594777][ T5181] netlink: 8 bytes leftover after parsing attributes in process `syz.0.11709'. [ 5745.509137][ T5188] fuse: Unknown parameter '0x0000000000000003' [ 5746.996520][ T29] kauditd_printk_skb: 4278 callbacks suppressed [ 5746.996613][ T29] audit: type=1400 audit(134223474.768:708726): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=5200 comm="modprobe" name="libselinux.so.1" dev="vda" ino=1636 [ 5746.998153][ T29] audit: type=1400 audit(134223474.778:708727): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=5200 comm="modprobe" path="/usr/lib/libselinux.so.1" dev="vda" ino=1636 [ 5746.999943][ T29] audit: type=1400 audit(134223474.778:708728): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5200 comm="modprobe" path="/usr/lib/libselinux.so.1" dev="vda" ino=1636 [ 5747.022874][ T29] audit: type=1400 audit(134223474.778:708729): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5200 comm="modprobe" name="/" dev="vda" ino=2 [ 5747.024198][ T29] audit: type=1400 audit(134223474.788:708730): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5200 comm="modprobe" name="/" dev="vda" ino=2 [ 5747.031122][ T29] audit: type=1400 audit(134223474.788:708731): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5200 comm="modprobe" name="lib" dev="vda" ino=195 [ 5747.032304][ T29] audit: type=1400 audit(134223474.788:708732): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5200 comm="modprobe" name="/" dev="vda" ino=2 [ 5747.034718][ T29] audit: type=1400 audit(134223474.788:708733): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5200 comm="modprobe" name="usr" dev="vda" ino=1488 [ 5747.048805][ T29] audit: type=1400 audit(134223474.788:708734): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5200 comm="modprobe" name="usr" dev="vda" ino=1488 [ 5747.055370][ T29] audit: type=1400 audit(134223474.788:708735): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5200 comm="modprobe" name="lib" dev="vda" ino=1622 [ 5748.027220][ T1473] usb 1-1: new high-speed USB device number 94 using dummy_hcd [ 5748.237247][ T1473] usb 1-1: device descriptor read/64, error -71 [ 5748.527872][ T1473] usb 1-1: new high-speed USB device number 95 using dummy_hcd [ 5748.575815][ T5215] serio: Serial port pts0 [ 5748.727514][ T1473] usb 1-1: device descriptor read/64, error -71 [ 5748.852967][ T1473] usb usb1-port1: attempt power cycle [ 5749.259313][ T1473] usb 1-1: new high-speed USB device number 96 using dummy_hcd [ 5749.309766][ T1473] usb 1-1: device descriptor read/8, error -71 [ 5749.578158][ T1473] usb 1-1: new high-speed USB device number 97 using dummy_hcd [ 5749.632591][ T1473] usb 1-1: device descriptor read/8, error -71 [ 5749.751404][ T1473] usb usb1-port1: unable to enumerate USB device [ 5754.164674][ T29] kauditd_printk_skb: 873 callbacks suppressed [ 5754.164822][ T29] audit: type=1400 audit(134223481.938:709609): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3124 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 5754.178340][ T29] audit: type=1400 audit(134223481.948:709610): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3190 comm="syz-executor" saddr=127.0.0.1 src=42428 daddr=127.0.0.1 dest=30006 netif=lo [ 5754.180484][ T29] audit: type=1400 audit(134223481.948:709611): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3124 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 5754.182367][ T29] audit: type=1400 audit(134223481.948:709612): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3124 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 5754.184066][ T29] audit: type=1400 audit(134223481.948:709613): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3124 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 5754.217844][ T29] audit: type=1400 audit(134223481.948:709614): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=3124 comm="syz-executor" name="349" dev="tmpfs" ino=1878 [ 5754.219807][ T29] audit: type=1400 audit(134223481.948:709615): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3124 comm="syz-executor" path="/349" dev="tmpfs" ino=1878 [ 5754.221734][ T29] audit: type=1400 audit(134223481.958:709616): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3015 comm="udevd" name="/" dev="vda" ino=2 [ 5754.224126][ T29] audit: type=1400 audit(134223481.958:709617): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3015 comm="udevd" name="/" dev="tmpfs" ino=1 [ 5754.225691][ T29] audit: type=1400 audit(134223481.958:709618): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3015 comm="udevd" name="udev" dev="tmpfs" ino=7 [ 5754.401363][ T5219] fuse: Unknown parameter '0x0000000000000003' [ 5758.204307][ T5239] fuse: Unknown parameter '0x0000000000000003' [ 5759.167492][ T29] kauditd_printk_skb: 2403 callbacks suppressed [ 5759.167867][ T29] audit: type=1400 audit(134223486.938:712013): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5246 comm="modprobe" name="/" dev="vda" ino=2 [ 5759.177116][ T29] audit: type=1400 audit(134223486.948:712014): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5246 comm="modprobe" name="lib" dev="vda" ino=195 [ 5759.179282][ T29] audit: type=1400 audit(134223486.948:712015): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5246 comm="modprobe" name="/" dev="vda" ino=2 [ 5759.181928][ T29] audit: type=1400 audit(134223486.948:712016): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5246 comm="modprobe" name="/" dev="vda" ino=2 [ 5759.183830][ T29] audit: type=1400 audit(134223486.948:712017): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5246 comm="modprobe" name="lib" dev="vda" ino=195 [ 5759.200477][ T29] audit: type=1400 audit(134223486.958:712018): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5245 comm="modprobe" name="/" dev="vda" ino=2 [ 5759.202541][ T29] audit: type=1400 audit(134223486.958:712019): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5245 comm="modprobe" name="/" dev="sysfs" ino=1 [ 5759.204571][ T29] audit: type=1400 audit(134223486.958:712020): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5245 comm="modprobe" name="fs" dev="sysfs" ino=2 [ 5759.219623][ T29] audit: type=1400 audit(134223486.958:712021): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5245 comm="modprobe" name="/" dev="vda" ino=2 [ 5759.222091][ T29] audit: type=1400 audit(134223486.968:712022): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5246 comm="modprobe" name="/" dev="vda" ino=2 [ 5761.132051][ T5259] fuse: Unknown parameter 'fd0x0000000000000003' [ 5761.728976][ T5261] can: request_module (can-proto-0) failed. [ 5762.054516][ T5266] fuse: Unknown parameter '0x0000000000000003' [ 5762.421454][ T5270] fuse: Unknown parameter 'fd0x0000000000000003' [ 5762.950908][ T5277] fuse: Bad value for 'rootmode' [ 5762.991266][ T5273] can: request_module (can-proto-0) failed. [ 5763.307462][ T5281] fuse: Unknown parameter 'fd0x0000000000000003' [ 5763.444204][ T5283] fuse: Unknown parameter 'fd0x0000000000000003' [ 5763.812512][ T5287] fuse: Bad value for 'rootmode' [ 5764.176943][ T29] kauditd_printk_skb: 3207 callbacks suppressed [ 5764.177110][ T29] audit: type=1400 audit(134223491.948:715230): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3124 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 5764.180094][ T29] audit: type=1400 audit(134223491.958:715231): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ksoftirqd/0" saddr=127.0.0.1 src=30006 daddr=127.0.0.1 dest=42428 netif=lo [ 5764.182446][ T29] audit: type=1400 audit(134223491.958:715232): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ksoftirqd/0" saddr=127.0.0.1 src=42428 daddr=127.0.0.1 dest=30006 netif=lo [ 5764.185800][ T29] audit: type=1400 audit(134223491.958:715233): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3188 comm="sshd" saddr=127.0.0.1 src=30006 daddr=127.0.0.1 dest=42428 netif=lo [ 5764.207184][ T29] audit: type=1400 audit(134223491.968:715234): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3124 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 5764.209167][ T29] audit: type=1400 audit(134223491.968:715235): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3124 comm="syz-executor" name="365" dev="tmpfs" ino=1964 [ 5764.211099][ T29] audit: type=1400 audit(134223491.968:715236): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5290 comm="modprobe" name="usr" dev="vda" ino=1488 [ 5764.213273][ T29] audit: type=1400 audit(134223491.968:715237): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=3124 comm="syz-executor" path="/365/cgroup.net" dev="tmpfs" ino=1967 [ 5764.215369][ T29] audit: type=1400 audit(134223491.968:715238): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5290 comm="modprobe" name="lib" dev="vda" ino=1622 [ 5764.233101][ T29] audit: type=1400 audit(134223491.968:715239): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3124 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 5764.443978][ T5294] fuse: Unknown parameter 'fd0x0000000000000003' [ 5765.469843][ T5304] fuse: Bad value for 'rootmode' [ 5769.187010][ T29] kauditd_printk_skb: 2429 callbacks suppressed [ 5769.187104][ T29] audit: type=1400 audit(134223496.958:717669): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=5299 comm="udevd" path="/sys/devices/virtual/misc/kvm/uevent" dev="sysfs" ino=3459 [ 5769.189178][ T29] audit: type=1400 audit(134223496.968:717670): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3015 comm="udevd" name="/" dev="tmpfs" ino=1 [ 5769.190861][ T29] audit: type=1400 audit(134223496.968:717671): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3015 comm="udevd" name="udev" dev="tmpfs" ino=7 [ 5769.192293][ T29] audit: type=1400 audit(134223496.968:717672): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=3015 comm="udevd" name="udev" dev="tmpfs" ino=7 [ 5769.217489][ T29] audit: type=1400 audit(134223496.968:717673): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3015 comm="udevd" path="/run/udev/queue" dev="tmpfs" ino=6147 [ 5769.219378][ T29] audit: type=1400 audit(134223496.968:717674): lsm=SMACK fn=smack_inode_setattr action=granted subject="_" object="_" requested=w pid=3015 comm="udevd" name="queue" dev="tmpfs" ino=6147 [ 5769.221131][ T29] audit: type=1400 audit(134223496.978:717675): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5299 comm="udevd" path="/sys/devices/virtual/misc/kvm/uevent" dev="sysfs" ino=3459 [ 5769.223084][ T29] audit: type=1400 audit(134223496.988:717676): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="/" dev="vda" ino=2 [ 5769.224850][ T29] audit: type=1400 audit(134223496.988:717677): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="var" dev="vda" ino=1718 [ 5769.251765][ T29] audit: type=1400 audit(134223496.988:717678): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="var" dev="vda" ino=1718 [ 5771.057316][ T5340] geneve1: entered promiscuous mode [ 5771.077438][ T5340] geneve1: left promiscuous mode [ 5774.198416][ T29] kauditd_printk_skb: 2422 callbacks suppressed [ 5774.198599][ T29] audit: type=1400 audit(134223501.978:720101): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5369 comm="modprobe" name="/" dev="vda" ino=2 [ 5774.202200][ T29] audit: type=1400 audit(134223501.978:720102): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5369 comm="modprobe" name="etc" dev="vda" ino=95 [ 5774.204346][ T29] audit: type=1400 audit(134223501.978:720103): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5369 comm="modprobe" name="selinux" dev="vda" ino=130 [ 5774.217742][ T29] audit: type=1400 audit(134223501.988:720104): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="/" dev="vda" ino=2 [ 5774.220584][ T29] audit: type=1400 audit(134223501.988:720105): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="var" dev="vda" ino=1718 [ 5774.222438][ T29] audit: type=1400 audit(134223501.988:720106): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="var" dev="vda" ino=1718 [ 5774.224365][ T29] audit: type=1400 audit(134223501.988:720107): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="/" dev="vda" ino=2 [ 5774.246899][ T29] audit: type=1400 audit(134223501.988:720108): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3000 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 5774.249255][ T29] audit: type=1400 audit(134223501.998:720109): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5369 comm="modprobe" name="/" dev="vda" ino=2 [ 5774.251335][ T29] audit: type=1400 audit(134223501.998:720110): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5369 comm="modprobe" name="lib" dev="vda" ino=195 [ 5776.059758][ T5381] ================================================================== [ 5776.071867][ T5381] BUG: KASAN: invalid-access in dev_map_enqueue+0x4/0xb0 [ 5776.075745][ T5381] Read at addr f5f00000043e9800 by task syz.0.11780/5381 [ 5776.077352][ T5381] Pointer tag: [f5], memory tag: [fd] [ 5776.078564][ T5381] [ 5776.080255][ T5381] CPU: 0 PID: 5381 Comm: syz.0.11780 Not tainted 6.10.0-rc7-syzkaller-00141-g43db1e03c086 #0 [ 5776.082121][ T5381] Hardware name: linux,dummy-virt (DT) [ 5776.083084][ T5381] Call trace: [ 5776.083875][ T5381] dump_backtrace+0x94/0xec [ 5776.085143][ T5381] show_stack+0x18/0x24 [ 5776.085996][ T5381] dump_stack_lvl+0x78/0x90 [ 5776.086848][ T5381] print_report+0x108/0x618 [ 5776.087692][ T5381] kasan_report+0x88/0xac [ 5776.088616][ T5381] __do_kernel_fault+0x1a0/0x1dc [ 5776.089436][ T5381] do_tag_check_fault+0x78/0x8c [ 5776.090256][ T5381] do_mem_abort+0x44/0x94 [ 5776.090910][ T5381] el1_abort+0x40/0x60 [ 5776.091553][ T5381] el1h_64_sync_handler+0xd8/0xe4 [ 5776.092252][ T5381] el1h_64_sync+0x64/0x68 [ 5776.092872][ T5381] dev_map_enqueue+0x4/0xb0 [ 5776.093531][ T5381] tun_xdp_act+0x5c/0x2c4 [ 5776.094208][ T5381] tun_build_skb.constprop.0+0x310/0x430 [ 5776.095002][ T5381] tun_get_user+0x7dc/0xf94 [ 5776.095659][ T5381] tun_chr_write_iter+0x5c/0xe8 [ 5776.096684][ T5381] vfs_write+0x238/0x370 [ 5776.097538][ T5381] ksys_write+0x70/0x104 [ 5776.098404][ T5381] __arm64_sys_write+0x1c/0x28 [ 5776.099299][ T5381] invoke_syscall+0x48/0x118 [ 5776.100198][ T5381] el0_svc_common.constprop.0+0x40/0xe0 [ 5776.100882][ T5381] do_el0_svc+0x1c/0x28 [ 5776.101518][ T5381] el0_svc+0x34/0xf8 [ 5776.102120][ T5381] el0t_64_sync_handler+0x100/0x12c [ 5776.102792][ T5381] el0t_64_sync+0x19c/0x1a0 [ 5776.103707][ T5381] [ 5776.104186][ T5381] The buggy address belongs to the object at fff00000043e9800 [ 5776.104186][ T5381] which belongs to the cache kmalloc-cg-64 of size 64 [ 5776.105572][ T5381] The buggy address is located 0 bytes inside of [ 5776.105572][ T5381] 48-byte region [fff00000043e9800, fff00000043e9830) [ 5776.107461][ T5381] [ 5776.108164][ T5381] The buggy address belongs to the physical page: [ 5776.109035][ T5381] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0xf4f00000043e9240 pfn:0x443e9 [ 5776.110268][ T5381] memcg:f1f00000042a3a01 [ 5776.111440][ T5381] ksm flags: 0x1ffc00000000000(node=0|zone=0|lastcpupid=0x7ff|kasantag=0x0) [ 5776.113009][ T5381] page_type: 0xffffefff(slab) [ 5776.114379][ T5381] raw: 01ffc00000000000 f4f0000002c03a00 ffffc1ffc00d4cc0 dead000000000003 [ 5776.115336][ T5381] raw: f4f00000043e9240 000000008040003b 00000001ffffefff f1f00000042a3a01 [ 5776.117922][ T5381] page dumped because: kasan: bad access detected [ 5776.118720][ T5381] [ 5776.119149][ T5381] Memory state around the buggy address: [ 5776.120015][ T5381] fff00000043e9600: f9 f9 f9 f9 f4 f4 f4 fe fe fe fe fe f7 f7 f7 fe [ 5776.120934][ T5381] fff00000043e9700: fe fe fe fe f2 f2 f2 fe fc fc fc fe fc fc fc fc [ 5776.121770][ T5381] >fff00000043e9800: fd fd fd fe f2 f2 f2 fe f2 f2 f2 fe fe fe fe fe [ 5776.123067][ T5381] ^ [ 5776.124497][ T5381] fff00000043e9900: f9 f9 f9 fe fa fa fa fe fe fe fe fe f9 f9 f9 fe [ 5776.125942][ T5381] fff00000043e9a00: f9 f9 f9 fe fe fe fe fe f5 f5 f5 fe fc fc fc fe [ 5776.126817][ T5381] ================================================================== [ 5776.128089][ T5381] Disabling lock debugging due to kernel taint [ 5776.129445][ T5381] Unable to handle kernel NULL pointer dereference at virtual address 00000000000001d9 [ 5776.130026][ T5381] Mem abort info: [ 5776.130353][ T5381] ESR = 0x0000000096000006 [ 5776.130731][ T5381] EC = 0x25: DABT (current EL), IL = 32 bits [ 5776.131111][ T5381] SET = 0, FnV = 0 [ 5776.131392][ T5381] EA = 0, S1PTW = 0 [ 5776.131751][ T5381] FSC = 0x06: level 2 translation fault [ 5776.132129][ T5381] Data abort info: [ 5776.132479][ T5381] ISV = 0, ISS = 0x00000006, ISS2 = 0x00000000 [ 5776.132880][ T5381] CM = 0, WnR = 0, TnD = 0, TagAccess = 0 [ 5776.133233][ T5381] GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0 [ 5776.133656][ T5381] user pgtable: 4k pages, 52-bit VAs, pgdp=000000004610fa80 [ 5776.134140][ T5381] [00000000000001d9] pgd=080000004781e003, p4d=080000006d140003, pud=0800000049f8a003, pmd=0000000000000000 [ 5776.142163][ T5381] Internal error: Oops: 0000000096000006 [#1] PREEMPT SMP [ 5776.142792][ T5381] Modules linked in: [ 5776.143312][ T5381] CPU: 0 PID: 5381 Comm: syz.0.11780 Tainted: G B 6.10.0-rc7-syzkaller-00141-g43db1e03c086 #0 [ 5776.143871][ T5381] Hardware name: linux,dummy-virt (DT) [ 5776.144263][ T5381] pstate: 61400009 (nZCv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--) [ 5776.144782][ T5381] pc : dev_map_enqueue+0xc/0xb0 [ 5776.145144][ T5381] lr : xdp_do_redirect+0x104/0x240 [ 5776.145656][ T5381] sp : ffff80008b91baa0 [ 5776.146473][ T5381] x29: ffff80008b91baa0 x28: f7ff80008a798000 x27: f2f000000980815e [ 5776.147843][ T5381] x26: 0000000000000000 x25: f2f000000d0c0a00 x24: fcf0000009567780 [ 5776.148767][ T5381] x23: f2f000000d0c0000 x22: fff07ffffd2e9000 x21: fff000007f8d4d20 [ 5776.149660][ T5381] x20: f2f0000009808000 x19: ffff8000825ebd20 x18: 0000000000000001 [ 5776.150508][ T5381] x17: 0000000000000000 x16: 0000000000000000 x15: 00000000200003c0 [ 5776.151139][ T5381] x14: 0000000000000002 x13: 0000000000000000 x12: 00000000000692d3 [ 5776.151707][ T5381] x11: 0000000000000000 x10: fff000007f9fe258 x9 : ffff800081516894 [ 5776.152622][ T5381] x8 : ffff80008b91bbe8 x7 : 0019000000000004 x6 : 0000000000000118 [ 5776.153540][ T5381] x5 : f5f00000043e9800 x4 : 000000000000000e x3 : f0f0000006472fe0 [ 5776.154212][ T5381] x2 : f2f000000d0c0000 x1 : f2f0000009808000 x0 : 0000000000000001 [ 5776.154880][ T5381] Call trace: [ 5776.155173][ T5381] dev_map_enqueue+0xc/0xb0 [ 5776.155635][ T5381] tun_xdp_act+0x5c/0x2c4 [ 5776.156130][ T5381] tun_build_skb.constprop.0+0x310/0x430 [ 5776.156628][ T5381] tun_get_user+0x7dc/0xf94 [ 5776.156991][ T5381] tun_chr_write_iter+0x5c/0xe8 [ 5776.157539][ T5381] vfs_write+0x238/0x370 [ 5776.157914][ T5381] ksys_write+0x70/0x104 [ 5776.158478][ T5381] __arm64_sys_write+0x1c/0x28 [ 5776.158990][ T5381] invoke_syscall+0x48/0x118 [ 5776.159375][ T5381] el0_svc_common.constprop.0+0x40/0xe0 [ 5776.159835][ T5381] do_el0_svc+0x1c/0x28 [ 5776.160527][ T5381] el0_svc+0x34/0xf8 [ 5776.161267][ T5381] el0t_64_sync_handler+0x100/0x12c [ 5776.161621][ T5381] el0t_64_sync+0x19c/0x1a0 [ 5776.162259][ T5381] Code: d65f03c0 aa0003e3 f9400000 f9400c63 (b941d805) [ 5776.163018][ T5381] ---[ end trace 0000000000000000 ]--- [ 5776.163871][ T5381] Kernel panic - not syncing: Oops: Fatal exception in interrupt [ 5776.165036][ T5381] SMP: stopping secondary CPUs [ 5776.166596][ T5381] Kernel Offset: disabled [ 5776.167114][ T5381] CPU features: 0x00,00000006,8f17bd7c,1767f6bf [ 5776.168013][ T5381] Memory Limit: none [ 5776.169391][ T5381] Rebooting in 86400 seconds.. VM DIAGNOSIS: 21:41:32 Registers: info registers vcpu 0 CPU#0 PC=ffff80008011e61c X00=ffff80008263b020 X01=0000000000004822 X02=0000000000000000 X03=00000000ffffffff X04=ffff8000825e2f80 X05=0000000000006198 X06=0000000000002822 X07=ffff8000826eb080 X08=0000000100000822 X09=ffff80008263b080 X10=ffff8000826f73b0 X11=0000000000000822 X12=0000000000001866 X13=ffff80008263b080 X14=0000000000000000 X15=ffff80008b91b1b0 X16=3d3d3d3d3d3d3d3d X17=3d3d3d3d3d3d3d3d X18=ffffffffffffffff X19=0000000000000001 X20=ffff800082883b08 X21=ffff80008263af10 X22=00000000000000c0 X23=ffff80008263b000 X24=0000000000000000 X25=ffff800082634000 X26=0000000000000000 X27=f2f000000980815e X28=fcf0000009566d80 X29=ffff80008b91b570 X30=ffff80008011b5c0 SP=ffff80008b91b570 PSTATE=624000c9 -ZC- EL2h SVCR=00000000 -- BTYPE=0 FPCR=00000000 FPSR=00000000 P00=0000000000000000 P01=0000000000000000 P02=0000000000000000 P03=0000000000000000 P04=0000000000000000 P05=0000000000000000 P06=0000000000000000 P07=0000000000000000 P08=0000000000000000 P09=0000000000000000 P10=0000000000000000 P11=0000000000000000 P12=0000000000000000 P13=0000000000000000 P14=0000000000000000 P15=0000000000000000 FFR=0000000000000000 Z00=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z01=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000ffff91c96418:0000ffff91c96430 Z02=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000ffff91c96428:0000ffff91c96470 Z03=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000ffff927fca20:0000ffff91c96410 Z04=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000ffff91c96448:0000ffff91c96420 Z05=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000ffff91c96458:0000ffff91c96450 Z06=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000ffff91c96458:0000ffff91c96450 Z07=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000ffff91c96468:0000ffff91c96460 Z08=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z09=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z10=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z11=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z12=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z13=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z14=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z15=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z16=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000ffffd732a4c0:0000ffffd732a4c0 Z17=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:ffffff80ffffffd0:0000ffffd732a490 Z18=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z19=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z20=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z21=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z22=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z23=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z24=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z25=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z26=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z27=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z28=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z29=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z30=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z31=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff80008198f2d0 X00=000000000037ed7c X01=fff000007f8e98e0 X02=fff07ffffd301000 X03=ffff800082a4bdd0 X04=fff07ffffd301000 X05=4000000000000000 X06=0101010101010101 X07=0000000000000002 X08=7fffffffffffffff X09=7fffffffffffffff X10=d4f0558c8454df76 X11=0000000000000001 X12=ffff800082610028 X13=0000000000000000 X14=0000000000000001 X15=0000ffffd732a4a8 X16=0000000000000000 X17=0000000000000000 X18=0000000000000000 X19=0000000000000001 X20=ffff80008260ffe0 X21=ffff800082610020 X22=faf0000002e3ed80 X23=0000000000000000 X24=0000000000000000 X25=faf0000002e3ed80 X26=0000000000000000 X27=0000000000000000 X28=0000000000000000 X29=ffff800082a4bdf0 X30=ffff80008198f2e4 SP=ffff800082a4bdf0 PSTATE=614000c9 -ZC- EL2h SVCR=00000000 -- BTYPE=0 FPCR=00000000 FPSR=00000000 P00=0000000000000000 P01=0000000000000000 P02=0000000000000000 P03=0000000000000000 P04=0000000000000000 P05=0000000000000000 P06=0000000000000000 P07=0000000000000000 P08=0000000000000000 P09=0000000000000000 P10=0000000000000000 P11=0000000000000000 P12=0000000000000000 P13=0000000000000000 P14=0000000000000000 P15=0000000000000000 FFR=0000000000000000 Z00=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0100000000000000:0100000000000000 Z01=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000100000000:0000000000000000 Z02=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000001:0000000000000000 Z03=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:00d000a800000000:0000000000000000 Z04=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000002 Z05=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000001:0000000000000002 Z06=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:6edc4d3a2914b135:d8e9c869e2695c88 Z07=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:b20fae707afde253:388e9c6c4fa85ca0 Z08=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z09=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z10=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z11=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z12=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z13=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z14=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z15=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z16=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000ffffd732a4c0:0000ffffd732a4c0 Z17=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:ffffff80ffffffd0:0000ffffd732a490 Z18=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z19=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z20=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z21=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z22=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z23=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z24=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z25=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z26=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z27=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z28=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z29=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z30=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z31=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000