last executing test programs: 11m48.46888844s ago: executing program 1 (id=81): r0 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) write$selinux_access(r0, &(0x7f0000000040)={'system_u:object_r:ping_exec_t:s0', 0x20, 'unconfined'}, 0x41) 11m48.093584531s ago: executing program 1 (id=82): r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x6, &(0x7f0000000140)={0x88, {{0x29, 0x0, 0x8000000, @private2}}}, 0x88) 11m47.858807638s ago: executing program 1 (id=83): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x78, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}]}, @CTA_TIMEOUT={0x8}, @CTA_SEQ_ADJ_REPLY={0x14, 0x10, 0x0, 0x1, [@CTA_SEQADJ_CORRECTION_POS={0x8}, @CTA_SEQADJ_OFFSET_BEFORE={0x8}]}]}, 0x78}}, 0x0) 11m47.511391638s ago: executing program 1 (id=84): mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000c40)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101090, 0x0) chroot(&(0x7f0000000300)='./file0/../file0/../file0/../file0\x00') mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) chroot(&(0x7f0000000300)='./file0/../file0/../file0/../file0\x00') pivot_root(&(0x7f0000000280)='./file0/../file0/../file0/../file0\x00', &(0x7f0000000240)='./file0\x00') 11m47.329830953s ago: executing program 1 (id=85): r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x8802, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x1, 0x1, {0x3c, 0x1b, 0xf, 0x54, 0x0, 0x82e5, 0x0, 0x88, 0x1}}) 11m47.06726319s ago: executing program 1 (id=86): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffff"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) socket$key(0xf, 0x3, 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00'}, 0x10) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f0000001040)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in=@empty, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}, 0x1, 0xe}, 0x0) 11m47.06673195s ago: executing program 32 (id=86): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffff"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) socket$key(0xf, 0x3, 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00'}, 0x10) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f0000001040)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in=@empty, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}, 0x1, 0xe}, 0x0) 5.250298092s ago: executing program 0 (id=751): r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000140), 0x82002, 0x0) ioctl$SNDCTL_DSP_SETFMT(r0, 0xc0045005, &(0x7f0000000040)=0x10000) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x12, r1, 0x0) read$dsp(r0, &(0x7f00000000c0)=""/108, 0xffffffcd) 4.449331135s ago: executing program 0 (id=755): r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/firmware/fdt', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x8) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000640)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)={0x24, r2, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) 2.62947807s ago: executing program 2 (id=761): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="20000000040a0500000400000000000005000006090001"], 0x20}, 0x1, 0x0, 0x0, 0x4080}, 0x804) 2.629146651s ago: executing program 0 (id=762): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$netlink(r0, 0x10e, 0x8, 0x0, &(0x7f0000000040)=0xfffffffffffffeb0) 2.357611258s ago: executing program 2 (id=763): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x12, r0, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_proto_private(r1, 0x89e1, 0x0) 2.191169564s ago: executing program 0 (id=764): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha256-avx\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = accept4$alg(r1, 0x0, 0x0, 0x80800) sendmmsg$alg(r2, &(0x7f0000005c40)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000080)="6ece80", 0x3}], 0x1, 0x0, 0x0, 0x40000c0}], 0x1, 0xc051) 2.051112838s ago: executing program 2 (id=765): r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x12, &(0x7f00000005c0)=0x100a, 0x4) 1.800085226s ago: executing program 2 (id=766): r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000480)={{0x0, 0x3, 0x0, 0x3}, 'syz0\x00', 0x2}) ioctl$UI_DEV_CREATE(r0, 0x5501) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x9) 1.459845096s ago: executing program 2 (id=767): r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000001840), 0x2982, 0x0) ioctl$TCXONC(r0, 0x540a, 0x300) 1.117268586s ago: executing program 2 (id=768): prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000400)=0x1, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000380)=@gcm_128={{0x304}, "0804020700000004", "2bc98b2bea9a61d78b704a3d7d90d4a1", "5c70a0a9", "eea200"}, 0x28) sendto$inet6(r0, &(0x7f0000000100)="2269c87986", 0xfffffffffffffe05, 0x240404c0, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f00000000c0)=""/40, 0x28, 0x28, 0x0, 0x0) 449.189357ms ago: executing program 0 (id=769): sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x1, 0x0) r0 = getpid() connect$unix(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) 0s ago: executing program 0 (id=770): ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f0000000340)=ANY=[@ANYBLOB="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"]) r0 = socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000004d00)={@ifindex, 0xffffffffffffffff, 0x2b, 0x10, 0xffffffffffffffff, @void, @value}, 0x20) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f00000000c0), 0x4) mount$fuse(0x0, 0x0, &(0x7f0000002100), 0x0, &(0x7f0000000280)=ANY=[]) r2 = userfaultfd(0x80001) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000180)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) syz_io_uring_setup(0x1612, &(0x7f0000000040)={0x0, 0x0, 0x201}, &(0x7f00000000c0), &(0x7f0000000100)) ioctl$UFFDIO_COPY(r2, 0xc028aa05, &(0x7f0000000040)={&(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000000/0x3000)=nil, 0x3000}) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000300)=@gcm_128={{0x303}, "00000000fd0ab900", "2607080d7f4fcf00114ef2dece6c7c58", '\x00', '\x00\x00\x00\x00\x00 \x00'}, 0x28) sendto$inet6(r1, &(0x7f00000001c0), 0xfffffffffffffede, 0x0, 0x0, 0x3000137) setsockopt$inet6_tcp_int(r1, 0x6, 0x16, &(0x7f0000000040), 0x4) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000001140)={0x0, 0x40}, 0x1, 0x0, 0x0, 0x20068811}, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000000)=0x4) kernel console output (not intermixed with test programs): code=0x7ffc0000 [ 222.923913][ T31] audit: type=1326 audit(222.820:320): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4580 comm="syz.2.126" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 222.924824][ T31] audit: type=1326 audit(222.820:321): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4580 comm="syz.2.126" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 222.935177][ T31] audit: type=1326 audit(222.820:322): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4580 comm="syz.2.126" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 222.975936][ T31] audit: type=1326 audit(222.840:323): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4580 comm="syz.2.126" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 222.998544][ T31] audit: type=1326 audit(222.850:324): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4580 comm="syz.2.126" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 223.011449][ T31] audit: type=1326 audit(222.850:325): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4580 comm="syz.2.126" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 223.042724][ T31] audit: type=1326 audit(222.910:326): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4580 comm="syz.2.126" exe="/syz-executor" sig=0 arch=40000028 syscall=122 compat=0 ip=0x133450 code=0x7ffc0000 [ 229.702262][ T4609] syz.2.136[4609] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 229.714792][ T4609] syz.2.136[4609] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 229.731252][ T4609] syz.2.136[4609] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 229.788899][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 229.789014][ T31] audit: type=1400 audit(229.690:329): avc: denied { ioctl } for pid=4608 comm="syz.2.136" path="socket:[3845]" dev="sockfs" ino=3845 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 229.812617][ T31] audit: type=1400 audit(229.700:330): avc: denied { bind } for pid=4608 comm="syz.2.136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 230.321978][ T31] audit: type=1400 audit(230.210:331): avc: denied { connect } for pid=4610 comm="syz.2.137" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 230.335554][ T31] audit: type=1400 audit(230.230:332): avc: denied { write } for pid=4610 comm="syz.2.137" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 230.620038][ T4613] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 230.620876][ T4613] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 234.559198][ T3817] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 234.720349][ T3817] usb 1-1: config 0 interface 0 altsetting 2 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 234.720946][ T3817] usb 1-1: config 0 interface 0 altsetting 2 has 1 endpoint descriptor, different from the interface descriptor's value: 5 [ 234.721636][ T3817] usb 1-1: config 0 interface 0 has no altsetting 0 [ 234.722002][ T3817] usb 1-1: New USB device found, idVendor=0757, idProduct=0a00, bcdDevice= 0.00 [ 234.722379][ T3817] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 234.739598][ T3817] usb 1-1: config 0 descriptor?? [ 235.186090][ T3817] nti 0003:0757:0A00.0003: unknown main item tag 0x0 [ 235.186705][ T3817] nti 0003:0757:0A00.0003: unknown main item tag 0x0 [ 235.187052][ T3817] nti 0003:0757:0A00.0003: unknown main item tag 0x0 [ 235.187384][ T3817] nti 0003:0757:0A00.0003: unknown main item tag 0x0 [ 235.198443][ T3817] nti 0003:0757:0A00.0003: unknown main item tag 0x0 [ 235.198975][ T3817] nti 0003:0757:0A00.0003: unknown main item tag 0x0 [ 235.199322][ T3817] nti 0003:0757:0A00.0003: unknown main item tag 0x0 [ 235.202399][ T3817] nti 0003:0757:0A00.0003: hidraw0: USB HID v0.00 Device [HID 0757:0a00] on usb-dummy_hcd.0-1/input0 [ 235.404017][ T3953] usb 1-1: USB disconnect, device number 2 [ 236.279386][ T3937] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 236.438138][ T3937] usb 1-1: Using ep0 maxpacket: 16 [ 236.477155][ T3937] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 236.478466][ T3937] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 236.511983][ T3937] usb 1-1: New USB device found, idVendor=1e7d, idProduct=2d50, bcdDevice= 0.00 [ 236.512542][ T3937] usb 1-1: New USB device strings: Mfr=236, Product=255, SerialNumber=0 [ 236.512897][ T3937] usb 1-1: Product: syz [ 236.513095][ T3937] usb 1-1: Manufacturer: syz [ 236.531664][ T3937] usb 1-1: config 0 descriptor?? [ 237.116670][ T3937] kovaplus 0003:1E7D:2D50.0004: item fetching failed at offset 5/7 [ 237.125288][ T3937] kovaplus 0003:1E7D:2D50.0004: parse failed [ 237.128937][ T3937] kovaplus 0003:1E7D:2D50.0004: probe with driver kovaplus failed with error -22 [ 237.331127][ T3852] usb 1-1: USB disconnect, device number 3 [ 239.116262][ T3896] usb 1-1: new high-speed USB device number 4 using dummy_hcd [ 239.328260][ T3896] usb 1-1: Using ep0 maxpacket: 16 [ 239.361463][ T3896] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x3 has invalid wMaxPacketSize 0 [ 239.401519][ T3896] usb 1-1: New USB device found, idVendor=0b57, idProduct=2bbd, bcdDevice=e7.cc [ 239.401828][ T3896] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 239.402068][ T3896] usb 1-1: Product: syz [ 239.402169][ T3896] usb 1-1: Manufacturer: syz [ 239.402270][ T3896] usb 1-1: SerialNumber: syz [ 239.418228][ T3896] usb 1-1: config 0 descriptor?? [ 239.450102][ T3896] usbhid 1-1:0.0: couldn't find an input interrupt endpoint [ 239.693142][ T3896] usb 1-1: USB disconnect, device number 4 [ 242.694143][ T31] audit: type=1400 audit(242.590:333): avc: denied { validate_trans } for pid=4712 comm="syz.2.159" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 243.858568][ T4723] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 243.859546][ T4723] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 244.388818][ T4728] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 244.400489][ T4728] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 250.275470][ T4739] pim6reg1: entered promiscuous mode [ 250.276326][ T4739] pim6reg1: entered allmulticast mode [ 250.585518][ T4745] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 250.603124][ T31] audit: type=1400 audit(250.500:334): avc: denied { name_bind } for pid=4744 comm="syz.2.166" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 266.991580][ T31] audit: type=1400 audit(266.890:335): avc: denied { write } for pid=4751 comm="syz.0.168" name="dev" dev="proc" ino=4026532763 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 278.160546][ T31] audit: type=1326 audit(278.060:336): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4769 comm="syz.0.174" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 278.165015][ T31] audit: type=1326 audit(278.060:337): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4769 comm="syz.0.174" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 278.178675][ T31] audit: type=1326 audit(278.080:338): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4769 comm="syz.0.174" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x133450 code=0x7ffc0000 [ 278.180157][ T31] audit: type=1326 audit(278.080:339): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4769 comm="syz.0.174" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 278.184934][ T31] audit: type=1326 audit(278.080:340): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4769 comm="syz.0.174" exe="/syz-executor" sig=0 arch=40000028 syscall=361 compat=0 ip=0x133450 code=0x7ffc0000 [ 278.185891][ T31] audit: type=1326 audit(278.080:341): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4769 comm="syz.0.174" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 282.498591][ T3964] usb 1-1: new high-speed USB device number 5 using dummy_hcd [ 282.707236][ T3964] usb 1-1: too many endpoints for config 0 interface 0 altsetting 0: 255, using maximum allowed: 30 [ 282.709557][ T3964] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 282.710860][ T3964] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 282.711283][ T3964] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 255 [ 282.714814][ T3964] usb 1-1: New USB device found, idVendor=044f, idProduct=b653, bcdDevice= 0.00 [ 282.753425][ T3964] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 282.780315][ T3964] usb 1-1: config 0 descriptor?? [ 283.378865][ T3964] thrustmaster 0003:044F:B653.0005: unknown main item tag 0x0 [ 283.385513][ T3964] thrustmaster 0003:044F:B653.0005: unknown main item tag 0x0 [ 283.395264][ T3964] thrustmaster 0003:044F:B653.0005: unknown main item tag 0x0 [ 283.395891][ T3964] thrustmaster 0003:044F:B653.0005: unknown main item tag 0x0 [ 283.396222][ T3964] thrustmaster 0003:044F:B653.0005: unknown main item tag 0x0 [ 283.396607][ T3964] thrustmaster 0003:044F:B653.0005: unknown main item tag 0x0 [ 283.396930][ T3964] thrustmaster 0003:044F:B653.0005: unknown main item tag 0x0 [ 283.412649][ T3964] thrustmaster 0003:044F:B653.0005: hidraw0: USB HID v0.00 Device [HID 044f:b653] on usb-dummy_hcd.0-1/input0 [ 283.413440][ T3964] thrustmaster 0003:044F:B653.0005: no inputs found [ 283.608548][ T3925] usb 1-1: USB disconnect, device number 5 [ 306.098446][ T4852] input: syz0 as /devices/virtual/input/input4 [ 320.558893][ T4720] usb 1-1: new full-speed USB device number 6 using dummy_hcd [ 320.733437][ T4720] usb 1-1: config index 0 descriptor too short (expected 31, got 27) [ 320.734088][ T4720] usb 1-1: config 1 interface 0 has no altsetting 0 [ 320.755389][ T4720] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= b.72 [ 320.755959][ T4720] usb 1-1: New USB device strings: Mfr=28, Product=37, SerialNumber=3 [ 320.756256][ T4720] usb 1-1: Product: syz [ 320.756525][ T4720] usb 1-1: Manufacturer: syz [ 320.756764][ T4720] usb 1-1: SerialNumber: syz [ 320.995285][ T31] audit: type=1326 audit(320.890:342): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4862 comm="syz.0.192" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x0 [ 324.434840][ T4874] fuse: Unknown parameter 'grou00000000000000000000' [ 324.434898][ T31] audit: type=1400 audit(324.330:343): avc: denied { mounton } for pid=4873 comm="syz.2.195" path="/78/file0" dev="tmpfs" ino=419 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 325.867166][ T4720] usblp 1-1:1.0: usblp0: USB Unidirectional printer dev 6 if 0 alt 253 proto 1 vid 0x0525 pid 0xA4A8 [ 327.126316][ T31] audit: type=1326 audit(327.010:344): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4875 comm="syz.2.196" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7fc00000 [ 327.830806][ T31] audit: type=1326 audit(327.730:345): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4884 comm="syz.2.198" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 327.840605][ T31] audit: type=1326 audit(327.730:346): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4884 comm="syz.2.198" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 327.852347][ T31] audit: type=1326 audit(327.750:347): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4884 comm="syz.2.198" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 327.862389][ T31] audit: type=1326 audit(327.750:348): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4884 comm="syz.2.198" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 327.869367][ T31] audit: type=1326 audit(327.770:349): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4884 comm="syz.2.198" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 327.884520][ T31] audit: type=1326 audit(327.780:350): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4884 comm="syz.2.198" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 327.891037][ T31] audit: type=1326 audit(327.790:351): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4884 comm="syz.2.198" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 327.899877][ T31] audit: type=1326 audit(327.800:352): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4884 comm="syz.2.198" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 327.905468][ T31] audit: type=1326 audit(327.800:353): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4884 comm="syz.2.198" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 328.894301][ T4889] fuse: Unknown parameter 'grou00000000000000000000' [ 330.790779][ T4903] input: syz0 as /devices/virtual/input/input5 [ 331.809451][ T4911] fuse: Unknown parameter 'group_i00000000000000000000' [ 332.081657][ T3953] usb 1-1: USB disconnect, device number 6 [ 332.092774][ T3953] usblp0: removed [ 332.359961][ T4921] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 332.389315][ T4921] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 332.808707][ T4927] syz.2.208[4927] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 332.808930][ T4927] syz.2.208[4927] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 332.809351][ T4927] syz.2.208[4927] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 332.883667][ T31] kauditd_printk_skb: 3 callbacks suppressed [ 332.883758][ T31] audit: type=1326 audit(332.780:357): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4928 comm="syz.0.209" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 332.897470][ T31] audit: type=1326 audit(332.780:358): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4928 comm="syz.0.209" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 332.902608][ T31] audit: type=1326 audit(332.800:359): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4928 comm="syz.0.209" exe="/syz-executor" sig=0 arch=40000028 syscall=175 compat=0 ip=0x133450 code=0x7ffc0000 [ 332.903846][ T31] audit: type=1326 audit(332.800:360): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4928 comm="syz.0.209" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 332.941595][ T31] audit: type=1326 audit(332.800:361): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4928 comm="syz.0.209" exe="/syz-executor" sig=0 arch=40000028 syscall=224 compat=0 ip=0x133450 code=0x7ffc0000 [ 332.942779][ T31] audit: type=1326 audit(332.840:362): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4928 comm="syz.0.209" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 332.947115][ T31] audit: type=1326 audit(332.840:363): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4928 comm="syz.0.209" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 332.960030][ T31] audit: type=1326 audit(332.840:364): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4928 comm="syz.0.209" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 332.963197][ T31] audit: type=1326 audit(332.860:365): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4928 comm="syz.0.209" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 332.965912][ T31] audit: type=1326 audit(332.860:366): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4928 comm="syz.0.209" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 333.048558][ T4931] fuse: Unknown parameter 'group_i00000000000000000000' [ 334.213075][ T4941] netlink: 32 bytes leftover after parsing attributes in process `syz.0.215'. [ 334.281449][ T4947] fuse: Unknown parameter 'group_i00000000000000000000' [ 334.842878][ T4951] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 334.856299][ T4951] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 335.529673][ T4961] fuse: Unknown parameter 'group_id00000000000000000000' [ 337.912495][ T4973] fuse: Unknown parameter 'group_id00000000000000000000' [ 338.298128][ T3884] usb 1-1: new high-speed USB device number 7 using dummy_hcd [ 338.300039][ T31] kauditd_printk_skb: 646 callbacks suppressed [ 338.300268][ T31] audit: type=1400 audit(338.190:1013): avc: denied { name_bind } for pid=4976 comm="syz.2.230" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 338.468519][ T3884] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 338.469170][ T3884] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 338.474953][ T3884] usb 1-1: New USB device found, idVendor=1e7d, idProduct=2db4, bcdDevice= 0.00 [ 338.475946][ T3884] usb 1-1: New USB device strings: Mfr=0, Product=9, SerialNumber=0 [ 338.476437][ T3884] usb 1-1: Product: syz [ 338.494415][ T3884] usb 1-1: config 0 descriptor?? [ 338.927183][ T3884] konepure 0003:1E7D:2DB4.0006: unknown main item tag 0x0 [ 338.938158][ T3884] konepure 0003:1E7D:2DB4.0006: unknown main item tag 0x0 [ 338.938867][ T3884] konepure 0003:1E7D:2DB4.0006: unknown main item tag 0x0 [ 338.939278][ T3884] konepure 0003:1E7D:2DB4.0006: unknown main item tag 0x0 [ 338.939631][ T3884] konepure 0003:1E7D:2DB4.0006: unknown main item tag 0x0 [ 338.940049][ T3884] konepure 0003:1E7D:2DB4.0006: unknown main item tag 0x0 [ 338.940602][ T3884] konepure 0003:1E7D:2DB4.0006: unknown main item tag 0x0 [ 338.941276][ T3884] konepure 0003:1E7D:2DB4.0006: unknown main item tag 0x0 [ 338.941852][ T3884] konepure 0003:1E7D:2DB4.0006: unknown main item tag 0x0 [ 338.942658][ T3884] konepure 0003:1E7D:2DB4.0006: unknown main item tag 0x0 [ 338.943053][ T3884] konepure 0003:1E7D:2DB4.0006: unknown main item tag 0x0 [ 338.998496][ T3884] konepure 0003:1E7D:2DB4.0006: hidraw0: USB HID v0.00 Device [syz] on usb-dummy_hcd.0-1/input0 [ 339.200941][ T3884] usb 1-1: USB disconnect, device number 7 [ 340.156559][ T31] audit: type=1400 audit(340.050:1014): avc: denied { mount } for pid=5002 comm="syz.0.232" name="/" dev="ramfs" ino=5196 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 340.274668][ T31] audit: type=1400 audit(340.170:1015): avc: denied { unmount } for pid=3090 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 340.889854][ T5005] netlink: 96 bytes leftover after parsing attributes in process `syz.0.233'. [ 341.003613][ T5007] fuse: Unknown parameter 'group_id00000000000000000000' [ 341.815196][ T5021] netlink: 44 bytes leftover after parsing attributes in process `syz.0.238'. [ 342.000980][ T5023] netlink: 12 bytes leftover after parsing attributes in process `syz.0.239'. [ 342.195497][ T5025] fuse: Bad value for 'user_id' [ 342.195993][ T5025] fuse: Bad value for 'user_id' [ 342.678332][ T3834] usb 1-1: new high-speed USB device number 8 using dummy_hcd [ 342.846220][ T3834] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 342.846825][ T3834] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 342.847235][ T3834] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 342.850234][ T3834] usb 1-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 342.850802][ T3834] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 342.862809][ T3834] usb 1-1: config 0 descriptor?? [ 343.349159][ T3834] plantronics 0003:047F:FFFF.0007: unknown main item tag 0x0 [ 343.349791][ T3834] plantronics 0003:047F:FFFF.0007: unknown main item tag 0x0 [ 343.350440][ T3834] plantronics 0003:047F:FFFF.0007: unknown main item tag 0x0 [ 343.350816][ T3834] plantronics 0003:047F:FFFF.0007: unknown main item tag 0x0 [ 343.351165][ T3834] plantronics 0003:047F:FFFF.0007: unknown main item tag 0x0 [ 343.351505][ T3834] plantronics 0003:047F:FFFF.0007: unknown main item tag 0x0 [ 343.351880][ T3834] plantronics 0003:047F:FFFF.0007: unknown main item tag 0x0 [ 343.352231][ T3834] plantronics 0003:047F:FFFF.0007: unknown main item tag 0x0 [ 343.352619][ T3834] plantronics 0003:047F:FFFF.0007: unknown main item tag 0x0 [ 343.352965][ T3834] plantronics 0003:047F:FFFF.0007: unknown main item tag 0x0 [ 343.353321][ T3834] plantronics 0003:047F:FFFF.0007: unknown main item tag 0x0 [ 343.353669][ T3834] plantronics 0003:047F:FFFF.0007: unknown main item tag 0x0 [ 343.354030][ T3834] plantronics 0003:047F:FFFF.0007: unknown main item tag 0x0 [ 343.354381][ T3834] plantronics 0003:047F:FFFF.0007: unknown main item tag 0x0 [ 343.354733][ T3834] plantronics 0003:047F:FFFF.0007: unknown main item tag 0x0 [ 343.355957][ T3834] plantronics 0003:047F:FFFF.0007: No inputs registered, leaving [ 343.380080][ T3834] plantronics 0003:047F:FFFF.0007: hiddev0,hidraw0: USB HID v0.40 Device [HID 047f:ffff] on usb-dummy_hcd.0-1/input0 [ 343.671028][ T3834] usb 1-1: USB disconnect, device number 8 [ 343.984152][ T31] audit: type=1326 audit(343.880:1016): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5051 comm="syz.0.242" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 343.989450][ T31] audit: type=1326 audit(343.890:1017): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5051 comm="syz.0.242" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 343.991460][ T31] audit: type=1326 audit(343.890:1018): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5051 comm="syz.0.242" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 343.992167][ T31] audit: type=1326 audit(343.890:1019): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5051 comm="syz.0.242" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 343.992711][ T31] audit: type=1326 audit(343.890:1020): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5051 comm="syz.0.242" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 344.001474][ T31] audit: type=1326 audit(343.900:1021): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5051 comm="syz.0.242" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 344.012044][ T31] audit: type=1326 audit(343.910:1022): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5051 comm="syz.0.242" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 344.016398][ T31] audit: type=1326 audit(343.910:1023): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5051 comm="syz.0.242" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 344.032219][ T31] audit: type=1326 audit(343.920:1024): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5051 comm="syz.0.242" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 344.035298][ T31] audit: type=1326 audit(343.930:1025): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5051 comm="syz.0.242" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 357.477032][ T31] kauditd_printk_skb: 5 callbacks suppressed [ 357.477120][ T31] audit: type=1400 audit(357.370:1031): avc: denied { unmount } for pid=4060 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 357.553901][ T5061] netlink: 16 bytes leftover after parsing attributes in process `syz.2.245'. [ 357.556606][ T5061] netlink: 8 bytes leftover after parsing attributes in process `syz.2.245'. [ 357.660123][ T5065] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 357.661249][ T5065] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 357.826527][ T31] audit: type=1326 audit(357.720:1032): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5068 comm="syz.2.247" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 357.847338][ T31] audit: type=1326 audit(357.740:1033): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5068 comm="syz.2.247" exe="/syz-executor" sig=0 arch=40000028 syscall=328 compat=0 ip=0x133450 code=0x7ffc0000 [ 357.849226][ T31] audit: type=1326 audit(357.740:1034): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5068 comm="syz.2.247" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 357.850003][ T31] audit: type=1326 audit(357.740:1035): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5068 comm="syz.2.247" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 362.380231][ T31] audit: type=1326 audit(362.280:1036): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5094 comm="syz.2.258" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 362.388094][ T31] audit: type=1326 audit(362.280:1037): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5094 comm="syz.2.258" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 362.406000][ T31] audit: type=1326 audit(362.300:1038): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5094 comm="syz.2.258" exe="/syz-executor" sig=0 arch=40000028 syscall=318 compat=0 ip=0x133450 code=0x7ffc0000 [ 362.414636][ T31] audit: type=1326 audit(362.310:1039): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5094 comm="syz.2.258" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 362.415371][ T31] audit: type=1326 audit(362.310:1040): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5094 comm="syz.2.258" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 362.688647][ T5097] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 362.689808][ T5097] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 390.808414][ T31] audit: type=1326 audit(390.700:1041): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5123 comm="syz.2.269" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 390.809445][ T31] audit: type=1326 audit(390.710:1042): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5123 comm="syz.2.269" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 390.810178][ T31] audit: type=1326 audit(390.710:1043): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5123 comm="syz.2.269" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 390.811088][ T31] audit: type=1326 audit(390.710:1044): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5123 comm="syz.2.269" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 390.811667][ T31] audit: type=1326 audit(390.710:1045): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5123 comm="syz.2.269" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 390.817323][ T31] audit: type=1326 audit(390.710:1046): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5123 comm="syz.2.269" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 390.821951][ T31] audit: type=1326 audit(390.710:1047): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5123 comm="syz.2.269" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 390.823064][ T31] audit: type=1326 audit(390.720:1048): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5123 comm="syz.2.269" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 390.823677][ T31] audit: type=1326 audit(390.720:1049): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5123 comm="syz.2.269" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 390.824806][ T31] audit: type=1326 audit(390.720:1050): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5123 comm="syz.2.269" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 413.020358][ T5145] netlink: 4 bytes leftover after parsing attributes in process `syz.0.274'. [ 434.175590][ T5158] futex_wake_op: syz.0.279 tries to shift op by 32; fix this program [ 435.786708][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 435.786813][ T31] audit: type=1400 audit(435.680:1053): avc: denied { create } for pid=5163 comm="syz.0.282" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 435.796855][ T31] audit: type=1400 audit(435.690:1054): avc: denied { ioctl } for pid=5163 comm="syz.0.282" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=5400 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 435.815012][ T31] audit: type=1400 audit(435.710:1055): avc: denied { write } for pid=2903 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 435.817909][ T31] audit: type=1400 audit(435.710:1056): avc: denied { remove_name } for pid=2903 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 435.818559][ T31] audit: type=1400 audit(435.710:1057): avc: denied { rename } for pid=2903 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 435.819222][ T31] audit: type=1400 audit(435.710:1058): avc: denied { add_name } for pid=2903 comm="syslogd" name="messages.0" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 435.824629][ T31] audit: type=1400 audit(435.710:1059): avc: denied { create } for pid=2903 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 437.091697][ T31] audit: type=1326 audit(436.990:1060): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5175 comm="syz.2.287" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 437.098305][ T31] audit: type=1326 audit(436.990:1061): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5175 comm="syz.2.287" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 437.099806][ T31] audit: type=1326 audit(436.990:1062): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5175 comm="syz.2.287" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x133450 code=0x7ffc0000 [ 437.233312][ T46] usb 1-1: new high-speed USB device number 9 using dummy_hcd [ 437.488663][ T46] usb 1-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 437.489412][ T46] usb 1-1: config 1 interface 0 altsetting 0 has 0 endpoint descriptors, different from the interface descriptor's value: 1 [ 437.490064][ T46] usb 1-1: config 1 interface 1 altsetting 1 has 0 endpoint descriptors, different from the interface descriptor's value: 2 [ 437.529683][ T46] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 437.530269][ T46] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 437.530784][ T46] usb 1-1: Product: syz [ 437.531060][ T46] usb 1-1: Manufacturer: syz [ 437.531548][ T46] usb 1-1: SerialNumber: syz [ 437.570832][ T46] cdc_ncm 1-1:1.0: skipping garbage [ 438.932930][ T46] cdc_ncm 1-1:1.0: bind() failure [ 438.962508][ T46] cdc_ncm 1-1:1.1: probe with driver cdc_ncm failed with error -71 [ 438.963841][ T46] cdc_mbim 1-1:1.1: probe with driver cdc_mbim failed with error -71 [ 438.966127][ T46] usbtest 1-1:1.1: probe with driver usbtest failed with error -71 [ 438.979207][ T46] usb 1-1: USB disconnect, device number 9 [ 439.283508][ T5196] capability: warning: `syz.0.290' uses deprecated v2 capabilities in a way that may be insecure [ 445.262439][ T31] kauditd_printk_skb: 21 callbacks suppressed [ 445.262558][ T31] audit: type=1400 audit(445.160:1084): avc: denied { getopt } for pid=5205 comm="syz.0.294" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 454.895458][ T31] audit: type=1400 audit(454.790:1085): avc: denied { connect } for pid=5213 comm="syz.2.296" lport=60 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 455.110263][ T5216] : renamed from pim6reg1 [ 456.548419][ T5231] input: syz0 as /devices/virtual/input/input6 [ 456.743889][ T5237] netlink: 4 bytes leftover after parsing attributes in process `syz.2.301'. [ 456.902193][ T31] audit: type=1326 audit(456.800:1086): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5238 comm="syz.2.302" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 456.904755][ T31] audit: type=1326 audit(456.800:1087): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5238 comm="syz.2.302" exe="/syz-executor" sig=0 arch=40000028 syscall=230 compat=0 ip=0x133450 code=0x7ffc0000 [ 456.906703][ T31] audit: type=1326 audit(456.800:1088): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5238 comm="syz.2.302" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 456.933057][ T31] audit: type=1326 audit(456.820:1089): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5238 comm="syz.2.302" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 457.592905][ T5245] netlink: 96 bytes leftover after parsing attributes in process `syz.2.305'. [ 464.982504][ T3949] usb 1-1: new high-speed USB device number 10 using dummy_hcd [ 465.186054][ T3949] usb 1-1: Using ep0 maxpacket: 16 [ 465.265362][ T3949] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 465.269950][ T3949] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 465.275042][ T3949] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 9 [ 465.276391][ T3949] usb 1-1: New USB device found, idVendor=045e, idProduct=07da, bcdDevice= 0.00 [ 465.276956][ T3949] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 465.292410][ T3949] usb 1-1: config 0 descriptor?? [ 465.834466][ T3949] microsoft 0003:045E:07DA.0008: unknown main item tag 0x0 [ 465.835484][ T3949] microsoft 0003:045E:07DA.0008: unknown main item tag 0x0 [ 465.836142][ T3949] microsoft 0003:045E:07DA.0008: unknown main item tag 0x0 [ 465.836634][ T3949] microsoft 0003:045E:07DA.0008: unknown main item tag 0x0 [ 465.848281][ T3949] microsoft 0003:045E:07DA.0008: unknown main item tag 0x0 [ 465.848928][ T3949] microsoft 0003:045E:07DA.0008: unknown main item tag 0x0 [ 465.849413][ T3949] microsoft 0003:045E:07DA.0008: unknown main item tag 0x0 [ 465.851105][ T3949] microsoft 0003:045E:07DA.0008: unknown main item tag 0x0 [ 465.868509][ T3949] microsoft 0003:045E:07DA.0008: unknown main item tag 0x0 [ 465.869115][ T3949] microsoft 0003:045E:07DA.0008: unknown main item tag 0x0 [ 465.890521][ T3949] input: HID 045e:07da as /devices/platform/dummy_hcd.0/usb1/1-1/1-1:0.0/0003:045E:07DA.0008/input/input7 [ 465.923946][ T3949] microsoft 0003:045E:07DA.0008: input,hidraw0: USB HID v0.00 Device [HID 045e:07da] on usb-dummy_hcd.0-1/input0 [ 465.993417][ T90] usb 1-1: USB disconnect, device number 10 [ 466.948650][ T3949] usb 1-1: new high-speed USB device number 11 using dummy_hcd [ 467.097989][ T3949] usb 1-1: Using ep0 maxpacket: 16 [ 467.112358][ T3949] usb 1-1: config 0 has an invalid interface number: 2 but max is 0 [ 467.113075][ T3949] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 467.113808][ T3949] usb 1-1: config 0 has no interface number 0 [ 467.114104][ T3949] usb 1-1: config 0 interface 2 altsetting 0 has 0 endpoint descriptors, different from the interface descriptor's value: 1 [ 467.135154][ T3949] usb 1-1: New USB device found, idVendor=0582, idProduct=0005, bcdDevice= 0.88 [ 467.135718][ T3949] usb 1-1: New USB device strings: Mfr=0, Product=2, SerialNumber=3 [ 467.136121][ T3949] usb 1-1: Product: syz [ 467.136318][ T3949] usb 1-1: SerialNumber: syz [ 467.146900][ T3949] usb 1-1: config 0 descriptor?? [ 467.609010][ T3949] usb 1-1: Quirk or no altset; falling back to MIDI 1.0 [ 467.651950][ T3949] snd-usb-audio 1-1:0.2: probe with driver snd-usb-audio failed with error -2 [ 467.669338][ T3949] usb 1-1: USB disconnect, device number 11 [ 490.374458][ T31] audit: type=1400 audit(490.270:1090): avc: denied { nlmsg_read } for pid=5323 comm="syz.0.318" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 490.375731][ T5324] netlink: 12 bytes leftover after parsing attributes in process `syz.0.318'. [ 490.803936][ T31] audit: type=1326 audit(490.700:1091): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5329 comm="syz.0.321" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 490.820119][ T31] audit: type=1326 audit(490.700:1092): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5329 comm="syz.0.321" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 490.821082][ T31] audit: type=1326 audit(490.720:1093): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5329 comm="syz.0.321" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 490.850853][ T31] audit: type=1326 audit(490.750:1094): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5329 comm="syz.0.321" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 490.876141][ T31] audit: type=1326 audit(490.770:1095): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5329 comm="syz.0.321" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 490.877176][ T31] audit: type=1326 audit(490.770:1096): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5329 comm="syz.0.321" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 490.879063][ T31] audit: type=1326 audit(490.770:1097): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5329 comm="syz.0.321" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 490.961850][ T31] audit: type=1326 audit(490.790:1098): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5329 comm="syz.0.321" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 490.968299][ T31] audit: type=1326 audit(490.860:1099): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5329 comm="syz.0.321" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 501.343832][ T5348] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 501.345159][ T5348] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 520.911807][ T5373] batadv_slave_0: entered promiscuous mode [ 522.868015][ T31] kauditd_printk_skb: 15 callbacks suppressed [ 522.868068][ T31] audit: type=1326 audit(522.760:1115): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5386 comm="syz.2.344" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 522.890584][ T31] audit: type=1326 audit(522.790:1116): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5386 comm="syz.2.344" exe="/syz-executor" sig=0 arch=40000028 syscall=65 compat=0 ip=0x133450 code=0x7ffc0000 [ 522.892310][ T31] audit: type=1326 audit(522.790:1117): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5386 comm="syz.2.344" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 523.117974][ T31] audit: type=1400 audit(523.010:1118): avc: denied { bind } for pid=5388 comm="syz.2.345" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 527.203613][ T31] audit: type=1326 audit(527.080:1119): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5398 comm="syz.2.350" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 527.204639][ T31] audit: type=1326 audit(527.100:1120): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5398 comm="syz.2.350" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 527.209771][ T31] audit: type=1326 audit(527.110:1121): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5398 comm="syz.2.350" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 527.210625][ T31] audit: type=1326 audit(527.110:1122): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5398 comm="syz.2.350" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 527.211407][ T31] audit: type=1326 audit(527.110:1123): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5398 comm="syz.2.350" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 527.218180][ T31] audit: type=1326 audit(527.110:1124): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5398 comm="syz.2.350" exe="/syz-executor" sig=0 arch=40000028 syscall=226 compat=0 ip=0x133450 code=0x7ffc0000 [ 533.524220][ T31] kauditd_printk_skb: 17 callbacks suppressed [ 533.524324][ T31] audit: type=1326 audit(533.420:1142): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5398 comm="syz.2.350" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 533.525311][ T31] audit: type=1326 audit(533.420:1143): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5398 comm="syz.2.350" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 533.546110][ T31] audit: type=1326 audit(533.440:1144): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5398 comm="syz.2.350" exe="/syz-executor" sig=0 arch=40000028 syscall=283 compat=0 ip=0x133450 code=0x7ffc0000 [ 533.546977][ T31] audit: type=1326 audit(533.440:1145): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5398 comm="syz.2.350" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 533.551546][ T31] audit: type=1326 audit(533.440:1146): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5398 comm="syz.2.350" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 533.552181][ T31] audit: type=1326 audit(533.440:1147): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5398 comm="syz.2.350" exe="/syz-executor" sig=0 arch=40000028 syscall=374 compat=0 ip=0x133450 code=0x7ffc0000 [ 535.090386][ T31] audit: type=1326 audit(534.980:1148): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5398 comm="syz.2.350" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 535.092658][ T31] audit: type=1326 audit(534.990:1149): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5398 comm="syz.2.350" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 536.763775][ T31] audit: type=1400 audit(536.660:1150): avc: denied { append } for pid=5412 comm="syz.2.355" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 550.618456][ T5435] netlink: 20 bytes leftover after parsing attributes in process `syz.0.362'. [ 550.797671][ T31] audit: type=1326 audit(550.690:1151): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5436 comm="syz.0.363" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 550.808633][ T31] audit: type=1326 audit(550.700:1152): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5436 comm="syz.0.363" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 550.818449][ T31] audit: type=1326 audit(550.710:1153): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5436 comm="syz.0.363" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 550.881794][ T31] audit: type=1326 audit(550.780:1154): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5436 comm="syz.0.363" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 550.883330][ T31] audit: type=1326 audit(550.780:1155): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5436 comm="syz.0.363" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 550.884097][ T31] audit: type=1326 audit(550.780:1156): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5436 comm="syz.0.363" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 550.884861][ T31] audit: type=1326 audit(550.780:1157): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5436 comm="syz.0.363" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 550.885616][ T31] audit: type=1326 audit(550.780:1158): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5436 comm="syz.0.363" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 550.908849][ T31] audit: type=1326 audit(550.790:1159): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5436 comm="syz.0.363" exe="/syz-executor" sig=0 arch=40000028 syscall=339 compat=0 ip=0x133450 code=0x7ffc0000 [ 550.909879][ T31] audit: type=1326 audit(550.790:1160): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5436 comm="syz.0.363" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 554.512907][ T5441] netlink: 'syz.0.364': attribute type 4 has an invalid length. [ 557.264397][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 557.264523][ T31] audit: type=1400 audit(557.160:1162): avc: denied { unmount } for pid=4060 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 558.279112][ T5448] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 558.281413][ T5448] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 558.690563][ T5454] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 558.691687][ T5454] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 559.025587][ T5460] Illegal XDP return value 4294967274 on prog (id 191) dev syz_tun, expect packet loss! [ 559.895889][ T31] audit: type=1326 audit(559.790:1163): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5465 comm="syz.2.374" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 559.897053][ T31] audit: type=1326 audit(559.790:1164): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5465 comm="syz.2.374" exe="/syz-executor" sig=0 arch=40000028 syscall=323 compat=0 ip=0x133450 code=0x7ffc0000 [ 559.897873][ T31] audit: type=1326 audit(559.790:1165): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5465 comm="syz.2.374" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 559.909418][ T31] audit: type=1326 audit(559.790:1166): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5465 comm="syz.2.374" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 559.910318][ T31] audit: type=1326 audit(559.790:1167): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5465 comm="syz.2.374" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 559.911360][ T31] audit: type=1326 audit(559.800:1168): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5465 comm="syz.2.374" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 559.917060][ T31] audit: type=1326 audit(559.800:1169): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5465 comm="syz.2.374" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 559.919125][ T31] audit: type=1326 audit(559.810:1170): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5465 comm="syz.2.374" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 559.938268][ T31] audit: type=1326 audit(559.810:1171): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5465 comm="syz.2.374" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 588.953359][ T5500] fuse: Unknown parameter 'user_id00000000000000000000' [ 590.087214][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 590.087386][ T31] audit: type=1326 audit(589.980:1174): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5508 comm="syz.0.392" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 590.098297][ T31] audit: type=1326 audit(589.990:1175): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5508 comm="syz.0.392" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 590.113305][ T31] audit: type=1326 audit(590.010:1176): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5508 comm="syz.0.392" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 590.124525][ T31] audit: type=1326 audit(590.020:1177): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5508 comm="syz.0.392" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 590.126390][ T31] audit: type=1326 audit(590.020:1178): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5508 comm="syz.0.392" exe="/syz-executor" sig=0 arch=40000028 syscall=323 compat=0 ip=0x133450 code=0x7ffc0000 [ 590.127264][ T31] audit: type=1326 audit(590.020:1179): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5508 comm="syz.0.392" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 590.134876][ T31] audit: type=1326 audit(590.020:1180): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5508 comm="syz.0.392" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 590.632707][ T5512] fuse: Unknown parameter 'user_id00000000000000000000' [ 591.079987][ T31] audit: type=1400 audit(590.980:1181): avc: denied { setcheckreqprot } for pid=5513 comm="syz.0.394" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 595.911691][ T31] audit: type=1400 audit(595.810:1182): avc: denied { mount } for pid=5520 comm="syz.0.397" name="/" dev="devtmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 595.929660][ T31] audit: type=1400 audit(595.830:1183): avc: denied { remount } for pid=5520 comm="syz.0.397" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 608.213748][ T5525] fuse: Bad value for 'fd' [ 608.465431][ T31] audit: type=1400 audit(608.360:1184): avc: denied { setopt } for pid=5528 comm="syz.2.400" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 613.951924][ T31] audit: type=1400 audit(613.850:1185): avc: denied { unmount } for pid=3090 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 628.047229][ T5558] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 628.060552][ T5558] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 648.528608][ T5571] serio: Serial port pts0 [ 660.610608][ T5611] netlink: 'syz.0.430': attribute type 10 has an invalid length. [ 660.792034][ T31] audit: type=1400 audit(660.690:1186): avc: denied { create } for pid=5614 comm="syz.0.432" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 660.804699][ T31] audit: type=1400 audit(660.700:1187): avc: denied { create } for pid=5614 comm="syz.0.432" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 660.819474][ T31] audit: type=1400 audit(660.720:1188): avc: denied { create } for pid=5614 comm="syz.0.432" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 668.560045][ T5651] netlink: 'syz.0.446': attribute type 27 has an invalid length. [ 674.912518][ T31] audit: type=1400 audit(674.810:1189): avc: denied { create } for pid=5671 comm="syz.2.455" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 679.217130][ T31] audit: type=1400 audit(679.110:1190): avc: denied { create } for pid=5695 comm="syz.2.465" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 679.252988][ T31] audit: type=1400 audit(679.140:1191): avc: denied { setopt } for pid=5695 comm="syz.2.465" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 679.283267][ T31] audit: type=1400 audit(679.170:1192): avc: denied { write } for pid=5695 comm="syz.2.465" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 679.299940][ T31] audit: type=1400 audit(679.180:1193): avc: denied { connect } for pid=5695 comm="syz.2.465" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 679.300737][ T31] audit: type=1400 audit(679.190:1194): avc: denied { name_connect } for pid=5695 comm="syz.2.465" dest=16 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=sctp_socket permissive=1 [ 685.009889][ T5729] A link change request failed with some changes committed already. Interface batadv_slave_0 may have been left with an inconsistent configuration, please check. [ 685.990066][ T5739] fuse: Bad value for 'user_id' [ 685.990638][ T5739] fuse: Bad value for 'user_id' [ 686.783897][ T31] audit: type=1400 audit(686.680:1195): avc: denied { relabelfrom } for pid=5742 comm="syz.0.483" name="NETLINK" dev="sockfs" ino=6340 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 686.788388][ T5743] SELinux: Context system_u:object_r:crack_db_t:s0 is not valid (left unmapped). [ 686.792248][ T31] audit: type=1400 audit(686.690:1196): avc: denied { relabelto } for pid=5742 comm="syz.0.483" name="NETLINK" dev="sockfs" ino=6340 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=netlink_generic_socket permissive=1 trawcon="system_u:object_r:crack_db_t:s0" [ 687.141670][ T31] audit: type=1400 audit(687.040:1197): avc: denied { create } for pid=5746 comm="syz.2.484" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 687.149744][ T31] audit: type=1400 audit(687.050:1198): avc: denied { ioctl } for pid=5746 comm="syz.2.484" path="socket:[6351]" dev="sockfs" ino=6351 ioctlcmd=0x703 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 687.178920][ T31] audit: type=1400 audit(687.070:1199): avc: denied { setopt } for pid=5746 comm="syz.2.484" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 687.190476][ T31] audit: type=1400 audit(687.090:1200): avc: denied { write } for pid=5746 comm="syz.2.484" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 687.226557][ T31] audit: type=1400 audit(687.090:1201): avc: denied { connect } for pid=5746 comm="syz.2.484" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 687.317227][ T31] audit: type=1400 audit(687.210:1202): avc: denied { setattr } for pid=5746 comm="syz.2.484" path="socket:[6351]" dev="sockfs" ino=6351 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 687.608714][ T5752] fuse: Bad value for 'user_id' [ 687.609247][ T5752] fuse: Bad value for 'user_id' [ 688.673169][ T5758] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 688.674424][ T5758] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 688.845912][ T5758] FAULT_INJECTION: forcing a failure. [ 688.845912][ T5758] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 688.859296][ T5758] CPU: 1 UID: 0 PID: 5758 Comm: syz.2.488 Not tainted 6.12.0-syzkaller #0 [ 688.861842][ T5758] Hardware name: ARM-Versatile Express [ 688.862516][ T5758] Call trace: [ 688.863168][ T5758] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 688.864596][ T5758] r7:00000000 r6:76b44f30 r5:60000113 r4:820413b8 [ 688.865015][ T5758] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 688.865420][ T5758] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 688.865970][ T5758] r5:00000000 r4:82751908 [ 688.866198][ T5758] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 688.866723][ T5758] [<808f17e0>] (should_fail_ex) from [<808f19d0>] (should_fail+0x14/0x18) [ 688.867309][ T5758] r6:76b44f30 r5:00000001 r4:00000001 [ 688.867884][ T5758] [<808f19bc>] (should_fail) from [<808f19f0>] (should_fail_usercopy+0x1c/0x20) [ 688.868557][ T5758] [<808f19d4>] (should_fail_usercopy) from [<8084f240>] (kstrtouint_from_user+0x60/0x134) [ 688.871282][ T5758] [<8084f1e0>] (kstrtouint_from_user) from [<805cdf64>] (proc_fail_nth_write+0x40/0xe8) [ 688.871752][ T5758] r8:dfef9f68 r7:84f4bc00 r6:00000001 r5:84f55000 r4:00000001 [ 688.872240][ T5758] [<805cdf24>] (proc_fail_nth_write) from [<8051dbf8>] (vfs_write+0xac/0x44c) [ 688.872695][ T5758] r5:84f55000 r4:805cdf24 [ 688.872909][ T5758] [<8051db4c>] (vfs_write) from [<8051e104>] (ksys_write+0x74/0xe4) [ 688.873331][ T5758] r10:00000004 r9:84f4bc00 r8:8020029c r7:00000000 r6:00000002 r5:84f55000 [ 688.873864][ T5758] r4:84f55003 [ 688.874345][ T5758] [<8051e090>] (ksys_write) from [<8051e184>] (sys_write+0x10/0x14) [ 688.875158][ T5758] r7:00000004 r6:00000004 r5:76b44f30 r4:00000001 [ 688.878829][ T5758] [<8051e174>] (sys_write) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 688.879614][ T5758] Exception stack(0xdfef9fa8 to 0xdfef9ff0) [ 688.880169][ T5758] 9fa0: 00000001 76b44f30 00000004 76b44f30 00000001 00000000 [ 688.880776][ T5758] 9fc0: 00000001 76b44f30 00000004 00000004 00000000 00006364 003d0f00 76b450bc [ 688.881181][ T5758] 9fe0: 00000158 76b44ed0 000d8998 001313ec [ 689.769904][ T5767] fuse: Bad value for 'fd' [ 691.051596][ T5778] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 691.054171][ T5778] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 692.695200][ T5784] fuse: Bad value for 'fd' [ 695.062327][ T5793] FAULT_INJECTION: forcing a failure. [ 695.062327][ T5793] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 695.079877][ T5793] CPU: 0 UID: 0 PID: 5793 Comm: syz.0.499 Not tainted 6.12.0-syzkaller #0 [ 695.080659][ T5793] Hardware name: ARM-Versatile Express [ 695.081005][ T5793] Call trace: [ 695.081282][ T5793] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 695.082020][ T5793] r7:00000000 r6:8223c840 r5:60000013 r4:820413b8 [ 695.082510][ T5793] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 695.083047][ T5793] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 695.083622][ T5793] r5:00000000 r4:82751908 [ 695.083969][ T5793] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 695.084548][ T5793] [<808f17e0>] (should_fail_ex) from [<808f19d0>] (should_fail+0x14/0x18) [ 695.085074][ T5793] r6:8223c840 r5:20000080 r4:83d66000 [ 695.085582][ T5793] [<808f19bc>] (should_fail) from [<808f19f0>] (should_fail_usercopy+0x1c/0x20) [ 695.085951][ T5793] [<808f19d4>] (should_fail_usercopy) from [<808f7a38>] (strncpy_from_user+0x20/0x194) [ 695.086562][ T5793] [<808f7a18>] (strncpy_from_user) from [<8052c6e8>] (getname_flags.part.0+0x44/0x18c) [ 695.087247][ T5793] r10:00000142 r9:83e56c00 r8:8020029c r7:00000000 r6:8223c840 r5:20000080 [ 695.087921][ T5793] r4:83d66000 [ 695.088332][ T5793] [<8052c6a4>] (getname_flags.part.0) from [<805318cc>] (getname+0x38/0x4c) [ 695.088812][ T5793] r9:83e56c00 r8:8020029c r7:ffffff9c r6:00000000 r5:df9b5f58 r4:20000080 [ 695.089178][ T5793] [<80531894>] (getname) from [<8051a37c>] (do_sys_openat2+0x80/0xe4) [ 695.089572][ T5793] r5:df9b5f58 r4:20000080 [ 695.089803][ T5793] [<8051a2fc>] (do_sys_openat2) from [<8051a7c0>] (sys_openat+0x98/0xd4) [ 695.090228][ T5793] r7:00000142 r6:00131400 r5:20000080 r4:ffffff9c [ 695.090583][ T5793] [<8051a728>] (sys_openat) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 695.090945][ T5793] Exception stack(0xdf9b5fa8 to 0xdf9b5ff0) [ 695.091218][ T5793] 5fa0: 00000000 00000000 ffffff9c 20000080 00000000 00000000 [ 695.091750][ T5793] 5fc0: 00000000 00000000 00131400 00000142 00000000 00006364 003d0f00 76b9c0bc [ 695.092139][ T5793] 5fe0: 76b9bec0 76b9beb0 00018af0 00133450 [ 695.092531][ T5793] r5:00000000 r4:00000000 [ 698.928373][ T5801] fuse: Bad value for 'fd' [ 700.211113][ T31] audit: type=1400 audit(700.110:1203): avc: denied { lock } for pid=5802 comm="syz.2.503" path="socket:[6449]" dev="sockfs" ino=6449 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 700.332197][ T5812] FAULT_INJECTION: forcing a failure. [ 700.332197][ T5812] name failslab, interval 1, probability 0, space 0, times 1 [ 700.335607][ T5812] CPU: 0 UID: 0 PID: 5812 Comm: syz.2.505 Not tainted 6.12.0-syzkaller #0 [ 700.336198][ T5812] Hardware name: ARM-Versatile Express [ 700.336433][ T5812] Call trace: [ 700.336696][ T5812] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 700.337137][ T5812] r7:00000cc0 r6:20000740 r5:60000013 r4:820413b8 [ 700.337395][ T5812] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 700.338387][ T5812] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 700.338846][ T5812] r5:00000000 r4:8271b79c [ 700.339048][ T5812] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 700.339401][ T5812] [<808f17e0>] (should_fail_ex) from [<804ef540>] (should_failslab+0x6c/0x94) [ 700.339743][ T5812] r6:20000740 r5:00000020 r4:82c01240 [ 700.339955][ T5812] [<804ef4d4>] (should_failslab) from [<804d46b0>] (__kmalloc_noprof+0x9c/0x458) [ 700.340282][ T5812] [<804d4614>] (__kmalloc_noprof) from [<805b0174>] (sys_open_by_handle_at+0x198/0x4dc) [ 700.340699][ T5812] r10:b5003500 r9:00000018 r8:b5403587 r7:df9f1f6c r6:20000740 r5:00100040 [ 700.341002][ T5812] r4:df9f1f5c [ 700.341170][ T5812] [<805affdc>] (sys_open_by_handle_at) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 700.341515][ T5812] Exception stack(0xdf9f1fa8 to 0xdf9f1ff0) [ 700.341783][ T5812] 1fa0: 00000000 00000000 00000005 20000740 00100040 00000000 [ 700.342115][ T5812] 1fc0: 00000000 00000000 00131400 00000173 00000000 00006364 003d0f00 76b450bc [ 700.342444][ T5812] 1fe0: 76b44ec0 76b44eb0 00018af0 00133450 [ 700.342704][ T5812] r10:00000173 r9:84f4a400 r8:8020029c r7:00000173 r6:00131400 r5:00000000 [ 700.343040][ T5812] r4:00000000 [ 700.581462][ T5816] fuse: Bad value for 'fd' [ 703.137899][ T31] audit: type=1400 audit(703.030:1204): avc: denied { ioctl } for pid=5824 comm="syz.0.510" path="socket:[7327]" dev="sockfs" ino=7327 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 704.258388][ T31] audit: type=1400 audit(704.150:1205): avc: denied { create } for pid=5829 comm="syz.2.512" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 704.268882][ T31] audit: type=1400 audit(704.160:1206): avc: denied { bind } for pid=5829 comm="syz.2.512" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 704.434542][ T31] audit: type=1400 audit(704.330:1207): avc: denied { listen } for pid=5824 comm="syz.0.510" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_route_socket permissive=1 [ 704.787961][ T31] audit: type=1400 audit(704.680:1208): avc: denied { accept } for pid=5829 comm="syz.2.512" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 705.822925][ T31] audit: type=1400 audit(705.720:1209): avc: denied { setopt } for pid=5839 comm="syz.2.513" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 705.833474][ T31] audit: type=1400 audit(705.730:1210): avc: denied { read } for pid=5839 comm="syz.2.513" path="socket:[7351]" dev="sockfs" ino=7351 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 706.341138][ T31] audit: type=1400 audit(706.230:1211): avc: denied { write } for pid=5839 comm="syz.2.513" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 707.153466][ T5849] fuse: Bad value for 'fd' [ 707.659432][ T90] usb 1-1: new high-speed USB device number 12 using dummy_hcd [ 707.873731][ T90] usb 1-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 707.874100][ T90] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 707.874274][ T90] usb 1-1: Product: syz [ 707.874389][ T90] usb 1-1: Manufacturer: syz [ 707.874531][ T90] usb 1-1: SerialNumber: syz [ 710.381789][ T5875] serio: Serial port pts0 [ 711.143767][ T31] audit: type=1400 audit(711.040:1212): avc: denied { create } for pid=5884 comm="syz.2.525" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 711.780068][ T31] audit: type=1400 audit(711.680:1213): avc: denied { setattr } for pid=5884 comm="syz.2.525" name="XDP" dev="sockfs" ino=7408 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 713.201576][ T5893] serio: Serial port pts0 [ 713.852805][ T5898] fuse: Bad value for 'fd' [ 714.514130][ T31] audit: type=1400 audit(714.410:1214): avc: denied { read } for pid=5903 comm="syz.2.531" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 717.331230][ T5913] fuse: Invalid rootmode [ 717.456527][ T5915] fuse: Invalid rootmode [ 717.913871][ T3949] usb 1-1: USB disconnect, device number 12 [ 718.182419][ T5931] fuse: Invalid rootmode [ 718.287142][ T5933] fuse: Bad value for 'rootmode' [ 720.400819][ T31] audit: type=1400 audit(720.300:1215): avc: denied { setopt } for pid=5942 comm="syz.2.543" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 720.407220][ T31] audit: type=1400 audit(720.300:1216): avc: denied { connect } for pid=5942 comm="syz.2.543" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 720.914036][ T31] audit: type=1400 audit(720.810:1217): avc: denied { listen } for pid=5942 comm="syz.2.543" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 721.420525][ T31] audit: type=1400 audit(721.320:1218): avc: denied { ioctl } for pid=5942 comm="syz.2.543" path="socket:[7458]" dev="sockfs" ino=7458 ioctlcmd=0x5760 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 721.925947][ T5949] FAULT_INJECTION: forcing a failure. [ 721.925947][ T5949] name failslab, interval 1, probability 0, space 0, times 0 [ 721.927863][ T5949] CPU: 0 UID: 0 PID: 5949 Comm: syz.2.543 Not tainted 6.12.0-syzkaller #0 [ 721.930749][ T5949] Hardware name: ARM-Versatile Express [ 721.931210][ T5949] Call trace: [ 721.932186][ T5949] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 721.933080][ T5949] r7:00000c40 r6:8474cb68 r5:60000013 r4:820413b8 [ 721.935805][ T5949] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 721.936358][ T5949] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 721.936793][ T5949] r5:00000000 r4:8271b79c [ 721.937012][ T5949] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 721.937441][ T5949] [<808f17e0>] (should_fail_ex) from [<804ef540>] (should_failslab+0x6c/0x94) [ 721.937980][ T5949] r6:8474cb68 r5:00001000 r4:82c016c0 [ 721.938490][ T5949] [<804ef4d4>] (should_failslab) from [<804d46b0>] (__kmalloc_noprof+0x9c/0x458) [ 721.939103][ T5949] [<804d4614>] (__kmalloc_noprof) from [<8075b974>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 721.939710][ T5949] r10:845e2400 r9:82c9fc00 r8:00000000 r7:84836770 r6:8474cb68 r5:00001000 [ 721.940165][ T5949] r4:00000000 [ 721.940363][ T5949] [<8075b938>] (tomoyo_realpath_from_path) from [<80757ab8>] (tomoyo_path_number_perm+0xcc/0x22c) [ 721.940903][ T5949] r10:845e2400 r9:00000000 r8:8474cb40 r7:c028660f r6:00000004 r5:81ad1efc [ 721.941277][ T5949] r4:8474cb68 r3:824bb340 [ 721.941690][ T5949] [<807579ec>] (tomoyo_path_number_perm) from [<8075c384>] (tomoyo_file_ioctl+0x1c/0x20) [ 721.942140][ T5949] r9:00000004 r8:8474cb40 r7:00000000 r6:00000000 r5:c028660f r4:8474cb40 [ 721.942557][ T5949] [<8075c368>] (tomoyo_file_ioctl) from [<8070a724>] (security_file_ioctl+0x64/0x1e4) [ 721.943486][ T5949] [<8070a6c0>] (security_file_ioctl) from [<80536dbc>] (sys_ioctl+0x4c/0xd88) [ 721.944333][ T5949] r7:00000000 r6:8474cb41 r5:00000000 r4:c028660f [ 721.944874][ T5949] [<80536d70>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 721.945444][ T5949] Exception stack(0xdff6dfa8 to 0xdff6dff0) [ 721.945934][ T5949] dfa0: 00000000 00000000 00000004 c028660f 00000000 00000000 [ 721.946406][ T5949] dfc0: 00000000 00000000 00131400 00000036 00000000 00006364 003d0f00 76ae20bc [ 721.946813][ T5949] dfe0: 76ae1ec0 76ae1eb0 00018af0 00133450 [ 721.947146][ T5949] r10:00000036 r9:845e2400 r8:8020029c r7:00000036 r6:00131400 r5:00000000 [ 721.948697][ T5949] r4:00000000 [ 721.953031][ T5949] ERROR: Out of memory at tomoyo_realpath_from_path. [ 727.922140][ T5975] FAULT_INJECTION: forcing a failure. [ 727.922140][ T5975] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 727.925210][ T5975] CPU: 0 UID: 0 PID: 5975 Comm: syz.2.551 Not tainted 6.12.0-syzkaller #0 [ 727.925832][ T5975] Hardware name: ARM-Versatile Express [ 727.926094][ T5975] Call trace: [ 727.926319][ T5975] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 727.927119][ T5975] r7:8514d000 r6:00000000 r5:60000013 r4:820413b8 [ 727.927399][ T5975] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 727.928825][ T5975] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 727.929631][ T5975] r5:00000000 r4:82751908 [ 727.929891][ T5975] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 727.930314][ T5975] [<808f17e0>] (should_fail_ex) from [<808f19d0>] (should_fail+0x14/0x18) [ 727.930758][ T5975] r6:00000000 r5:00000100 r4:00001000 [ 727.931039][ T5975] [<808f19bc>] (should_fail) from [<808f19f0>] (should_fail_usercopy+0x1c/0x20) [ 727.931461][ T5975] [<808f19d4>] (should_fail_usercopy) from [<815c132c>] (bpf_test_init+0xa4/0x200) [ 727.931920][ T5975] [<815c1288>] (bpf_test_init) from [<815c35d8>] (bpf_prog_test_run_xdp+0x158/0x6d4) [ 727.932390][ T5975] r10:840c1800 r9:00000000 r8:00000000 r7:e036d000 r6:00000100 r5:00000000 [ 727.932809][ T5975] r4:dff65ec0 [ 727.933016][ T5975] [<815c3480>] (bpf_prog_test_run_xdp) from [<803abb84>] (__sys_bpf+0xd8c/0x1ff0) [ 727.933471][ T5975] r10:00000182 r9:00000000 r8:b5403587 r7:20000240 r6:0000000a r5:dff65e98 [ 727.933876][ T5975] r4:e036d000 [ 727.934053][ T5975] [<803aadf8>] (__sys_bpf) from [<803ad388>] (sys_bpf+0x2c/0x48) [ 727.934421][ T5975] r10:00000182 r9:840c1800 r8:8020029c r7:00000182 r6:00131400 r5:00000000 [ 727.934910][ T5975] r4:00000000 [ 727.935199][ T5975] [<803ad35c>] (sys_bpf) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 727.935635][ T5975] Exception stack(0xdff65fa8 to 0xdff65ff0) [ 727.936046][ T5975] 5fa0: 00000000 00000000 0000000a 20000240 00000057 00000000 [ 727.936726][ T5975] 5fc0: 00000000 00000000 00131400 00000182 00000000 00006364 003d0f00 76b450bc [ 727.937244][ T5975] 5fe0: 76b44ec0 76b44eb0 00018af0 00133450 [ 728.569857][ T5971] FAULT_INJECTION: forcing a failure. [ 728.569857][ T5971] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 728.570939][ T5971] CPU: 0 UID: 0 PID: 5971 Comm: syz.0.550 Not tainted 6.12.0-syzkaller #0 [ 728.571352][ T5971] Hardware name: ARM-Versatile Express [ 728.571629][ T5971] Call trace: [ 728.571875][ T5971] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 728.572341][ T5971] r7:00000000 r6:8223c840 r5:60000013 r4:820413b8 [ 728.572678][ T5971] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 728.573054][ T5971] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 728.573453][ T5971] r5:00000000 r4:82751908 [ 728.573680][ T5971] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 728.574087][ T5971] [<808f17e0>] (should_fail_ex) from [<808f19d0>] (should_fail+0x14/0x18) [ 728.574506][ T5971] r6:8223c840 r5:20000080 r4:83526000 [ 728.574779][ T5971] [<808f19bc>] (should_fail) from [<808f19f0>] (should_fail_usercopy+0x1c/0x20) [ 728.575196][ T5971] [<808f19d4>] (should_fail_usercopy) from [<808f7a38>] (strncpy_from_user+0x20/0x194) [ 728.575638][ T5971] [<808f7a18>] (strncpy_from_user) from [<8052c6e8>] (getname_flags.part.0+0x44/0x18c) [ 728.576124][ T5971] r10:00000143 r9:8369e000 r8:8020029c r7:00000000 r6:8223c840 r5:20000080 [ 728.576504][ T5971] r4:83526000 [ 728.576719][ T5971] [<8052c6a4>] (getname_flags.part.0) from [<8053178c>] (getname_flags+0x3c/0x50) [ 728.580400][ T5971] r9:8369e000 r8:8020029c r7:00000143 r6:00131400 r5:00000000 r4:20000080 [ 728.581012][ T5971] [<80531750>] (getname_flags) from [<80533838>] (sys_mkdirat+0x24/0x38) [ 728.581776][ T5971] r5:00000000 r4:ffffff9c [ 728.582083][ T5971] [<80533814>] (sys_mkdirat) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 728.582720][ T5971] Exception stack(0xdff61fa8 to 0xdff61ff0) [ 728.583144][ T5971] 1fa0: 00000000 00000000 ffffff9c 20000080 00000000 00000000 [ 728.583670][ T5971] 1fc0: 00000000 00000000 00131400 00000143 00000000 00006364 003d0f00 76bbd0bc [ 728.584231][ T5971] 1fe0: 76bbcec0 76bbceb0 00018af0 00133450 [ 728.584540][ T5971] r5:00000000 r4:00000000 [ 730.585611][ T5980] fuse: Bad value for 'fd' [ 736.251145][ T5999] FAULT_INJECTION: forcing a failure. [ 736.251145][ T5999] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 736.252520][ T5999] CPU: 1 UID: 0 PID: 5999 Comm: syz.0.558 Not tainted 6.12.0-syzkaller #0 [ 736.254846][ T5999] Hardware name: ARM-Versatile Express [ 736.255427][ T5999] Call trace: [ 736.255659][ T5999] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 736.258221][ T5999] r7:00000000 r6:00000000 r5:60000013 r4:820413b8 [ 736.261625][ T5999] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 736.267491][ T5999] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 736.268613][ T5999] r5:00000000 r4:82751908 [ 736.269191][ T5999] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 736.269798][ T5999] [<808f17e0>] (should_fail_ex) from [<808f19d0>] (should_fail+0x14/0x18) [ 736.274572][ T5999] r6:00000000 r5:e04b1f68 r4:00000002 [ 736.277783][ T5999] [<808f19bc>] (should_fail) from [<808f19f0>] (should_fail_usercopy+0x1c/0x20) [ 736.280128][ T5999] [<808f19d4>] (should_fail_usercopy) from [<80557bd8>] (simple_read_from_buffer+0x8c/0x134) [ 736.285407][ T5999] [<80557b4c>] (simple_read_from_buffer) from [<805cca58>] (proc_fail_nth_read+0xb8/0x100) [ 736.288932][ T5999] r10:00000001 r9:805cc9a0 r8:00000002 r7:e04b1f68 r6:0000000f r5:76bbcf30 [ 736.289334][ T5999] r4:82e58000 r3:e04b1e9f [ 736.289612][ T5999] [<805cc9a0>] (proc_fail_nth_read) from [<8051d360>] (vfs_read+0x98/0x324) [ 736.290287][ T5999] r8:76bbcf30 r7:e04b1f68 r6:82e58000 r5:0000000f r4:8474c240 [ 736.290774][ T5999] [<8051d2c8>] (vfs_read) from [<8051e00c>] (ksys_read+0x74/0xe4) [ 736.291299][ T5999] r10:00000003 r9:82e58000 r8:8020029c r7:00000000 r6:00000000 r5:8474c240 [ 736.291811][ T5999] r4:8474c243 [ 736.292048][ T5999] [<8051df98>] (ksys_read) from [<8051e08c>] (sys_read+0x10/0x14) [ 736.296583][ T5999] r7:00000003 r6:00000005 r5:76bbcf30 r4:0000000f [ 736.298210][ T5999] [<8051e07c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 736.298863][ T5999] Exception stack(0xe04b1fa8 to 0xe04b1ff0) [ 736.300589][ T5999] 1fa0: 0000000f 76bbcf30 00000005 76bbcf30 0000000f 00000000 [ 736.301078][ T5999] 1fc0: 0000000f 76bbcf30 00000005 00000003 00000000 00006364 003d0f00 76bbd0bc [ 736.301485][ T5999] 1fe0: 00000158 76bbced0 000d8998 00131324 [ 736.842105][ T6007] FAULT_INJECTION: forcing a failure. [ 736.842105][ T6007] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 736.843170][ T6007] CPU: 1 UID: 0 PID: 6007 Comm: syz.2.557 Not tainted 6.12.0-syzkaller #0 [ 736.843608][ T6007] Hardware name: ARM-Versatile Express [ 736.843966][ T6007] Call trace: [ 736.844258][ T6007] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 736.844820][ T6007] r7:85310448 r6:ffffffa4 r5:60000013 r4:820413b8 [ 736.845214][ T6007] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 736.845614][ T6007] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 736.845937][ T6007] r5:00000000 r4:82751908 [ 736.846140][ T6007] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 736.846456][ T6007] [<808f17e0>] (should_fail_ex) from [<808f19d0>] (should_fail+0x14/0x18) [ 736.846865][ T6007] r6:ffffffa4 r5:df961ec4 r4:20000ac0 [ 736.847089][ T6007] [<808f19bc>] (should_fail) from [<808f19f0>] (should_fail_usercopy+0x1c/0x20) [ 736.847600][ T6007] [<808f19d4>] (should_fail_usercopy) from [<818bd8c8>] (copy_from_sockptr_offset.constprop.0+0x48/0xd4) [ 736.848374][ T6007] [<818bd880>] (copy_from_sockptr_offset.constprop.0) from [<818bda44>] (smc_setsockopt+0xf0/0x3cc) [ 736.849137][ T6007] r6:ffffffa4 r5:85310000 r4:00000030 [ 736.849557][ T6007] [<818bd958>] (smc_setsockopt) from [<81494afc>] (do_sock_setsockopt+0xb0/0x17c) [ 736.849934][ T6007] r9:83bf0c00 r8:00000000 r7:84f55b40 r6:83377900 r5:00000000 r4:818bd954 [ 736.850316][ T6007] [<81494a4c>] (do_sock_setsockopt) from [<81497e98>] (__sys_setsockopt+0x7c/0xb4) [ 736.850697][ T6007] r6:84f55b41 r5:00000030 r4:00000029 [ 736.850927][ T6007] [<81497e1c>] (__sys_setsockopt) from [<81497eec>] (sys_setsockopt+0x1c/0x24) [ 736.851297][ T6007] r8:8020029c r7:00000126 r6:00131400 r5:00000000 r4:0000008c [ 736.851576][ T6007] [<81497ed0>] (sys_setsockopt) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 736.851947][ T6007] Exception stack(0xdf961fa8 to 0xdf961ff0) [ 736.852199][ T6007] 1fa0: 0000008c 00000000 00000004 00000029 00000030 20000ac0 [ 736.852550][ T6007] 1fc0: 0000008c 00000000 00131400 00000126 00000000 00006364 003d0f00 76ac10bc [ 736.852867][ T6007] 1fe0: 76ac0ec0 76ac0eb0 00018af0 00133450 [ 740.120536][ T31] audit: type=1400 audit(740.020:1219): avc: denied { read } for pid=6009 comm="syz.0.560" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 740.597034][ T31] audit: type=1400 audit(740.490:1220): avc: denied { ioctl } for pid=6023 comm="syz.2.562" path="socket:[7546]" dev="sockfs" ino=7546 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 740.603341][ T6024] SELinux: security_context_str_to_sid (system_u) failed with errno=-22 [ 742.118877][ T3949] usb 1-1: new high-speed USB device number 13 using dummy_hcd [ 742.286182][ T3949] usb 1-1: config 0 interface 0 altsetting 0 has an endpoint descriptor with address 0xFF, changing to 0x8F [ 742.286594][ T3949] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x8F has an invalid bInterval 0, changing to 7 [ 742.286870][ T3949] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x8F has invalid wMaxPacketSize 0 [ 742.287170][ T3949] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 742.290204][ T3949] usb 1-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 742.290460][ T3949] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 742.293770][ T3949] usb 1-1: config 0 descriptor?? [ 742.736377][ T3949] plantronics 0003:047F:FFFF.0009: ignoring exceeding usage max [ 742.742522][ T3949] plantronics 0003:047F:FFFF.0009: No inputs registered, leaving [ 742.746702][ T3949] plantronics 0003:047F:FFFF.0009: hiddev0,hidraw0: USB HID v0.40 Device [HID 047f:ffff] on usb-dummy_hcd.0-1/input0 [ 742.945064][ T31] audit: type=1400 audit(742.840:1221): avc: denied { create } for pid=6031 comm="syz.0.565" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 742.951644][ T31] audit: type=1400 audit(742.850:1222): avc: denied { write } for pid=6031 comm="syz.0.565" path="socket:[7575]" dev="sockfs" ino=7575 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 744.874666][ T6048] FAULT_INJECTION: forcing a failure. [ 744.874666][ T6048] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 744.875593][ T6048] CPU: 1 UID: 0 PID: 6048 Comm: syz.2.566 Not tainted 6.12.0-syzkaller #0 [ 744.875932][ T6048] Hardware name: ARM-Versatile Express [ 744.876153][ T6048] Call trace: [ 744.876349][ T6048] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 744.878627][ T6048] r7:00000000 r6:00000000 r5:60000013 r4:820413b8 [ 744.879340][ T6048] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 744.880084][ T6048] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 744.880721][ T6048] r5:00000000 r4:82751908 [ 744.880970][ T6048] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 744.881390][ T6048] [<808f17e0>] (should_fail_ex) from [<808f19d0>] (should_fail+0x14/0x18) [ 744.881792][ T6048] r6:00000000 r5:dfae1f68 r4:00000002 [ 744.882048][ T6048] [<808f19bc>] (should_fail) from [<808f19f0>] (should_fail_usercopy+0x1c/0x20) [ 744.882446][ T6048] [<808f19d4>] (should_fail_usercopy) from [<80557bd8>] (simple_read_from_buffer+0x8c/0x134) [ 744.882918][ T6048] [<80557b4c>] (simple_read_from_buffer) from [<805cca58>] (proc_fail_nth_read+0xb8/0x100) [ 744.883409][ T6048] r10:00000001 r9:805cc9a0 r8:00000002 r7:dfae1f68 r6:0000000f r5:76b44f30 [ 744.883785][ T6048] r4:84f4b000 r3:dfae1e9f [ 744.884031][ T6048] [<805cc9a0>] (proc_fail_nth_read) from [<8051d360>] (vfs_read+0x98/0x324) [ 744.884480][ T6048] r8:76b44f30 r7:dfae1f68 r6:84f4b000 r5:0000000f r4:84f55f00 [ 744.884854][ T6048] [<8051d2c8>] (vfs_read) from [<8051e00c>] (ksys_read+0x74/0xe4) [ 744.885249][ T6048] r10:00000003 r9:84f4b000 r8:8020029c r7:00000000 r6:00000000 r5:84f55f00 [ 744.885805][ T6048] r4:84f55f03 [ 744.886019][ T6048] [<8051df98>] (ksys_read) from [<8051e08c>] (sys_read+0x10/0x14) [ 744.886423][ T6048] r7:00000003 r6:00000004 r5:76b44f30 r4:0000000f [ 744.886736][ T6048] [<8051e07c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 744.887509][ T6048] Exception stack(0xdfae1fa8 to 0xdfae1ff0) [ 744.888613][ T6048] 1fa0: 0000000f 76b44f30 00000004 76b44f30 0000000f 00000000 [ 744.889382][ T6048] 1fc0: 0000000f 76b44f30 00000004 00000003 00000000 00006364 003d0f00 76b450bc [ 744.889794][ T6048] 1fe0: 00000158 76b44ed0 000d8998 00131324 [ 752.984390][ T3949] usb 1-1: USB disconnect, device number 13 [ 753.099293][ T31] audit: type=1400 audit(753.000:1223): avc: denied { create } for pid=6081 comm="syz.0.574" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 753.113964][ T31] audit: type=1400 audit(753.010:1224): avc: denied { write } for pid=6081 comm="syz.0.574" path="socket:[6871]" dev="sockfs" ino=6871 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 753.121393][ T6082] fuse: Unknown parameter 'fd]}l' [ 753.983135][ T6089] FAULT_INJECTION: forcing a failure. [ 753.983135][ T6089] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 753.983718][ T6089] CPU: 0 UID: 0 PID: 6089 Comm: syz.2.576 Not tainted 6.12.0-syzkaller #0 [ 753.984039][ T6089] Hardware name: ARM-Versatile Express [ 753.984287][ T6089] Call trace: [ 753.984529][ T6089] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 753.984923][ T6089] r7:00000001 r6:8223c840 r5:60000013 r4:820413b8 [ 753.985146][ T6089] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 753.985495][ T6089] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 753.985823][ T6089] r5:00000000 r4:82751908 [ 753.985953][ T6089] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 753.986275][ T6089] [<808f17e0>] (should_fail_ex) from [<808f19d0>] (should_fail+0x14/0x18) [ 753.986622][ T6089] r6:8223c840 r5:20000680 r4:83525000 [ 753.986787][ T6089] [<808f19bc>] (should_fail) from [<808f19f0>] (should_fail_usercopy+0x1c/0x20) [ 753.987156][ T6089] [<808f19d4>] (should_fail_usercopy) from [<808f7a38>] (strncpy_from_user+0x20/0x194) [ 753.987756][ T6089] [<808f7a18>] (strncpy_from_user) from [<8052c6e8>] (getname_flags.part.0+0x44/0x18c) [ 753.988394][ T6089] r10:00000182 r9:00000000 r8:b5403587 r7:00000001 r6:8223c840 r5:20000680 [ 753.988684][ T6089] r4:83525000 [ 753.988822][ T6089] [<8052c6a4>] (getname_flags.part.0) from [<8053178c>] (getname_flags+0x3c/0x50) [ 753.989240][ T6089] r9:00000000 r8:b5403587 r7:200006c0 r6:ffffff9c r5:00000001 r4:20000680 [ 753.989687][ T6089] [<80531750>] (getname_flags) from [<80531d90>] (user_path_at+0x2c/0x64) [ 753.990067][ T6089] r5:00000001 r4:e04b1e44 [ 753.990278][ T6089] [<80531d64>] (user_path_at) from [<803d4c4c>] (bpf_obj_get_user+0x58/0x1f4) [ 753.991327][ T6089] r6:20000680 r5:ffffff9c r4:00000002 [ 753.992278][ T6089] [<803d4bf4>] (bpf_obj_get_user) from [<803abc84>] (__sys_bpf+0xe8c/0x1ff0) [ 753.993081][ T6089] r6:00000007 r5:e04b1e98 r4:00000018 [ 753.993381][ T6089] [<803aadf8>] (__sys_bpf) from [<803ad388>] (sys_bpf+0x2c/0x48) [ 753.993741][ T6089] r10:00000182 r9:845e5400 r8:8020029c r7:00000182 r6:00131400 r5:00000000 [ 753.994091][ T6089] r4:00000000 [ 753.994201][ T6089] [<803ad35c>] (sys_bpf) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 753.994459][ T6089] Exception stack(0xe04b1fa8 to 0xe04b1ff0) [ 753.994648][ T6089] 1fa0: 00000000 00000000 00000007 200006c0 00000018 00000000 [ 753.994933][ T6089] 1fc0: 00000000 00000000 00131400 00000182 00000000 00006364 003d0f00 76b450bc [ 753.995287][ T6089] 1fe0: 76b44ec0 76b44eb0 00018af0 00133450 [ 755.912684][ T6101] FAULT_INJECTION: forcing a failure. [ 755.912684][ T6101] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 755.913735][ T6101] CPU: 1 UID: 0 PID: 6101 Comm: syz.0.579 Not tainted 6.12.0-syzkaller #0 [ 755.914235][ T6101] Hardware name: ARM-Versatile Express [ 755.914588][ T6101] Call trace: [ 755.914865][ T6101] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 755.915353][ T6101] r7:00000000 r6:8223c840 r5:60000013 r4:820413b8 [ 755.915650][ T6101] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 755.916077][ T6101] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 755.916504][ T6101] r5:00000000 r4:82751908 [ 755.916795][ T6101] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 755.917220][ T6101] [<808f17e0>] (should_fail_ex) from [<808f19d0>] (should_fail+0x14/0x18) [ 755.918230][ T6101] r6:8223c840 r5:20000180 r4:83d66000 [ 755.919232][ T6101] [<808f19bc>] (should_fail) from [<808f19f0>] (should_fail_usercopy+0x1c/0x20) [ 755.919795][ T6101] [<808f19d4>] (should_fail_usercopy) from [<808f7a38>] (strncpy_from_user+0x20/0x194) [ 755.920297][ T6101] [<808f7a18>] (strncpy_from_user) from [<8052c6e8>] (getname_flags.part.0+0x44/0x18c) [ 755.920834][ T6101] r10:000000eb r9:845e0c00 r8:845e0c00 r7:00000000 r6:8223c840 r5:20000180 [ 755.921224][ T6101] r4:83d66000 [ 755.921429][ T6101] [<8052c6a4>] (getname_flags.part.0) from [<805318cc>] (getname+0x38/0x4c) [ 755.921899][ T6101] r9:845e0c00 r8:845e0c00 r7:20000180 r6:ffffff9c r5:00000000 r4:20000180 [ 755.922277][ T6101] [<80531894>] (getname) from [<805550a4>] (path_removexattrat+0x1cc/0x298) [ 755.922734][ T6101] r5:00000000 r4:00000018 [ 755.922973][ T6101] [<80554ed8>] (path_removexattrat) from [<80556284>] (sys_removexattr+0x20/0x24) [ 755.923425][ T6101] r9:845e0c00 r8:8020029c r7:000000eb r6:00131400 r5:00000000 r4:00000000 [ 755.923815][ T6101] [<80556264>] (sys_removexattr) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 755.924979][ T6101] Exception stack(0xdfa31fa8 to 0xdfa31ff0) [ 755.925726][ T6101] 1fa0: 00000000 00000000 20000180 20000280 00000000 00000000 [ 755.926259][ T6101] 1fc0: 00000000 00000000 00131400 000000eb 00000000 00006364 003d0f00 76bbd0bc [ 755.926912][ T6101] 1fe0: 76bbcec0 76bbceb0 00018af0 00133450 [ 758.513881][ T6108] FAULT_INJECTION: forcing a failure. [ 758.513881][ T6108] name failslab, interval 1, probability 0, space 0, times 0 [ 758.514525][ T6108] CPU: 1 UID: 0 PID: 6108 Comm: syz.0.581 Not tainted 6.12.0-syzkaller #0 [ 758.514815][ T6108] Hardware name: ARM-Versatile Express [ 758.515027][ T6108] Call trace: [ 758.515203][ T6108] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 758.515974][ T6108] r7:840c1800 r6:00000cc0 r5:60000013 r4:820413b8 [ 758.516235][ T6108] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 758.516572][ T6108] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 758.516969][ T6108] r5:00000000 r4:8271b79c [ 758.517235][ T6108] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 758.517860][ T6108] [<808f17e0>] (should_fail_ex) from [<804ef540>] (should_failslab+0x6c/0x94) [ 758.518320][ T6108] r6:00000cc0 r5:ffffffff r4:82cab840 [ 758.518641][ T6108] [<804ef4d4>] (should_failslab) from [<804d3cc0>] (kmem_cache_alloc_node_noprof+0x50/0x338) [ 758.519009][ T6108] [<804d3c70>] (kmem_cache_alloc_node_noprof) from [<814a2ca8>] (__alloc_skb+0x138/0x160) [ 758.519391][ T6108] r10:dfb45e58 r9:00000000 r8:00000cc0 r7:00000000 r6:82cab840 r5:ffffffff [ 758.519740][ T6108] r4:82606040 [ 758.519921][ T6108] [<814a2b70>] (__alloc_skb) from [<814ab060>] (alloc_skb_with_frags+0x44/0x1ec) [ 758.520273][ T6108] r8:802a7e50 r7:dfb45dc4 r6:00000000 r5:00001000 r4:00000003 [ 758.520534][ T6108] [<814ab01c>] (alloc_skb_with_frags) from [<8149c290>] (sock_alloc_send_pskb+0x1f4/0x228) [ 758.520845][ T6108] r10:dfb45e58 r9:00000000 r8:802a7e50 r7:dfb45dc4 r6:840c1800 r5:7fffffff [ 758.521147][ T6108] r4:840d6800 [ 758.521314][ T6108] [<8149c09c>] (sock_alloc_send_pskb) from [<80c988f0>] (tun_get_user+0x2ac/0x115c) [ 758.521699][ T6108] r10:00000000 r9:00000000 r8:00000018 r7:dfb45e58 r6:dfb45ef0 r5:00000028 [ 758.521990][ T6108] r4:84fec6c0 [ 758.522165][ T6108] [<80c98644>] (tun_get_user) from [<80c9a0b0>] (tun_chr_write_iter+0x60/0xc8) [ 758.522512][ T6108] r10:81b73f94 r9:20000280 r8:840d6800 r7:84fec6c0 r6:00000000 r5:dfb45ef0 [ 758.522819][ T6108] r4:dfb45f08 [ 758.522988][ T6108] [<80c9a050>] (tun_chr_write_iter) from [<8051ddc0>] (vfs_write+0x274/0x44c) [ 758.523335][ T6108] r8:dfb45f68 r7:840c1800 r6:00000036 r5:8431b900 r4:80c9a050 [ 758.523590][ T6108] [<8051db4c>] (vfs_write) from [<8051e104>] (ksys_write+0x74/0xe4) [ 758.523928][ T6108] r10:00000004 r9:840c1800 r8:8020029c r7:00000000 r6:00000000 r5:8431b900 [ 758.524216][ T6108] r4:8431b901 [ 758.524390][ T6108] [<8051e090>] (ksys_write) from [<8051e184>] (sys_write+0x10/0x14) [ 758.524759][ T6108] r7:00000004 r6:00131400 r5:00000000 r4:00000000 [ 758.525004][ T6108] [<8051e174>] (sys_write) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 758.525322][ T6108] Exception stack(0xdfb45fa8 to 0xdfb45ff0) [ 758.525577][ T6108] 5fa0: 00000000 00000000 00000003 20000280 00000036 00000000 [ 758.525903][ T6108] 5fc0: 00000000 00000000 00131400 00000004 00000000 00006364 003d0f00 76bbd0bc [ 758.526218][ T6108] 5fe0: 76bbcec0 76bbceb0 00018af0 00133450 [ 758.959030][ T3949] usb 1-1: new high-speed USB device number 14 using dummy_hcd [ 759.118521][ T3949] usb 1-1: Using ep0 maxpacket: 16 [ 759.133589][ T3949] usb 1-1: config 1 contains an unexpected descriptor of type 0x1, skipping [ 759.134232][ T3949] usb 1-1: config 1 has an invalid descriptor of length 1, skipping remainder of the config [ 759.134644][ T3949] usb 1-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 759.151496][ T3949] usb 1-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 759.152148][ T3949] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 759.152723][ T3949] usb 1-1: Product: syz [ 759.152977][ T3949] usb 1-1: Manufacturer: syz [ 759.153340][ T3949] usb 1-1: SerialNumber: syz [ 759.380489][ T3949] usb 1-1: 0:2 : does not exist [ 759.419428][ T3949] usb 1-1: USB disconnect, device number 14 [ 762.244685][ T6151] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 762.245929][ T6151] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 765.699197][ T31] audit: type=1400 audit(765.590:1225): avc: denied { connect } for pid=6171 comm="syz.0.594" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 767.340377][ T31] audit: type=1400 audit(767.240:1226): avc: granted { setsecparam } for pid=6175 comm="syz.0.595" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 768.338124][ T31] audit: type=1400 audit(768.230:1227): avc: denied { bind } for pid=6188 comm="syz.2.598" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 768.338846][ T31] audit: type=1400 audit(768.230:1228): avc: denied { name_bind } for pid=6188 comm="syz.2.598" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 768.339382][ T31] audit: type=1400 audit(768.230:1229): avc: denied { node_bind } for pid=6188 comm="syz.2.598" saddr=100.1.1.2 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=sctp_socket permissive=1 [ 768.344283][ T31] audit: type=1400 audit(768.240:1230): avc: denied { ioctl } for pid=6188 comm="syz.2.598" path="socket:[7067]" dev="sockfs" ino=7067 ioctlcmd=0x89f8 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 768.759614][ T31] audit: type=1400 audit(768.650:1231): avc: denied { name_connect } for pid=6192 comm="syz.2.600" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 [ 768.769392][ T31] audit: type=1400 audit(768.670:1232): avc: denied { listen } for pid=6192 comm="syz.2.600" lport=34089 faddr=::ffff:172.20.255.187 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 769.038151][ T31] audit: type=1400 audit(768.930:1233): avc: denied { accept } for pid=6192 comm="syz.2.600" lport=34089 faddr=::ffff:172.20.255.187 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 769.046607][ T6193] audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 [ 770.321045][ T6219] FAULT_INJECTION: forcing a failure. [ 770.321045][ T6219] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 770.321471][ T6219] CPU: 1 UID: 0 PID: 6219 Comm: syz.2.606 Not tainted 6.12.0-syzkaller #0 [ 770.321660][ T6219] Hardware name: ARM-Versatile Express [ 770.321810][ T6219] Call trace: [ 770.321922][ T6219] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 770.322183][ T6219] r7:00000000 r6:00000000 r5:60000013 r4:820413b8 [ 770.322338][ T6219] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 770.322567][ T6219] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 770.322790][ T6219] r5:00000000 r4:82751908 [ 770.322915][ T6219] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 770.323218][ T6219] [<808f17e0>] (should_fail_ex) from [<808f19d0>] (should_fail+0x14/0x18) [ 770.323515][ T6219] r6:00000000 r5:dfad9f68 r4:00000002 [ 770.323667][ T6219] [<808f19bc>] (should_fail) from [<808f19f0>] (should_fail_usercopy+0x1c/0x20) [ 770.323954][ T6219] [<808f19d4>] (should_fail_usercopy) from [<80557bd8>] (simple_read_from_buffer+0x8c/0x134) [ 770.324179][ T6219] [<80557b4c>] (simple_read_from_buffer) from [<805cca58>] (proc_fail_nth_read+0xb8/0x100) [ 770.324515][ T6219] r10:00000001 r9:805cc9a0 r8:00000002 r7:dfad9f68 r6:0000000f r5:76b23f30 [ 770.324914][ T6219] r4:83d72400 r3:dfad9e9f [ 770.325040][ T6219] [<805cc9a0>] (proc_fail_nth_read) from [<8051d360>] (vfs_read+0x98/0x324) [ 770.325298][ T6219] r8:76b23f30 r7:dfad9f68 r6:83d72400 r5:0000000f r4:85297840 [ 770.325497][ T6219] [<8051d2c8>] (vfs_read) from [<8051e00c>] (ksys_read+0x74/0xe4) [ 770.325728][ T6219] r10:00000003 r9:83d72400 r8:8020029c r7:00000000 r6:00000000 r5:85297840 [ 770.325972][ T6219] r4:85297843 [ 770.326078][ T6219] [<8051df98>] (ksys_read) from [<8051e08c>] (sys_read+0x10/0x14) [ 770.326308][ T6219] r7:00000003 r6:00000004 r5:76b23f30 r4:0000000f [ 770.326485][ T6219] [<8051e07c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 770.326724][ T6219] Exception stack(0xdfad9fa8 to 0xdfad9ff0) [ 770.326910][ T6219] 9fa0: 0000000f 76b23f30 00000004 76b23f30 0000000f 00000000 [ 770.327152][ T6219] 9fc0: 0000000f 76b23f30 00000004 00000003 00000000 00006364 003d0f00 76b240bc [ 770.327397][ T6219] 9fe0: 00000158 76b23ed0 000d8998 00131324 [ 770.636821][ T6229] Zero length message leads to an empty skb [ 770.815162][ T31] kauditd_printk_skb: 3 callbacks suppressed [ 770.815322][ T31] audit: type=1400 audit(770.710:1236): avc: denied { write } for pid=6234 comm="syz.2.610" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 771.994326][ T31] audit: type=1400 audit(771.890:1237): avc: denied { setopt } for pid=6234 comm="syz.2.610" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 773.482351][ T31] audit: type=1400 audit(773.380:1238): avc: denied { bind } for pid=6263 comm="syz.2.613" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 773.505583][ T31] audit: type=1400 audit(773.400:1239): avc: denied { listen } for pid=6263 comm="syz.2.613" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 773.842784][ T31] audit: type=1400 audit(773.740:1240): avc: denied { ioctl } for pid=6278 comm="syz.2.617" path="socket:[8195]" dev="sockfs" ino=8195 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 774.270094][ T6288] FAULT_INJECTION: forcing a failure. [ 774.270094][ T6288] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 774.270875][ T6288] CPU: 1 UID: 0 PID: 6288 Comm: syz.2.618 Not tainted 6.12.0-syzkaller #0 [ 774.271267][ T6288] Hardware name: ARM-Versatile Express [ 774.271544][ T6288] Call trace: [ 774.271783][ T6288] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 774.272738][ T6288] r7:dfb9debc r6:20000000 r5:60000013 r4:820413b8 [ 774.273031][ T6288] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 774.273434][ T6288] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 774.273760][ T6288] r5:00000000 r4:82751908 [ 774.273974][ T6288] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 774.274368][ T6288] [<808f17e0>] (should_fail_ex) from [<808f19d0>] (should_fail+0x14/0x18) [ 774.274911][ T6288] r6:20000000 r5:84fec6c0 r4:800454d7 [ 774.275169][ T6288] [<808f19bc>] (should_fail) from [<808f19f0>] (should_fail_usercopy+0x1c/0x20) [ 774.275628][ T6288] [<808f19d4>] (should_fail_usercopy) from [<80c9a7e4>] (tun_chr_ioctl+0x6cc/0x18b4) [ 774.276086][ T6288] [<80c9a118>] (tun_chr_ioctl) from [<80536ea8>] (sys_ioctl+0x138/0xd88) [ 774.276524][ T6288] r10:840c1800 r9:00000003 r8:85297780 r7:20000000 r6:85297781 r5:00000000 [ 774.276883][ T6288] r4:800454d7 [ 774.277110][ T6288] [<80536d70>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 774.277409][ T6288] Exception stack(0xdfb9dfa8 to 0xdfb9dff0) [ 774.277713][ T6288] dfa0: 00000000 00000000 00000003 800454d7 20000000 00000000 [ 774.278020][ T6288] dfc0: 00000000 00000000 00131400 00000036 00000000 00006364 003d0f00 76b450bc [ 774.278311][ T6288] dfe0: 76b44ec0 76b44eb0 00018af0 00133450 [ 774.278508][ T6288] r10:00000036 r9:840c1800 r8:8020029c r7:00000036 r6:00131400 r5:00000000 [ 774.278789][ T6288] r4:00000000 [ 774.821009][ T6300] FAULT_INJECTION: forcing a failure. [ 774.821009][ T6300] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 774.821572][ T6300] CPU: 0 UID: 0 PID: 6300 Comm: syz.2.622 Not tainted 6.12.0-syzkaller #0 [ 774.821780][ T6300] Hardware name: ARM-Versatile Express [ 774.821908][ T6300] Call trace: [ 774.822018][ T6300] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 774.822332][ T6300] r7:833a9400 r6:00000020 r5:60000013 r4:820413b8 [ 774.822486][ T6300] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 774.822680][ T6300] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 774.822917][ T6300] r5:00000000 r4:82751908 [ 774.823025][ T6300] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 774.823257][ T6300] [<808f17e0>] (should_fail_ex) from [<808f19d0>] (should_fail+0x14/0x18) [ 774.823459][ T6300] r6:00000020 r5:00000000 r4:dfd55f20 [ 774.823577][ T6300] [<808f19bc>] (should_fail) from [<808f19f0>] (should_fail_usercopy+0x1c/0x20) [ 774.823778][ T6300] [<808f19d4>] (should_fail_usercopy) from [<814964c4>] (____sys_sendmsg+0x158/0x2c4) [ 774.823988][ T6300] [<8149636c>] (____sys_sendmsg) from [<814983a8>] (___sys_sendmsg+0x9c/0xd0) [ 774.824290][ T6300] r10:dfd55e24 r9:20002280 r8:00000000 r7:00000000 r6:833a9400 r5:dfd55f20 [ 774.824550][ T6300] r4:00000000 [ 774.824667][ T6300] [<8149830c>] (___sys_sendmsg) from [<81498838>] (__sys_sendmsg+0x8c/0xd8) [ 774.825030][ T6300] r10:00000128 r9:83e50000 r8:8474c000 r7:00000000 r6:20002280 r5:8474c001 [ 774.825357][ T6300] r4:00000003 [ 774.825535][ T6300] [<814987ac>] (__sys_sendmsg) from [<81498898>] (sys_sendmsg+0x14/0x18) [ 774.825919][ T6300] r8:8020029c r7:00000128 r6:00131400 r5:00000000 r4:00000000 [ 774.826208][ T6300] [<81498884>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 774.826571][ T6300] Exception stack(0xdfd55fa8 to 0xdfd55ff0) [ 774.826876][ T6300] 5fa0: 00000000 00000000 00000003 20002280 00000000 00000000 [ 774.827213][ T6300] 5fc0: 00000000 00000000 00131400 00000128 00000000 00006364 003d0f00 76b450bc [ 774.827717][ T6300] 5fe0: 76b44ec0 76b44eb0 00018af0 00133450 [ 781.032572][ T6352] FAULT_INJECTION: forcing a failure. [ 781.032572][ T6352] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 781.034166][ T6352] CPU: 1 UID: 0 PID: 6352 Comm: syz.2.633 Not tainted 6.12.0-syzkaller #0 [ 781.034554][ T6352] Hardware name: ARM-Versatile Express [ 781.034822][ T6352] Call trace: [ 781.035048][ T6352] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 781.035519][ T6352] r7:00000000 r6:00000000 r5:60000013 r4:820413b8 [ 781.035786][ T6352] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 781.037878][ T6352] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 781.038461][ T6352] r5:00000000 r4:82751908 [ 781.038717][ T6352] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 781.039673][ T6352] [<808f17e0>] (should_fail_ex) from [<808f19d0>] (should_fail+0x14/0x18) [ 781.040498][ T6352] r6:00000000 r5:e03b1f68 r4:00000002 [ 781.040957][ T6352] [<808f19bc>] (should_fail) from [<808f19f0>] (should_fail_usercopy+0x1c/0x20) [ 781.041424][ T6352] [<808f19d4>] (should_fail_usercopy) from [<80557bd8>] (simple_read_from_buffer+0x8c/0x134) [ 781.042174][ T6352] [<80557b4c>] (simple_read_from_buffer) from [<805cca58>] (proc_fail_nth_read+0xb8/0x100) [ 781.043234][ T6352] r10:00000001 r9:805cc9a0 r8:00000002 r7:e03b1f68 r6:0000000f r5:76b44f30 [ 781.044004][ T6352] r4:83e53c00 r3:e03b1e9f [ 781.044405][ T6352] [<805cc9a0>] (proc_fail_nth_read) from [<8051d360>] (vfs_read+0x98/0x324) [ 781.045307][ T6352] r8:76b44f30 r7:e03b1f68 r6:83e53c00 r5:0000000f r4:852976c0 [ 781.045918][ T6352] [<8051d2c8>] (vfs_read) from [<8051e00c>] (ksys_read+0x74/0xe4) [ 781.046634][ T6352] r10:00000003 r9:83e53c00 r8:8020029c r7:00000000 r6:00000000 r5:852976c0 [ 781.047407][ T6352] r4:852976c3 [ 781.047791][ T6352] [<8051df98>] (ksys_read) from [<8051e08c>] (sys_read+0x10/0x14) [ 781.048497][ T6352] r7:00000003 r6:00000006 r5:76b44f30 r4:0000000f [ 781.048764][ T6352] [<8051e07c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 781.049105][ T6352] Exception stack(0xe03b1fa8 to 0xe03b1ff0) [ 781.049429][ T6352] 1fa0: 0000000f 76b44f30 00000006 76b44f30 0000000f 00000000 [ 781.050066][ T6352] 1fc0: 0000000f 76b44f30 00000006 00000003 00000000 00006364 003d0f00 76b450bc [ 781.050753][ T6352] 1fe0: 00000158 76b44ed0 000d8998 00131324 [ 782.492694][ T6361] audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 [ 782.494367][ T6361] audit: out of memory in audit_log_start [ 806.238486][ T3964] usb 1-1: new high-speed USB device number 15 using dummy_hcd [ 806.388712][ T3964] usb 1-1: Using ep0 maxpacket: 16 [ 806.402649][ T3964] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 806.404726][ T3964] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 806.405154][ T3964] usb 1-1: New USB device found, idVendor=05ac, idProduct=8241, bcdDevice= 0.00 [ 806.405483][ T3964] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 806.409499][ T3964] usb 1-1: config 0 descriptor?? [ 806.860774][ T3964] appleir 0003:05AC:8241.000A: unknown main item tag 0x0 [ 806.861409][ T3964] appleir 0003:05AC:8241.000A: unknown main item tag 0x0 [ 806.861769][ T3964] appleir 0003:05AC:8241.000A: unknown main item tag 0x0 [ 806.862160][ T3964] appleir 0003:05AC:8241.000A: unknown main item tag 0x0 [ 806.862518][ T3964] appleir 0003:05AC:8241.000A: unknown main item tag 0x0 [ 806.863264][ T3964] appleir 0003:05AC:8241.000A: No inputs registered, leaving [ 806.871486][ T3964] appleir 0003:05AC:8241.000A: hiddev0,hidraw0: USB HID v0.00 Device [HID 05ac:8241] on usb-dummy_hcd.0-1/input0 [ 807.071139][ T3964] usb 1-1: USB disconnect, device number 15 [ 807.876633][ T31] audit: type=1400 audit(807.770:1241): avc: denied { ioctl } for pid=6497 comm="syz.0.664" path="socket:[8631]" dev="sockfs" ino=8631 ioctlcmd=0x3ba0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 808.483839][ T6498] fuse: Bad value for 'fd' [ 808.769326][ T31] audit: type=1400 audit(808.670:1242): avc: denied { ioctl } for pid=6506 comm="syz.0.667" path="socket:[8055]" dev="sockfs" ino=8055 ioctlcmd=0x662a scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 808.776875][ T31] audit: type=1400 audit(808.670:1243): avc: denied { setattr } for pid=6506 comm="syz.0.667" name="binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 808.931900][ T6509] fuse: Unknown parameter 'AGQ)@' [ 822.510952][ T31] audit: type=1400 audit(822.400:1244): avc: denied { write } for pid=6575 comm="syz.2.692" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 823.346261][ T6580] FAULT_INJECTION: forcing a failure. [ 823.346261][ T6580] name failslab, interval 1, probability 0, space 0, times 0 [ 823.347127][ T6580] CPU: 1 UID: 0 PID: 6580 Comm: syz.0.693 Not tainted 6.12.0-syzkaller #0 [ 823.347606][ T6580] Hardware name: ARM-Versatile Express [ 823.347913][ T6580] Call trace: [ 823.348478][ T6580] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 823.349289][ T6580] r7:84f4c800 r6:00000cc0 r5:60000013 r4:820413b8 [ 823.349833][ T6580] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 823.350356][ T6580] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 823.351150][ T6580] r5:00000000 r4:8271b79c [ 823.351481][ T6580] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 823.352003][ T6580] [<808f17e0>] (should_fail_ex) from [<804ef540>] (should_failslab+0x6c/0x94) [ 823.353114][ T6580] r6:00000cc0 r5:84f7b120 r4:82c029c0 [ 823.353419][ T6580] [<804ef4d4>] (should_failslab) from [<804d432c>] (kmem_cache_alloc_noprof+0x4c/0x334) [ 823.354345][ T6580] [<804d42e0>] (kmem_cache_alloc_noprof) from [<819967c8>] (mas_alloc_nodes+0x78/0x220) [ 823.354907][ T6580] r10:00000cc0 r9:00000000 r8:dfaa9d98 r7:00000001 r6:00000001 r5:84f7b120 [ 823.355587][ T6580] r4:dfaa9d98 [ 823.355865][ T6580] [<81996750>] (mas_alloc_nodes) from [<819969b0>] (mas_node_count_gfp+0x40/0x5c) [ 823.356557][ T6580] r10:20b36000 r9:00000000 r8:dfaa9d98 r7:00000001 r6:00000cc0 r5:84f7b120 [ 823.357483][ T6580] r4:dfaa9d98 [ 823.357685][ T6580] [<81996970>] (mas_node_count_gfp) from [<8199b87c>] (mas_preallocate+0x1ac/0x2f0) [ 823.358214][ T6580] [<8199b6d0>] (mas_preallocate) from [<804baf78>] (__split_vma+0x148/0x450) [ 823.358560][ T6580] r7:20b36000 r6:82937004 r5:84f7b120 r4:84f7b360 [ 823.358911][ T6580] [<804bae30>] (__split_vma) from [<804bcbec>] (vms_gather_munmap_vmas+0xe8/0x4c8) [ 823.359307][ T6580] r10:00000000 r9:00000001 r8:dfaa9d70 r7:82937004 r6:82937008 r5:dfaa9e00 [ 823.359654][ T6580] r4:84f7b360 [ 823.359812][ T6580] [<804bcb04>] (vms_gather_munmap_vmas) from [<804a5878>] (__mmap_region+0x198/0xad0) [ 823.360207][ T6580] r10:00000000 r9:20b36000 r8:00b36000 r7:84f4c800 r6:84eef000 r5:000000fe [ 823.360511][ T6580] r4:20000000 [ 823.360662][ T6580] [<804a56e0>] (__mmap_region) from [<804a6214>] (mmap_region+0x64/0x110) [ 823.361004][ T6580] r10:00000000 r9:84eef000 r8:20000000 r7:84f4c800 r6:000000fe r5:84f4c800 [ 823.361338][ T6580] r4:00000000 [ 823.361536][ T6580] [<804a61b0>] (mmap_region) from [<804a661c>] (do_mmap+0x35c/0x4cc) [ 823.361853][ T6580] r7:84f4c800 r6:000000fe r5:00008031 r4:00b36000 [ 823.362136][ T6580] [<804a62c0>] (do_mmap) from [<80474518>] (vm_mmap_pgoff+0xd8/0x18c) [ 823.362459][ T6580] r10:84eef000 r9:00b36000 r8:20000000 r7:00000000 r6:dfaa9f20 r5:06ebbeee [ 823.362837][ T6580] r4:00000000 [ 823.362993][ T6580] [<80474440>] (vm_mmap_pgoff) from [<804a33b0>] (ksys_mmap_pgoff+0x48/0xec) [ 823.363371][ T6580] r10:000000c0 r9:84f4c800 r8:8020029c r7:20000000 r6:00b36000 r5:06ebbeee [ 823.363658][ T6580] r4:00008031 [ 823.363885][ T6580] [<804a3368>] (ksys_mmap_pgoff) from [<804a3470>] (sys_mmap_pgoff+0x1c/0x24) [ 823.364302][ T6580] r8:8020029c r7:000000c0 r6:00131400 r5:10000000 r4:00000003 [ 823.364758][ T6580] [<804a3454>] (sys_mmap_pgoff) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 823.365111][ T6580] Exception stack(0xdfaa9fa8 to 0xdfaa9ff0) [ 823.365374][ T6580] 9fa0: 00000003 10000000 20000000 00b36000 06ebbeee 00008031 [ 823.365839][ T6580] 9fc0: 00000003 10000000 00131400 000000c0 00000000 00006364 003d0f00 76bbd0bc [ 823.366354][ T6580] 9fe0: 76bbcec0 76bbceb0 00018af0 00133450 [ 825.118217][ T31] audit: type=1400 audit(825.010:1245): avc: denied { ioctl } for pid=6575 comm="syz.2.692" path="socket:[8812]" dev="sockfs" ino=8812 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 826.865726][ T6593] FAULT_INJECTION: forcing a failure. [ 826.865726][ T6593] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 826.866427][ T6593] CPU: 0 UID: 0 PID: 6593 Comm: syz.2.696 Not tainted 6.12.0-syzkaller #0 [ 826.866789][ T6593] Hardware name: ARM-Versatile Express [ 826.867034][ T6593] Call trace: [ 826.867244][ T6593] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 826.868101][ T6593] r7:00000000 r6:00000000 r5:60000013 r4:820413b8 [ 826.868572][ T6593] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 826.869000][ T6593] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 826.869470][ T6593] r5:00000000 r4:82751908 [ 826.869850][ T6593] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 826.870389][ T6593] [<808f17e0>] (should_fail_ex) from [<808f19d0>] (should_fail+0x14/0x18) [ 826.871065][ T6593] r6:00000000 r5:dfb49f68 r4:00000002 [ 826.871457][ T6593] [<808f19bc>] (should_fail) from [<808f19f0>] (should_fail_usercopy+0x1c/0x20) [ 826.871878][ T6593] [<808f19d4>] (should_fail_usercopy) from [<80557bd8>] (simple_read_from_buffer+0x8c/0x134) [ 826.872497][ T6593] [<80557b4c>] (simple_read_from_buffer) from [<805cca58>] (proc_fail_nth_read+0xb8/0x100) [ 826.873043][ T6593] r10:00000001 r9:805cc9a0 r8:00000002 r7:dfb49f68 r6:0000000f r5:76b44f30 [ 826.873615][ T6593] r4:8432a400 r3:dfb49e9f [ 826.873855][ T6593] [<805cc9a0>] (proc_fail_nth_read) from [<8051d360>] (vfs_read+0x98/0x324) [ 826.874237][ T6593] r8:76b44f30 r7:dfb49f68 r6:8432a400 r5:0000000f r4:8474c000 [ 826.874608][ T6593] [<8051d2c8>] (vfs_read) from [<8051e00c>] (ksys_read+0x74/0xe4) [ 826.875008][ T6593] r10:00000003 r9:8432a400 r8:8020029c r7:00000000 r6:00000000 r5:8474c000 [ 826.875335][ T6593] r4:8474c003 [ 826.875505][ T6593] [<8051df98>] (ksys_read) from [<8051e08c>] (sys_read+0x10/0x14) [ 826.875910][ T6593] r7:00000003 r6:00000003 r5:76b44f30 r4:0000000f [ 826.876860][ T6593] [<8051e07c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 826.877217][ T6593] Exception stack(0xdfb49fa8 to 0xdfb49ff0) [ 826.879386][ T6593] 9fa0: 0000000f 76b44f30 00000003 76b44f30 0000000f 00000000 [ 826.880062][ T6593] 9fc0: 0000000f 76b44f30 00000003 00000003 00000000 00006364 003d0f00 76b450bc [ 826.880537][ T6593] 9fe0: 00000158 76b44ed0 000d8998 00131324 [ 827.836516][ T6599] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 827.853161][ T6599] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 828.098976][ T6604] FAULT_INJECTION: forcing a failure. [ 828.098976][ T6604] name failslab, interval 1, probability 0, space 0, times 0 [ 828.100434][ T6604] CPU: 0 UID: 0 PID: 6604 Comm: syz.2.700 Not tainted 6.12.0-syzkaller #0 [ 828.100883][ T6604] Hardware name: ARM-Versatile Express [ 828.101198][ T6604] Call trace: [ 828.101437][ T6604] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 828.102394][ T6604] r7:00000dc0 r6:00000056 r5:60000013 r4:820413b8 [ 828.102711][ T6604] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 828.103170][ T6604] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 828.103681][ T6604] r5:00000000 r4:8271b79c [ 828.103932][ T6604] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 828.104371][ T6604] [<808f17e0>] (should_fail_ex) from [<804ef540>] (should_failslab+0x6c/0x94) [ 828.104821][ T6604] r6:00000056 r5:00000010 r4:82c01240 [ 828.105251][ T6604] [<804ef4d4>] (should_failslab) from [<804d46b0>] (__kmalloc_noprof+0x9c/0x458) [ 828.105851][ T6604] [<804d4614>] (__kmalloc_noprof) from [<80565fdc>] (copy_splice_read+0xa0/0x308) [ 828.106431][ T6604] r10:00000001 r9:0000000c r8:8474c000 r7:00000056 r6:00000056 r5:00000000 [ 828.106746][ T6604] r4:841b9180 [ 828.106909][ T6604] [<80565f3c>] (copy_splice_read) from [<805662cc>] (do_splice_read+0x88/0xb8) [ 828.107484][ T6604] r10:00000000 r9:00000000 r8:00000000 r7:8474c000 r6:00000056 r5:80565f3c [ 828.108307][ T6604] r4:00000056 [ 828.108690][ T6604] [<80566244>] (do_splice_read) from [<80566404>] (splice_direct_to_actor+0xac/0x2d8) [ 828.109117][ T6604] r5:dff4dea0 r4:841b9180 [ 828.109481][ T6604] [<80566358>] (splice_direct_to_actor) from [<805667ec>] (do_splice_direct+0x88/0xc8) [ 828.110014][ T6604] r10:8474c0c0 r9:8474c000 r8:00000056 r7:00000000 r6:00000000 r5:8474c001 [ 828.110486][ T6604] r4:dff4df20 [ 828.110799][ T6604] [<80566764>] (do_splice_direct) from [<8051c45c>] (do_sendfile+0x39c/0x43c) [ 828.111431][ T6604] r7:00000000 r6:84f4a400 r4:00000000 [ 828.111660][ T6604] [<8051c0c0>] (do_sendfile) from [<8051e60c>] (sys_sendfile+0xec/0x100) [ 828.112159][ T6604] r10:000000bb r9:00000005 r8:00000003 r7:00000000 r6:00000000 r5:00000000 [ 828.112761][ T6604] r4:00000000 [ 828.113045][ T6604] [<8051e520>] (sys_sendfile) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 828.113444][ T6604] Exception stack(0xdff4dfa8 to 0xdff4dff0) [ 828.113714][ T6604] dfa0: 00000000 00000000 00000005 00000003 00000000 00000056 [ 828.114238][ T6604] dfc0: 00000000 00000000 00131400 000000bb 00000000 00006364 003d0f00 76b450bc [ 828.114570][ T6604] dfe0: 76b44ec0 76b44eb0 00018af0 00133450 [ 828.114838][ T6604] r9:84f4a400 r8:8020029c r7:000000bb r6:00131400 r5:00000000 r4:00000000 [ 840.729407][ T6663] ucma_write: process 721 (syz.0.712) changed security contexts after opening file descriptor, this is not allowed. [ 841.250595][ T6666] ======================================================= [ 841.250595][ T6666] WARNING: The mand mount option has been deprecated and [ 841.250595][ T6666] and is ignored by this kernel. Remove the mand [ 841.250595][ T6666] option from the mount to silence this warning. [ 841.250595][ T6666] ======================================================= [ 841.259361][ T6666] fuse: Unknown parameter 'fowner>00000000000000000000' [ 841.555609][ T6668] FAULT_INJECTION: forcing a failure. [ 841.555609][ T6668] name failslab, interval 1, probability 0, space 0, times 0 [ 841.557373][ T6668] CPU: 1 UID: 0 PID: 6668 Comm: syz.0.714 Not tainted 6.12.0-syzkaller #0 [ 841.558061][ T6668] Hardware name: ARM-Versatile Express [ 841.558339][ T6668] Call trace: [ 841.558540][ T6668] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 841.559014][ T6668] r7:84fe4800 r6:00000cc0 r5:60000013 r4:820413b8 [ 841.559312][ T6668] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 841.559732][ T6668] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 841.560130][ T6668] r5:00000000 r4:8271b79c [ 841.560336][ T6668] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 841.561198][ T6668] [<808f17e0>] (should_fail_ex) from [<804ef540>] (should_failslab+0x6c/0x94) [ 841.561623][ T6668] r6:00000cc0 r5:ffffffff r4:82cab840 [ 841.561931][ T6668] [<804ef4d4>] (should_failslab) from [<804d3cc0>] (kmem_cache_alloc_node_noprof+0x50/0x338) [ 841.562402][ T6668] [<804d3c70>] (kmem_cache_alloc_node_noprof) from [<814a2ca8>] (__alloc_skb+0x138/0x160) [ 841.562897][ T6668] r10:00000000 r9:00000000 r8:00000cc0 r7:00000000 r6:82cab840 r5:ffffffff [ 841.563278][ T6668] r4:82606040 [ 841.563481][ T6668] [<814a2b70>] (__alloc_skb) from [<815baecc>] (netlink_alloc_large_skb+0x88/0xa0) [ 841.564045][ T6668] r8:00000000 r7:84df9800 r6:00000020 r5:83376500 r4:00000140 [ 841.564393][ T6668] [<815bae44>] (netlink_alloc_large_skb) from [<815bb4d4>] (netlink_sendmsg+0x134/0x43c) [ 841.564938][ T6668] r5:83376500 r4:dfc09f20 [ 841.565180][ T6668] [<815bb3a0>] (netlink_sendmsg) from [<81495610>] (__sock_sendmsg+0x44/0x78) [ 841.565630][ T6668] r10:00000000 r9:dfc09dc4 r8:dfc09dc4 r7:83376500 r6:83376500 r5:dfc09f20 [ 841.566018][ T6668] r4:00000000 [ 841.566239][ T6668] [<814955cc>] (__sock_sendmsg) from [<81496610>] (____sys_sendmsg+0x2a4/0x2c4) [ 841.566684][ T6668] r7:83376500 r6:00000000 r5:00000000 r4:dfc09f20 [ 841.567000][ T6668] [<8149636c>] (____sys_sendmsg) from [<814983a8>] (___sys_sendmsg+0x9c/0xd0) [ 841.567601][ T6668] r10:dfc09e24 r9:20001bc0 r8:00000000 r7:00000000 r6:83376500 r5:dfc09f20 [ 841.568261][ T6668] r4:00000000 [ 841.568822][ T6668] [<8149830c>] (___sys_sendmsg) from [<81498838>] (__sys_sendmsg+0x8c/0xd8) [ 841.569296][ T6668] r10:00000128 r9:84fe4800 r8:85344cc0 r7:00000000 r6:20001bc0 r5:85344cc1 [ 841.569654][ T6668] r4:00000003 [ 841.569844][ T6668] [<814987ac>] (__sys_sendmsg) from [<81498898>] (sys_sendmsg+0x14/0x18) [ 841.570266][ T6668] r8:8020029c r7:00000128 r6:00131400 r5:00000000 r4:00000000 [ 841.570572][ T6668] [<81498884>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 841.571003][ T6668] Exception stack(0xdfc09fa8 to 0xdfc09ff0) [ 841.571285][ T6668] 9fa0: 00000000 00000000 00000003 20001bc0 00000000 00000000 [ 841.571699][ T6668] 9fc0: 00000000 00000000 00131400 00000128 00000000 00006364 003d0f00 76bbd0bc [ 841.572100][ T6668] 9fe0: 76bbcec0 76bbceb0 00018af0 00133450 [ 842.175279][ T31] audit: type=1400 audit(842.070:1246): avc: denied { bind } for pid=6675 comm="syz.0.718" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 844.678023][ T31] audit: type=1400 audit(844.570:1247): avc: denied { block_suspend } for pid=6689 comm="syz.2.723" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 845.802411][ T6699] netlink: 8 bytes leftover after parsing attributes in process `syz.2.725'. [ 846.208644][ T6703] capability: warning: `syz.2.727' uses 32-bit capabilities (legacy support in use) [ 853.449444][ T6734] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 853.450975][ T6734] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 853.640728][ T31] audit: type=1400 audit(853.530:1248): avc: denied { create } for pid=6737 comm="syz.2.741" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 853.908613][ T31] audit: type=1400 audit(853.790:1249): avc: denied { write } for pid=6737 comm="syz.2.741" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 859.828124][ T31] audit: type=1400 audit(859.720:1250): avc: denied { map } for pid=6770 comm="syz.2.756" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=10348 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 859.829052][ T31] audit: type=1400 audit(859.720:1251): avc: denied { read write } for pid=6770 comm="syz.2.756" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=10348 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 861.615106][ T31] audit: type=1400 audit(861.510:1252): avc: denied { getopt } for pid=6787 comm="syz.0.762" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 864.799994][ T6809] ------------[ cut here ]------------ [ 864.800694][ T6809] WARNING: CPU: 0 PID: 6809 at mm/highmem.c:622 kunmap_local_indexed+0x20c/0x224 [ 864.801236][ T6809] Modules linked in: [ 864.803604][ T6809] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 864.804937][ T6809] CPU: 0 UID: 0 PID: 6809 Comm: syz.0.770 Not tainted 6.12.0-syzkaller #0 [ 864.806017][ T6809] Hardware name: ARM-Versatile Express [ 864.806333][ T6809] Call trace: [ 864.806887][ T6809] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 864.807443][ T6809] r7:00000000 r6:82623304 r5:00000000 r4:820413b8 [ 864.807889][ T6809] [<819b809c>] (show_stack) from [<819d60dc>] (dump_stack_lvl+0x54/0x7c) [ 864.808374][ T6809] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 864.808821][ T6809] r5:00000000 r4:82874d18 [ 864.809531][ T6809] [<819d6104>] (dump_stack) from [<819b8be0>] (panic+0x120/0x374) [ 864.810741][ T6809] [<819b8ac0>] (panic) from [<802426d0>] (get_taint+0x0/0x1c) [ 864.811829][ T6809] r3:8260c604 r2:00000001 r1:82029878 r0:82031344 [ 864.812776][ T6809] r7:80492e7c [ 864.813091][ T6809] [<8024265c>] (check_panic_on_warn) from [<80242834>] (__warn+0x80/0x188) [ 864.813492][ T6809] [<802427b4>] (__warn) from [<80242ab4>] (warn_slowpath_fmt+0x178/0x1f4) [ 864.814875][ T6809] r8:00000009 r7:82059090 r6:df985d24 r5:83bf1800 r4:00000000 [ 864.816048][ T6809] [<80242940>] (warn_slowpath_fmt) from [<80492e7c>] (kunmap_local_indexed+0x20c/0x224) [ 864.816691][ T6809] r10:ffefdfe8 r9:84eef000 r8:20000000 r7:00000000 r6:00000003 r5:83bf1800 [ 864.817148][ T6809] r4:ffefd000 [ 864.817345][ T6809] [<80492c70>] (kunmap_local_indexed) from [<8050cd58>] (move_pages+0x7e8/0x149c) [ 864.818040][ T6809] r7:00000000 r6:84d94cc0 r5:dee4d3a4 r4:ffefb000 [ 864.818764][ T6809] [<8050c570>] (move_pages) from [<8058b378>] (userfaultfd_ioctl+0x111c/0x2080) [ 864.819300][ T6809] r10:84eef000 r9:df985e98 r8:00000001 r7:21000000 r6:00000000 r5:20000040 [ 864.820058][ T6809] r4:84f8d000 [ 864.820332][ T6809] [<8058a25c>] (userfaultfd_ioctl) from [<80536ea8>] (sys_ioctl+0x138/0xd88) [ 864.820916][ T6809] r10:83bf1800 r9:00000005 r8:85344600 r7:20000040 r6:85344601 r5:00000000 [ 864.823483][ T6809] r4:c028aa05 [ 864.823845][ T6809] [<80536d70>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 864.824380][ T6809] Exception stack(0xdf985fa8 to 0xdf985ff0) [ 864.824737][ T6809] 5fa0: 00000000 00000000 00000005 c028aa05 20000040 00000000 [ 864.825636][ T6809] 5fc0: 00000000 00000000 00286380 00000036 00000000 00006364 003d0f00 76b9c0bc [ 864.826705][ T6809] 5fe0: 76b9bec0 76b9beb0 00018af0 00133450 [ 864.827274][ T6809] r10:00000036 r9:83bf1800 r8:8020029c r7:00000036 r6:00286380 r5:00000000 [ 864.828260][ T6809] r4:00000000 [ 864.830440][ T6809] Rebooting in 86400 seconds.. VM DIAGNOSIS: 18:12:54 Registers: info registers vcpu 0 CPU#0 R00=84052040 R01=00000020 R02=eaf35000 R03=eaf35018 R04=8287745a R05=84052040 R06=809f5e5c R07=8287747a R08=8287741c R09=0000005f R10=00000001 R11=df985a64 R12=00000002 R13=df985a58 R14=8275b574 R15=809f5e6c PSR=80000093 N--- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=00000c0b R01=0000002f R02=00000000 R03=00000000 R04=0056da07 R05=00000000 R06=0056df15 R07=00000014 R08=0056dae3 R09=00000000 R10=7ec05ba4 R11=005a2afc R12=005a0924 R13=df955ff8 R14=76aeacec R15=76aeacec PSR=40000093 -Z-- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=005627e9 s17=00000000 d08=00000000005627e9 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=0112c004 s33=01080006 d16=010800060112c004 s34=909a0800 s35=02088183 d17=02088183909a0800 s36=0047fa00 s37=04080006 d18=040800060047fa00 s38=a08a0800 s39=00080040 d19=00080040a08a0800 s40=06024890 s41=00040800 d20=0004080006024890 s42=40808208 s43=02880800 d21=0288080040808208 s44=00018003 s45=099e1008 d22=099e100800018003 s46=08060a01 s47=01000002 d23=0100000208060a01 s48=00000001 s49=00000000 d24=0000000000000001 s50=00000000 s51=00000000 d25=0000000000000000 s52=e705b7fc s53=ba1d659a d26=ba1d659ae705b7fc s54=eac0959c s55=909f0897 d27=909f0897eac0959c s56=5b160abf s57=985f6bbf d28=985f6bbf5b160abf s58=ca656f2e s59=d89ac2e5 d29=d89ac2e5ca656f2e s60=c98f7089 s61=a0ce6621 d30=a0ce6621c98f7089 s62=472a0f64 s63=5bc084cf d31=5bc084cf472a0f64 FPSCR: 00000000