last executing test programs: 2m27.410401172s ago: executing program 0 (id=12749): openat2$dir(0xffffff9c, 0x0, &(0x7f00000001c0)={0x101001, 0x4a}, 0x18) madvise(&(0x7f0000000000/0x600000)=nil, 0x600722, 0x19) mremap(&(0x7f0000064000/0x3000)=nil, 0x3000, 0x600000, 0x3, &(0x7f0000a00000/0x600000)=nil) syz_clone3(&(0x7f0000000180)={0x800000, 0x0, 0x0, 0x0, {0x1d}, 0x0, 0x0, 0x0, &(0x7f0000000140)=[0xffffffffffffffff], 0x1}, 0x58) 2m27.220681824s ago: executing program 0 (id=12750): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="5c01000013000100"/20, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=0x0, @ANYBLOB="050027000000000008008500", @ANYRES32=0x0, @ANYBLOB="140003006d6163766c616e31"], 0x15c}, 0x1, 0x0, 0x0, 0x4}, 0x0) 2m27.120576061s ago: executing program 0 (id=12751): socket$unix(0x1, 0x1, 0x0) socket$unix(0x1, 0x1, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x21, 0x2, @thr={0x0, 0x0}}, &(0x7f0000000300)=0x0) fcntl$lock(0xffffffffffffffff, 0x24, &(0x7f0000000040)={0x0, 0x0, 0x10001, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(r0, 0x1, &(0x7f0000000040)={{}, {0x0, 0x989680}}, 0x0) timer_delete(r0) 2m26.877738767s ago: executing program 0 (id=12752): mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) chroot(&(0x7f0000000300)='./file0/../file0/../file0/../file0\x00') r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r1, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0) r2 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r2, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='./file0/../file0/../file0/../file0/file0\x00') 2m26.661902301s ago: executing program 0 (id=12753): bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="cb000000e100000071100a000000000006000000000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd96, &(0x7f0000000080)=""/201, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffd56, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 2m26.447578775s ago: executing program 0 (id=12754): r0 = socket$inet6(0xa, 0x3, 0xff) setsockopt$inet6_IPV6_RTHDR(r0, 0x29, 0x39, &(0x7f0000002e40)=ANY=[@ANYBLOB="00020201"], 0x18) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) sendto$l2tp6(r0, &(0x7f0000000340)="a2dd694004b5235a3cc4f4d8acf29c4d7660f7fae5fa71ac014f0f0e5f0d09308cd61c1a9077f74b", 0x28, 0x800, 0x0, 0x0) 2m26.447416225s ago: executing program 32 (id=12754): r0 = socket$inet6(0xa, 0x3, 0xff) setsockopt$inet6_IPV6_RTHDR(r0, 0x29, 0x39, &(0x7f0000002e40)=ANY=[@ANYBLOB="00020201"], 0x18) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) sendto$l2tp6(r0, &(0x7f0000000340)="a2dd694004b5235a3cc4f4d8acf29c4d7660f7fae5fa71ac014f0f0e5f0d09308cd61c1a9077f74b", 0x28, 0x800, 0x0, 0x0) 14.83733745s ago: executing program 2 (id=13225): bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x5, 0x18, &(0x7f0000000a40)=@raw=[@map_idx={0x18, 0xa, 0x5, 0x0, 0x1}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x5}, @map_idx_val={0x18, 0x3, 0x6, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x7}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @alu={0x4, 0x0, 0x9, 0x0, 0xa, 0x20, 0x1}, @generic={0xfd, 0x2, 0x2, 0x2a, 0xffff7626}], &(0x7f0000000100)='GPL\x00', 0x6, 0x5, &(0x7f0000000180)=""/5, 0x41000, 0x20, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0xa, 0x8, 0x6}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f0000000780)=[0xffffffffffffffff], &(0x7f0000000900)=[{0x4, 0x2798, 0x0, 0x6}, {0x5, 0x4, 0x3, 0x1}, {0x5, 0x4, 0x9, 0x6}, {0x4, 0x1, 0x3, 0x4}, {0x1, 0x3, 0xc, 0x5}, {0x0, 0x4, 0x8, 0x9}], 0x10, 0x3}, 0x6e) 14.486733752s ago: executing program 2 (id=13226): unshare(0x2a020400) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSTI(r0, 0x5412, 0x0) 14.256413877s ago: executing program 2 (id=13227): socket$inet6_tcp(0xa, 0x1, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) socket(0x200000000000011, 0x2, 0xd) socket(0x200000000000011, 0x2, 0xd) syz_emit_ethernet(0x32, &(0x7f0000000040)={@random="e90c610faca2", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0xe000, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x0, 0x10, 0x0, @gue={{0x2, 0x1, 0x2, 0xc, 0x100}}}}}}}, 0x0) 13.578698122s ago: executing program 2 (id=13228): bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000300)=ANY=[@ANYBLOB="1200000002000000080000000207000000"], 0x50) 12.039873032s ago: executing program 2 (id=13229): openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x40, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, r1, {0x7, 0x1f, 0x8, 0xfffffffff24b241a, 0x83, 0x9, 0x3, 0xabe6, 0x0, 0x0, 0x80, 0x8001}}, 0x50) syz_fuse_handle_req(r0, &(0x7f000000e3c0)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dc4e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ba045abcd5dfc67d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000230000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d838aae8c05dd22d0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000209bfd66eea210560000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001354c4b600", 0x2000, &(0x7f00000062c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x20, 0x0, 0x0, {0x0, 0x1e}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_fuse_handle_req(r0, &(0x7f0000004200)="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", 0x2000, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={0x78, 0x0, 0x80, {0xc, 0x3, 0x0, {0xfffffffffffffffd, 0x0, 0xfffffffffffffffc, 0x0, 0x8, 0xffffffff, 0xfffffffc, 0x0, 0x80000, 0x8000, 0x0, 0x0, r2, 0x1, 0x3}}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x20c01, 0x0) syz_fuse_handle_req(r0, &(0x7f0000006340)="7c7a6a069306f2c5ddf91f36944f207a1bd11284b4445fa3507bbc5def2e6fec4bb7c6001eafe381e277221f30085acd5d0c251f7c60c23874c04db6aa516f773dd2e57e746d1a085193c8b7664fceb1fe764d87f4395c66e5d4eee443a555692ebe80f3a11b8be74963f1a18c1d0cd71dec65e609e065e14615d2e8b283e55b4aa8b485f81ce52443d61fac9f08cf34f2997c05a63f98f988cfcea9a5650b37dff5817e5033b3912c226bd9bf68b528dec710584242fbdcf7dd0d55e394d3742039e6960bb589fb9ba18ac8e9e82cdbd08e9b584d0a8224cae3e9dd91e25699549007dc0d99165a73cda1c99fc48f6bfdb900c60e4481222505c58cc1108fbaf317d361d1f2d78f6db6e14b283ca9f1927f4f8a0f6f52818be03c7b257aec57f06a0a4279131a2bb0a13b23ab188ea50a686abb2f7e4d0f7a166f358e4cb886b7fbdf51cd9a153410dcc4cc5db7e8e94cc9ba2371a328480ad20f51d7fa012f367a0a8f9c882c47b5f714f0e1b35f72b2261989513c1428d648aa8ab8c12c87dfea38d5be0d49097fce804c9cd2ac8f61b68579853129351e3bcdbdae3371d2b12a150d94b3097161c226c50a1d2c1f8b4c10a986e21dbbb854ad1d26d0ce5d950835d14664ee8f58c537f5256b761b4707fe8d46cc1658798d285310a1cff127b1280cab3f1f633569391d5a7cc08aa1d108b93c38df397d90bbb81753930934df7dcaf8f960dff660fe239aa15cf48872668cacf4d664dc0809fe9d780ab202c3a968abb56655267c907eb3343809b2407105a5c14d53a3b17a9a1552314d27e13daf48a2bb7b2c9fc15aba9ae1d6325c11fbe8432c067efa72878ca56c6463b6cf4d29646905422908a4a1f7741d0049febed4fc2b7cc27154031e50a0ab297826383935bef6a0f968db92128e8a940509b5368146bdcacc852b9d0b4ae9624635f9e69f3a7bc8e6f3340c7de46f49feb20a46f11aef464fa6696a60865bdd0c40b1c411c9661fa9f6393a33a7eb4afaef3eb1ab4634a42baeea780ac6c0c4fc8cf7a92cf0592f993ac85bdfd6c18ba4b7cf4c4438a8330413de8365b4a080234f59edefca0c5ce9697b20cc7b71d04438c00cf3d557bd03b5e1b86e167d2d6e09714135ef720667d0f2e7ca54da419d1bf6722eda31381059216009cd8c99ba1d7f9ebc1bc021457a195fa5be2f0727a84cf4cac5e080f22c836a4955d5ed06bee2eec0d39abc5f459ac43596fee3b341dfbd7ce6f4e57ea42e1e8d4f65880b8b77d2ee27dc1efe95ff1bacf5aa14933456b68645380d0f2ef6284b9946857456d64f4cb656998e99e3e286f596b31c69a69d0ee8444ed838ca2f0ead1be9538e4e927239d0e65a3f871dcad33881f69592eed93a9fafc934aefa67bb87d582d0ae4cfbb5c50325774bbc259a277749751228d3610f95fd56e9fbccb288eca1b14c8255b6996a59c91efbb08440ed91cdd53b0aab82600906904cee2a117a06157e24fa822e1cf4f9db4c2e8a5e842cfc503e578e69002fbae194b6bc7c8b69aac7359292109b712eb49d21946f5ea2745ab77ef59950dcfd926df2aef20e85f2a14554aabb417f15c725c73edd4853926ad6c525afa2c65de213cee799c18d1ced9424d10d7076fc5862579702a5f91031381f41cb8d9899ab514cfa1c8c51437df9710271d8cf69e8900921cba296703f1a7b5234500c1625884fea594d836a930b06142a6e577cd9c2a32cae65e712624abeeffc423a5d5ed7bd75fcb1a82ecec8acd0da9918a5c7c189f14f8cdf37062f93b87f9188501556060ffc6eac435cb1624f2af688316366e03cfb869eacf83d9d45fce910c3347f810b614c2e4291e70471ca2b574241c3f3d9740c6a45c7296a2f275acbde72e513ef4e5a1123a57c2eb1bd023af716c16a7747204338f60b6e3ac514af50b21952c21592aefb6149828a5183ba581d5ee8647f374645ff941bab67bef760ce353b456c4b51c5d3a0c5372b1773b944ad67a92937dd838e1b6f550a1dca975d6230e430bcc278afed54e0621008b2f850107b0244359e3747be5282630452d432e5df0fd160795effed150f9396a7da5a1e4dce0c8f62280ff2fbfaa813859a671208b4b9f05fe450729b0efad83a790acd688a90e5fee5550de4ddeac70ecd125ad076c4e2b68652e6ea520e2b6b339b4b9dc219d853e06b9aa79d022e53607213fc254e15ec3e6b776d2b562997e0fe52b98c58e1c0316b22a4219460053da87e7baff7dc1892c2de2f324dd1169b977f3a6698d0234c78de3e46ba5824f3e373f264e8d28fbb4cc108a41fdecd4b629d92b0a65f84366bf504eb5a894ba40c89f9df854dc469fa174ac85cb8d2adfdc099ca9848a1032b2e2f375bd1544dfb69e33492e1a4b921ad7ff17c4c7e357ff69f42d2301c302ee2ed313f0e9a20ebfe028a8737d6e38bf179940179cb779b70c2276264cb4f23249db7d5f179baa842b70f5b287cf74ce1ff6b70a56be8f2fe15aeadca229804923d28a793838bc605eaf5dcd362f757577ebdac54b09fd73326720d3522d002a41a3b5f2450f48286a5ea45836b5ee77fc415f47e0716049ec2610d607737fd5a73b066b4876f9d744f6b3486b088dd3bfc3d393a27c6c799ce078e2ee348257b5ec1ba9de76da2a67ca912dc2dd5afc70834ceecbb8bd41f6e790294cacd5891bef1b4e2124dcd6dffdedee8f16b3bddc030429dcb0f98e6fe0649cb14eed3293fa4933b2ab8c0ec0ff4dbbced1e32dceb317252e715b872b00478cbd7b0275b7394a0ccfe9887410b32f1ce9266b3b83470ec982cf908507d3ad0cc366bff3759388b624701b3e0dc0e7928386b155b50b42a8e352622516beeeddfb79866a2eb1d360802cd19d62fd171267a0fece5f54e315a8cd49c41072f2a7a0baab5aadae2c1ff28e285b642f8d3869321bd18b4aed107feaa12d055b179a8ab7b50e2796d287a196e280d527b526c45c8aa98696d88a02d923d06fedf51336c0695c218e70448073921971093ea44b5352e10ce6cec26d082b93f69958165bd986f56650a62224c2d9fd044bd8fefd33544c6bd141b4cc211a087fa57c09e195c8edffe559048db738d1395f5e2625dd7cd035b8c76aad6c238fb52a7c5ff0965fc7122a5899746ca88abd699d6078623722fff92726e18613519f2b1927504fd5cb7a38ffa373c3883022f0387953530834affb5f05e0f44c24caa75561b2b63994493ab857fdc30900586fed09298d846e5936869b43d81c4b91902028e57a8f2da16355ccb7a77d29ecc8e66015e979b2f3edc5b8d77c45348dea55c9ed6b7465acf899f4bc1a7edcae0b0daf69ff85c504eea1294620b6d3dbb004575044a5ae7c110010c2cf39827fbdab3b42ac35d147fc53bb5e7de6c47091dc80c14b8da494b2e913d1a52085e29af19edc4a417346c5a896a3851cb6132511e0627d190b77623c8a3bb6085eff22ede7127f7988a1d388fb70ea20d5c1b2424c5aa83532bc5162a5d177968b4a46583f2d4b92d04a5f19145221aeaf724d92ea1d4dfb53021b47585bbe5ce35f8d09a83e13fdb1de8e52dc646d41e810879ce9c830959c3ee93f11a16d030d141863244395e3f847505fe6d9594a34009fec9a743c033b9793335684cc5c3d0eb0ad094f40a60264b02cd88c583c850d99c5b9c6c5dcef467ca3ea38f2aa42f5657cd940aeb12960efa18d571e4f958b9cd90918e069a486d84f214617ce29c0f2c26bf84f12f5036f26a8de0c8359f572654bf5ee06d38f741c464976d95ae3fdda45c2ed2d08ef71d3590e82d235e0fa357c568158791a195d4a2d9615e1edc85be64cfd169f925ffc4f636f86783cf43624a77bdb9b172228097f02f391df00668dafbd9932298b23cfadfd1b8d14a25cb408a440f930f0813de73c1eb2eb4b3c802d718a672453d0038965c6dc98db96fb4e06f1fda72782d0839d4e8b477ebdb2c73510db44f643ec7dc4fcb837806853caa35cf622aff9d44381d3f7adae00650cbb6f0334ceca14ec982dfb5817d7fd49251c203b6463a09c14885f754603291ccf0a7ceaa57284ee751774fa5ad72f9f7a32fa542947af40601e98057895f2869d4ec2db0d73930962535fc9e12ba7e6777cb458592bee505b367012ebd27b256fa0fac1452cf3b28eab573549b7c7a13752ca0189768f738d5f8030fe999f7bdc466d67bb32937ae469f1a1e21fac2ae2ab92a0a260bf0e9ce20625e82f88d0ed4d13876aed768765d77433bb9137d92d622df502aef574de82fe28063128fe5a1787ced99734c2f3f221e80d3baefd367d01d950ee1bc981b4b5ff86b2a96ab78fa3c1201303cab473103d89bb185afc77dd2cb7ac1564045036fe9fcf85af5d73a7553bc45bf5e221564540982db2f81e612e7c1715d3498b8d7851c0160146d6eaae9e30c81dedfca8e7122fcb69b26b396629b723f1e1822b8d5d8f2ac583728a5ab40010f88aa42f37f2031a3e99d8d6661e63f86f65af521066ea6af89c89e1748521b8368cd03409e895a941025ee777653f55e66cd1a0cca21308666260c3b9a306ddadb322eb1d09f7b27fd570cd35b6ec88bb391e3ae4745e17fb4dd7aef1d75b4ebb91e6e7789b241566d7c0cc97a3a126ed50b0cb621e015414f62641afd85bad78470463f86d8287aa56d331911c23c4cae8e5dfea33f3789c03d61f51c590417b5ff9f1aa35ab6a15364296c5f9399216ce565210a4075ac5e43e916850774a127f9174d95b43d839e056b4a7d679bb8804951ca171c0b59f4d6f32c4fe8f908b9a1614591f5d1e1cf3348e02317ec4655c693417a4c4e7007a8db02faa1634f8eea9c9bbe5b149ce2279953a54884392dc7251dd38670fd59d9d1da5203340909d50f779e864339014bcb545d825cdcccedc558a1d01a2784b8f499ce9fa2ddb0dd1dc0b93d1b282a96cb4ecf152474dbc4b2853b30c8e5fcea85bdab949f5eb1e98d81c102c349f680230082db5aba9e20209c35b16598507d28211b49763b598a7e60519d5b28b67c027cb2657cf2ac7c7455291fcfe63f0b43afcd3afaea934da97c209d02e5b47a686c1c284aeee5d662fd9d9be7c576259d9f1a36fc0f7fe329a1da1dbe078381233940745fc28a56db98b1a8442325168158e3f0b3cbf8a368d19dd20cdfc1c4f3893a30a49223050159b0bb8b7c59ca705ae25453988d87ca6cdd2bd2fe37847ba67cbcf7a494925a8598b7b50a741c9ced10ea08e35c422b79265561a07f40ebb89bc46069a1c1ad95949fe757a76ff6b5386a043abc967c367a9d86b54d374e573540dfc1f6d396f398abe9735f523b778fd124ac1e1eb832a66dd4b1838a50e6a4eb1b95b8a60a94f067b24d1194976c539d5ec287a261bf25904575be3ff49e7411a8dc09739649828124c14fc2b89dad1f3f5725db2e45f5a447cd3e4bdf9e1e95c5ad7c76fcf0c1021cb6c32e6985e1d113030d534eecb0dff2554183ee18da2da5d21a8b994a81f05e0e6ae89b20bffb4be333d1956270da23e9905830921b1f3d615a56a20b11d45ccd1d22b910e33f475a92c31fa5b4675ddee18336d0ee7b75c07df2a9d4ad53d83142219a00aef15e1e9dace0f039d63a530fdf671a54aba3882dad0d439632af5576726c3aa095cc1a0a03063e8a6581b78bef501acc24b05a0150d8f683c90e8e5e283a49f898906dab926e544ead48cb9bf9a6e1bf140b5273443b8cb8166b2d8a5464a3e9d9f4246ac81ea91b33a0b399dde9f5efaf792bb04cfa028f40b7c92db2d9c33e16ef58b9263350879ea94e581a1187b2d1931b1cd7606a76bd8943b7c3098a33bdf476960af7bdf2854b1336e72feb603b8bb2242df0839d157843d369a50a615068ff5d99ecebe8dc19158a6c654e853cedf860a727bf8140c062f5d307fdcd150ad0af03d2c3a913b91047858ed6382d2d2d30f5c0bd419c2cd4047f225107ea8bf4a3a69384f16b5b5bb2655bdb750db4e975794592987df95f6a90374b0a08769b2c957faa16a21270196afba76b4527f01f0c5db7fa16e2da81fc49336e20bc3ee1ccbcb62255c84513d9ceb706f03c25000517070c03b7bce838e6b6cbc7f767959fbd62e11ab7ea6d760cff674a4296e6185eb348028b472290922160f3ea36c22c8375a016f505017c0a0e041dd8e52b4f19ccfc701109a19391a059d77db239d40a06d84a6f0ccd08aaad764e53ad1da19ee825a4d25ca7cd538289bffe135486ec1614e28b3682c7081a1b0a2c7272f4e36f6d0d9e68d84209126dc59312d48eed1c63c90efeadd472259392c28746abf394c5c6c97d3fb00b70a74c313a817ee1719c33f16d58f297fc7eacbca5803df115745079c5434e851ad6c1f0e8ba0bdbb66cbb6789b89a23526b476ad0f2cea0907e72702f93d37bdfe7b39fb9b33fb1111e58f5c45db8cc38afe4e03a318aa0690afb870a67aeda7da9640fdad1e1f551dd4757c69b4f523b616e502514a2e35495916f2e5ddab1ad9534644d99ec56e818caba173773aa5e45104deb869b23063eaea5542d3bc503a6948b83779aa46879443cad02477451b46429f1f67560c31d4377f96031ab94866a73be753c4ab91cc6576c3991c3423103ebae604e887c56cbacb9e95b8b46300b62e698a6456a0d175cf682eacabbe301e0b0ea34f963daed0dc6c1b75fa5e3870959913e69e61911d9ff646e9c6bab33fe566871027e861577c4d7fdfdf94ce7ac1a3f6d29daf28d660431a89c0b56c4b95090e2ca5df62c1e5c5dbf98f067751819d4c5914aa33883b7b521aab30d14e1cfae74fcf3ad4b2cf9448009d3223ad984e0c50f92d465573a6fc2894f8a5d4e855316738ecfd6a6c157d39b5c44d80a7cba944cf9f7a701899859821cf2bc248459f7a350fefba53c1481a7197f024f2eb74251455c06f4b82dfcf3ccf3e3b98b898fa1b16c310125e5e9fd4019acccbe91b4d842ddd52ee56f6d3112dec80159d6d3ef93bca70e7afcccb223361c39addbe3c429934cd0ae35f36a8f6309f08e36b27341db1f21fd8a148b239361b31a85f53bd1ad49fadace6c64d5f4363427fb2f268e8aec6d81cdb7f1252baa4652dc55881661114bf98cdf17190379591f0e22dc97e790f53f463bbb0ad0ead78ddf7dfe2e26052acc31cfe52b822afd5ec5c75957106cb5c368c09252ff3e4f624d90e599279fb985ecdb7d8880dfe05ac2d2da83e34e2b9b88f5dd60107a4509902fcddf4a36605e5c7a2606a4aea9fd4b5b24ca6b67d6945d133869cf9276d8c30b08c2a9f4bf03f4e0b956fd5f3c80b958ac5c41e4115b6708799c3102bd8b6c7fe17ff8c3f89c7437255faf69d1e16074086dd44d038bc0211ac74743169b462dbc085d77bf45eea72bf8348308bf48feea02d739a0fee9fbf71023ef8c6828da1aec8618cc2345ff663f88bc52a990e6b9591425435b0c7900ea4068f5aa6345e94254e259a71290fa23281658a6a165d1dee10dcb355518264824665ff2c5538de9ae4487782911f79e0bb09bc2c2d8e0d91b33cbec839075c9b38c848e9d2fad7368e96c1932042c3e85fd95b7d4500e6cae9e649082e9d5ca6f2cf91fc7ecaccc1049525d4325003424cacbd6eb5b8cc30b6893bd1ef46a8e7cbcc87dc2dda5c802ef1f8bb607c7457eb161254dc0feb60ed5ed0383fdb4db91d7e41d45c8eb80c1981e801ef05703f97f8710a2e00eb0559f854f700f946937b9e68c75ad6d0015d5d79be5423d0d846bc76f92ea7ebb0302b3d3c695c0aafa83b2bf029a444709cbf2cefbdcc7eaf3dd7a16f8ca8c861e883db10d433f7fec547be45e6829962e430bb3c93e8cdfb342c1cb7e53d8a6ea625d5574c4b4303f61c4338a658e652ab2bc0029c0a78a5114f495a439956909cf42128cb4348affbecb20b7fea98e22160e9a58e7666a00e7b37fbec4bd3860d66a39d1232a57e8cc50710c5c666f7efa98f16f9a02d843c94b0842a383945d06899998ff2fd01ffb58ab53ea89b2c93634c48d0420edb9791b8e451b35b534b8b2874c4859c684cd14afb5335a2555c75ad9df018635bb7131a7ef204ccecfed33a675fc51687e3f8818406fbf58e7b5fde1ca96153817e1b632e89a78d967eb6a34af1dac0d9ffa448b7b9bac27afc305a7b47febbe0a37036c18aef6852b1b2759d67479f9edb169e796d949844a1624b1e832a2eee9be36dc5866d6fde431cfcbd4e305d322c9dd07f83b5b361daaa74bfc9fbce8b447210c327468659ecbb0a5fc20d0cb79de7d1d70bf251c81d5f38711f3f4bd4752685b077058beb465711b1359d2a7d2f59216c5a807121bb97e7ccacc46526e4072f1d6de3b487d492fed0995e2273fa3bb115bd08d32d8e57eb2aa8f9d3b81babd1b8334c3a5e69422b75502ced3793d07b9bdf38e9d9fa1d2e48c7886dfc41985e8ffc49f09c4ba58ddc3b4cbf562b591f8939ced5d18214a77cc753075334a157373cc33cbc07a731cd6342492f5e05f78108e627bc88777203c76632bbe0120924c7a51bbfc9dc789a5695b7c95ef544935032fb81d499c454a2d78727875c20bc8a48a9f23cf6595c17c9cdaa8d04bab8ac567ebd3bbcdb40e11f1893fea3970f176f75f38d17d6ee1bd4ab76c660723a776bc72319199ab82c40ac4a9f4f475e8fd4643a4be8601cb5172e112c236c7c430078601bf183a59a03885e994c1116a9d4ef275790ff2417ffd85b43274fc57654466fa394958aeb11f343c3439604af13997011af70b67df1a9dfa4cdb751a2dc3e5bbf42f7b9ebc6dcebb2dbdc57d7a2cef7409dba307b7cf6eab148a924566341d035cabc877c68d0fbfaebdd39c16304b63a1bae376fb4650708bf5695dfd7ffc01f43f0021f622de0b116ea494454497337a0ec469963de7f9d2b1d6c5a7a0a7835777a78a2b9e16eec696446981d2fea550f011419b96f7b2018d027b87fc715521b0302bd7b5b3bc5f033346029eced73df07dd1bb1f91848376b40b9e9da7233e7832edcc7b54ef6fd320d19efce78d58ea7020fbbdf77612dc8a4f3281915ac9706f346e405b9f489f8f2e9a2decb8d18bec1e5f735a4ec69bba4dc5d36c9c1cc50b92fe67b2cdd53fa671c0cbe331abdf46787e7c9912b951aa20700dba6cf5a209fe5c9c61ef62a8e2e572ec774b2d0f42d570633fc44d44826e848d47a8f386a5704e0a3eaf1d06617181aeb166334ab55d5aedccb27abf19a42a480930e25465721336c70a2ea7799d21a3659124ac9503efc99c1b13ca2b9723e3e338055f9b3cef7502017ebbb09a64b06462db353a5c562101cb7fbf29e056deeb1ff0c7bc877210c941c87401ceae52bcecc83e87655069ab931bd813c1a87d67554f5d2cf435e6dd92a515c22f5d5a9a44ebc81e9c4849104343b80824005619312a9e349d996e366d381da42edad1a560bf5e31ecd049e92ceaf42954958600a7868599fe10e9b34587368d3044250c3d1a8ba6c8dcb6d318d4f9e71c2d33fc74cb57620a8343258d072f3aa767b4b178f3f66d5a713dae2426296c12edf9ee37636869e30df64cd3855fae20bc7602c1b7e6c8246ed4be71231a5ec7b5e7a9ebb08bf8667d8f2900ecdb0a0addc14a2328eebc448db13013e6a3c1a661065e5ac0a04b5171bd84c9d9d947a6c31257ed13a966530c5e20168c100117cf82b4c00ea3ad00ea65e1af89535b3f11a1418ddad33db8cec281543732d2ff4eab54b12cc95f7d872e75bc01bf6c580540b0e26413c6c2321ddfb0447bdb6acf05ddf2bb92534a3a5f37d6da882289f6fefc6a213cdfcf34902137fa3b982b2b4c27c611f08909a18405482f1e3a2bf3635d3e970457541da16e37bb3c422cceeb484bb64c78724431a543ecf4ca851914c1555e3b785ec87bba3769927f6c29f80e7ae8632bdb9acdddf7c3b5580740d9b2bfc25086c9566844136f3fac74f429121f86c378c68c20a194b0c98b1e92991954cbf60477e217a2e25297fc7b18972e40c531ec19e1eea193bbc8893392d8528c6a0375bcb4b082d20d5c47cb330bbb4b74b91ab55d4a0d3e1dee8182c581e8e70ac30108eeb7185c6ea3f786881ad124e1404651ee95cdb0fbb0d0f4a2b43c795ec1cd4e46234a88862d57903ce878b641004fb637341e5d6bf5163f1a3467b828f6eea96c3c2bb79503687867e11eec32dec452e0fdd2eaacfc0a477ee839ef049855da734d18212142dfe2a95ab9ad9bc4f98c3bfa34134c7e6c9f8669303314d4e8c1bc5475e8fcf418cbdb3246ebf393d911cdfee8f2550dc1593ece59ced81a4ffb2484f9c8ebed0aed8d418138445c4e96b209adcc4afd70f09901662daa2c8c557d6039768d97e6b9518f0de4ac2e0187ba08a4a9128d3e632fca102137338b5e568f12c7bd28db772c800fb5f4d4e683b201840731bb7c034235cd73313cde88891bbb31597bb537696e6c987302297f9717b8053779aed447d33ef9129e84d3031fa9b453bd5731fb010ffd19a9133e0ccbec2461cdd31ba294d68c60a8535b15584bab6e6d0ce6c1cef4755bd5f7d90f4debb40af1437a19a96ef9c0709692156152091c7efb58f2d39a65b96416dc09e8091ae08d9be5235a3c1ec062862baa1aab788f28e83ba4635cecc6671f2320f42b4f711e7d0fcad89d6727d3630da1ef35e32dee39eda665946abe6224f17f2acc29e62518fd51eb7f193d9bb16c38204069098c293fdce24c1c79229fd08622a4256b581cffce12e46c20248dc902753f0e3c91f9685b3d45f984620e262b3487d67d152f1c50de3fd2067a9d3debf715f346dd2f712c55545336a9036ba82bb06cfae59a48d083c3388f77790c9639fa0a9c33f4c66c7513042bffb765c2a4b3657dddf0ea094d8d79018f66c8ef8e9df980a89906275edf4a467a5db0a623976899f0efd167aab6ff385cdde59027a95a570277cb94ebce503906c28527e3114eb9ed739d0c2f4cf82786b35c0054718f47381ed8ce9b107e1f1019be5fc877166da667036f0c1b84e2b5118b5f4babc052d997e5f1e8c4cf45eb26430b74d9e1df3735b8d5df559903143d983e974bed6cc608c2580a991bdd3628ec676d348de8752cafa80c1661f162e35c25fc0ba0198423f83214fed800f9355ac8ea67951cfeeb3736b50c1e14d45d33aa25fc72c38702bd5dd217842e54114f4799c45ff1b7cec9729382ff7fc3ff80cbe1a13d03e19eecd7de676f6791fe34143ae30c97da9623907d974a37b65d0ef5d46b718d58541c6b1902814de71218ca7396ceb5fdacdc3cf4d110862402e7cc6254f1e44e28593fd443290262db75fd482ce1d305d6bf9fd3e5e0efbedac5a4d097650b111e6e9e1b2c66a23ac5bf27ed78d25d1a54c16ca4287126736c2f17ab73e683798c29d16481775ada8e20d94b00b6b29654b18f60e2853fdc7d3ba55d7df660db90288b6f440efd19f0478047b12c7b07ab2b1c9529597e6462d20612e6c3b6d1b1d11305f8ddc811860450504b7cbf9794edd0d07c25ab6307d74afdce958355eb919dcb1fcb8038c6dd5e774ee398dc8553a9ddeb551f", 0x2000, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0x18}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) writev(r3, &(0x7f0000000200)=[{&(0x7f00000003c0)='n', 0xfdef}], 0x1) 6.57701325s ago: executing program 1 (id=13249): sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYRESHEX, @ANYRES16], 0x40}}, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000100), 0x76, 0x101301) ioctl$USBDEVFS_DISCONNECT_CLAIM(r0, 0x8108551b, &(0x7f0000000380)={0x0, 0x0, "5a77bd318786aeb879ca62cdab2a0000000086d85b25a5665a3247e500f61681905db88235f8a5447dd2a2ed6e91626f068881e50f6853772b21a100efb76cba37ff3111d6847e8b9398a646717af75fc008daefba68e6222103472bc55704cdb72b4b996ed831f3b802549db3a8ffff7d34171113d806726615380fe65a6a0a72e1ac2b60bd6276fd8bb6363d10f70da60fd53ded22c87eb2be010e4a62fb73c33424b437bb192c9d06ea6ed04983fe5c5ca033dfce0a82575ef14eee686be0fc58e384f93a13f4e8bbf599394baea3a9ca1864f0a35d6cc38fca32ad6b39905a9727d2001457df7be7e1aefe363590d1f600"}) ioctl$USBDEVFS_CLEAR_HALT(r0, 0xc0105502, &(0x7f0000000300)={0x1, 0x1}) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$IEEE802154_LLSEC_LIST_DEV(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, r1, 0x100, 0x70bd2c, 0x25dfdbff, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x10}, 0x8010) 6.347883245s ago: executing program 1 (id=13250): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000140)=@req3={0x1000, 0x3a, 0x1000, 0x3a, 0x7ff, 0xf80, 0x3}, 0x1c) setsockopt$packet_int(r0, 0x107, 0x7, &(0x7f0000000000)=0x1, 0x4) syz_emit_ethernet(0x102b, &(0x7f0000000100)=ANY=[@ANYRESDEC=r0], 0x0) 6.114573701s ago: executing program 1 (id=13251): syz_usb_connect(0x0, 0x24, &(0x7f0000000140)=ANY=[@ANYBLOB="12010000e2793b10d10501200006010203010902120008f7ff00000904cf4e07070e513478bfb413227e3024af8729c5"], 0x0) 5.997468818s ago: executing program 1 (id=13252): bpf$PROG_LOAD(0x5, &(0x7f0000004200)={0x12, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000061182c000000000095"], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x1, '\x00', 0x0, @cgroup_sock_addr=0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 5.894124215s ago: executing program 1 (id=13253): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000400)=[{0x6, 0x1, 0x2, 0x7fff7ffc}]}) sync() 471.74µs ago: executing program 2 (id=13254): r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, 0x0, 0x4000050) recvmmsg(r0, 0x0, 0x0, 0x80, 0x0) r1 = syz_usb_connect$cdc_ncm(0x0, 0x8f, &(0x7f0000000580)=ANY=[@ANYBLOB="12010000020000402505a1a440000102030109027d0002010080000904000001020d0000052406000105240000000d240f0103050000fd0000000406241aff072908241c0101090000142413099f33760bf14377323063f9c8a04d113905241510000905810300020800040904010000020d00000904010102020d0000090582020002e1ad00090503020002"], 0x0) syz_usb_control_io$cdc_ncm(r1, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r1, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r1, 0x0, &(0x7f0000000000)={0xfffffffffffffee0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x20, 0x80, 0x1c, {0xff, 0x2070, 0x1000, 0x9, 0x4, 0x8000, 0xfffd, 0xec, 0x3906, 0xfffc, 0x3, 0xfb}}, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io(r1, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r1, &(0x7f0000000900)={0x14, 0x0, &(0x7f00000008c0)={0x0, 0x3, 0x1a, {0x1a}}}, 0x0) syz_usb_control_io(r1, 0x0, &(0x7f0000000940)={0x84, &(0x7f0000000540)={0x20, 0xf, 0x3, "779e4c"}, 0x0, 0x0, &(0x7f0000000600)={0x20, 0x0, 0x4}, &(0x7f0000000640)={0x20, 0x0, 0x8, {0x60, 0x10, [0xfff0]}}, &(0x7f0000000680)={0x40, 0x7, 0x2, 0xb}, &(0x7f00000006c0)={0x40, 0x9, 0x1, 0x40}, 0x0, 0x0, &(0x7f0000000780)={0x40, 0x13, 0x6, @random="3d8933f46c45"}, &(0x7f00000007c0)={0x40, 0x17, 0x6, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0}) 0s ago: executing program 1 (id=13255): bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x6) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000380)=@abs, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000000), 0x651, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000005c0)=0x14) r1 = syz_open_procfs(0x0, &(0x7f0000002040)='net/tcp\x00') read$FUSE(r1, &(0x7f0000000000)={0x2020}, 0x96) kernel console output (not intermixed with test programs): 102310][ T30] audit: type=1400 audit(6358.900:560673): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3307 comm="syz-executor" saddr=127.0.0.1 src=51556 daddr=127.0.0.1 dest=30006 netif=lo [ 6359.106284][ T30] audit: type=1400 audit(6358.900:560674): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3307 comm="syz-executor" saddr=127.0.0.1 src=30006 daddr=127.0.0.1 dest=51556 netif=lo [ 6359.391768][ T9346] 8021q: adding VLAN 0 to HW filter on device macvlan3 [ 6359.415159][ T9346] bond1: (slave macvlan3): Enslaving as an active interface with an up link [ 6359.726460][ T9346] netlink: 'syz.0.12464': attribute type 10 has an invalid length. [ 6359.728155][ T9346] syz1: rxe_newlink: already configured on syz_tun [ 6360.666959][ T9363] netlink: 'syz.1.12469': attribute type 10 has an invalid length. [ 6360.675906][ T9363] rdma_rxe: rxe_newlink: failed to add syz_tun [ 6362.610773][ T30] kauditd_printk_skb: 4450 callbacks suppressed [ 6362.622570][ T30] audit: type=1400 audit(6362.130:565101): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=9376 comm="syz.1.12476" name="/" dev="proc" ino=1 [ 6362.661177][ T30] audit: type=1400 audit(6362.130:565102): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=9376 comm="syz.1.12476" name="159" dev="proc" ino=116548 [ 6362.662784][ T30] audit: type=1400 audit(6362.130:565103): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=9376 comm="syz.1.12476" name="net" dev="proc" ino=117131 [ 6362.664837][ T30] audit: type=1400 audit(6362.130:565104): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=9376 comm="syz.1.12476" name="netlink" dev="proc" ino=4026532728 [ 6362.665169][ T30] audit: type=1400 audit(6362.130:565105): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=9376 comm="syz.1.12476" path="/proc/159/net/netlink" dev="proc" ino=4026532728 [ 6364.727972][ T30] audit: type=1400 audit(6364.510:565106): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=3131 comm="udevd" opid=9042 ocomm="udevd" [ 6364.728438][ T30] audit: type=1400 audit(6364.520:565107): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=3131 comm="udevd" opid=9047 ocomm="udevd" [ 6364.729724][ T30] audit: type=1400 audit(6364.520:565108): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=3131 comm="udevd" opid=9040 ocomm="udevd" [ 6364.729966][ T30] audit: type=1400 audit(6364.520:565109): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=3131 comm="udevd" opid=9041 ocomm="udevd" [ 6364.730140][ T30] audit: type=1400 audit(6364.520:565110): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=3131 comm="udevd" opid=9169 ocomm="udevd" [ 6365.681357][ T9391] netlink: 'syz.1.12481': attribute type 10 has an invalid length. [ 6365.697988][ T9391] rdma_rxe: rxe_newlink: failed to add syz_tun [ 6367.129840][ T9416] 8021q: adding VLAN 0 to HW filter on device macvlan4 [ 6367.155316][ T9416] bond1: (slave macvlan4): Enslaving as an active interface with an up link [ 6367.420376][ T9416] netlink: 'syz.0.12491': attribute type 10 has an invalid length. [ 6367.428226][ T9416] syz1: rxe_newlink: already configured on syz_tun [ 6367.619011][ T30] kauditd_printk_skb: 4052 callbacks suppressed [ 6367.620742][ T30] audit: type=1400 audit(6367.420:569163): lsm=SMACK fn=smack_inode_rmdir action=granted subject="_" object="_" requested=w pid=7407 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6367.621063][ T30] audit: type=1400 audit(6367.420:569164): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="loop1" dev="sysfs" ino=13591 [ 6367.621261][ T30] audit: type=1400 audit(6367.420:569165): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=7407 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6367.621470][ T30] audit: type=1400 audit(6367.420:569166): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=3131 comm="udevd" name="power" dev="sysfs" ino=13620 [ 6367.621662][ T30] audit: type=1400 audit(6367.420:569167): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=7407 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6367.621859][ T30] audit: type=1400 audit(6367.430:569168): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3131 comm="udevd" path="/sys/devices/virtual/block/loop1/power" dev="sysfs" ino=13620 [ 6367.622060][ T30] audit: type=1400 audit(6367.430:569170): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=7407 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6367.622260][ T30] audit: type=1400 audit(6367.430:569169): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=3131 comm="udevd" path="/sys/devices/virtual/block/loop1/power" dev="sysfs" ino=13620 [ 6367.622472][ T30] audit: type=1400 audit(6367.430:569171): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="/" dev="vda" ino=2 [ 6367.622666][ T30] audit: type=1400 audit(6367.430:569172): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=7407 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6372.624320][ T30] kauditd_printk_skb: 8802 callbacks suppressed [ 6372.630468][ T30] audit: type=1400 audit(6372.430:577975): lsm=SMACK fn=smack_inode_rename action=granted subject="_" object="_" requested=rw pid=9396 comm="udevd" name="b7:1" dev="tmpfs" ino=11216 [ 6372.633209][ T30] audit: type=1400 audit(6372.430:577976): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=9461 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6372.636712][ T30] audit: type=1400 audit(6372.430:577977): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=9461 comm="syz-executor" name="/" dev="proc" ino=1 [ 6372.639390][ T30] audit: type=1400 audit(6372.430:577978): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=9461 comm="syz-executor" name="/" dev="proc" ino=1 [ 6372.642078][ T30] audit: type=1400 audit(6372.430:577979): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=9396 comm="udevd" name="/" dev="vda" ino=2 [ 6372.645757][ T30] audit: type=1400 audit(6372.430:577980): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=9461 comm="syz-executor" name="192" dev="proc" ino=117271 [ 6372.648538][ T30] audit: type=1400 audit(6372.430:577981): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=9396 comm="udevd" name="/" dev="devtmpfs" ino=1 [ 6372.651427][ T30] audit: type=1400 audit(6372.430:577982): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=9396 comm="udevd" name="loop1" dev="devtmpfs" ino=639 [ 6372.654025][ T30] audit: type=1400 audit(6372.430:577983): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=w pid=9461 comm="syz-executor" name="oom_score_adj" dev="proc" ino=117272 [ 6372.657612][ T30] audit: type=1400 audit(6372.440:577984): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="/" dev="sysfs" ino=1 [ 6373.092066][ T9467] syz_tun: entered allmulticast mode [ 6373.098489][ T9467] netlink: 4 bytes leftover after parsing attributes in process `syz.0.12512'. [ 6373.149735][ T9467] syz_tun (unregistering): left allmulticast mode [ 6373.165551][ T9338] smc: removing ib device syz1 [ 6373.181086][ T7615] syz1: Port: 1 Link DOWN [ 6375.648117][ T9486] netlink: 83 bytes leftover after parsing attributes in process `syz.1.12520'. [ 6376.416448][ T9492] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 6376.420991][ T9492] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 6379.599043][ T30] kauditd_printk_skb: 4060 callbacks suppressed [ 6379.600643][ T30] audit: type=1400 audit(6379.410:582045): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=8876 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6379.603353][ T30] audit: type=1400 audit(6379.410:582046): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=8876 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6379.607273][ T30] audit: type=1400 audit(6379.410:582047): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=8876 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6379.607703][ T30] audit: type=1400 audit(6379.410:582048): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=8876 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6379.610776][ T30] audit: type=1400 audit(6379.410:582049): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=8876 comm="syz-executor" name="88" dev="tmpfs" ino=461 [ 6379.618766][ T30] audit: type=1400 audit(6379.430:582050): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3307 comm="syz-executor" saddr=127.0.0.1 src=51556 daddr=127.0.0.1 dest=30006 netif=lo [ 6379.620090][ T30] audit: type=1400 audit(6379.430:582051): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=8876 comm="syz-executor" path="/88" dev="tmpfs" ino=461 [ 6379.622743][ T30] audit: type=1400 audit(6379.430:582052): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=8876 comm="syz-executor" path="/88" dev="tmpfs" ino=461 [ 6379.630638][ T30] audit: type=1400 audit(6379.440:582053): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=8876 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6379.632041][ T30] audit: type=1400 audit(6379.440:582054): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3306 comm="sshd-session" saddr=10.0.2.2 src=46664 daddr=10.0.2.15 dest=22 netif=eth0 [ 6383.704934][ T7617] usb 1-1: new full-speed USB device number 18 using dummy_hcd [ 6383.902819][ T7617] usb 1-1: config 0 interface 0 has no altsetting 0 [ 6383.903203][ T7617] usb 1-1: New USB device found, idVendor=1e7d, idProduct=2e22, bcdDevice= 0.00 [ 6383.906968][ T7617] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 6383.938831][ T7617] usb 1-1: config 0 descriptor?? [ 6384.454511][ T7617] hid-generic 0003:1E7D:2E22.0009: hidraw0: USB HID v1.01 Device [HID 1e7d:2e22] on usb-dummy_hcd.0-1/input0 [ 6384.604585][ T30] kauditd_printk_skb: 3767 callbacks suppressed [ 6384.605988][ T30] audit: type=1400 audit(6384.410:585822): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="block" dev="sysfs" ino=11781 [ 6384.608672][ T30] audit: type=1400 audit(6384.410:585823): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=9525 comm="modprobe" name="lib" dev="vda" ino=219 [ 6384.611550][ T30] audit: type=1400 audit(6384.410:585824): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="loop1" dev="sysfs" ino=13591 [ 6384.616238][ T30] audit: type=1400 audit(6384.410:585825): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=9525 comm="modprobe" name="libbusybox.so.1.37.0" dev="vda" ino=410 [ 6384.619352][ T30] audit: type=1400 audit(6384.410:585826): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=3131 comm="udevd" path="/sys/devices/virtual/block/loop1/uevent" dev="sysfs" ino=13592 [ 6384.622696][ T30] audit: type=1400 audit(6384.410:585827): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=9525 comm="modprobe" path="/lib/libbusybox.so.1.37.0" dev="vda" ino=410 [ 6384.627425][ T30] audit: type=1400 audit(6384.410:585828): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="/" dev="vda" ino=2 [ 6384.634860][ T30] audit: type=1400 audit(6384.410:585829): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="/" dev="sysfs" ino=1 [ 6384.641889][T23538] usb 1-1: USB disconnect, device number 18 [ 6384.649229][ T30] audit: type=1400 audit(6384.410:585830): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="devices" dev="sysfs" ino=7 [ 6384.652832][ T30] audit: type=1400 audit(6384.410:585831): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="virtual" dev="sysfs" ino=840 [ 6385.636452][ T9524] infiniband syz1: set active [ 6385.637489][ T9524] infiniband syz1: added syz_tun [ 6385.740387][ T9524] RDS/IB: syz1: added [ 6385.740661][ T9524] smc: adding ib device syz1 with port count 1 [ 6385.742770][ T9524] smc: ib device syz1 port 1 has no pnetid [ 6386.997659][ T9533] fido_id[9533]: Failed to open report descriptor at '/sys/devices/platform/dummy_hcd.0/usb1/report_descriptor': No such file or directory [ 6389.618460][ T30] kauditd_printk_skb: 3886 callbacks suppressed [ 6389.620702][ T30] audit: type=1400 audit(6389.420:589562): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=9546 comm="syz-executor" name="311" dev="tmpfs" ino=1589 [ 6389.625901][ T30] audit: type=1400 audit(6389.420:589563): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=9546 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6389.630140][ T30] audit: type=1400 audit(6389.420:589564): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=9546 comm="syz-executor" name="/" dev="proc" ino=1 [ 6389.632861][ T30] audit: type=1400 audit(6389.420:589565): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=9546 comm="syz-executor" name="/" dev="proc" ino=1 [ 6389.640075][ T30] audit: type=1400 audit(6389.420:589567): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=9546 comm="syz-executor" name="725" dev="proc" ino=117899 [ 6389.643247][ T30] audit: type=1400 audit(6389.420:589566): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=30 comm="kauditd" saddr=10.0.2.2 src=46664 daddr=10.0.2.15 dest=22 netif=eth0 [ 6389.646366][ T30] audit: type=1400 audit(6389.420:589568): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=30 comm="kauditd" saddr=10.0.2.2 src=46664 daddr=10.0.2.15 dest=22 netif=eth0 [ 6389.649100][ T30] audit: type=1400 audit(6389.420:589569): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=w pid=9546 comm="syz-executor" name="oom_score_adj" dev="proc" ino=117900 [ 6389.652813][ T30] audit: type=1400 audit(6389.430:589570): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=9546 comm="syz-executor" path="/proc/725/oom_score_adj" dev="proc" ino=117900 [ 6389.656790][ T30] audit: type=1400 audit(6389.430:589571): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=9546 comm="syz-executor" name="311" dev="tmpfs" ino=1589 [ 6389.698476][ T9547] 8021q: adding VLAN 0 to HW filter on device macvlan5 [ 6389.707914][ T9547] bond1: (slave macvlan5): Enslaving as an active interface with an up link [ 6392.701036][ T9570] netlink: 'syz.1.12551': attribute type 4 has an invalid length. [ 6394.376741][ T9585] netlink: 4 bytes leftover after parsing attributes in process `syz.1.12558'. [ 6394.624680][ T30] kauditd_printk_skb: 5438 callbacks suppressed [ 6394.625095][ T30] audit: type=1400 audit(6394.440:594044): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="loop1" dev="sysfs" ino=13591 [ 6394.626161][ T30] audit: type=1400 audit(6394.440:594045): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="mq" dev="sysfs" ino=13680 [ 6394.627517][ T30] audit: type=1400 audit(6394.440:594046): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="/" dev="vda" ino=2 [ 6394.628712][ T30] audit: type=1400 audit(6394.440:594047): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="/" dev="sysfs" ino=1 [ 6394.629920][ T30] audit: type=1400 audit(6394.440:594048): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="devices" dev="sysfs" ino=7 [ 6394.631351][ T30] audit: type=1400 audit(6394.440:594049): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="virtual" dev="sysfs" ino=840 [ 6394.632452][ T30] audit: type=1400 audit(6394.440:594050): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="block" dev="sysfs" ino=11781 [ 6394.635514][ T30] audit: type=1400 audit(6394.440:594051): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="loop1" dev="sysfs" ino=13591 [ 6394.637252][ T30] audit: type=1400 audit(6394.450:594052): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="mq" dev="sysfs" ino=13680 [ 6394.638450][ T30] audit: type=1400 audit(6394.450:594053): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="0" dev="sysfs" ino=13681 [ 6395.070108][ T9589] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 6395.071447][ T9589] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 6396.917718][ T9594] netlink: 16 bytes leftover after parsing attributes in process `syz.1.12561'. [ 6399.634732][ T30] kauditd_printk_skb: 4227 callbacks suppressed [ 6399.636470][ T30] audit: type=1400 audit(6399.440:598281): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=9433 comm="udevd" name="virtual" dev="sysfs" ino=840 [ 6399.640813][ T30] audit: type=1400 audit(6399.450:598282): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=9433 comm="udevd" name="block" dev="sysfs" ino=11781 [ 6399.647458][ T30] audit: type=1400 audit(6399.450:598283): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=9433 comm="udevd" name="loop1" dev="sysfs" ino=13591 [ 6399.652178][ T30] audit: type=1400 audit(6399.450:598284): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=9433 comm="udevd" path="/sys/devices/virtual/block/loop1" dev="sysfs" ino=13591 [ 6399.655404][ T30] audit: type=1400 audit(6399.450:598285): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=9433 comm="udevd" name="loop1" dev="sysfs" ino=13591 [ 6399.658220][ T30] audit: type=1400 audit(6399.450:598286): lsm=SMACK fn=smack_file_ioctl action=granted subject="_" object="_" requested=r pid=9433 comm="udevd" path="/dev/loop1" dev="devtmpfs" ino=639 [ 6399.660559][ T30] audit: type=1400 audit(6399.450:598287): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=9433 comm="udevd" path="/dev/loop1" dev="devtmpfs" ino=639 [ 6399.662839][ T30] audit: type=1400 audit(6399.450:598288): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=9433 comm="udevd" name="/" dev="vda" ino=2 [ 6399.665082][ T30] audit: type=1400 audit(6399.450:598289): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=9433 comm="udevd" name="/" dev="sysfs" ino=1 [ 6399.666658][ T30] audit: type=1400 audit(6399.450:598290): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=9433 comm="udevd" name="dev" dev="sysfs" ino=8 [ 6404.645438][ T30] kauditd_printk_skb: 3140 callbacks suppressed [ 6404.646798][ T30] audit: type=1400 audit(6404.460:601432): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=8876 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6404.647104][ T30] audit: type=1400 audit(6404.460:601433): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=7407 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6404.647325][ T30] audit: type=1400 audit(6404.460:601434): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=8876 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6404.647526][ T30] audit: type=1400 audit(6404.460:601435): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=8876 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6404.647734][ T30] audit: type=1400 audit(6404.460:601436): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=8876 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6404.647964][ T30] audit: type=1400 audit(6404.460:601437): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=8876 comm="syz-executor" name="117" dev="tmpfs" ino=610 [ 6404.648165][ T30] audit: type=1400 audit(6404.460:601438): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=8876 comm="syz-executor" path="/117" dev="tmpfs" ino=610 [ 6404.648376][ T30] audit: type=1400 audit(6404.460:601439): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=8876 comm="syz-executor" path="/117" dev="tmpfs" ino=610 [ 6404.654190][ T30] audit: type=1400 audit(6404.460:601440): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=8876 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6404.654560][ T30] audit: type=1400 audit(6404.460:601441): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=7407 comm="syz-executor" name="/" dev="devtmpfs" ino=1 [ 6404.791368][ T9644] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 6404.795231][ T9644] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 6405.248733][T23538] usb 1-1: new high-speed USB device number 19 using dummy_hcd [ 6405.448335][T23538] usb 1-1: New USB device found, idVendor=2304, idProduct=023e, bcdDevice=d7.69 [ 6405.448631][T23538] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 6405.449485][T23538] usb 1-1: Product: syz [ 6405.449588][T23538] usb 1-1: Manufacturer: syz [ 6405.449655][T23538] usb 1-1: SerialNumber: syz [ 6405.491380][T23538] hub 1-1:24.0: bad descriptor, ignoring hub [ 6405.491974][T23538] hub 1-1:24.0: probe with driver hub failed with error -5 [ 6405.816061][T23538] usb 1-1: USB disconnect, device number 19 [ 6409.723502][ T30] kauditd_printk_skb: 4657 callbacks suppressed [ 6409.773388][ T30] audit: type=1400 audit(6409.050:604973): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="devices" dev="sysfs" ino=7 [ 6409.776724][ T30] audit: type=1400 audit(6409.050:604974): lsm=SMACK fn=smack_task_setscheduler action=granted subject="_" object="_" requested=w pid=9668 comm="syz.1.12591" opid=9668 ocomm="syz.1.12591" [ 6409.780516][ T30] audit: type=1400 audit(6409.550:604975): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="virtual" dev="sysfs" ino=840 [ 6409.782885][ T30] audit: type=1400 audit(6409.550:604976): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="block" dev="sysfs" ino=11781 [ 6409.783074][ T30] audit: type=1400 audit(6409.550:604977): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="loop1" dev="sysfs" ino=13591 [ 6409.783273][ T30] audit: type=1400 audit(6409.550:604978): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="/" dev="vda" ino=2 [ 6409.783435][ T30] audit: type=1400 audit(6409.550:604979): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="/" dev="sysfs" ino=1 [ 6409.785674][ T30] audit: type=1400 audit(6409.550:604980): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="devices" dev="sysfs" ino=7 [ 6409.785894][ T30] audit: type=1400 audit(6409.550:604981): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="virtual" dev="sysfs" ino=840 [ 6409.786037][ T30] audit: type=1400 audit(6409.560:604982): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=9530 comm="udevd" path="/dev/loop1" dev="devtmpfs" ino=639 [ 6414.742969][ T30] kauditd_printk_skb: 5444 callbacks suppressed [ 6414.746589][ T30] audit: type=1400 audit(6414.550:609011): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=8876 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6414.749062][ T30] audit: type=1400 audit(6414.550:609012): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=8876 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6414.751628][ T30] audit: type=1400 audit(6414.550:609013): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=8876 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6414.758179][ T30] audit: type=1400 audit(6414.550:609014): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=8876 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6414.760605][ T30] audit: type=1400 audit(6414.550:609015): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=8876 comm="syz-executor" name="125" dev="tmpfs" ino=650 [ 6414.762605][ T30] audit: type=1400 audit(6414.550:609016): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=8876 comm="syz-executor" path="/125" dev="tmpfs" ino=650 [ 6414.770371][ T30] audit: type=1400 audit(6414.560:609017): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3307 comm="syz-executor" saddr=127.0.0.1 src=51556 daddr=127.0.0.1 dest=30006 netif=lo [ 6414.774272][ T30] audit: type=1400 audit(6414.560:609018): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3307 comm="syz-executor" saddr=127.0.0.1 src=30006 daddr=127.0.0.1 dest=51556 netif=lo [ 6414.785609][ T30] audit: type=1400 audit(6414.600:609019): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=8876 comm="syz-executor" path="/125" dev="tmpfs" ino=650 [ 6414.804374][ T30] audit: type=1400 audit(6414.610:609020): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=8876 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6417.258042][ T9701] 8021q: adding VLAN 0 to HW filter on device macvlan6 [ 6417.265346][ T9701] bond1: (slave macvlan6): Enslaving as an active interface with an up link [ 6419.044538][ T7794] usb 1-1: new high-speed USB device number 20 using dummy_hcd [ 6419.214143][ T7794] usb 1-1: Using ep0 maxpacket: 16 [ 6419.251585][ T7794] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 6419.253464][ T7794] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 6419.258739][ T7794] usb 1-1: New USB device found, idVendor=6161, idProduct=4d15, bcdDevice= 0.00 [ 6419.268082][ T7794] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 6419.296922][ T7794] usb 1-1: config 0 descriptor?? [ 6419.764861][ T30] kauditd_printk_skb: 5334 callbacks suppressed [ 6419.765263][ T30] audit: type=1400 audit(6419.550:612540): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=9530 comm="udevd" name="/" dev="vda" ino=2 [ 6419.765504][ T30] audit: type=1400 audit(6419.550:612541): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=9530 comm="udevd" name="/" dev="devtmpfs" ino=1 [ 6419.765682][ T30] audit: type=1400 audit(6419.550:612542): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=9530 comm="udevd" name="block" dev="devtmpfs" ino=767 [ 6419.765857][ T30] audit: type=1400 audit(6419.550:612543): lsm=SMACK fn=smack_inode_setattr action=granted subject="_" object="_" requested=w pid=9530 comm="udevd" name="7:1" dev="devtmpfs" ino=821 [ 6419.766028][ T30] audit: type=1400 audit(6419.550:612544): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=9530 comm="udevd" name="/" dev="vda" ino=2 [ 6419.766220][ T30] audit: type=1400 audit(6419.550:612545): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=9530 comm="udevd" name="/" dev="tmpfs" ino=1 [ 6419.766351][ T30] audit: type=1400 audit(6419.550:612546): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=9530 comm="udevd" name="udev" dev="tmpfs" ino=7 [ 6419.766478][ T30] audit: type=1400 audit(6419.550:612547): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=9530 comm="udevd" name="links" dev="tmpfs" ino=21 [ 6419.766610][ T30] audit: type=1400 audit(6419.550:612548): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=9530 comm="udevd" name="\x2fdisk\x2fby-diskseq\x2f56" dev="tmpfs" ino=6892 [ 6419.766742][ T30] audit: type=1400 audit(6419.550:612549): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=9530 comm="udevd" path="/run/udev/links/\x2fdisk\x2fby-diskseq\x2f56" dev="tmpfs" ino=6892 [ 6419.987472][ T7794] usb 1-1: string descriptor 0 read error: -71 [ 6420.024472][ T7794] usb 1-1: Max retries (5) exceeded reading string descriptor 200 [ 6420.026369][ T7794] letsketch 0003:6161:4D15.000A: probe with driver letsketch failed with error -32 [ 6420.048310][ T7794] usb 1-1: USB disconnect, device number 20 [ 6421.859100][ T9720] 8021q: adding VLAN 0 to HW filter on device macvlan7 [ 6421.862908][ T9720] bond1: (slave macvlan7): Enslaving as an active interface with an up link [ 6422.218713][ T9724] loop2: detected capacity change from 0 to 7 [ 6425.008837][ T9737] netdevsim netdevsim1: Direct firmware load for þ failed with error -2 [ 6425.009331][ T9737] netdevsim netdevsim1: Falling back to sysfs fallback for: þ [ 6425.116386][ T30] kauditd_printk_skb: 5446 callbacks suppressed [ 6425.116920][ T30] audit: type=1400 audit(6424.540:616199): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=9733 comm="syz.1.12612" name="newroot" dev="tmpfs" ino=2 [ 6425.146822][ T30] audit: type=1400 audit(6424.540:616200): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=9733 comm="syz.1.12612" name="/" dev="proc" ino=1 [ 6425.166558][ T30] audit: type=1400 audit(6424.550:616201): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=9733 comm="syz.1.12612" name="/" dev="proc" ino=1 [ 6425.169197][ T30] audit: type=1400 audit(6424.550:616202): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=9733 comm="syz.1.12612" name="322" dev="proc" ino=118139 [ 6425.171432][ T30] audit: type=1400 audit(6424.560:616203): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=rw pid=9733 comm="syz.1.12612" name="mounts" dev="proc" ino=118143 [ 6425.174838][ T30] audit: type=1400 audit(6424.560:616204): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=9733 comm="syz.1.12612" path="/proc/322/mounts" dev="proc" ino=118143 [ 6425.177187][ T30] audit: type=1400 audit(6424.630:616205): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=9733 comm="syz.1.12612" name="newroot" dev="tmpfs" ino=2 [ 6425.180457][ T30] audit: type=1400 audit(6424.630:616206): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=9733 comm="syz.1.12612" name="/" dev="proc" ino=1 [ 6425.183164][ T30] audit: type=1400 audit(6424.630:616207): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=9733 comm="syz.1.12612" name="/" dev="proc" ino=1 [ 6425.186717][ T30] audit: type=1400 audit(6424.630:616208): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=9733 comm="syz.1.12612" name="322" dev="proc" ino=118139 [ 6426.558560][ T9739] 8021q: adding VLAN 0 to HW filter on device macvlan8 [ 6426.572380][ T9739] bond1: (slave macvlan8): Enslaving as an active interface with an up link [ 6427.274893][ T7615] usb 1-1: new high-speed USB device number 21 using dummy_hcd [ 6427.447794][ T7615] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 6427.448141][ T7615] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 6427.448531][ T7615] usb 1-1: New USB device found, idVendor=0d8c, idProduct=0022, bcdDevice= 0.00 [ 6427.448615][ T7615] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 6427.472079][ T7615] usb 1-1: config 0 descriptor?? [ 6427.996073][ T7615] hid-generic 0003:0D8C:0022.000B: unknown main item tag 0x0 [ 6427.997185][ T7615] hid-generic 0003:0D8C:0022.000B: unknown main item tag 0x0 [ 6428.018661][ T7615] hid-generic 0003:0D8C:0022.000B: hidraw0: USB HID v0.00 Device [HID 0d8c:0022] on usb-dummy_hcd.0-1/input0 [ 6428.167888][ T4801] usb 1-1: USB disconnect, device number 21 [ 6428.646628][ T9753] syz1: rxe_newlink: already configured on syz_tun [ 6429.834385][ T7617] usb 1-1: new full-speed USB device number 22 using dummy_hcd [ 6429.999307][ T7617] usb 1-1: config 4 has an invalid interface number: 231 but max is 0 [ 6430.001774][ T7617] usb 1-1: config 4 has no interface number 0 [ 6430.023450][ T7617] usb 1-1: New USB device found, idVendor=13d3, idProduct=3224, bcdDevice=cb.0d [ 6430.025059][ T7617] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 6430.026292][ T7617] usb 1-1: Product: syz [ 6430.027026][ T7617] usb 1-1: Manufacturer: syz [ 6430.028016][ T7617] usb 1-1: SerialNumber: syz [ 6430.124534][ T30] kauditd_printk_skb: 5892 callbacks suppressed [ 6430.126126][ T30] audit: type=1400 audit(6429.930:622071): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=9396 comm="udevd" name="/" dev="sysfs" ino=1 [ 6430.129767][ T30] audit: type=1400 audit(6429.940:622072): lsm=SMACK fn=smack_inode_setattr action=granted subject="_" object="_" requested=w pid=9433 comm="udevd" name="b7:1" dev="tmpfs" ino=6893 [ 6430.132019][ T30] audit: type=1400 audit(6429.940:622073): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=9534 comm="udevd" name="/" dev="sysfs" ino=1 [ 6430.138428][ T30] audit: type=1400 audit(6429.940:622074): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=9396 comm="udevd" name="devices" dev="sysfs" ino=7 [ 6430.140585][ T30] audit: type=1400 audit(6429.950:622075): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=9433 comm="udevd" name="/" dev="vda" ino=2 [ 6430.140764][ T30] audit: type=1400 audit(6429.950:622076): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=9433 comm="udevd" name="/" dev="tmpfs" ino=1 [ 6430.142265][ T30] audit: type=1400 audit(6429.950:622078): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=9396 comm="udevd" name="platform" dev="sysfs" ino=379 [ 6430.146863][ T30] audit: type=1400 audit(6429.950:622079): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=9534 comm="udevd" name="bus" dev="sysfs" ino=11 [ 6430.148514][ T30] audit: type=1400 audit(6429.960:622080): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=9530 comm="udevd" name="/" dev="vda" ino=2 [ 6430.163234][ T30] audit: type=1400 audit(6429.970:622082): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=9468 comm="udevd" path="/sys/devices/platform/dummy_udc.0/gadget.0/uevent" dev="sysfs" ino=22722 [ 6430.413022][ T9775] fido_id[9775]: Failed to open report descriptor at '/sys/devices/platform/dummy_hcd.0/usb1/1-1/report_descriptor': No such file or directory [ 6431.390056][ T9779] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 6431.391468][ T9779] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 6437.195687][ T30] kauditd_printk_skb: 3619 callbacks suppressed [ 6437.200206][ T30] audit: type=1400 audit(6437.000:625700): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=8876 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6437.203444][ T30] audit: type=1400 audit(6437.010:625701): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=8876 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6437.209357][ T30] audit: type=1400 audit(6437.010:625702): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3307 comm="syz-executor" saddr=127.0.0.1 src=51556 daddr=127.0.0.1 dest=30006 netif=lo [ 6437.212098][ T30] audit: type=1400 audit(6437.020:625703): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3306 comm="sshd-session" saddr=10.0.2.2 src=46664 daddr=10.0.2.15 dest=22 netif=eth0 [ 6437.215529][ T30] audit: type=1400 audit(6437.020:625704): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=8876 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6437.218207][ T30] audit: type=1400 audit(6437.020:625705): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=8876 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6437.220780][ T30] audit: type=1400 audit(6437.020:625706): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=8876 comm="syz-executor" name="145" dev="tmpfs" ino=751 [ 6437.225271][ T30] audit: type=1400 audit(6437.020:625707): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=8876 comm="syz-executor" path="/145" dev="tmpfs" ino=751 [ 6437.227720][ T30] audit: type=1400 audit(6437.020:625708): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=8876 comm="syz-executor" path="/145" dev="tmpfs" ino=751 [ 6437.230879][ T30] audit: type=1400 audit(6437.020:625709): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=8876 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6443.376368][ T30] kauditd_printk_skb: 5388 callbacks suppressed [ 6443.380162][ T30] audit: type=1400 audit(6443.190:631098): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=8876 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6443.383187][ T30] audit: type=1400 audit(6443.190:631099): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=8876 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6443.387666][ T30] audit: type=1400 audit(6443.190:631100): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=8876 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6443.390594][ T30] audit: type=1400 audit(6443.190:631102): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3307 comm="syz-executor" saddr=127.0.0.1 src=51556 daddr=127.0.0.1 dest=30006 netif=lo [ 6443.394519][ T30] audit: type=1400 audit(6443.200:631103): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3306 comm="sshd-session" saddr=10.0.2.2 src=46664 daddr=10.0.2.15 dest=22 netif=eth0 [ 6443.398852][ T30] audit: type=1400 audit(6443.190:631101): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=8876 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6443.401874][ T30] audit: type=1400 audit(6443.200:631104): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=8876 comm="syz-executor" name="161" dev="tmpfs" ino=831 [ 6443.405267][ T30] audit: type=1400 audit(6443.210:631105): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=8876 comm="syz-executor" path="/161" dev="tmpfs" ino=831 [ 6443.407682][ T30] audit: type=1400 audit(6443.210:631106): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=8876 comm="syz-executor" path="/161" dev="tmpfs" ino=831 [ 6443.410829][ T30] audit: type=1400 audit(6443.210:631107): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=8876 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6443.915766][ T7617] usb 1-1: USB disconnect, device number 22 [ 6446.318231][ T9858] syzkaller0: entered promiscuous mode [ 6446.319572][ T9858] syzkaller0: entered allmulticast mode [ 6448.394405][ T30] kauditd_printk_skb: 5808 callbacks suppressed [ 6448.395206][ T30] audit: type=1400 audit(6448.190:636622): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=9530 comm="udevd" name="udev" dev="tmpfs" ino=7 [ 6448.395403][ T30] audit: type=1400 audit(6448.190:636623): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=8876 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6448.395524][ T30] audit: type=1400 audit(6448.190:636624): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=8876 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6448.395639][ T30] audit: type=1400 audit(6448.190:636625): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=8876 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6448.395770][ T30] audit: type=1400 audit(6448.200:636626): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="loop1" dev="sysfs" ino=13591 [ 6448.395980][ T30] audit: type=1400 audit(6448.200:636627): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="mq" dev="sysfs" ino=13680 [ 6448.396092][ T30] audit: type=1400 audit(6448.200:636628): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="0" dev="sysfs" ino=13681 [ 6448.396195][ T30] audit: type=1400 audit(6448.200:636629): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="/" dev="vda" ino=2 [ 6448.396303][ T30] audit: type=1400 audit(6448.200:636630): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="/" dev="sysfs" ino=1 [ 6448.396415][ T30] audit: type=1400 audit(6448.200:636631): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="devices" dev="sysfs" ino=7 [ 6448.604925][ T9879] netlink: 'syz.0.12671': attribute type 29 has an invalid length. [ 6448.610115][ T9879] netlink: 4 bytes leftover after parsing attributes in process `syz.0.12671'. [ 6453.337598][ C1] vxcan1: j1939_tp_rxtimer: 0x00000000a7c863a6: rx timeout, send abort [ 6453.414635][ T30] kauditd_printk_skb: 4517 callbacks suppressed [ 6453.417928][ T30] audit: type=1400 audit(6453.160:641122): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="loop1" dev="sysfs" ino=13591 [ 6453.420459][ T30] audit: type=1400 audit(6453.170:641123): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=3131 comm="udevd" name="integrity" dev="sysfs" ino=13613 [ 6453.427271][ T30] audit: type=1400 audit(6453.170:641124): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3131 comm="udevd" path="/sys/devices/virtual/block/loop1/integrity" dev="sysfs" ino=13613 [ 6453.433181][ T30] audit: type=1400 audit(6453.170:641125): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=3131 comm="udevd" path="/sys/devices/virtual/block/loop1/integrity" dev="sysfs" ino=13613 [ 6453.444595][ T30] audit: type=1400 audit(6453.170:641126): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="/" dev="vda" ino=2 [ 6453.450819][ T30] audit: type=1400 audit(6453.170:641127): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="/" dev="sysfs" ino=1 [ 6453.455606][ T30] audit: type=1400 audit(6453.170:641128): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="devices" dev="sysfs" ino=7 [ 6453.461705][ T30] audit: type=1400 audit(6453.170:641129): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="virtual" dev="sysfs" ino=840 [ 6453.462219][ T30] audit: type=1400 audit(6453.170:641130): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="block" dev="sysfs" ino=11781 [ 6453.462436][ T30] audit: type=1400 audit(6453.170:641131): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="loop1" dev="sysfs" ino=13591 [ 6453.838288][ C1] vxcan1: j1939_tp_rxtimer: 0x00000000a7c863a6: abort rx timeout. Force session deactivation [ 6453.840446][ C1] vxcan1: j1939_tp_rxtimer: 0x00000000c2b2c9b6: rx timeout, send abort [ 6454.341191][ C1] vxcan1: j1939_tp_rxtimer: 0x00000000c2b2c9b6: abort rx timeout. Force session deactivation [ 6454.479228][ T9920] netlink: 4 bytes leftover after parsing attributes in process `syz.1.12692'. [ 6454.605740][ T9927] input: syz1 as /devices/virtual/input/input573 [ 6455.317890][ T9932] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 6455.326099][ T9932] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 6455.401316][ T9932] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 6455.412003][ T9932] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 6456.871429][ T9944] syz.0.12699 (9944): drop_caches: 0 [ 6458.425414][ T30] kauditd_printk_skb: 7474 callbacks suppressed [ 6458.427423][ T30] audit: type=1400 audit(6458.240:647742): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3307 comm="syz-executor" saddr=127.0.0.1 src=51556 daddr=127.0.0.1 dest=30006 netif=lo [ 6458.428367][ T30] audit: type=1400 audit(6458.240:647743): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=7407 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6458.429133][ T30] audit: type=1400 audit(6458.240:647744): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=7407 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6458.444471][ T30] audit: type=1400 audit(6458.240:647745): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=7407 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6458.444955][ T30] audit: type=1400 audit(6458.240:647746): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=7407 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6458.446376][ T30] audit: type=1400 audit(6458.240:647747): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=7407 comm="syz-executor" name="382" dev="tmpfs" ino=1947 [ 6458.446578][ T30] audit: type=1400 audit(6458.250:647748): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=7407 comm="syz-executor" path="/382" dev="tmpfs" ino=1947 [ 6458.446765][ T30] audit: type=1400 audit(6458.250:647749): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=7407 comm="syz-executor" path="/382" dev="tmpfs" ino=1947 [ 6458.446926][ T30] audit: type=1400 audit(6458.250:647750): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=7407 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6458.447071][ T30] audit: type=1400 audit(6458.250:647751): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=7407 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6459.868479][ T9973] netlink: 27 bytes leftover after parsing attributes in process `syz.1.12711'. [ 6463.240075][ T9999] netlink: 24 bytes leftover after parsing attributes in process `syz.0.12721'. [ 6463.435897][ T30] kauditd_printk_skb: 5778 callbacks suppressed [ 6463.437867][ T30] audit: type=1400 audit(6463.250:653500): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=10000 comm="syz-executor" name="389" dev="tmpfs" ino=1982 [ 6463.444102][ T30] audit: type=1400 audit(6463.250:653501): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=10000 comm="syz-executor" name="389" dev="tmpfs" ino=1982 [ 6463.445918][ T30] audit: type=1400 audit(6463.260:653502): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=10000 comm="syz-executor" name="389" dev="tmpfs" ino=1982 [ 6463.448163][ T30] audit: type=1400 audit(6463.260:653503): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=10000 comm="syz-executor" name="389" dev="tmpfs" ino=1982 [ 6463.449430][ T30] audit: type=1400 audit(6463.260:653504): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=10000 comm="syz-executor" name="389" dev="tmpfs" ino=1982 [ 6463.451210][ T30] audit: type=1400 audit(6463.260:653505): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=10000 comm="syz-executor" name="389" dev="tmpfs" ino=1982 [ 6463.460328][ T30] audit: type=1400 audit(6463.270:653506): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=10000 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6463.463498][ T30] audit: type=1400 audit(6463.270:653507): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=10000 comm="syz-executor" name="/" dev="proc" ino=1 [ 6463.465217][ T30] audit: type=1400 audit(6463.280:653508): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=10000 comm="syz-executor" name="/" dev="proc" ino=1 [ 6463.466644][ T30] audit: type=1400 audit(6463.280:653509): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=10000 comm="syz-executor" name="900" dev="proc" ino=118559 [ 6467.922652][T10017] syzkaller0: entered promiscuous mode [ 6468.467086][ T30] kauditd_printk_skb: 2882 callbacks suppressed [ 6468.468765][ T30] audit: type=1400 audit(6468.270:656392): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=9530 comm="udevd" path="/run/udev/links/\x2fdisk\x2fby-diskseq\x2f56/b7:1" dev="tmpfs" ino=6893 [ 6468.471533][ T30] audit: type=1400 audit(6468.270:656393): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="block" dev="sysfs" ino=11781 [ 6468.474837][ T30] audit: type=1400 audit(6468.270:656394): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="loop1" dev="sysfs" ino=13591 [ 6468.474983][ T30] audit: type=1400 audit(6468.270:656395): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="mq" dev="sysfs" ino=13680 [ 6468.475125][ T30] audit: type=1400 audit(6468.270:656396): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="0" dev="sysfs" ino=13681 [ 6468.475269][ T30] audit: type=1400 audit(6468.270:656397): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="/" dev="vda" ino=2 [ 6468.475428][ T30] audit: type=1400 audit(6468.270:656398): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="/" dev="sysfs" ino=1 [ 6468.475596][ T30] audit: type=1400 audit(6468.270:656399): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="devices" dev="sysfs" ino=7 [ 6468.499548][ T30] audit: type=1400 audit(6468.270:656400): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="virtual" dev="sysfs" ino=840 [ 6468.502099][ T30] audit: type=1400 audit(6468.270:656401): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="block" dev="sysfs" ino=11781 [ 6469.828833][T10033] syzkaller0: entered promiscuous mode [ 6469.830130][T10033] syzkaller0: entered allmulticast mode [ 6472.861012][T10059] syzkaller1: entered promiscuous mode [ 6472.862351][T10059] syzkaller1: entered allmulticast mode [ 6473.475357][ T30] kauditd_printk_skb: 5507 callbacks suppressed [ 6473.478247][ T30] audit: type=1400 audit(6473.290:661909): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="loop1" dev="sysfs" ino=13591 [ 6473.482069][ T30] audit: type=1400 audit(6473.290:661910): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="mq" dev="sysfs" ino=13680 [ 6473.486870][ T30] audit: type=1400 audit(6473.300:661911): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=9530 comm="udevd" name="data" dev="tmpfs" ino=11 [ 6473.494922][ T30] audit: type=1400 audit(6473.300:661912): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="/" dev="vda" ino=2 [ 6473.495213][ T30] audit: type=1400 audit(6473.300:661913): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=10061 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6473.495379][ T30] audit: type=1400 audit(6473.300:661914): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="/" dev="sysfs" ino=1 [ 6473.495522][ T30] audit: type=1400 audit(6473.300:661915): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="devices" dev="sysfs" ino=7 [ 6473.495664][ T30] audit: type=1400 audit(6473.300:661916): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="virtual" dev="sysfs" ino=840 [ 6473.495816][ T30] audit: type=1400 audit(6473.300:661917): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="block" dev="sysfs" ino=11781 [ 6473.495986][ T30] audit: type=1400 audit(6473.300:661918): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="loop1" dev="sysfs" ino=13591 [ 6473.630386][T10063] netdevsim netdevsim1 netdevsim0: refused to change device tx_queue_len [ 6477.878627][T10088] netlink: 272 bytes leftover after parsing attributes in process `syz.0.12750'. [ 6478.565688][ T30] kauditd_printk_skb: 4582 callbacks suppressed [ 6478.567143][ T30] audit: type=1400 audit(6478.380:666465): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3307 comm="syz-executor" saddr=127.0.0.1 src=51556 daddr=127.0.0.1 dest=30006 netif=lo [ 6478.571938][ T30] audit: type=1400 audit(6478.380:666466): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=3307 comm="syz-executor" opid=7406 ocomm="syz-executor" [ 6478.578961][ T30] audit: type=1400 audit(6478.390:666467): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=23538 comm="kworker/0:3" saddr=10.0.2.2 src=46664 daddr=10.0.2.15 dest=22 netif=eth0 [ 6478.596198][ T30] audit: type=1400 audit(6478.410:666468): lsm=SMACK fn=smack_task_setpgid action=granted subject="_" object="_" requested=w pid=10093 comm="syz-executor" opid=10093 ocomm="syz-executor" [ 6478.606131][ T30] audit: type=1400 audit(6478.410:666469): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=10093 comm="syz-executor" name="/" dev="vda" ino=2 [ 6478.607494][ T30] audit: type=1400 audit(6478.420:666470): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=10093 comm="syz-executor" name="syz-executor" dev="vda" ino=1867 [ 6478.608727][ T30] audit: type=1400 audit(6478.420:666471): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=10093 comm="syz-executor" path="/syz-executor" dev="vda" ino=1867 [ 6478.611317][ T30] audit: type=1400 audit(6478.420:666472): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=10093 comm="syz-executor" name="/" dev="vda" ino=2 [ 6478.624876][ T30] audit: type=1400 audit(6478.420:666473): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=10093 comm="syz-executor" name="syz-executor" dev="vda" ino=1867 [ 6478.625352][ T30] audit: type=1400 audit(6478.430:666474): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3120 comm="klogd" saddr=127.0.0.1 src=30006 daddr=127.0.0.1 dest=51556 netif=lo [ 6479.197373][T10100] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 6479.200276][T10100] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 6479.625657][T10102] input: syz0 as /devices/virtual/input/input574 [ 6480.170842][T10094] lo speed is unknown, defaulting to 1000 [ 6481.876505][T10123] netlink: 4 bytes leftover after parsing attributes in process `syz.1.12762'. [ 6482.259537][T10128] 8021q: adding VLAN 0 to HW filter on device bond1 [ 6483.577066][ T30] kauditd_printk_skb: 7737 callbacks suppressed [ 6483.584128][ T30] audit: type=1400 audit(6483.390:673817): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="/" dev="vda" ino=2 [ 6483.590972][ T30] audit: type=1400 audit(6483.390:673818): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=9530 comm="udevd" name="data" dev="tmpfs" ino=11 [ 6483.593013][ T30] audit: type=1400 audit(6483.390:673819): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=9530 comm="udevd" name="data" dev="tmpfs" ino=11 [ 6483.596245][ T30] audit: type=1400 audit(6483.390:673820): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="/" dev="sysfs" ino=1 [ 6483.598951][ T30] audit: type=1400 audit(6483.390:673821): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="devices" dev="sysfs" ino=7 [ 6483.601221][ T30] audit: type=1400 audit(6483.390:673822): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="virtual" dev="sysfs" ino=840 [ 6483.604151][ T30] audit: type=1400 audit(6483.390:673823): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=9530 comm="udevd" path="/run/udev/data/b7:1.tmp" dev="tmpfs" ino=11587 [ 6483.606705][ T30] audit: type=1400 audit(6483.390:673824): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="block" dev="sysfs" ino=11781 [ 6483.623261][ T30] audit: type=1400 audit(6483.390:673825): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="loop1" dev="sysfs" ino=13591 [ 6483.625944][ T30] audit: type=1400 audit(6483.390:673826): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="mq" dev="sysfs" ino=13680 [ 6484.149817][T10152] syz_tun: entered allmulticast mode [ 6484.170931][T10094] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 6484.180639][T10151] syz_tun: left allmulticast mode [ 6484.197105][T10094] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 6486.335614][T10094] hsr_slave_0: entered promiscuous mode [ 6486.356708][T10094] hsr_slave_1: entered promiscuous mode [ 6486.359457][T10094] debugfs: 'hsr0' already exists in 'hsr' [ 6486.359725][T10094] Cannot create hsr debugfs directory [ 6487.317495][T10094] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 6487.350955][T10094] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 6487.371350][T10094] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 6487.390278][T10094] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 6488.387464][T10094] 8021q: adding VLAN 0 to HW filter on device bond0 [ 6488.584099][ T30] kauditd_printk_skb: 6570 callbacks suppressed [ 6488.585435][ T30] audit: type=1400 audit(6488.390:680378): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=10193 comm="kworker/u8:4" name="modprobe" dev="vda" ino=1569 [ 6488.588030][ T30] audit: type=1400 audit(6488.390:680379): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=10193 comm="kworker/u8:4" path="/sbin/modprobe" dev="vda" ino=1569 [ 6488.597576][ T30] audit: type=1400 audit(6488.410:680380): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=10193 comm="kworker/u8:4" name="/" dev="vda" ino=2 [ 6488.600185][ T30] audit: type=1400 audit(6488.410:680381): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=10193 comm="kworker/u8:4" name="sbin" dev="vda" ino=1533 [ 6488.602920][ T30] audit: type=1400 audit(6488.410:680382): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=10193 comm="kworker/u8:4" name="/" dev="vda" ino=2 [ 6488.607659][ T30] audit: type=1400 audit(6488.410:680383): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=10193 comm="kworker/u8:4" name="lib" dev="vda" ino=219 [ 6488.610085][ T30] audit: type=1400 audit(6488.410:680384): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=10193 comm="kworker/u8:4" name="ld-linux-aarch64.so.1" dev="vda" ino=403 [ 6488.613378][ T30] audit: type=1400 audit(6488.410:680385): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=10193 comm="kworker/u8:4" path="/lib/ld-linux-aarch64.so.1" dev="vda" ino=403 [ 6488.616763][ T30] audit: type=1400 audit(6488.420:680386): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=10193 comm="kworker/u8:4" name="ld-linux-aarch64.so.1" dev="vda" ino=403 [ 6488.620699][ T30] audit: type=1400 audit(6488.420:680387): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=10193 comm="kworker/u8:4" name="modprobe" dev="vda" ino=1569 [ 6493.597291][ T30] kauditd_printk_skb: 5337 callbacks suppressed [ 6493.597788][ T30] audit: type=1400 audit(6493.410:685620): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=10232 comm="modprobe" name="/" dev="vda" ino=2 [ 6493.599059][ T30] audit: type=1400 audit(6493.410:685621): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=10232 comm="modprobe" name="/" dev="vda" ino=2 [ 6493.600062][ T30] audit: type=1400 audit(6493.410:685622): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=10232 comm="modprobe" name="lib" dev="vda" ino=219 [ 6493.605428][ T30] audit: type=1400 audit(6493.420:685623): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=10232 comm="modprobe" name="lib" dev="vda" ino=219 [ 6493.614529][ T30] audit: type=1400 audit(6493.420:685624): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=10232 comm="modprobe" name="libatomic.so.1.2.0" dev="vda" ino=407 [ 6493.617746][ T30] audit: type=1400 audit(6493.420:685625): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=10232 comm="modprobe" path="/lib/libatomic.so.1.2.0" dev="vda" ino=407 [ 6493.621018][ T30] audit: type=1400 audit(6493.420:685626): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=10232 comm="modprobe" path="/lib/libatomic.so.1.2.0" dev="vda" ino=407 [ 6493.627697][ T30] audit: type=1400 audit(6493.440:685627): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=10232 comm="modprobe" name="/" dev="vda" ino=2 [ 6493.631933][ T30] audit: type=1400 audit(6493.440:685628): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=10232 comm="modprobe" name="/" dev="vda" ino=2 [ 6493.638253][ T30] audit: type=1400 audit(6493.450:685629): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=10232 comm="modprobe" name="lib" dev="vda" ino=219 [ 6494.037108][T10094] veth0_vlan: entered promiscuous mode [ 6494.082482][T10094] veth1_vlan: entered promiscuous mode [ 6494.293058][T10094] veth0_macvtap: entered promiscuous mode [ 6494.325477][T10094] veth1_macvtap: entered promiscuous mode [ 6494.546313][ T7232] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 6494.548268][ T7232] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 6494.551334][ T7232] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 6494.563262][ T7232] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 6495.548564][T10249] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 6495.551126][T10249] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 6496.411569][T10258] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 6496.420537][T10258] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 6497.078903][T10267] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 6497.086068][T10267] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 6498.613455][ T30] kauditd_printk_skb: 7493 callbacks suppressed [ 6498.616253][ T30] audit: type=1400 audit(6498.410:693124): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=10243 comm="udevd" name="/" dev="vda" ino=2 [ 6498.616782][ T30] audit: type=1400 audit(6498.420:693125): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=10288 comm="syz-executor" name="14" dev="tmpfs" ino=83 [ 6498.616941][ T30] audit: type=1400 audit(6498.420:693126): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=10288 comm="syz-executor" name="14" dev="tmpfs" ino=83 [ 6498.617094][ T30] audit: type=1400 audit(6498.420:693127): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=10288 comm="syz-executor" name="14" dev="tmpfs" ino=83 [ 6498.617243][ T30] audit: type=1400 audit(6498.420:693128): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=10288 comm="syz-executor" name="14" dev="tmpfs" ino=83 [ 6498.617409][ T30] audit: type=1400 audit(6498.420:693129): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=10288 comm="syz-executor" name="14" dev="tmpfs" ino=83 [ 6498.617649][ T30] audit: type=1400 audit(6498.420:693130): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="/" dev="vda" ino=2 [ 6498.617805][ T30] audit: type=1400 audit(6498.420:693131): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=10288 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6498.617955][ T30] audit: type=1400 audit(6498.420:693132): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="/" dev="sysfs" ino=1 [ 6498.618129][ T30] audit: type=1400 audit(6498.420:693133): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=10288 comm="syz-executor" name="/" dev="proc" ino=1 [ 6499.271987][T10295] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 6499.286707][T10295] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 6499.369382][T10296] netlink: 4 bytes leftover after parsing attributes in process `syz.2.12807'. [ 6500.838526][T10314] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 6500.839787][T10314] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 6501.786801][T10327] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 6501.788158][T10327] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 6503.616461][ T30] kauditd_printk_skb: 8556 callbacks suppressed [ 6503.618458][ T30] audit: type=1400 audit(6503.430:701689): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="/" dev="vda" ino=2 [ 6503.619794][ T30] audit: type=1400 audit(6503.430:701690): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="/" dev="tmpfs" ino=1 [ 6503.621180][ T30] audit: type=1400 audit(6503.430:701691): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="udev" dev="tmpfs" ino=7 [ 6503.622350][ T30] audit: type=1400 audit(6503.430:701692): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=w pid=3131 comm="udevd" name="queue" dev="tmpfs" ino=11630 [ 6503.634829][ T30] audit: type=1400 audit(6503.450:701694): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=8876 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6503.644163][ T30] audit: type=1400 audit(6503.450:701695): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=8876 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6503.644569][ T30] audit: type=1400 audit(6503.430:701693): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3131 comm="udevd" path="/run/udev/queue" dev="tmpfs" ino=11630 [ 6503.646455][ T30] audit: type=1400 audit(6503.450:701696): lsm=SMACK fn=smack_inode_setattr action=granted subject="_" object="_" requested=w pid=3131 comm="udevd" name="queue" dev="tmpfs" ino=11630 [ 6503.646617][ T30] audit: type=1400 audit(6503.450:701697): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="/" dev="vda" ino=2 [ 6503.646749][ T30] audit: type=1400 audit(6503.450:701698): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="/" dev="tmpfs" ino=1 [ 6504.061739][T10356] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 6504.065520][T10356] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 6504.231601][T10359] netlink: 64 bytes leftover after parsing attributes in process `syz.2.12834'. [ 6504.639373][T10362] 0: reclassify loop, rule prio 0, protocol 700 [ 6505.509536][T10375] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 6505.545645][T10375] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 6505.745651][T10378] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 6505.749184][T10378] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 6506.042526][T10383] netlink: 132 bytes leftover after parsing attributes in process `syz.1.12843'. [ 6507.609333][T10397] netlink: 8 bytes leftover after parsing attributes in process `syz.1.12849'. [ 6508.628463][T10407] audit_log_start: 9757 callbacks suppressed [ 6508.629769][T10407] audit: audit_backlog=66 > audit_backlog_limit=64 [ 6508.629931][T10407] audit: audit_lost=14603 audit_rate_limit=0 audit_backlog_limit=64 [ 6508.630020][T10407] audit: backlog limit exceeded [ 6508.631085][T10407] audit: audit_backlog=66 > audit_backlog_limit=64 [ 6508.631190][T10407] audit: audit_lost=14604 audit_rate_limit=0 audit_backlog_limit=64 [ 6508.631288][T10407] audit: backlog limit exceeded [ 6508.631406][T10407] audit: audit_backlog=66 > audit_backlog_limit=64 [ 6508.631497][T10407] audit: audit_lost=14605 audit_rate_limit=0 audit_backlog_limit=64 [ 6508.631584][T10407] audit: backlog limit exceeded [ 6508.631694][T10407] audit: audit_backlog=66 > audit_backlog_limit=64 [ 6511.042736][T10419] vxcan1: entered promiscuous mode [ 6513.270079][T10425] fuse: Bad value for 'fd' [ 6513.636270][ T30] kauditd_printk_skb: 3099 callbacks suppressed [ 6513.636741][ T30] audit: type=1400 audit(6513.440:710866): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=8876 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6513.639810][ T30] audit: type=1400 audit(6513.450:710867): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=8876 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6513.641191][ T30] audit: type=1400 audit(6513.450:710868): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=8876 comm="syz-executor" name="287" dev="tmpfs" ino=1467 [ 6513.642982][ T30] audit: type=1400 audit(6513.450:710869): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=8876 comm="syz-executor" name="287" dev="tmpfs" ino=1467 [ 6513.646738][ T30] audit: type=1400 audit(6513.460:710870): lsm=SMACK fn=smack_inode_unlink action=granted subject="_" object="_" requested=w pid=8876 comm="syz-executor" name="cgroup.net" dev="tmpfs" ino=1470 [ 6513.648745][ T30] audit: type=1400 audit(6513.460:710871): lsm=SMACK fn=smack_inode_unlink action=granted subject="_" object="_" requested=w pid=8876 comm="syz-executor" name="287" dev="tmpfs" ino=1467 [ 6513.650573][ T30] audit: type=1400 audit(6513.460:710872): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=8876 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6513.652004][ T30] audit: type=1400 audit(6513.460:710873): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=8876 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6513.653359][ T30] audit: type=1400 audit(6513.460:710874): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=8876 comm="syz-executor" name="287" dev="tmpfs" ino=1467 [ 6513.662996][ T30] audit: type=1400 audit(6513.470:710875): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=8876 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6518.937411][ T30] kauditd_printk_skb: 1789 callbacks suppressed [ 6518.941626][ T30] audit: type=1400 audit(6518.750:712665): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=8876 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6518.944774][ T30] audit: type=1400 audit(6518.750:712666): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=8876 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6518.952753][ T30] audit: type=1400 audit(6518.750:712667): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=8876 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6518.957793][ T30] audit: type=1400 audit(6518.750:712668): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=8876 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6518.961912][ T30] audit: type=1400 audit(6518.750:712669): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=8876 comm="syz-executor" name="303" dev="tmpfs" ino=1548 [ 6518.967409][ T30] audit: type=1400 audit(6518.750:712670): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=8876 comm="syz-executor" path="/303" dev="tmpfs" ino=1548 [ 6518.972217][ T30] audit: type=1400 audit(6518.750:712671): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=8876 comm="syz-executor" path="/303" dev="tmpfs" ino=1548 [ 6518.976944][ T30] audit: type=1400 audit(6518.750:712672): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=8876 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6518.981799][ T30] audit: type=1400 audit(6518.750:712673): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=8876 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6518.986385][ T30] audit: type=1400 audit(6518.750:712674): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=8876 comm="syz-executor" name="303" dev="tmpfs" ino=1548 [ 6519.881596][T10482] fuse: Bad value for 'fd' [ 6521.051406][ C0] vxcan1: j1939_tp_rxtimer: 0x00000000cde82155: Timeout. Failed to send simple message. [ 6521.225936][T10487] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 6521.230031][T10487] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 6522.253271][T10494] netlink: 4 bytes leftover after parsing attributes in process `syz.2.12890'. [ 6523.945080][ T30] kauditd_printk_skb: 4939 callbacks suppressed [ 6523.945440][ T30] audit: type=1400 audit(6523.760:717614): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=8876 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6523.946925][ T30] audit: type=1400 audit(6523.760:717615): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=8876 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6523.952034][ T30] audit: type=1400 audit(6523.760:717616): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=8876 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6523.955359][ T30] audit: type=1400 audit(6523.760:717617): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=8876 comm="syz-executor" name="317" dev="tmpfs" ino=1619 [ 6523.957617][ T30] audit: type=1400 audit(6523.760:717618): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=8876 comm="syz-executor" path="/317" dev="tmpfs" ino=1619 [ 6523.957857][ T30] audit: type=1400 audit(6523.760:717619): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=8876 comm="syz-executor" path="/317" dev="tmpfs" ino=1619 [ 6523.958773][ T30] audit: type=1400 audit(6523.770:717621): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3306 comm="sshd-session" saddr=10.0.2.2 src=46664 daddr=10.0.2.15 dest=22 netif=eth0 [ 6523.961249][ T30] audit: type=1400 audit(6523.760:717620): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=8876 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6523.962371][ T30] audit: type=1400 audit(6523.770:717622): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=8876 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6523.963420][ T30] audit: type=1400 audit(6523.770:717623): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=8876 comm="syz-executor" name="317" dev="tmpfs" ino=1619 [ 6527.084837][T23538] hid-generic 0001:0002:005D.000C: item fetching failed at offset 0/1 [ 6527.087462][T23538] hid-generic 0001:0002:005D.000C: probe with driver hid-generic failed with error -22 [ 6528.377587][T10568] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 6528.380411][T10568] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 6529.005367][ T30] kauditd_printk_skb: 4287 callbacks suppressed [ 6529.008718][ T30] audit: type=1400 audit(6528.820:721821): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=8876 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6529.012457][ T30] audit: type=1400 audit(6528.820:721822): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=8876 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6529.017104][ T30] audit: type=1400 audit(6528.820:721823): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=8876 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6529.017273][ T30] audit: type=1400 audit(6528.820:721824): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=8876 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6529.017423][ T30] audit: type=1400 audit(6528.820:721825): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=8876 comm="syz-executor" name="335" dev="tmpfs" ino=1709 [ 6529.017574][ T30] audit: type=1400 audit(6528.820:721826): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=8876 comm="syz-executor" path="/335" dev="tmpfs" ino=1709 [ 6529.017727][ T30] audit: type=1400 audit(6528.820:721827): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=8876 comm="syz-executor" path="/335" dev="tmpfs" ino=1709 [ 6529.017901][ T30] audit: type=1400 audit(6528.820:721828): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=8876 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6529.018055][ T30] audit: type=1400 audit(6528.820:721829): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=8876 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6529.018222][ T30] audit: type=1400 audit(6528.820:721830): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=8876 comm="syz-executor" name="335" dev="tmpfs" ino=1709 [ 6530.061514][T10587] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 6530.065329][T10587] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 6530.273400][T10589] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 6530.276045][T10589] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 6530.402194][T10591] hsr_slave_0: hsr_addr_subst_dest: Unknown node [ 6530.402694][T10591] hsr_slave_1: hsr_addr_subst_dest: Unknown node [ 6530.632262][T10594] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 6530.638651][T10594] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 6534.014233][ T30] kauditd_printk_skb: 6823 callbacks suppressed [ 6534.015438][ T30] audit: type=1400 audit(6533.830:728184): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=10570 comm="udevd" name="/" dev="tmpfs" ino=1 [ 6534.019602][ T30] audit: type=1400 audit(6533.830:728185): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=10570 comm="udevd" name="udev" dev="tmpfs" ino=7 [ 6534.022136][ T30] audit: type=1400 audit(6533.830:728186): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=8876 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6534.034829][ T30] audit: type=1400 audit(6533.830:728187): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=8876 comm="syz-executor" name="dev" dev="tmpfs" ino=3 [ 6534.037188][ T30] audit: type=1400 audit(6533.820:728183): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="watch" dev="tmpfs" ino=36 [ 6534.039672][ T30] audit: type=1400 audit(6533.840:728188): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="/" dev="vda" ino=2 [ 6534.042205][ T30] audit: type=1400 audit(6533.840:728189): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="/" dev="sysfs" ino=1 [ 6534.045185][ T30] audit: type=1400 audit(6533.840:728190): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="dev" dev="sysfs" ino=8 [ 6534.048130][ T30] audit: type=1400 audit(6533.840:728191): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="block" dev="sysfs" ino=9 [ 6534.050862][ T30] audit: type=1400 audit(6533.840:728192): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="/" dev="vda" ino=2 [ 6534.439301][T10639] syzkaller0: entered promiscuous mode [ 6534.439553][T10639] syzkaller0: entered allmulticast mode [ 6535.100317][T10643] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 6535.101867][T10643] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 6539.024133][ T30] kauditd_printk_skb: 3943 callbacks suppressed [ 6539.034763][ T30] audit: type=1400 audit(6538.830:732032): lsm=SMACK fn=smack_inode_unlink action=granted subject="_" object="_" requested=w pid=10570 comm="udevd" name="watch" dev="tmpfs" ino=36 [ 6539.035085][ T30] audit: type=1400 audit(6538.810:732016): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=10094 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6539.035254][ T30] audit: type=1400 audit(6538.830:732033): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=10094 comm="syz-executor" name="61" dev="tmpfs" ino=321 [ 6539.035403][ T30] audit: type=1400 audit(6538.830:732034): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=10570 comm="udevd" name="/" dev="vda" ino=2 [ 6539.035481][ T30] audit: type=1400 audit(6538.830:732035): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=10094 comm="syz-executor" path="/61" dev="tmpfs" ino=321 [ 6539.035563][ T30] audit: type=1400 audit(6538.830:732036): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=10570 comm="udevd" name="/" dev="sysfs" ino=1 [ 6539.035673][ T30] audit: type=1400 audit(6538.830:732037): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=10570 comm="udevd" name="devices" dev="sysfs" ino=7 [ 6539.035771][ T30] audit: type=1400 audit(6538.830:732038): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=10570 comm="udevd" name="virtual" dev="sysfs" ino=840 [ 6539.035891][ T30] audit: type=1400 audit(6538.830:732039): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=10094 comm="syz-executor" path="/61" dev="tmpfs" ino=321 [ 6539.035974][ T30] audit: type=1400 audit(6538.830:732040): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=10570 comm="udevd" name="block" dev="sysfs" ino=11781 [ 6539.497196][T10679] netlink: 256 bytes leftover after parsing attributes in process `syz.1.12964'. [ 6540.361266][T10690] netlink: 4 bytes leftover after parsing attributes in process `syz.1.12967'. [ 6544.038165][ T30] kauditd_printk_skb: 6584 callbacks suppressed [ 6544.041996][ T30] audit: type=1400 audit(6543.850:738610): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=10730 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6544.047786][ T30] audit: type=1400 audit(6543.860:738611): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=10730 comm="syz-executor" name="71" dev="tmpfs" ino=372 [ 6544.054523][ T30] audit: type=1400 audit(6543.860:738612): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=10570 comm="udevd" name="udev" dev="tmpfs" ino=7 [ 6544.057707][ T30] audit: type=1400 audit(6543.860:738613): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=10570 comm="udevd" name="data" dev="tmpfs" ino=11 [ 6544.063144][ T30] audit: type=1400 audit(6543.860:738614): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=10570 comm="udevd" name="data" dev="tmpfs" ino=11 [ 6544.069322][ T30] audit: type=1400 audit(6543.860:738615): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=10570 comm="udevd" name="data" dev="tmpfs" ino=11 [ 6544.080721][ T30] audit: type=1400 audit(6543.860:738616): lsm=SMACK fn=smack_inode_rename action=granted subject="_" object="_" requested=rw pid=10570 comm="udevd" name="b7:2.tmp" dev="tmpfs" ino=11790 [ 6544.084477][ T30] audit: type=1400 audit(6543.860:738617): lsm=SMACK fn=smack_inode_rename action=granted subject="_" object="_" requested=rw pid=10570 comm="udevd" name="b7:2" dev="tmpfs" ino=11788 [ 6544.084961][ T30] audit: type=1400 audit(6543.860:738618): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=10570 comm="udevd" name="/" dev="vda" ino=2 [ 6544.085656][ T30] audit: type=1400 audit(6543.860:738619): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=10570 comm="udevd" name="/" dev="devtmpfs" ino=1 [ 6546.332452][T10746] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 6546.336438][T10746] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 6548.598249][T10772] netlink: 108 bytes leftover after parsing attributes in process `syz.1.13001'. [ 6549.044828][ T30] kauditd_printk_skb: 6100 callbacks suppressed [ 6549.048608][ T30] audit: type=1400 audit(6548.850:744577): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=46664 daddr=10.0.2.15 dest=22 netif=eth0 [ 6549.060641][ T30] audit: type=1400 audit(6548.850:744578): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=10778 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6549.061167][ T30] audit: type=1400 audit(6548.850:744579): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=10778 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6549.061417][ T30] audit: type=1400 audit(6548.850:744580): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=46664 daddr=10.0.2.15 dest=22 netif=eth0 [ 6549.061638][ T30] audit: type=1400 audit(6548.850:744581): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=10778 comm="syz-executor" name="381" dev="tmpfs" ino=1941 [ 6549.061851][ T30] audit: type=1400 audit(6548.850:744582): lsm=SMACK fn=smack_task_setpgid action=granted subject="_" object="_" requested=w pid=10778 comm="syz-executor" opid=10778 ocomm="syz-executor" [ 6549.062070][ T30] audit: type=1400 audit(6548.860:744583): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=10570 comm="udevd" name="/" dev="vda" ino=2 [ 6549.062285][ T30] audit: type=1400 audit(6548.860:744584): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=10570 comm="udevd" name="/" dev="sysfs" ino=1 [ 6549.062492][ T30] audit: type=1400 audit(6548.860:744585): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=10570 comm="udevd" name="devices" dev="sysfs" ino=7 [ 6549.062722][ T30] audit: type=1400 audit(6548.860:744586): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=10570 comm="udevd" name="virtual" dev="sysfs" ino=840 [ 6549.542081][T10786] netlink: 4 bytes leftover after parsing attributes in process `syz.2.13007'. [ 6549.760421][T10788] netlink: 4 bytes leftover after parsing attributes in process `syz.2.13008'. [ 6549.848417][T10790] netlink: 'syz.1.13009': attribute type 13 has an invalid length. [ 6549.850236][T10790] netlink: 4 bytes leftover after parsing attributes in process `syz.1.13009'. [ 6549.890724][ T4603] netdevsim netdevsim1 netdevsim0: set [0, 0] type 1 family 0 port 8472 - 0 [ 6549.891018][ T4603] netdevsim netdevsim1 netdevsim1: set [0, 0] type 1 family 0 port 8472 - 0 [ 6549.892984][ T4603] netdevsim netdevsim1 netdevsim2: set [0, 0] type 1 family 0 port 8472 - 0 [ 6549.893097][ T4603] netdevsim netdevsim1 netdevsim3: set [0, 0] type 1 family 0 port 8472 - 0 [ 6549.897197][T10790] netlink: 'syz.1.13009': attribute type 13 has an invalid length. [ 6549.898906][T10790] netlink: 4 bytes leftover after parsing attributes in process `syz.1.13009'. [ 6552.935759][T10826] netlink: 822 bytes leftover after parsing attributes in process `syz.1.13024'. [ 6554.054085][ T30] kauditd_printk_skb: 8442 callbacks suppressed [ 6554.058392][ T30] audit: type=1400 audit(6553.860:752827): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=10551 comm="udevd" name="/" dev="tmpfs" ino=1 [ 6554.059014][ T30] audit: type=1400 audit(6553.860:752828): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=10551 comm="udevd" name="udev" dev="tmpfs" ino=7 [ 6554.069409][ T30] audit: type=1400 audit(6553.870:752829): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=10551 comm="udevd" name="data" dev="tmpfs" ino=11 [ 6554.072150][ T30] audit: type=1400 audit(6553.870:752830): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=10551 comm="udevd" name="/" dev="vda" ino=2 [ 6554.072326][ T30] audit: type=1400 audit(6553.870:752831): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=10551 comm="udevd" name="/" dev="tmpfs" ino=1 [ 6554.072456][ T30] audit: type=1400 audit(6553.870:752832): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=10551 comm="udevd" name="udev" dev="tmpfs" ino=7 [ 6554.072584][ T30] audit: type=1400 audit(6553.870:752833): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=10551 comm="udevd" name="data" dev="tmpfs" ino=11 [ 6554.072731][ T30] audit: type=1400 audit(6553.870:752834): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=10551 comm="udevd" name="data" dev="tmpfs" ino=11 [ 6554.072916][ T30] audit: type=1400 audit(6553.870:752835): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=10551 comm="udevd" name="data" dev="tmpfs" ino=11 [ 6554.073073][ T30] audit: type=1400 audit(6553.870:752836): lsm=SMACK fn=smack_inode_rename action=granted subject="_" object="_" requested=rw pid=10551 comm="udevd" name="b7:2.tmp" dev="tmpfs" ino=11841 [ 6556.551555][T10852] netlink: 232 bytes leftover after parsing attributes in process `syz.2.13033'. [ 6556.553433][T10852] netlink: 16 bytes leftover after parsing attributes in process `syz.2.13033'. [ 6559.088816][ T30] kauditd_printk_skb: 3035 callbacks suppressed [ 6559.094397][ T30] audit: type=1400 audit(6558.900:755872): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=8876 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6559.094909][ T30] audit: type=1400 audit(6558.900:755873): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3307 comm="syz-executor" saddr=127.0.0.1 src=51556 daddr=127.0.0.1 dest=30006 netif=lo [ 6559.095136][ T30] audit: type=1400 audit(6558.900:755874): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=8876 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6559.099066][ T30] audit: type=1400 audit(6558.900:755875): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=8876 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6559.099305][ T30] audit: type=1400 audit(6558.900:755876): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=8876 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6559.099452][ T30] audit: type=1400 audit(6558.900:755877): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=8876 comm="syz-executor" name="391" dev="tmpfs" ino=1991 [ 6559.099592][ T30] audit: type=1400 audit(6558.900:755878): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=8876 comm="syz-executor" path="/391" dev="tmpfs" ino=1991 [ 6559.099742][ T30] audit: type=1400 audit(6558.910:755879): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3306 comm="sshd-session" saddr=10.0.2.2 src=46664 daddr=10.0.2.15 dest=22 netif=eth0 [ 6559.102253][ T30] audit: type=1400 audit(6558.910:755880): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=8876 comm="syz-executor" path="/391" dev="tmpfs" ino=1991 [ 6559.104445][ T30] audit: type=1400 audit(6558.910:755881): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=8876 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6563.926078][T10919] netdevsim netdevsim1 netdevsim3 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 6563.926502][T10919] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 6564.038425][T10919] netdevsim netdevsim1 netdevsim2 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 6564.038786][T10919] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 6564.102071][ T30] kauditd_printk_skb: 6067 callbacks suppressed [ 6564.102805][ T30] audit: type=1400 audit(6563.910:761949): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="loop2" dev="sysfs" ino=13707 [ 6564.121463][ T30] audit: type=1400 audit(6563.910:761950): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="mq" dev="sysfs" ino=13796 [ 6564.125176][ T30] audit: type=1400 audit(6563.910:761951): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="0" dev="sysfs" ino=13797 [ 6564.125361][ T30] audit: type=1400 audit(6563.910:761952): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=3131 comm="udevd" name="cpu1" dev="sysfs" ino=13802 [ 6564.125526][ T30] audit: type=1400 audit(6563.910:761953): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3131 comm="udevd" path="/sys/devices/virtual/block/loop2/mq/0/cpu1" dev="sysfs" ino=13802 [ 6564.125696][ T30] audit: type=1400 audit(6563.910:761954): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=3131 comm="udevd" path="/sys/devices/virtual/block/loop2/mq/0/cpu1" dev="sysfs" ino=13802 [ 6564.125850][ T30] audit: type=1400 audit(6563.910:761955): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="/" dev="vda" ino=2 [ 6564.125992][ T30] audit: type=1400 audit(6563.910:761956): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="/" dev="sysfs" ino=1 [ 6564.126137][ T30] audit: type=1400 audit(6563.910:761957): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="devices" dev="sysfs" ino=7 [ 6564.126305][ T30] audit: type=1400 audit(6563.910:761958): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="virtual" dev="sysfs" ino=840 [ 6564.221471][T10919] netdevsim netdevsim1 netdevsim1 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 6564.235979][T10919] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 6564.422051][T10919] netdevsim netdevsim1 netdevsim0 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 6564.425539][T10919] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 6564.700268][ T4160] netdevsim netdevsim1 eth0: set [0, 0] type 1 family 0 port 8472 - 0 [ 6564.701783][ T4160] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 6564.703208][ T4160] netdevsim netdevsim1 eth1: set [0, 0] type 1 family 0 port 8472 - 0 [ 6564.704953][ T4160] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 6564.740523][ T4160] netdevsim netdevsim1 eth2: set [0, 0] type 1 family 0 port 8472 - 0 [ 6564.742136][ T4160] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 6564.772662][ T4160] netdevsim netdevsim1 eth3: set [0, 0] type 1 family 0 port 8472 - 0 [ 6564.773485][ T4160] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 6566.056261][T10937] netlink: 83 bytes leftover after parsing attributes in process `syz.1.13070'. [ 6566.326625][T10941] lo speed is unknown, defaulting to 1000 [ 6568.957421][T10970] netlink: 4 bytes leftover after parsing attributes in process `syz.1.13085'. [ 6569.105412][ T30] kauditd_printk_skb: 4671 callbacks suppressed [ 6569.106806][ T30] audit: type=1400 audit(6568.910:766630): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=10570 comm="udevd" name="/" dev="vda" ino=2 [ 6569.107286][ T30] audit: type=1400 audit(6568.910:766631): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=10570 comm="udevd" name="/" dev="devtmpfs" ino=1 [ 6569.107446][ T30] audit: type=1400 audit(6568.910:766632): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=10570 comm="udevd" name="block" dev="devtmpfs" ino=767 [ 6569.107599][ T30] audit: type=1400 audit(6568.910:766633): lsm=SMACK fn=smack_inode_setattr action=granted subject="_" object="_" requested=w pid=10570 comm="udevd" name="7:7" dev="devtmpfs" ino=849 [ 6569.107749][ T30] audit: type=1400 audit(6568.910:766634): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=10570 comm="udevd" name="/" dev="vda" ino=2 [ 6569.107933][ T30] audit: type=1400 audit(6568.910:766635): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=10570 comm="udevd" name="/" dev="tmpfs" ino=1 [ 6569.108100][ T30] audit: type=1400 audit(6568.910:766636): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=10570 comm="udevd" name="udev" dev="tmpfs" ino=7 [ 6569.108255][ T30] audit: type=1400 audit(6568.910:766637): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=10570 comm="udevd" name="links" dev="tmpfs" ino=21 [ 6569.108423][ T30] audit: type=1400 audit(6568.910:766638): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=10570 comm="udevd" name="/" dev="vda" ino=2 [ 6569.108665][ T30] audit: type=1400 audit(6568.910:766639): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=10570 comm="udevd" name="/" dev="devtmpfs" ino=1 [ 6569.509234][T10976] netlink: 4 bytes leftover after parsing attributes in process `syz.2.13088'. [ 6574.113964][ T30] kauditd_printk_skb: 7160 callbacks suppressed [ 6574.115421][ T30] audit: type=1400 audit(6573.920:773800): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=23 comm="ksoftirqd/1" saddr=172.20.20.33 src=20004 daddr=172.20.20.33 dest=20004 netif=lo [ 6574.118046][ T30] audit: type=1400 audit(6573.920:773801): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=23 comm="ksoftirqd/1" saddr=172.20.20.33 src=20004 daddr=172.20.20.33 dest=20004 netif=lo [ 6574.121888][ T30] audit: type=1400 audit(6573.920:773802): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=23 comm="ksoftirqd/1" saddr=172.20.20.33 src=20004 daddr=172.20.20.33 dest=20004 netif=lo [ 6574.125897][ T30] audit: type=1400 audit(6573.920:773803): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=23 comm="ksoftirqd/1" saddr=172.20.20.33 src=20004 daddr=172.20.20.33 dest=20004 netif=lo [ 6574.126071][ T30] audit: type=1400 audit(6573.920:773804): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=23 comm="ksoftirqd/1" saddr=172.20.20.33 src=20004 daddr=172.20.20.33 dest=20004 netif=lo [ 6574.126256][ T30] audit: type=1400 audit(6573.920:773805): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=23 comm="ksoftirqd/1" saddr=172.20.20.33 src=20004 daddr=172.20.20.33 dest=20004 netif=lo [ 6574.137171][ T30] audit: type=1400 audit(6573.940:773806): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11030 comm="modprobe" name="/" dev="vda" ino=2 [ 6574.139974][ T30] audit: type=1400 audit(6573.950:773807): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11030 comm="modprobe" name="/" dev="vda" ino=2 [ 6574.144673][ T30] audit: type=1400 audit(6573.950:773808): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11030 comm="modprobe" name="lib" dev="vda" ino=219 [ 6574.147922][ T30] audit: type=1400 audit(6573.950:773809): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11030 comm="modprobe" name="/" dev="vda" ino=2 [ 6579.124239][ T30] kauditd_printk_skb: 7187 callbacks suppressed [ 6579.125174][ T30] audit: type=1400 audit(6578.930:780700): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="/" dev="vda" ino=2 [ 6579.127334][ T30] audit: type=1400 audit(6578.940:780701): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="/" dev="sysfs" ino=1 [ 6579.132881][ T30] audit: type=1400 audit(6578.940:780702): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="devices" dev="sysfs" ino=7 [ 6579.133162][ T30] audit: type=1400 audit(6578.940:780703): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="virtual" dev="sysfs" ino=840 [ 6579.133324][ T30] audit: type=1400 audit(6578.940:780704): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="block" dev="sysfs" ino=11781 [ 6579.133456][ T30] audit: type=1400 audit(6578.940:780705): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="loop2" dev="sysfs" ino=13707 [ 6579.136384][ T30] audit: type=1400 audit(6578.940:780706): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="mq" dev="sysfs" ino=13796 [ 6579.136516][ T30] audit: type=1400 audit(6578.940:780707): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="0" dev="sysfs" ino=13797 [ 6579.136590][ T30] audit: type=1400 audit(6578.940:780708): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="/" dev="vda" ino=2 [ 6579.136660][ T30] audit: type=1400 audit(6578.940:780709): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="/" dev="sysfs" ino=1 [ 6579.560927][T11092] netlink: 'syz.1.13134': attribute type 29 has an invalid length. [ 6579.575119][T11092] netlink: 'syz.1.13134': attribute type 29 has an invalid length. [ 6579.578835][T11092] netlink: 'syz.1.13134': attribute type 29 has an invalid length. [ 6579.582715][T11092] netlink: 'syz.1.13134': attribute type 29 has an invalid length. [ 6580.489314][T11105] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 6580.490250][T11105] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 6584.153534][ T30] kauditd_printk_skb: 4832 callbacks suppressed [ 6584.164360][ T30] audit: type=1400 audit(6583.960:785542): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=8876 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6584.168081][ T30] audit: type=1400 audit(6583.970:785543): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=8876 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6584.169471][ T30] audit: type=1400 audit(6583.970:785544): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=8876 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6584.170296][ T30] audit: type=1400 audit(6583.970:785545): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=8876 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6584.170988][ T30] audit: type=1400 audit(6583.970:785546): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=8876 comm="syz-executor" name="453" dev="tmpfs" ino=2305 [ 6584.171792][ T30] audit: type=1400 audit(6583.970:785547): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=8876 comm="syz-executor" path="/453" dev="tmpfs" ino=2305 [ 6584.172977][ T30] audit: type=1400 audit(6583.970:785548): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=8876 comm="syz-executor" path="/453" dev="tmpfs" ino=2305 [ 6584.198283][ T30] audit: type=1400 audit(6583.970:785549): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=8876 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6584.201842][ T30] audit: type=1400 audit(6583.970:785550): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=8876 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6584.205374][ T30] audit: type=1400 audit(6583.970:785551): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=8876 comm="syz-executor" name="453" dev="tmpfs" ino=2305 [ 6584.373900][T11127] netlink: 28 bytes leftover after parsing attributes in process `syz.1.13146'. [ 6584.536372][T11129] sit0: entered promiscuous mode [ 6584.564413][T11129] netlink: 'syz.2.13147': attribute type 1 has an invalid length. [ 6584.566085][T11129] netlink: 1 bytes leftover after parsing attributes in process `syz.2.13147'. [ 6588.240777][T11149] fuse: Bad value for 'fd' [ 6588.990450][T11155] lo speed is unknown, defaulting to 1000 [ 6589.154579][ T30] kauditd_printk_skb: 3854 callbacks suppressed [ 6589.156730][ T30] audit: type=1400 audit(6588.960:789400): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11157 comm="syz-executor" name="461" dev="tmpfs" ino=2347 [ 6589.157061][ T30] audit: type=1400 audit(6588.960:789407): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3131 comm="udevd" path="/sys/devices/virtual/block/loop2/uevent" dev="sysfs" ino=13708 [ 6589.157221][ T30] audit: type=1400 audit(6588.960:789408): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11157 comm="syz-executor" name="461" dev="tmpfs" ino=2347 [ 6589.157419][ T30] audit: type=1400 audit(6588.960:789409): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=3131 comm="udevd" path="/sys/devices/virtual/block/loop2/uevent" dev="sysfs" ino=13708 [ 6589.157657][ T30] audit: type=1400 audit(6588.960:789410): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=11157 comm="syz-executor" name="461" dev="tmpfs" ino=2347 [ 6589.157867][ T30] audit: type=1400 audit(6588.960:789411): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="/" dev="vda" ino=2 [ 6589.158011][ T30] audit: type=1400 audit(6588.960:789412): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="/" dev="sysfs" ino=1 [ 6589.158163][ T30] audit: type=1400 audit(6588.960:789413): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="devices" dev="sysfs" ino=7 [ 6589.158245][ T30] audit: type=1400 audit(6588.960:789414): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="virtual" dev="sysfs" ino=840 [ 6589.158329][ T30] audit: type=1400 audit(6588.960:789415): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="block" dev="sysfs" ino=11781 [ 6590.369423][T11167] netlink: 'syz.2.13163': attribute type 4 has an invalid length. [ 6594.154224][T11192] netlink: 8 bytes leftover after parsing attributes in process `syz.2.13172'. [ 6594.164629][ T30] kauditd_printk_skb: 4109 callbacks suppressed [ 6594.165907][ T30] audit: type=1400 audit(6593.970:793387): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="/" dev="sysfs" ino=1 [ 6594.169252][ T30] audit: type=1400 audit(6593.980:793388): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="devices" dev="sysfs" ino=7 [ 6594.174793][ T30] audit: type=1400 audit(6593.990:793389): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="virtual" dev="sysfs" ino=840 [ 6594.178568][ T30] audit: type=1400 audit(6593.990:793391): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="block" dev="sysfs" ino=11781 [ 6594.182322][ T30] audit: type=1400 audit(6593.990:793390): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=8876 comm="syz-executor" path="/466/cgroup" dev="tmpfs" ino=2373 [ 6594.186288][ T30] audit: type=1400 audit(6593.990:793392): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=8876 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6594.190267][ T30] audit: type=1400 audit(6593.990:793393): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=10094 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6594.199178][ T30] audit: type=1400 audit(6593.990:793394): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=10094 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6594.202139][ T30] audit: type=1400 audit(6594.000:793395): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=8876 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6594.205893][ T30] audit: type=1400 audit(6594.000:793396): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=8876 comm="syz-executor" name="466" dev="tmpfs" ino=2372 [ 6597.929086][T11217] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 6597.930366][T11217] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 6599.178762][ T30] kauditd_printk_skb: 4005 callbacks suppressed [ 6599.179663][ T30] audit: type=1400 audit(6598.980:796952): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=8876 comm="syz-executor" name="477" dev="tmpfs" ino=2428 [ 6599.182755][ T30] audit: type=1400 audit(6598.990:796953): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=8876 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6599.186247][ T30] audit: type=1400 audit(6598.990:796954): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=8876 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6599.189573][ T30] audit: type=1400 audit(6598.990:796955): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=8876 comm="syz-executor" name="477" dev="tmpfs" ino=2428 [ 6599.197456][ T30] audit: type=1400 audit(6599.000:796956): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=8876 comm="syz-executor" path="/477/cgroup" dev="tmpfs" ino=2429 [ 6599.205594][ T30] audit: type=1400 audit(6599.000:796957): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=8876 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6599.209237][ T30] audit: type=1400 audit(6599.000:796958): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=8876 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6599.212046][ T30] audit: type=1400 audit(6599.000:796959): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=8876 comm="syz-executor" name="477" dev="tmpfs" ino=2428 [ 6599.217838][ T30] audit: type=1400 audit(6599.000:796960): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=8876 comm="syz-executor" name="477" dev="tmpfs" ino=2428 [ 6599.220978][ T30] audit: type=1400 audit(6599.000:796961): lsm=SMACK fn=smack_inode_unlink action=granted subject="_" object="_" requested=w pid=8876 comm="syz-executor" name="cgroup" dev="tmpfs" ino=2429 [ 6604.312167][ T30] kauditd_printk_skb: 6570 callbacks suppressed [ 6604.317810][ T30] audit: type=1400 audit(6604.120:803505): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11293 comm="syz-executor" name="490" dev="tmpfs" ino=2494 [ 6604.347285][ T30] audit: type=1400 audit(6604.140:803506): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11293 comm="syz-executor" name="490" dev="tmpfs" ino=2494 [ 6605.326600][ T30] audit: type=1400 audit(6604.640:803507): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=11293 comm="syz-executor" name="490" dev="tmpfs" ino=2494 [ 6605.329456][ T30] audit: type=1400 audit(6604.640:803508): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11293 comm="syz-executor" name="490" dev="tmpfs" ino=2494 [ 6605.331741][ T30] audit: type=1400 audit(6604.640:803509): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11293 comm="syz-executor" name="490" dev="tmpfs" ino=2494 [ 6605.334637][ T30] audit: type=1400 audit(6604.640:803510): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=11293 comm="syz-executor" name="490" dev="tmpfs" ino=2494 [ 6605.344309][ T30] audit: type=1400 audit(6604.640:803511): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11293 comm="syz-executor" name="490" dev="tmpfs" ino=2494 [ 6605.349335][ T30] audit: type=1400 audit(6604.640:803512): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11293 comm="syz-executor" name="490" dev="tmpfs" ino=2494 [ 6605.351786][ T30] audit: type=1400 audit(6604.640:803513): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=11293 comm="syz-executor" name="490" dev="tmpfs" ino=2494 [ 6605.356069][ T30] audit: type=1400 audit(6604.640:803514): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11293 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6607.645550][T11305] syzkaller0: entered promiscuous mode [ 6607.646973][T11305] syzkaller0: entered allmulticast mode [ 6609.316132][ T30] kauditd_printk_skb: 3109 callbacks suppressed [ 6609.316570][ T30] audit: type=1400 audit(6609.120:806624): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=3131 comm="udevd" path="/sys/devices/virtual/block/loop2/uevent" dev="sysfs" ino=13708 [ 6609.316878][ T30] audit: type=1400 audit(6609.120:806625): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=8876 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6609.317056][ T30] audit: type=1400 audit(6609.120:806626): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="/" dev="vda" ino=2 [ 6609.317200][ T30] audit: type=1400 audit(6609.120:806627): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=8876 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6609.317354][ T30] audit: type=1400 audit(6609.120:806628): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="/" dev="sysfs" ino=1 [ 6609.317493][ T30] audit: type=1400 audit(6609.120:806629): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=8876 comm="syz-executor" name="494" dev="tmpfs" ino=2514 [ 6609.317637][ T30] audit: type=1400 audit(6609.120:806630): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="devices" dev="sysfs" ino=7 [ 6609.317774][ T30] audit: type=1400 audit(6609.120:806631): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=8876 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6609.317911][ T30] audit: type=1400 audit(6609.120:806632): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3131 comm="udevd" name="virtual" dev="sysfs" ino=840 [ 6609.318113][ T30] audit: type=1400 audit(6609.120:806633): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=8876 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6614.324775][ T30] kauditd_printk_skb: 4632 callbacks suppressed [ 6614.325149][ T30] audit: type=1400 audit(6614.140:810420): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=8876 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6614.325345][ T30] audit: type=1400 audit(6614.140:810421): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=8876 comm="syz-executor" name="508" dev="tmpfs" ino=2584 [ 6614.335020][ T30] audit: type=1400 audit(6614.140:810422): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=8876 comm="syz-executor" name="508" dev="tmpfs" ino=2584 [ 6614.335523][ T30] audit: type=1400 audit(6614.140:810423): lsm=SMACK fn=smack_inode_unlink action=granted subject="_" object="_" requested=w pid=8876 comm="syz-executor" name="cgroup.cpu" dev="tmpfs" ino=2586 [ 6614.335716][ T30] audit: type=1400 audit(6614.150:810424): lsm=SMACK fn=smack_inode_unlink action=granted subject="_" object="_" requested=w pid=8876 comm="syz-executor" name="508" dev="tmpfs" ino=2584 [ 6614.342586][ T30] audit: type=1400 audit(6614.150:810425): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=8876 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6614.345671][ T30] audit: type=1400 audit(6614.150:810426): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=8876 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6614.348502][ T30] audit: type=1400 audit(6614.160:810427): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=15 comm="ksoftirqd/0" saddr=127.0.0.1 src=30006 daddr=127.0.0.1 dest=51556 netif=lo [ 6614.349540][ T30] audit: type=1400 audit(6614.160:810428): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=15 comm="ksoftirqd/0" saddr=127.0.0.1 src=51556 daddr=127.0.0.1 dest=30006 netif=lo [ 6614.352430][ T30] audit: type=1400 audit(6614.160:810429): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3306 comm="sshd-session" saddr=127.0.0.1 src=30006 daddr=127.0.0.1 dest=51556 netif=lo [ 6615.103100][T11370] netlink: 'syz.1.13242': attribute type 1 has an invalid length. [ 6615.105918][T11370] netlink: 'syz.1.13242': attribute type 2 has an invalid length. [ 6624.757912][ T30] kauditd_printk_skb: 1724 callbacks suppressed [ 6624.759513][ T30] audit: type=1400 audit(6624.570:812154): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=10094 comm="syz-executor" opid=11339 ocomm="syz.2.13229" [ 6624.764638][ T30] audit: type=1400 audit(6624.570:812155): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=10094 comm="syz-executor" opid=11339 ocomm="syz.2.13229" [ 6624.946202][ T30] audit: type=1400 audit(6624.760:812156): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=10094 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6624.946716][ T30] audit: type=1400 audit(6624.760:812157): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=10094 comm="syz-executor" name="/" dev="sysfs" ino=1 [ 6624.948719][ T30] audit: type=1400 audit(6624.760:812158): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=10094 comm="syz-executor" name="fs" dev="sysfs" ino=2 [ 6624.949996][ T30] audit: type=1400 audit(6624.760:812159): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=10094 comm="syz-executor" name="fuse" dev="sysfs" ino=4007 [ 6624.951201][ T30] audit: type=1400 audit(6624.760:812160): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=10094 comm="syz-executor" name="/" dev="fusectl" ino=1 [ 6624.966716][ T30] audit: type=1400 audit(6624.760:812161): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=10094 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 [ 6624.967133][ T30] audit: type=1400 audit(6624.770:812162): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=10094 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 [ 6624.967365][ T30] audit: type=1400 audit(6624.770:812163): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=10094 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 6624.987385][T11396] INFO: The task syz.1.13253:11396 has been waiting for writeback completion for more than 5 seconds. [ 6625.467676][T11401] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 6625.469412][T11401] misc raw-gadget: fail, usb_gadget_register_driver returned -16 SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 6626.062949][ T4599] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 6626.173057][ T4599] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 6626.312034][ T4163] smc: removing ib device syz1 [ 6626.338318][ T7617] syz1: Port: 1 Link DOWN [ 6626.363117][ T4599] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 6626.510539][ T4599] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 6627.929038][ T4599] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 6628.006158][ T4599] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 6628.042613][ T4599] bond0 (unregistering): Released all slaves [ 6628.949789][ T4599] hsr_slave_0: left promiscuous mode [ 6628.959085][ T4599] hsr_slave_1: left promiscuous mode [ 6628.977782][ T4599] veth1_macvtap: left promiscuous mode [ 6628.978161][ T4599] veth0_macvtap: left promiscuous mode [ 6628.978565][ T4599] veth1_vlan: left promiscuous mode [ 6628.978841][ T4599] veth0_vlan: left promiscuous mode [ 6629.764420][ T30] kauditd_printk_skb: 3735 callbacks suppressed [ 6629.774072][ T30] audit: type=1400 audit(6629.570:815899): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11409 comm="dhcpcd-run-hook" name="/" dev="vda" ino=2 [ 6629.775333][ T30] audit: type=1400 audit(6629.580:815900): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11409 comm="dhcpcd-run-hook" name="usr" dev="vda" ino=1599 [ 6629.775557][ T30] audit: type=1400 audit(6629.580:815901): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11409 comm="dhcpcd-run-hook" name="sbin" dev="vda" ino=1779 [ 6629.775673][ T30] audit: type=1400 audit(6629.580:815902): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11409 comm="dhcpcd-run-hook" name="/" dev="vda" ino=2 [ 6629.775779][ T30] audit: type=1400 audit(6629.580:815903): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11409 comm="dhcpcd-run-hook" name="bin" dev="vda" ino=13 [ 6629.775924][ T30] audit: type=1400 audit(6629.580:815904): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=11409 comm="dhcpcd-run-hook" path="/bin/rm" dev="vda" ino=67 [ 6629.793182][ T30] audit: type=1400 audit(6629.600:815905): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11412 comm="dhcpcd-run-hook" name="/" dev="vda" ino=2 [ 6629.796534][ T30] audit: type=1400 audit(6629.610:815906): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11412 comm="dhcpcd-run-hook" name="bin" dev="vda" ino=13 [ 6629.800092][ T30] audit: type=1400 audit(6629.610:815907): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11412 comm="dhcpcd-run-hook" name="rm" dev="vda" ino=67 [ 6629.806460][ T30] audit: type=1400 audit(6629.610:815908): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=11412 comm="dhcpcd-run-hook" path="/bin/rm" dev="vda" ino=67 [ 6630.388162][ T4599] netdevsim netdevsim1 eth3 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 6630.390047][ T4599] netdevsim netdevsim1 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 6630.463434][ T4599] netdevsim netdevsim1 eth2 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 6630.466598][ T4599] netdevsim netdevsim1 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 6630.530172][ T4599] netdevsim netdevsim1 eth1 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 6630.533102][ T4599] netdevsim netdevsim1 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 6630.591732][ T4599] netdevsim netdevsim1 eth0 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 6630.596692][ T4599] netdevsim netdevsim1 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 6632.170757][ T4599] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 6632.219122][ T4599] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 6632.240726][ T4599] bond0 (unregistering): Released all slaves [ 6632.255783][ T4599] bond1 (unregistering): Released all slaves [ 6632.396204][ T4599] hsr_slave_0: left promiscuous mode [ 6632.399872][ T4599] hsr_slave_1: left promiscuous mode [ 6632.419923][ T4599] veth1_macvtap: left promiscuous mode [ 6632.420280][ T4599] veth0_macvtap: left promiscuous mode [ 6632.420833][ T4599] veth1_vlan: left promiscuous mode [ 6632.421142][ T4599] veth0_vlan: left promiscuous mode [ 6634.819526][ T30] kauditd_printk_skb: 3869 callbacks suppressed [ 6634.819968][ T30] audit: type=1400 audit(6634.630:819778): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3161 comm="dhcpcd" name="/" dev="vda" ino=2 [ 6634.820243][ T30] audit: type=1400 audit(6634.630:819779): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3161 comm="dhcpcd" name="/" dev="sysfs" ino=1 [ 6634.821787][ T30] audit: type=1400 audit(6634.630:819780): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3161 comm="dhcpcd" name="/" dev="vda" ino=2 [ 6634.822905][ T30] audit: type=1400 audit(6634.630:819781): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3161 comm="dhcpcd" name="/" dev="sysfs" ino=1 [ 6634.826354][ T30] audit: type=1400 audit(6634.640:819782): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3161 comm="dhcpcd" name="bus" dev="sysfs" ino=11 [ 6634.835136][ T30] audit: type=1400 audit(6634.640:819783): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3161 comm="dhcpcd" name="/" dev="vda" ino=2 [ 6634.835456][ T30] audit: type=1400 audit(6634.640:819784): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3161 comm="dhcpcd" name="/" dev="sysfs" ino=1 [ 6634.835707][ T30] audit: type=1400 audit(6634.640:819785): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3161 comm="dhcpcd" name="class" dev="sysfs" ino=13 [ 6634.835885][ T30] audit: type=1400 audit(6634.640:819786): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3161 comm="dhcpcd" name="net" dev="sysfs" ino=2623 [ 6634.836017][ T30] audit: type=1400 audit(6634.640:819787): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3161 comm="dhcpcd" name="net" dev="sysfs" ino=2623 [ 6639.824370][ T30] kauditd_printk_skb: 5371 callbacks suppressed [ 6639.827589][ T30] audit: type=1400 audit(6639.630:825159): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11460 comm="dhcpcd-run-hook" name="/" dev="vda" ino=2 [ 6639.830967][ T30] audit: type=1400 audit(6639.640:825160): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11460 comm="dhcpcd-run-hook" name="usr" dev="vda" ino=1599 [ 6639.835938][ T30] audit: type=1400 audit(6639.640:825161): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11460 comm="dhcpcd-run-hook" name="usr" dev="vda" ino=1599 [ 6639.840805][ T30] audit: type=1400 audit(6639.640:825162): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11460 comm="dhcpcd-run-hook" name="lib" dev="vda" ino=1741 [ 6639.848633][ T30] audit: type=1400 audit(6639.640:825163): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=11460 comm="dhcpcd-run-hook" name="libselinux.so.1" dev="vda" ino=1758 [ 6639.853543][ T30] audit: type=1400 audit(6639.640:825164): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=11460 comm="dhcpcd-run-hook" path="/usr/lib/libselinux.so.1" dev="vda" ino=1758 [ 6639.858406][ T30] audit: type=1400 audit(6639.640:825165): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=11460 comm="dhcpcd-run-hook" path="/usr/lib/libselinux.so.1" dev="vda" ino=1758 [ 6639.864822][ T30] audit: type=1400 audit(6639.640:825166): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11460 comm="dhcpcd-run-hook" name="/" dev="vda" ino=2 [ 6639.868522][ T30] audit: type=1400 audit(6639.640:825167): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11460 comm="dhcpcd-run-hook" name="/" dev="vda" ino=2 [ 6639.871556][ T30] audit: type=1400 audit(6639.640:825168): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11460 comm="dhcpcd-run-hook" name="lib" dev="vda" ino=219 [ 6644.834191][ T30] kauditd_printk_skb: 2809 callbacks suppressed [ 6644.835720][ T30] audit: type=1400 audit(6644.640:827978): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=11481 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=932 [ 6644.841471][ T30] audit: type=1400 audit(6644.650:827979): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11481 comm="dhcpcd-run-hook" name="/" dev="vda" ino=2 [ 6644.844707][ T30] audit: type=1400 audit(6644.650:827980): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11481 comm="dhcpcd-run-hook" name="var" dev="vda" ino=1849 [ 6644.846971][ T30] audit: type=1400 audit(6644.650:827981): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11481 comm="dhcpcd-run-hook" name="var" dev="vda" ino=1849 [ 6644.849149][ T30] audit: type=1400 audit(6644.660:827982): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11481 comm="dhcpcd-run-hook" name="/" dev="vda" ino=2 [ 6644.852386][ T30] audit: type=1400 audit(6644.660:827983): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11481 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 [ 6644.854268][ T30] audit: type=1400 audit(6644.660:827984): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11481 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=927 [ 6644.856399][ T30] audit: type=1400 audit(6644.660:827985): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11481 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=931 [ 6644.857814][ T30] audit: type=1400 audit(6644.660:827986): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11481 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=932 [ 6644.860241][ T30] audit: type=1400 audit(6644.660:827987): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11481 comm="dhcpcd-run-hook" name="/" dev="vda" ino=2 [ 6652.156392][ T30] kauditd_printk_skb: 602 callbacks suppressed [ 6652.160412][ T30] audit: type=1400 audit(6651.970:828590): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11493 comm="dhcpcd" name="/" dev="vda" ino=2 [ 6652.160858][ T30] audit: type=1400 audit(6651.970:828591): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11493 comm="dhcpcd" name="lib" dev="vda" ino=219 [ 6652.164990][ T30] audit: type=1400 audit(6651.970:828592): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11493 comm="dhcpcd" name="dhcpcd" dev="vda" ino=220 [ 6652.165682][ T30] audit: type=1400 audit(6651.970:828593): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11493 comm="dhcpcd" name="dhcpcd-run-hooks" dev="vda" ino=228 [ 6652.165838][ T30] audit: type=1400 audit(6651.970:828594): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=11493 comm="dhcpcd" path="/lib/dhcpcd/dhcpcd-run-hooks" dev="vda" ino=228 [ 6652.177022][ T30] audit: type=1400 audit(6651.990:828595): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11493 comm="dhcpcd" name="/" dev="vda" ino=2 [ 6652.177548][ T30] audit: type=1400 audit(6651.990:828596): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11493 comm="dhcpcd" name="lib" dev="vda" ino=219 [ 6652.177834][ T30] audit: type=1400 audit(6651.990:828597): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11493 comm="dhcpcd" name="dhcpcd" dev="vda" ino=220 [ 6652.193287][ T30] audit: type=1400 audit(6652.000:828598): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11493 comm="dhcpcd" name="/" dev="vda" ino=2 [ 6652.195392][ T30] audit: type=1400 audit(6652.000:828599): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=11493 comm="dhcpcd" name="bin" dev="vda" ino=13 VM DIAGNOSIS: 23:59:16 Registers: info registers vcpu 0 CPU#0 PC=ffff800081b878bc X00=ffff800081b878b8 X01=ffff8000814637d8 X02=0000000000000000 X03=faf0000005a36f00 X04=f9f0000005806b28 X05=0000000000000000 X06=00000000029473b6 X07=0000000000000000 X08=0000000000000038 X09=0000000000000000 X10=0000000000000001 X11=0000000000155cc0 X12=0000000000000000 X13=0000000000000001 X14=000000000000017c X15=ffff800082deb450 X16=ffff800082de8000 X17=fff07ffffcef4000 X18=00000000ffffffff X19=ffff800082d18cc0 X20=0000060680c58a00 X21=00000000001432de X22=faf0000005a36f62 X23=faf0000005a36f62 X24=0000000000000000 X25=faf0000005a36f4e X26=ffff800082dae840 X27=fdf0000008ab9300 X28=f9f0000005806b00 X29=ffff800082deb7c0 X30=ffff8000814637f0 SP=ffff800082deb7c0 PSTATE=60402009 -ZC- EL2h SVCR=00000000 -- BTYPE=0 FPCR=00000000 FPSR=00000000 P00=0000000000000000 P01=0000000000000000 P02=0000000000000000 P03=0000000000000000 P04=0000000000000000 P05=0000000000000000 P06=0000000000000000 P07=0000000000000000 P08=0000000000000000 P09=0000000000000000 P10=0000000000000000 P11=0000000000000000 P12=0000000000000000 P13=0000000000000000 P14=0000000000000000 P15=0000000000000000 FFR=0000000000000000 Z00=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:000000102a000000:000000102a000000 Z01=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000010 Z02=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z03=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000028:0000000000000c10 Z04=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z05=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z06=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:6edc4d3a2914b135:d8e9c869e2695c88 Z07=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:b20fae707afde253:388e9c6c4fa85ca0 Z08=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z09=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z10=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z11=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z12=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z13=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z14=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z15=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z16=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000ffffe05b1500:0000ffffe05b1500 Z17=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:ffffff80ffffffd0:0000ffffe05b14d0 Z18=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z19=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z20=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z21=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z22=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z23=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z24=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z25=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z26=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z27=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z28=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z29=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z30=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z31=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff800080294140 X00=0000000002140cca X01=0000000000000000 X02=0000000000000000 X03=fff000007fa03c00 X04=0000000000000000 X05=0000000000000001 X06=fff000007fa03c00 X07=0000000000000000 X08=fcf000000b971080 X09=0000000000000000 X10=0000000000000010 X11=faf000000976dc28 X12=0000000000064925 X13=0000000000000003 X14=0000000000000003 X15=0000000000000000 X16=90b8000000000000 X17=000000000000ffff X18=0000000000000001 X19=ffff800082d296f0 X20=0000000002100cca X21=0000000000000cc0 X22=faf000000976db90 X23=faf000000976dc28 X24=ffff80008420bad8 X25=ffffc1ffc0533d80 X26=0000000000000000 X27=0000000000000c00 X28=fdf0000005dbc800 X29=ffff80008420b7c0 X30=ffff80008036549c SP=ffff80008420b7c0 PSTATE=01402009 ---- EL2h SVCR=00000000 -- BTYPE=0 FPCR=00000000 FPSR=00000000 P00=0000000000000000 P01=0000000000000000 P02=0000000000000000 P03=0000000000000000 P04=0000000000000000 P05=0000000000000000 P06=0000000000000000 P07=0000000000000000 P08=0000000000000000 P09=0000000000000000 P10=0000000000000000 P11=0000000000000000 P12=0000000000000000 P13=0000000000000000 P14=0000000000000000 P15=0000000000000000 FFR=0000000000000000 Z00=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z01=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000ffffafd86438:0000ffffafd86450 Z02=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000ffffafd86448:0000ffffafd86490 Z03=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000ffffb08eca20:0000ffffafd86430 Z04=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000ffffafd86468:0000ffffafd86440 Z05=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000ffffafd86478:0000ffffafd86470 Z06=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000ffffafd86478:0000ffffafd86470 Z07=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000ffffafd86488:0000ffffafd86480 Z08=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z09=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z10=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z11=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z12=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z13=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z14=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z15=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z16=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000ffffd6448600:0000ffffd6448600 Z17=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:ffffff80ffffffd0:0000ffffd64485d0 Z18=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z19=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z20=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z21=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z22=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z23=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z24=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z25=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z26=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z27=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z28=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z29=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z30=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z31=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000