last executing test programs: 47.381506358s ago: executing program 0 (id=3117): r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) pwritev(r0, &(0x7f00000001c0)=[{&(0x7f0000000280)="be", 0x7ffff000}, {0x0, 0x141}], 0x2, 0x0, 0x0) 45.946921904s ago: executing program 0 (id=3122): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DESTROY(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x1c, 0x3, 0x6, 0x301, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 44.597855143s ago: executing program 0 (id=3127): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)={0x1c, 0x35, 0x107, 0x0, 0x0, {0xb, 0x7c}, [@typed={0x8, 0x1, 0x0, 0x0, @pid}]}, 0x1c}}, 0x0) 43.218607175s ago: executing program 0 (id=3133): r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000180)={'bond0\x00', @ifru_names='rose0\x00'}) 41.596541314s ago: executing program 0 (id=3139): r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000001c0), 0x42000) ioctl$SNDRV_TIMER_IOCTL_STATUS32(r0, 0x80585414, 0x0) 40.275429783s ago: executing program 0 (id=3144): r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x38, 0x1403, 0x403, 0x0, 0x0, "", [{{0x9, 0x2, 'syz1\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'ipvlan1\x00'}}]}, 0x38}}, 0x0) 9.794874696s ago: executing program 3 (id=3219): r0 = memfd_create(&(0x7f0000000680)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\xf2\xed\x04\x00\x80\x00\xd4N\x12\x9b\x1f\t\xd1Z+\x86T\x16\xf8\x01\x00\x00\x00\x9f+\x8d!\x9f\vF\x1a\x9d\x01\x0f\xc7\xefo\xa4k\xdf\xb1>\xa1\x9c\x86xm\xe6\x9bZ4\x91\x1a\xcb\xdd\x89\xb9\xc0LF;\xd6\x84\x195\x06\x00^\xc1jP\x8a\xc6[\xbd\xe7a]\xdd\r\x1aZS\x01*\x1b\x86\xdd{q\xdcq\xa1\x00\xb3\xf9\x91r\x7f\xdc\xf1\xc3\xf2\x97\x14\'\x9a\x7f\x00\x8e\a\xab\xe4?B\xafce_\x98\x81\x84\xb8\x92P\x99Y\xd3O\xb8V\xd5p\x90X\xaaf\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xec\xf5\x13\xc8H\x8dj\x12>y\x13N\x16Z\xbf\xdcTB\xaf?5~\xed\xbe\xc9\x91\xad\x10 \x0f\x81\x13\xb3\x8b\xaa\xa23\x14\xd2$2\x81\x96\xf5\xa9\xef\"K\x8e\xa6E\x96o\x1e\x8b\xed\xc7\xc4\x11V\t\x92\xb2)\xa8\x88\xe1(\xe6\xc6`Q\x16G\x1b1]\"}o_S@\x9f\x82OM\xc6\x0f\x87\xe2\x1d\xb5\x8e\x9a\xfb(\xd2\xab7Y-5\x8b\xd2`\t1\xa9\x03\x06\x17\xee\xcc{NI\xa9.\xc7\xbd\xbb0\x12\r\nQ\xa3', 0x4) fallocate(r0, 0x0, 0x400000000000000, 0x7) 9.173323904s ago: executing program 3 (id=3223): r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)=ANY=[@ANYBLOB="d82400002800011d02000008000000000a"], 0x24d8}], 0x1}, 0x0) 7.867485555s ago: executing program 2 (id=3224): r0 = openat$iommufd(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$IOMMU_IOAS_ALLOW_IOVAS(r0, 0x3b82, &(0x7f0000000100)={0x18, 0x0, 0x0, 0x8b8, 0x0}) 7.778117345s ago: executing program 3 (id=3225): r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000140)={{0x12, 0x1, 0x0, 0xb5, 0x40, 0x33, 0x40, 0x1a86, 0x7522, 0x3536, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xe4, 0xd6, 0x24}}]}}]}}, 0x0) syz_usb_control_io(r0, 0x0, &(0x7f0000000000)={0x84, &(0x7f0000000500)=ANY=[@ANYBLOB="000002"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 7.670574541s ago: executing program 4 (id=3226): r0 = fanotify_init(0x0, 0x1000) write$P9_RSYMLINK(r0, &(0x7f0000000480)={0x14, 0x11, 0x0, {0x0, 0x40000}}, 0x14) 7.542192536s ago: executing program 1 (id=3227): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000540)=@newtaction={0x70, 0x30, 0x1, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_tunnel_key={0x58, 0x1, 0x0, 0x0, {{0xf}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}, @TCA_TUNNEL_KEY_NO_CSUM={0x5, 0xa, 0x1}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}}, 0x0) 6.383194557s ago: executing program 1 (id=3228): r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000200)=0x7, &(0x7f0000000240)=0x4) 6.377934216s ago: executing program 4 (id=3229): r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000880)=@newtaction={0x70, 0x30, 0x53b, 0x0, 0x0, {0x9}, [{0x5c, 0x1, [@m_sample={0x58, 0x1, 0x0, 0x0, {{0xb}, {0x2c, 0x2, 0x0, 0x1, [@TCA_SAMPLE_PSAMPLE_GROUP={0x8}, @TCA_SAMPLE_PARMS={0x7}, @TCA_SAMPLE_RATE={0x8}]}, {0x4}, {0xc}, {0xc, 0x4}}}]}]}, 0x70}}, 0x0) 6.160311369s ago: executing program 2 (id=3230): r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000001000000000000000000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, &(0x7f0000000000)='\x00', 0x0}, 0x48) 4.907859367s ago: executing program 1 (id=3231): personality(0xfe47fef9f5ff7379) uname(&(0x7f0000000000)=""/123) 4.780007119s ago: executing program 4 (id=3232): r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x46, &(0x7f0000000340)=0x41, 0x4) 4.341497509s ago: executing program 2 (id=3233): r0 = syz_open_dev$video(&(0x7f0000000000), 0x75, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r0, 0xc034564b, &(0x7f0000000040)={0x0, 0x32315659, 0x780, 0x438}) 3.487590316s ago: executing program 1 (id=3234): r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x8, 0x3, 0x2f0, 0x0, 0x8, 0xfa04, 0xc0, 0x6c02, 0x258, 0x194, 0x194, 0x258, 0x194, 0x3, 0x0, {[{{@ip={@empty=0x1e00, @broadcast, 0x0, 0x0, 'veth0_to_hsr\x00', 'veth0_virt_wifi\x00', {}, {}, 0x6}, 0x0, 0x98, 0xc0, 0x0, {0x0, 0x74020000}, [@common=@inet=@socket1={{0x28}}]}, @common=@inet=@SYNPROXY={0x28}}, {{@ip={@broadcast, @dev, 0x0, 0x0, '\x00', 'tunl0\x00'}, 0x0, 0x70, 0x198}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:man_t:s0\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x350) 3.480871852s ago: executing program 3 (id=3235): bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000180000001800000002000000000000000000000a00000000000000000000000d"], 0x0, 0x32}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x18, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x3, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x3}}, &(0x7f0000000340)='syzkaller\x00'}, 0x90) 3.006024463s ago: executing program 4 (id=3236): r0 = fsopen(&(0x7f0000000100)='configfs\x00', 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x4000, 0x0, 0x0) 2.571583192s ago: executing program 2 (id=3237): ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'vxcan1\x00'}) syz_emit_ethernet(0x56, &(0x7f00000001c0)={@local, @dev, @void, {@ipv4={0x800, @tcp={{0xd, 0x4, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x6, 0x0, @private=0xa010102, @local, {[@generic={0x7, 0xb, "04030e010000000000"}, @timestamp_addr={0x44, 0x14, 0x6, 0x1, 0x0, [{@multicast1}, {@multicast1}]}]}}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x6, 0x5}}}}}}, 0x0) 1.907031913s ago: executing program 1 (id=3238): r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000080)="48000000150081fb7059ae08060c04000aff0f11000048040011018701546fabca1b4e7d06a6bd7c493872f750375ed08a562af5745e17b8c119418f0f000000d6e74703", 0x44}, {&(0x7f0000000840)='C11O', 0x4}], 0x2}, 0x0) 1.527977258s ago: executing program 3 (id=3239): r0 = openat$iommufd(0xffffffffffffff9c, &(0x7f0000000800), 0x0, 0x0) ioctl$IOMMU_HWPT_INVALIDATE$TEST(r0, 0x3b8d, &(0x7f0000000280)={0x20, 0x0, 0x0, 0xdeadbeef, 0x8, 0x0, 0x2}) 1.294713274s ago: executing program 4 (id=3240): openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x40, 0x0) mount$fuseblk(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x200808, 0x0) 1.289109614s ago: executing program 2 (id=3241): r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'netdevsim0\x00', &(0x7f0000000400)=@ethtool_flash={0x50, 0x0, '.\x00'}}) 139.071299ms ago: executing program 2 (id=3242): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000200)=@newlink={0x38, 0x10, 0x437, 0x0, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, 0x50483, 0x1}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_IGNORE_DF={0x5, 0x13, 0x1}]}}}]}, 0x38}}, 0x0) 66.269089ms ago: executing program 1 (id=3243): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000100), 0x10}, 0x14) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x1f2f, 0x22, 0x3ce, &(0x7f00000007c0)="9f44948721919580684010a40800", 0x0, 0x241, 0x0, 0xb1, 0x0, &(0x7f0000000700)="389ceff69d08b0af1cc71b6262d50660bbaf31a7f8cd6a6f911beb65d5fe6b54bf21a66489121f24fefd198059288c9b735e1898e77a7469489a249292c02a72bc193a3008ebdbf4e9dd4ee8fcceef55402c913c8dd0ebece1330aaa93ece835c5044a246a5967e3acd7c950b3b19f351830e545eb9bc3a9c6dd22ce97f1f857cfe8b68a2370b69ea336006b589368f92deb68f3dfc6f2bfee09f8342da437fce5dcdf658e453e3132bb42067575318c39"}, 0x23) 28.422188ms ago: executing program 4 (id=3244): r0 = socket$kcm(0xa, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001240)={&(0x7f0000000a00)=@generic={0xa, "8ab77fa26849ff263ef30c98b353011a5990650042e2dacdc165ececece6be1862e2adacd2737d00ad6f9fa9f3d7145e15dd9fb1a7adc211220963ad5def53b911ba5b9da13641f982757012a7496de0b3a36f5849f260c603dbc317f54b901ee80ea6132ca6e88c776553e1833052ca376304313c5637786a36a4b83857"}, 0x80, 0x0}, 0x0) 0s ago: executing program 3 (id=3245): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000800)={&(0x7f00000017c0)=@newtaction={0xe78, 0x30, 0x25, 0x0, 0x0, {}, [{0xe64, 0x1, [@m_pedit={0xe60, 0x1, 0x0, 0x0, {{0xa}, {0xe34, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x10, 0x5, 0x0, 0x1, [{0xc, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x2}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0x2}}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe78}}, 0x0) kernel console output (not intermixed with test programs): type=1400 audit(2000000028.860:411): avc: denied { read } for pid=10552 comm="syz.4.2472" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 494.031996][T10559] xt_connbytes: Forcing CT accounting to be enabled [ 494.039060][T10559] Cannot find del_set index 768 as target [ 494.274988][T10564] kAFS: unable to lookup cell '/' [ 494.775134][T10581] netlink: 'syz.2.2483': attribute type 1 has an invalid length. [ 494.789506][T10581] netlink: 224 bytes leftover after parsing attributes in process `syz.2.2483'. [ 495.073235][ T29] audit: type=1400 audit(2000000030.220:412): avc: denied { bind } for pid=10587 comm="syz.1.2489" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 495.155181][T10592] bridge_slave_1: left allmulticast mode [ 495.208840][T10592] bridge0: port 2(bridge_slave_1) entered disabled state [ 495.261289][ T29] audit: type=1400 audit(2000000030.410:413): avc: denied { connect } for pid=10593 comm="syz.2.2491" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 495.780052][T10610] ipvlan0: entered allmulticast mode [ 495.785412][T10610] veth0_vlan: entered allmulticast mode [ 496.333381][T10623] usb usb7: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 496.463991][T10627] CIFS: iocharset name too long [ 496.882820][T10636] netlink: 16126 bytes leftover after parsing attributes in process `syz.1.2512'. [ 496.964890][T10636] netlink: 105116 bytes leftover after parsing attributes in process `syz.1.2512'. [ 497.077880][T10643] netlink: 256 bytes leftover after parsing attributes in process `syz.2.2514'. [ 497.149853][ T29] audit: type=1400 audit(2000000032.290:414): avc: denied { ioctl } for pid=10641 comm="syz.0.2516" path="socket:[25829]" dev="sockfs" ino=25829 ioctlcmd=0x890c scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 497.885960][T10664] capability: warning: `syz.4.2523' uses deprecated v2 capabilities in a way that may be insecure [ 498.322409][T10673] ip6t_srh: unknown srh match flags 4001 [ 499.055710][ T5703] usb 3-1: new high-speed USB device number 82 using dummy_hcd [ 499.235828][ T5703] usb 3-1: Using ep0 maxpacket: 16 [ 499.249566][T10702] netlink: 104 bytes leftover after parsing attributes in process `syz.3.2541'. [ 499.264739][ T5703] usb 3-1: config 1 contains an unexpected descriptor of type 0x2, skipping [ 499.264777][ T5703] usb 3-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 499.264808][ T5703] usb 3-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 499.270484][ T5703] usb 3-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 499.397461][ T5703] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 499.405533][ T5703] usb 3-1: Product: syz [ 499.448522][ T5703] usb 3-1: Manufacturer: syz [ 499.453186][ T5703] usb 3-1: SerialNumber: syz [ 499.645056][ T5431] Bluetooth: hci3: unexpected event for opcode 0x0c7b [ 499.907537][ T5703] usb 3-1: 0:2 : does not exist [ 499.970711][ T5703] usb 3-1: 1:0: cannot get min/max values for control 4 (id 1) [ 500.016756][T10717] caif0: entered promiscuous mode [ 500.066530][T10717] caif0: entered allmulticast mode [ 500.202894][ T5703] usb 3-1: USB disconnect, device number 82 [ 500.439537][T10695] udevd[10695]: error opening ATTR{/sys/devices/platform/dummy_hcd.2/usb3/3-1/3-1:1.0/sound/card3/controlC3/../uevent} for writing: No such file or directory [ 500.625946][T10729] netlink: 8 bytes leftover after parsing attributes in process `syz.4.2555'. [ 502.101368][ T29] audit: type=1400 audit(2000000037.250:415): avc: denied { setopt } for pid=10766 comm="syz.0.2574" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 502.961142][T10791] netlink: 'syz.0.2584': attribute type 7 has an invalid length. [ 503.229961][ T25] usb 5-1: new high-speed USB device number 91 using dummy_hcd [ 503.334764][T10800] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 503.392347][T10803] netlink: 8 bytes leftover after parsing attributes in process `syz.3.2592'. [ 503.470709][ T25] usb 5-1: Using ep0 maxpacket: 16 [ 503.504206][ T25] usb 5-1: config 0 has an invalid interface number: 251 but max is 0 [ 503.553057][ T25] usb 5-1: config 0 has no interface number 0 [ 503.591279][ T25] usb 5-1: config 0 interface 251 altsetting 0 bulk endpoint 0x4 has invalid maxpacket 16 [ 503.658576][ T25] usb 5-1: config 0 interface 251 altsetting 0 bulk endpoint 0x82 has invalid maxpacket 64 [ 503.684953][ T5431] Bluetooth: hci3: Controller not accepting commands anymore: ncmd = 0 [ 503.694629][ T5431] Bluetooth: hci3: Injecting HCI hardware error event [ 503.703792][ T5431] Bluetooth: hci3: hardware error 0x00 [ 503.741269][ T25] usb 5-1: New USB device found, idVendor=0b95, idProduct=172a, bcdDevice=f7.f4 [ 503.820952][ T25] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 503.885426][ T25] usb 5-1: Product: syz [ 503.911281][ T25] usb 5-1: Manufacturer: syz [ 503.962758][ T25] usb 5-1: SerialNumber: syz [ 504.043821][ T25] usb 5-1: config 0 descriptor?? [ 504.092538][T10792] raw-gadget.0 gadget.4: fail, usb_ep_enable returned -22 [ 504.134829][T10792] raw-gadget.0 gadget.4: fail, usb_ep_enable returned -22 [ 504.473434][T10792] raw-gadget.0 gadget.4: fail, usb_ep_enable returned -22 [ 504.505844][T10792] raw-gadget.0 gadget.4: fail, usb_ep_enable returned -22 [ 504.760094][ T25] asix 5-1:0.251 (unnamed net_device) (uninitialized): Failed to read reg index 0x0000: -71 [ 504.798196][ T25] asix 5-1:0.251 (unnamed net_device) (uninitialized): Failed to read MAC address: -71 [ 504.859152][ T25] asix 5-1:0.251: probe with driver asix failed with error -5 [ 504.932407][ T25] usb 5-1: USB disconnect, device number 91 [ 504.934812][ T29] audit: type=1400 audit(2000000040.080:416): avc: denied { mount } for pid=10834 comm="syz.0.2608" name="/" dev="selinuxfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=filesystem permissive=1 [ 504.995737][ T5599] usb 3-1: new high-speed USB device number 83 using dummy_hcd [ 505.198910][T10841] netlink: 172 bytes leftover after parsing attributes in process `syz.0.2611'. [ 505.234320][T10841] netlink: 8 bytes leftover after parsing attributes in process `syz.0.2611'. [ 505.263406][ T5599] usb 3-1: config 0 interface 0 altsetting 0 has an endpoint descriptor with address 0xD6, changing to 0x86 [ 505.286147][ T5599] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x86 has an invalid bInterval 0, changing to 7 [ 505.299536][ T5599] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x86 has invalid wMaxPacketSize 0 [ 505.344452][ T5599] usb 3-1: New USB device found, idVendor=05f3, idProduct=0240, bcdDevice=1b.24 [ 505.437453][ T5599] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 505.467565][ T5599] usb 3-1: Product: syz [ 505.471888][ T5599] usb 3-1: Manufacturer: syz [ 505.489341][ T5599] usb 3-1: SerialNumber: syz [ 505.523677][ T5599] usb 3-1: config 0 descriptor?? [ 505.789219][ T5431] Bluetooth: hci3: Opcode 0x0c03 failed: -110 [ 505.813608][T10850] netlink: 203452 bytes leftover after parsing attributes in process `syz.3.2615'. [ 505.842324][T10850] netlink: 'syz.3.2615': attribute type 2 has an invalid length. [ 505.928116][T10852] netlink: 'syz.1.2618': attribute type 5 has an invalid length. [ 505.976129][ T5599] powermate: unknown product id 0240 [ 505.981496][ T5599] powermate: Expected payload of 3--6 bytes, found 0 bytes! [ 506.018656][ T5599] powermate 3-1:0.0: probe with driver powermate failed with error -5 [ 506.133861][ T5599] usb 3-1: USB disconnect, device number 83 [ 506.257198][ T29] audit: type=1400 audit(2000000041.400:417): avc: denied { getopt } for pid=10857 comm="syz.1.2619" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 506.810344][T10872] tmpfs: Bad value for 'nr_inodes' [ 506.887007][ T1271] ieee802154 phy0 wpan0: encryption failed: -22 [ 506.893512][ T1271] ieee802154 phy1 wpan1: encryption failed: -22 [ 507.751488][ T25] usb 4-1: new high-speed USB device number 92 using dummy_hcd [ 507.993201][ T25] usb 4-1: Using ep0 maxpacket: 16 [ 508.036850][ T25] usb 4-1: New USB device found, idVendor=2770, idProduct=9050, bcdDevice=11.97 [ 508.066306][ T25] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 508.140499][ T25] usb 4-1: config 0 descriptor?? [ 508.164955][ T25] gspca_main: sq905c-2.14.0 probing 2770:9050 [ 508.329173][ T5599] usb 2-1: new high-speed USB device number 89 using dummy_hcd [ 508.556300][ T5599] usb 2-1: Using ep0 maxpacket: 8 [ 508.567393][ T5599] usb 2-1: too many endpoints for config 11 interface 0 altsetting 0: 202, using maximum allowed: 30 [ 508.591593][ T25] gspca_sq905c: sq905c_read: usb_control_msg failed (-71) [ 508.595656][ T5599] usb 2-1: config 11 interface 0 altsetting 0 has 0 endpoint descriptors, different from the interface descriptor's value: 202 [ 508.619362][ T25] sq905c 4-1:0.0: Reading version command failed [ 508.619489][ T25] sq905c 4-1:0.0: probe with driver sq905c failed with error -71 [ 508.622907][ T25] usb 4-1: USB disconnect, device number 92 [ 508.783409][ T5599] usb 2-1: New USB device found, idVendor=0421, idProduct=0508, bcdDevice=91.94 [ 508.843961][ T5599] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 508.875434][ T5599] usb 2-1: Product: syz [ 508.891769][ T5599] usb 2-1: Manufacturer: syz [ 508.918194][ T5599] usb 2-1: SerialNumber: syz [ 508.941815][ T29] audit: type=1400 audit(2000000044.090:418): avc: denied { ioctl } for pid=10919 comm="syz.0.2648" path="socket:[25298]" dev="sockfs" ino=25298 ioctlcmd=0x8946 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 508.966442][ T5599] usb 2-1: bad CDC descriptors [ 509.428961][ T5704] usb 2-1: USB disconnect, device number 89 [ 509.779318][ T29] audit: type=1400 audit(2000000044.910:419): avc: denied { write } for pid=10935 comm="syz.4.2656" name="nvram" dev="devtmpfs" ino=625 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nvram_device_t tclass=chr_file permissive=1 [ 510.260659][ T5599] usb 3-1: new full-speed USB device number 84 using dummy_hcd [ 510.453759][ T29] audit: type=1400 audit(2000000045.600:420): avc: denied { write } for pid=10951 comm="syz.4.2664" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 510.558111][ T5599] usb 3-1: config 0 has an invalid interface number: 20 but max is 0 [ 510.579507][ T5599] usb 3-1: config 0 has no interface number 0 [ 510.604780][ T5599] usb 3-1: config 0 interface 20 altsetting 0 endpoint 0x6 has invalid maxpacket 1023, setting to 64 [ 510.629227][ T5599] usb 3-1: New USB device found, idVendor=04e6, idProduct=000b, bcdDevice= 1.00 [ 510.658562][ T5599] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 510.716108][ T5599] usb 3-1: Product: syz [ 510.720410][ T5599] usb 3-1: Manufacturer: syz [ 510.755268][ T5599] usb 3-1: SerialNumber: syz [ 510.807343][ T5599] usb 3-1: config 0 descriptor?? [ 510.813640][T10940] raw-gadget.0 gadget.2: fail, usb_ep_enable returned -22 [ 510.847672][ T5599] usb-storage 3-1:0.20: USB Mass Storage device detected [ 510.908868][ T5599] usb-storage 3-1:0.20: Quirks match for vid 04e6 pid 000b: 4 [ 511.055871][ T29] audit: type=1400 audit(2000000046.190:421): avc: denied { shutdown } for pid=10966 comm="syz.3.2671" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 511.096087][ T5599] scsi host1: usb-storage 3-1:0.20 [ 511.281134][ T5559] usb 3-1: USB disconnect, device number 84 [ 511.882021][T10989] smc: removing ib device syz2 [ 512.354775][ T29] audit: type=1326 audit(2000000047.470:422): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11001 comm="syz.4.2685" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fcc0c979ef9 code=0x0 [ 512.875192][T11016] usb usb9: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 512.911198][T11016] vhci_hcd: USB_PORT_FEAT_BH_PORT_RESET req not supported for USB 2.0 roothub [ 512.983218][T11018] kAFS: unable to lookup cell '(R9@/Zyf-5f]KsIPc*g' [ 513.310220][T11027] netlink: 'syz.4.2699': attribute type 5 has an invalid length. [ 513.933591][ T29] audit: type=1400 audit(2000000049.080:423): avc: denied { bind } for pid=11042 comm="syz.2.2707" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 514.204009][T11054] netlink: 'syz.0.2710': attribute type 21 has an invalid length. [ 514.309684][T11057] usb usb8: usbfs: interface 0 claimed by hub while 'syz.2.2712' sets config #1 [ 514.443510][ T29] audit: type=1800 audit(2000000049.590:424): pid=11046 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=set_data cause=unavailable-hash-algorithm comm="syz.3.2708" name="/newroot/532/file0" dev="tmpfs" ino=2684 res=0 errno=0 [ 515.385699][ T29] audit: type=1400 audit(2000000050.530:425): avc: denied { bind } for pid=11083 comm="syz.4.2725" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 517.071189][T11133] netlink: 'syz.4.2749': attribute type 1 has an invalid length. [ 517.131379][T11133] netlink: 244 bytes leftover after parsing attributes in process `syz.4.2749'. [ 517.428370][ T5704] usb 1-1: new high-speed USB device number 88 using dummy_hcd [ 517.643675][ T5704] usb 1-1: Using ep0 maxpacket: 16 [ 517.671037][ T5704] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 517.712340][ T5704] usb 1-1: New USB device found, idVendor=18d1, idProduct=1eaf, bcdDevice= 7.79 [ 517.739243][ T5704] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 517.825323][ T5704] usb 1-1: Product: syz [ 517.855380][ T5704] usb 1-1: Manufacturer: syz [ 517.898761][ T5704] usb 1-1: SerialNumber: syz [ 517.930316][ T5704] usb 1-1: config 0 descriptor?? [ 518.225364][ T5704] usb 1-1: Invalid number of CPorts: 0 [ 518.260965][ T5704] es2_ap_driver 1-1:0.0: probe with driver es2_ap_driver failed with error -22 [ 518.521200][T11162] netlink: 72 bytes leftover after parsing attributes in process `syz.2.2759'. [ 518.565787][T11163] IPv6: Can't replace route, no match found [ 518.600719][ T5559] usb 1-1: USB disconnect, device number 88 [ 519.259855][ T29] audit: type=1400 audit(2000000054.410:426): avc: denied { create } for pid=11172 comm="syz.2.2765" name="file5" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 519.395724][ T29] audit: type=1400 audit(2000000054.440:427): avc: denied { mounton } for pid=11172 comm="syz.2.2765" path="/467/file5" dev="tmpfs" ino=2355 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 519.498801][ T29] audit: type=1400 audit(2000000054.600:428): avc: denied { unlink } for pid=5860 comm="syz-executor" name="file5" dev="tmpfs" ino=2355 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 519.638141][T11184] netlink: 8 bytes leftover after parsing attributes in process `syz.2.2769'. [ 519.882552][T11189] sctp: [Deprecated]: syz.3.2772 (pid 11189) Use of int in maxseg socket option. [ 519.882552][T11189] Use struct sctp_assoc_value instead [ 520.294758][ T29] audit: type=1400 audit(2000000055.420:429): avc: denied { bind } for pid=11198 comm="syz.3.2777" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 520.425081][ T29] audit: type=1400 audit(2000000055.570:430): avc: denied { create } for pid=11203 comm="syz.0.2779" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 520.537814][ T29] audit: type=1400 audit(2000000055.610:431): avc: denied { write } for pid=11201 comm="syz.4.2780" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 520.580707][ T29] audit: type=1400 audit(2000000055.670:432): avc: denied { write } for pid=11203 comm="syz.0.2779" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 520.861057][T11214] (unnamed net_device) (uninitialized): option arp_validate: invalid value (18446744073709551615) [ 520.931507][ T29] audit: type=1400 audit(2000000056.060:433): avc: denied { ioctl } for pid=11215 comm="syz.0.2784" path="socket:[26838]" dev="sockfs" ino=26838 ioctlcmd=0x8915 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 520.956836][ C1] vkms_vblank_simulate: vblank timer overrun [ 521.833664][ T29] audit: type=1400 audit(2000000056.970:434): avc: denied { accept } for pid=11237 comm="syz.0.2795" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 522.623618][ T29] audit: type=1400 audit(2000000057.770:435): avc: granted { setsecparam } for pid=11257 comm="syz.2.2805" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 524.064832][T10305] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 524.066926][ T29] audit: type=1400 audit(2000000059.210:436): avc: denied { create } for pid=11292 comm="syz.4.2822" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 524.123895][T10305] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 524.137739][T10305] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 524.253663][T10305] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 524.295441][T11298] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 524.318165][T11298] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 524.587671][ T29] audit: type=1400 audit(2000000059.730:437): avc: denied { write } for pid=11305 comm="syz.4.2826" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 525.475511][ T29] audit: type=1400 audit(2000000060.620:438): avc: denied { module_request } for pid=11288 comm="syz-executor" kmod="rtnl-link-nicvf" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 525.584978][ T29] audit: type=1400 audit(2000000060.730:439): avc: denied { read write } for pid=5471 comm="syz-executor" name="loop3" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 525.747142][ T29] audit: type=1400 audit(2000000060.730:440): avc: denied { open } for pid=5471 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 525.808363][T11288] chnl_net:caif_netlink_parms(): no params data found [ 525.862708][ T29] audit: type=1400 audit(2000000060.730:441): avc: denied { ioctl } for pid=5471 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=652 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 526.041692][ T29] audit: type=1400 audit(2000000060.970:442): avc: denied { ioctl } for pid=11336 comm="syz.3.2841" path="socket:[27989]" dev="sockfs" ino=27989 ioctlcmd=0x89e0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 526.192152][ T29] audit: type=1400 audit(2000000061.060:443): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 526.306024][ T29] audit: type=1400 audit(2000000061.090:444): avc: denied { search } for pid=4656 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 526.416878][ T5431] Bluetooth: hci4: command tx timeout [ 526.435038][ T29] audit: type=1400 audit(2000000061.110:445): avc: denied { append } for pid=4656 comm="syslogd" name="messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 526.469148][ T29] audit: type=1400 audit(2000000061.110:446): avc: denied { append open } for pid=4656 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 527.053227][T11288] bridge0: port 1(bridge_slave_0) entered blocking state [ 527.126683][T11288] bridge0: port 1(bridge_slave_0) entered disabled state [ 527.134026][T11288] bridge_slave_0: entered allmulticast mode [ 527.213726][T11288] bridge_slave_0: entered promiscuous mode [ 527.300129][T11288] bridge0: port 2(bridge_slave_1) entered blocking state [ 527.343016][T11288] bridge0: port 2(bridge_slave_1) entered disabled state [ 527.403417][T11288] bridge_slave_1: entered allmulticast mode [ 527.466947][T11288] bridge_slave_1: entered promiscuous mode [ 527.889860][T11288] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 527.977280][T11288] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 528.141981][T11362] netlink: 108 bytes leftover after parsing attributes in process `syz.3.2848'. [ 528.486596][ T5431] Bluetooth: hci4: command tx timeout [ 528.519751][T11288] team0: Port device team_slave_0 added [ 528.570029][T11288] team0: Port device team_slave_1 added [ 528.992394][T11288] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 529.068212][T11288] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 529.296860][T11288] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 529.354562][T11288] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 529.405010][T11288] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 529.605632][T11288] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 529.605901][ T29] kauditd_printk_skb: 67 callbacks suppressed [ 529.605920][ T29] audit: type=1400 audit(2000000064.750:514): avc: denied { create } for pid=11366 comm="syz.3.2852" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 529.855424][ T29] audit: type=1400 audit(2000000064.980:515): avc: denied { read write } for pid=5470 comm="syz-executor" name="loop0" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 530.075751][ T29] audit: type=1400 audit(2000000064.980:516): avc: denied { read write open } for pid=5470 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 530.292284][ T29] audit: type=1400 audit(2000000064.980:517): avc: denied { ioctl } for pid=5470 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=649 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 530.457081][ T29] audit: type=1400 audit(2000000065.080:518): avc: denied { read write } for pid=5471 comm="syz-executor" name="loop3" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 530.564727][ T5431] Bluetooth: hci4: command tx timeout [ 530.586338][ T29] audit: type=1400 audit(2000000065.080:519): avc: denied { read write open } for pid=5471 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 530.628954][ T29] audit: type=1400 audit(2000000065.100:520): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 530.664745][ T29] audit: type=1400 audit(2000000065.100:521): avc: denied { search } for pid=4656 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 530.724397][ T29] audit: type=1400 audit(2000000065.100:522): avc: denied { append } for pid=4656 comm="syslogd" name="messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 530.844771][T11288] hsr_slave_0: entered promiscuous mode [ 530.902200][ T29] audit: type=1400 audit(2000000065.100:523): avc: denied { append open } for pid=4656 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 531.037952][T11288] hsr_slave_1: entered promiscuous mode [ 531.087017][T11288] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 531.094639][T11288] Cannot create hsr debugfs directory [ 532.568009][T11391] netlink: 8 bytes leftover after parsing attributes in process `syz.2.2863'. [ 532.637448][ T5431] Bluetooth: hci4: command tx timeout [ 533.079426][T11288] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 533.628760][T11288] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 534.032255][T11288] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 534.408085][T11288] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 534.616455][ T29] kauditd_printk_skb: 82 callbacks suppressed [ 534.616476][ T29] audit: type=1400 audit(2000000069.760:606): avc: denied { read write } for pid=5471 comm="syz-executor" name="loop3" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 534.705516][ T29] audit: type=1400 audit(2000000069.760:607): avc: denied { read write open } for pid=5471 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 534.790154][ T29] audit: type=1400 audit(2000000069.770:608): avc: denied { ioctl } for pid=5471 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=652 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 535.025700][ T29] audit: type=1400 audit(2000000069.900:609): avc: denied { create } for pid=11405 comm="syz.0.2870" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 535.194031][ T29] audit: type=1400 audit(2000000069.940:610): avc: denied { create } for pid=11406 comm="syz.2.2871" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 535.417657][ T29] audit: type=1400 audit(2000000070.080:612): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 535.592270][ T29] audit: type=1400 audit(2000000070.070:611): avc: denied { write } for pid=11406 comm="syz.2.2871" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 535.699599][ T29] audit: type=1400 audit(2000000070.120:613): avc: denied { search } for pid=4656 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 535.763630][T11288] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 535.875264][ T29] audit: type=1400 audit(2000000070.120:614): avc: denied { append } for pid=4656 comm="syslogd" name="messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 535.912823][T11288] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 535.978631][ T29] audit: type=1400 audit(2000000070.120:615): avc: denied { append open } for pid=4656 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 536.079586][T11288] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 536.161968][T11288] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 538.298066][T11288] 8021q: adding VLAN 0 to HW filter on device bond0 [ 538.661646][T11288] 8021q: adding VLAN 0 to HW filter on device team0 [ 538.896598][ T2552] bridge0: port 1(bridge_slave_0) entered blocking state [ 538.903879][ T2552] bridge0: port 1(bridge_slave_0) entered forwarding state [ 539.164130][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 539.171456][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 539.955297][ T29] kauditd_printk_skb: 92 callbacks suppressed [ 539.955321][ T29] audit: type=1400 audit(2000000075.100:708): avc: denied { create } for pid=11440 comm="syz.2.2885" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 540.128695][ T29] audit: type=1400 audit(2000000075.100:709): avc: denied { read write } for pid=5471 comm="syz-executor" name="loop3" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 540.298314][ T29] audit: type=1400 audit(2000000075.100:710): avc: denied { read write open } for pid=5471 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 540.341701][ T29] audit: type=1400 audit(2000000075.120:711): avc: denied { ioctl } for pid=5471 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=652 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 540.464249][ T29] audit: type=1400 audit(2000000075.200:712): avc: denied { write } for pid=11440 comm="syz.2.2885" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 540.657290][ T29] audit: type=1400 audit(2000000075.250:713): avc: denied { create } for pid=11441 comm="syz.4.2887" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 540.825243][ T29] audit: type=1400 audit(2000000075.260:714): avc: denied { getopt } for pid=11441 comm="syz.4.2887" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 541.012477][ T29] audit: type=1400 audit(2000000075.270:715): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 541.174397][ T29] audit: type=1400 audit(2000000075.270:716): avc: denied { search } for pid=4656 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 541.304308][ T29] audit: type=1400 audit(2000000075.270:717): avc: denied { append } for pid=4656 comm="syslogd" name="messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 541.464225][T11452] netlink: 32032 bytes leftover after parsing attributes in process `syz.2.2889'. [ 543.077004][T11458] xt_ipvs: protocol family 7 not supported [ 543.441625][T11465] netlink: 20 bytes leftover after parsing attributes in process `syz.0.2895'. [ 545.053864][ T29] kauditd_printk_skb: 74 callbacks suppressed [ 545.053890][ T29] audit: type=1400 audit(2000000080.200:792): avc: denied { create } for pid=11475 comm="syz.4.2900" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 545.200660][ T29] audit: type=1400 audit(2000000080.250:793): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 545.385257][ T29] audit: type=1400 audit(2000000080.260:794): avc: denied { search } for pid=4656 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 545.579890][ T29] audit: type=1400 audit(2000000080.260:795): avc: denied { append } for pid=4656 comm="syslogd" name="messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 545.723935][ T29] audit: type=1400 audit(2000000080.300:796): avc: denied { write } for pid=11475 comm="syz.4.2900" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 545.874227][ T29] audit: type=1400 audit(2000000080.350:797): avc: denied { append open } for pid=4656 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 545.984137][ T29] audit: type=1400 audit(2000000080.350:798): avc: denied { getattr } for pid=4656 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 546.028250][ T942] usb 4-1: new high-speed USB device number 93 using dummy_hcd [ 546.231733][ T29] audit: type=1400 audit(2000000080.430:799): avc: denied { read write } for pid=5470 comm="syz-executor" name="loop0" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 546.351804][ T942] usb 4-1: Using ep0 maxpacket: 8 [ 546.365253][ T29] audit: type=1400 audit(2000000080.430:800): avc: denied { read write open } for pid=5470 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 546.407525][ T942] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x5 has invalid wMaxPacketSize 0 [ 546.419429][ T942] usb 4-1: New USB device found, idVendor=0421, idProduct=008f, bcdDevice=ba.de [ 546.515596][ T942] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 546.580262][ T29] audit: type=1400 audit(2000000080.450:801): avc: denied { ioctl } for pid=5470 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=649 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 546.634655][ T942] usb 4-1: config 0 descriptor?? [ 546.751135][ T942] rndis_host 4-1:0.0: invalid descriptor buffer length [ 546.835629][ T942] usb 4-1: bad CDC descriptors [ 546.841229][ T942] cdc_acm 4-1:0.0: invalid descriptor buffer length [ 547.492389][ T5704] usb 4-1: USB disconnect, device number 93 [ 550.075308][ T29] kauditd_printk_skb: 84 callbacks suppressed [ 550.075330][ T29] audit: type=1400 audit(2000000085.190:886): avc: denied { read write open } for pid=5471 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 550.235224][ T29] audit: type=1400 audit(2000000085.200:887): avc: denied { ioctl } for pid=5471 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=652 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 550.277954][T11288] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 550.427971][ T29] audit: type=1400 audit(2000000085.210:888): avc: denied { read write open } for pid=11508 comm="syz.2.2913" path="/dev/radio1" dev="devtmpfs" ino=875 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l_device_t tclass=chr_file permissive=1 [ 550.595685][ T29] audit: type=1400 audit(2000000085.320:889): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 550.747050][T11515] kAFS: Can only specify source 'none' with -o dyn [ 550.755448][ T29] audit: type=1400 audit(2000000085.320:890): avc: denied { search } for pid=4656 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 550.885246][ T29] audit: type=1400 audit(2000000085.320:891): avc: denied { append } for pid=4656 comm="syslogd" name="messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 551.028244][ T29] audit: type=1400 audit(2000000085.380:892): avc: denied { append open } for pid=4656 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 551.143057][ T29] audit: type=1400 audit(2000000085.380:893): avc: denied { getattr } for pid=4656 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 551.290984][ T29] audit: type=1400 audit(2000000085.480:894): avc: denied { read } for pid=11509 comm="syz.0.2912" name="v4l-subdev3" dev="devtmpfs" ino=862 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 551.405641][ T29] audit: type=1400 audit(2000000085.480:895): avc: denied { read open } for pid=11509 comm="syz.0.2912" path="/dev/v4l-subdev3" dev="devtmpfs" ino=862 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 551.596668][T11288] veth0_vlan: entered promiscuous mode [ 551.900857][T11288] veth1_vlan: entered promiscuous mode [ 552.844257][T11288] veth0_macvtap: entered promiscuous mode [ 553.129929][T11288] veth1_macvtap: entered promiscuous mode [ 553.664804][T11288] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 553.730494][T11288] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 553.800160][T11288] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 553.860681][T11288] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 553.940450][T11288] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 553.984207][T11288] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 554.033953][T11288] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 554.072704][T11288] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 554.131535][T11288] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 554.171723][T11288] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 554.274902][T11288] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 554.520783][T11288] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 554.595106][T11288] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 554.664482][T11288] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 554.720505][T11288] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 554.749832][T11288] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 554.808045][T11288] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 554.845634][T11288] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 554.907731][T11288] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 554.984940][T11288] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 554.998325][T11288] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 555.048157][T11288] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 555.098170][ T29] kauditd_printk_skb: 98 callbacks suppressed [ 555.098191][ T29] audit: type=1400 audit(2000000090.250:994): avc: denied { ioctl } for pid=5471 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=652 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 555.129737][ C0] vkms_vblank_simulate: vblank timer overrun [ 555.257804][T11288] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 555.293482][T11288] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 555.346163][ T29] audit: type=1400 audit(2000000090.310:995): avc: denied { read write } for pid=5470 comm="syz-executor" name="loop0" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 555.372967][T11288] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 555.373021][T11288] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 555.610363][ T29] audit: type=1400 audit(2000000090.330:996): avc: denied { read write open } for pid=5470 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 555.775412][ T29] audit: type=1400 audit(2000000090.330:997): avc: denied { ioctl } for pid=5470 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=649 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 555.923866][ T29] audit: type=1400 audit(2000000090.500:998): avc: denied { bpf } for pid=11545 comm="syz.4.2928" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 556.105370][ T29] audit: type=1400 audit(2000000090.550:999): avc: denied { map_create } for pid=11545 comm="syz.4.2928" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 556.244560][ T29] audit: type=1400 audit(2000000090.560:1000): avc: denied { perfmon } for pid=11545 comm="syz.4.2928" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 556.399345][ T29] audit: type=1400 audit(2000000090.650:1001): avc: denied { create } for pid=11546 comm="syz.2.2929" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 556.561466][ T29] audit: type=1400 audit(2000000090.690:1002): avc: denied { write } for pid=11546 comm="syz.2.2929" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 556.725465][ T29] audit: type=1400 audit(2000000090.960:1003): avc: denied { read write } for pid=5480 comm="syz-executor" name="loop4" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 557.147437][T11559] netlink: 28 bytes leftover after parsing attributes in process `syz.3.2934'. [ 557.149033][ T35] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 557.178791][T11559] netlink: 28 bytes leftover after parsing attributes in process `syz.3.2934'. [ 557.234540][ T35] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 557.928988][ T2910] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 557.949542][ T2910] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 558.562500][T11568] (syz.4.2936,11568,0):ocfs2_fill_super:990 ERROR: superblock probe failed! [ 558.602776][T11568] (syz.4.2936,11568,1):ocfs2_fill_super:1178 ERROR: status = -22 [ 559.575644][ T5599] usb 3-1: new high-speed USB device number 85 using dummy_hcd [ 559.774943][ T5599] usb 3-1: Using ep0 maxpacket: 16 [ 559.984823][ T5599] usb 3-1: New USB device found, idVendor=054c, idProduct=0038, bcdDevice=16.f5 [ 560.042140][ T5599] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 560.092755][ T5599] usb 3-1: Product: syz [ 560.111397][ T29] kauditd_printk_skb: 125 callbacks suppressed [ 560.111418][ T29] audit: type=1400 audit(2000000095.260:1129): avc: denied { append open } for pid=4656 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 560.140884][ C0] vkms_vblank_simulate: vblank timer overrun [ 560.186333][ T5599] usb 3-1: Manufacturer: syz [ 560.191111][ T5599] usb 3-1: SerialNumber: syz [ 560.275806][ T5599] usb 3-1: config 0 descriptor?? [ 560.281167][ T29] audit: type=1400 audit(2000000095.300:1130): avc: denied { getattr } for pid=4656 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 560.304216][ C0] vkms_vblank_simulate: vblank timer overrun [ 560.387620][ T5599] visor 3-1:0.0: Sony Clie 3.5 converter detected [ 560.462583][ T29] audit: type=1400 audit(2000000095.430:1131): avc: denied { ioctl } for pid=11573 comm="syz.2.2938" path="/dev/raw-gadget" dev="devtmpfs" ino=734 ioctlcmd=0x550a scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 560.487606][ C0] vkms_vblank_simulate: vblank timer overrun [ 560.581712][ T29] audit: type=1400 audit(2000000095.440:1132): avc: denied { ioctl } for pid=11573 comm="syz.2.2938" path="/dev/raw-gadget" dev="devtmpfs" ino=734 ioctlcmd=0x5509 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 560.606755][ C0] vkms_vblank_simulate: vblank timer overrun [ 560.674384][ T5599] usb 3-1: clie_3_5_startup: get config number bad return length: 0 [ 560.726918][ T5599] visor 3-1:0.0: probe with driver visor failed with error -5 [ 560.786671][ T29] audit: type=1400 audit(2000000095.440:1133): avc: denied { ioctl } for pid=11573 comm="syz.2.2938" path="/dev/raw-gadget" dev="devtmpfs" ino=734 ioctlcmd=0x5504 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 560.811643][ C0] vkms_vblank_simulate: vblank timer overrun [ 560.975553][ T29] audit: type=1326 audit(2000000095.530:1134): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11580 comm="syz.0.2942" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6fd7979ef9 code=0x7ffc0000 [ 561.161567][T11584] x_tables: ip_tables: ah match: only valid for protocol 51 [ 561.168716][ T29] audit: type=1326 audit(2000000095.530:1135): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11580 comm="syz.0.2942" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6fd7979ef9 code=0x7ffc0000 [ 561.179353][ T5599] usb 3-1: USB disconnect, device number 85 [ 561.375112][ T29] audit: type=1326 audit(2000000095.570:1136): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11580 comm="syz.0.2942" exe="/root/syz-executor" sig=0 arch=c000003e syscall=104 compat=0 ip=0x7f6fd7979ef9 code=0x7ffc0000 [ 561.641777][ T29] audit: type=1326 audit(2000000095.570:1137): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11580 comm="syz.0.2942" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6fd7979ef9 code=0x7ffc0000 [ 561.739133][T11588] SET target dimension over the limit! [ 561.810202][ T29] audit: type=1400 audit(2000000095.780:1138): avc: denied { ioctl } for pid=11573 comm="syz.2.2938" path="/dev/raw-gadget" dev="devtmpfs" ino=734 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 563.013462][T11596] netlink: 'syz.3.2945': attribute type 10 has an invalid length. [ 563.163824][T11596] netlink: 40 bytes leftover after parsing attributes in process `syz.3.2945'. [ 563.224304][T11596] batman_adv: batadv0: Adding interface: vlan1 [ 563.302910][T11596] batman_adv: batadv0: The MTU of interface vlan1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 563.483420][T11596] batman_adv: batadv0: Interface activated: vlan1 [ 563.693428][ T5705] usb 3-1: new high-speed USB device number 86 using dummy_hcd [ 563.955220][ T5705] usb 3-1: Using ep0 maxpacket: 16 [ 564.093811][ T5705] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0xA has invalid wMaxPacketSize 0 [ 564.125958][ T5705] usb 3-1: config 0 interface 0 altsetting 0 bulk endpoint 0xA has invalid maxpacket 0 [ 564.184105][ T5705] usb 3-1: config 0 interface 0 altsetting 0 has an endpoint descriptor with address 0x6B, changing to 0xB [ 564.216044][ T5705] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0xB has invalid wMaxPacketSize 0 [ 564.355100][ T5705] usb 3-1: New USB device found, idVendor=1286, idProduct=2046, bcdDevice=b4.5b [ 564.411584][ T5705] usb 3-1: New USB device strings: Mfr=1, Product=130, SerialNumber=3 [ 564.425201][T11605] xt_connbytes: Forcing CT accounting to be enabled [ 564.504780][ T5705] usb 3-1: Product: syz [ 564.509908][ T5705] usb 3-1: Manufacturer: syz [ 564.520851][ T5705] usb 3-1: SerialNumber: syz [ 564.532958][T11605] Cannot find set identified by id 0 to match [ 564.623509][ T5705] usb 3-1: config 0 descriptor?? [ 564.759292][ T5705] usb 3-1: NFC: intf ffff8880521e1000 id ffffffff8ec4a200 [ 564.923383][T11607] netlink: 8 bytes leftover after parsing attributes in process `syz.3.2952'. [ 565.155268][ T29] kauditd_printk_skb: 102 callbacks suppressed [ 565.155291][ T29] audit: type=1400 audit(2000000100.300:1241): avc: denied { read write } for pid=11288 comm="syz-executor" name="loop1" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 565.278757][ T5705] usb 3-1: USB disconnect, device number 86 [ 565.414914][ T29] audit: type=1400 audit(2000000100.360:1242): avc: denied { read write open } for pid=11288 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 565.590464][ T29] audit: type=1400 audit(2000000100.360:1243): avc: denied { ioctl } for pid=11288 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=650 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 565.864062][ T29] audit: type=1400 audit(2000000100.470:1244): avc: denied { map_create } for pid=11609 comm="syz.4.2954" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 566.105716][ T29] audit: type=1400 audit(2000000100.470:1245): avc: denied { map_read map_write } for pid=11609 comm="syz.4.2954" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 566.319078][ T29] audit: type=1400 audit(2000000100.620:1246): avc: denied { prog_load } for pid=11609 comm="syz.4.2954" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 566.477400][ T29] audit: type=1400 audit(2000000100.640:1247): avc: denied { bpf } for pid=11609 comm="syz.4.2954" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 566.678328][ T29] audit: type=1400 audit(2000000100.650:1248): avc: denied { perfmon } for pid=11609 comm="syz.4.2954" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 566.835681][ T29] audit: type=1400 audit(2000000100.670:1249): avc: denied { perfmon } for pid=11609 comm="syz.4.2954" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 567.017900][ T29] audit: type=1400 audit(2000000100.670:1250): avc: denied { perfmon } for pid=11609 comm="syz.4.2954" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 567.642154][T11622] CIFS: VFS: Malformed UNC in devname [ 568.333974][ T1271] ieee802154 phy0 wpan0: encryption failed: -22 [ 568.371217][ T1271] ieee802154 phy1 wpan1: encryption failed: -22 [ 569.538638][ T5704] usb 5-1: new high-speed USB device number 92 using dummy_hcd [ 569.908575][ T5704] usb 5-1: config 0 has an invalid interface number: 117 but max is 0 [ 569.953025][ T5704] usb 5-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 570.014758][ T5704] usb 5-1: config 0 has no interface number 0 [ 570.022758][ T5704] usb 5-1: config 0 interface 117 altsetting 0 endpoint 0x88 has invalid wMaxPacketSize 0 [ 570.091048][ T5704] usb 5-1: config 0 interface 117 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 3 [ 570.204791][ T29] kauditd_printk_skb: 94 callbacks suppressed [ 570.204816][ T29] audit: type=1400 audit(2000000105.350:1345): avc: denied { ioctl } for pid=11628 comm="syz.4.2962" path="/dev/raw-gadget" dev="devtmpfs" ino=734 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 570.318638][ T29] audit: type=1400 audit(2000000105.350:1346): avc: denied { ioctl } for pid=11628 comm="syz.4.2962" path="/dev/raw-gadget" dev="devtmpfs" ino=734 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 570.393687][ T5704] usb 5-1: New USB device found, idVendor=0afa, idProduct=03e8, bcdDevice=99.d0 [ 570.406692][ T5704] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 570.434936][ T29] audit: type=1400 audit(2000000105.370:1347): avc: denied { read write } for pid=11288 comm="syz-executor" name="loop1" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 570.436849][ T5704] usb 5-1: Product: syz [ 570.551072][ T5704] usb 5-1: Manufacturer: syz [ 570.571299][ T5704] usb 5-1: SerialNumber: syz [ 570.606980][ T29] audit: type=1400 audit(2000000105.400:1348): avc: denied { read write open } for pid=11288 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 570.688612][ T29] audit: type=1400 audit(2000000105.440:1349): avc: denied { ioctl } for pid=11628 comm="syz.4.2962" path="/dev/raw-gadget" dev="devtmpfs" ino=734 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 570.720414][ T5704] usb 5-1: config 0 descriptor?? [ 570.932336][ T29] audit: type=1400 audit(2000000105.450:1350): avc: denied { ioctl } for pid=11628 comm="syz.4.2962" path="/dev/raw-gadget" dev="devtmpfs" ino=734 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 571.145343][ T29] audit: type=1400 audit(2000000105.450:1351): avc: denied { ioctl } for pid=11628 comm="syz.4.2962" path="/dev/raw-gadget" dev="devtmpfs" ino=734 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 571.332069][ T29] audit: type=1400 audit(2000000105.510:1352): avc: denied { ioctl } for pid=11628 comm="syz.4.2962" path="/dev/raw-gadget" dev="devtmpfs" ino=734 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 571.500959][ T29] audit: type=1400 audit(2000000105.520:1353): avc: denied { ioctl } for pid=11288 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=650 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 571.679409][ T29] audit: type=1400 audit(2000000105.520:1354): avc: denied { ioctl } for pid=11628 comm="syz.4.2962" path="/dev/raw-gadget" dev="devtmpfs" ino=734 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 571.694028][T11648] syz.0.2970: attempt to access beyond end of device [ 571.694028][T11648] nbd0: rw=0, sector=0, nr_sectors = 1 limit=0 [ 571.755753][T11648] efs: cannot read volume header [ 571.956246][ T5704] usb 5-1: USB disconnect, device number 92 [ 574.450861][T11667] netdevsim netdevsim2 netdevsim0: set [1, 1] type 2 family 0 port 20000 - 0 [ 574.489175][T11667] netdevsim netdevsim2 netdevsim1: set [1, 1] type 2 family 0 port 20000 - 0 [ 574.545698][T11667] netdevsim netdevsim2 netdevsim2: set [1, 1] type 2 family 0 port 20000 - 0 [ 574.593297][T11667] netdevsim netdevsim2 netdevsim3: set [1, 1] type 2 family 0 port 20000 - 0 [ 575.329639][ T29] kauditd_printk_skb: 82 callbacks suppressed [ 575.329660][ T29] audit: type=1400 audit(2000000110.480:1437): avc: denied { create } for pid=11672 comm="syz.1.2982" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 575.478715][ T29] audit: type=1400 audit(2000000110.560:1438): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 575.590675][ T29] audit: type=1400 audit(2000000110.560:1439): avc: denied { read write } for pid=11670 comm="syz.3.2981" name="raw-gadget" dev="devtmpfs" ino=734 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 575.728706][ T29] audit: type=1400 audit(2000000110.580:1440): avc: denied { search } for pid=4656 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 575.841771][ T5704] usb 4-1: new high-speed USB device number 94 using dummy_hcd [ 575.955362][ T29] audit: type=1400 audit(2000000110.580:1441): avc: denied { append } for pid=4656 comm="syslogd" name="messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 576.122373][ T29] audit: type=1400 audit(2000000110.600:1442): avc: denied { append open } for pid=4656 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 576.158151][ T5704] usb 4-1: Using ep0 maxpacket: 16 [ 576.263699][ T5704] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x1 has an invalid bInterval 0, changing to 7 [ 576.287536][ T29] audit: type=1400 audit(2000000110.600:1443): avc: denied { getattr } for pid=4656 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 576.362973][ T5704] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x1 has invalid wMaxPacketSize 0 [ 576.485066][ T29] audit: type=1400 audit(2000000110.600:1444): avc: denied { read write open } for pid=11670 comm="syz.3.2981" path="/dev/raw-gadget" dev="devtmpfs" ino=734 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 576.624764][ T5704] usb 4-1: New USB device found, idVendor=04e6, idProduct=0001, bcdDevice= 2.00 [ 576.655180][ T29] audit: type=1400 audit(2000000110.620:1445): avc: denied { ioctl } for pid=11670 comm="syz.3.2981" path="/dev/raw-gadget" dev="devtmpfs" ino=734 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 576.703565][ T5704] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 576.739299][ T5704] usb 4-1: Product: syz [ 576.743549][ T5704] usb 4-1: Manufacturer: syz [ 576.792633][ T5704] usb 4-1: SerialNumber: syz [ 576.815985][ T29] audit: type=1400 audit(2000000110.630:1446): avc: denied { read } for pid=11671 comm="syz.4.2980" name="uinput" dev="devtmpfs" ino=837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 576.922284][ T5704] usb 4-1: config 0 descriptor?? [ 577.060934][ T5704] usb-storage 4-1:0.0: USB Mass Storage device detected [ 577.455845][ T5704] usb 4-1: USB disconnect, device number 94 [ 580.418700][ T29] kauditd_printk_skb: 86 callbacks suppressed [ 580.418720][ T29] audit: type=1400 audit(2000000115.570:1533): avc: denied { create } for pid=11703 comm="syz.4.2994" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 580.618856][ T29] audit: type=1400 audit(2000000115.700:1534): avc: denied { create } for pid=11704 comm="syz.0.2992" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 580.726691][T11709] netlink: 'syz.0.2992': attribute type 1 has an invalid length. [ 580.749794][ T29] audit: type=1400 audit(2000000115.800:1535): avc: denied { write } for pid=11704 comm="syz.0.2992" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 581.058767][ T29] audit: type=1400 audit(2000000115.870:1536): avc: denied { read write } for pid=11705 comm="syz.3.2993" name="raw-gadget" dev="devtmpfs" ino=734 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 581.275232][ T29] audit: type=1400 audit(2000000115.940:1537): avc: denied { read write open } for pid=11705 comm="syz.3.2993" path="/dev/raw-gadget" dev="devtmpfs" ino=734 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 581.348933][ T5599] usb 4-1: new high-speed USB device number 95 using dummy_hcd [ 581.485412][ T29] audit: type=1400 audit(2000000115.950:1538): avc: denied { ioctl } for pid=11705 comm="syz.3.2993" path="/dev/raw-gadget" dev="devtmpfs" ino=734 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 581.648683][ T5599] usb 4-1: config 1 has too many interfaces: 66, using maximum allowed: 32 [ 581.678485][ T5599] usb 4-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 581.732681][ T29] audit: type=1400 audit(2000000115.990:1539): avc: denied { ioctl } for pid=11705 comm="syz.3.2993" path="/dev/raw-gadget" dev="devtmpfs" ino=734 ioctlcmd=0x5501 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 581.733698][ T5599] usb 4-1: config 1 has 1 interface, different from the descriptor's value: 66 [ 581.914532][ T5599] usb 4-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 581.962290][ T29] audit: type=1400 audit(2000000116.060:1540): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 582.088564][ T5599] usb 4-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 582.103155][ T29] audit: type=1400 audit(2000000116.060:1541): avc: denied { search } for pid=4656 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 582.199229][ T5599] usb 4-1: New USB device found, idVendor=7d25, idProduct=a415, bcdDevice= 0.40 [ 582.264405][ T5599] usb 4-1: New USB device strings: Mfr=1, Product=4, SerialNumber=0 [ 582.306773][ T5599] usb 4-1: Product: syz [ 582.311000][ T5599] usb 4-1: Manufacturer: syz [ 582.322768][ T29] audit: type=1400 audit(2000000116.140:1542): avc: denied { ioctl } for pid=11705 comm="syz.3.2993" path="/dev/raw-gadget" dev="devtmpfs" ino=734 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 582.542342][ T5599] cdc_wdm 4-1:1.0: skipping garbage [ 582.560659][ T5599] cdc_wdm 4-1:1.0: skipping garbage [ 582.722604][ T5599] cdc_wdm 4-1:1.0: cdc-wdm0: USB WDM device [ 582.806280][ T5599] cdc_wdm 4-1:1.0: Unknown control protocol [ 583.203844][ T5704] usb 4-1: USB disconnect, device number 95 [ 583.295682][ T5705] usb 1-1: new full-speed USB device number 89 using dummy_hcd [ 583.724537][ T5705] usb 1-1: New USB device found, idVendor=09c0, idProduct=0203, bcdDevice=d3.32 [ 583.774906][ T5705] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 583.848119][ T5705] usb 1-1: config 0 descriptor?? [ 583.972057][ T5705] dvb-usb: found a 'Genpix SkyWalker-1 DVB-S receiver' in warm state. [ 584.641360][ T5705] gp8psk: usb in 128 operation failed. [ 584.673610][ T5705] gp8psk: usb in 137 operation failed. [ 584.725231][ T5705] dvb-usb: This USB2.0 device cannot be run on a USB1.1 port. (it lacks a hardware PID filter) [ 584.883317][ T5705] dvb-usb: Genpix SkyWalker-1 DVB-S receiver error while loading driver (-19) [ 585.163922][ T5705] usb 1-1: USB disconnect, device number 89 [ 585.255638][ T9] usb 3-1: new high-speed USB device number 87 using dummy_hcd [ 585.484174][ T29] kauditd_printk_skb: 119 callbacks suppressed [ 585.484200][ T29] audit: type=1400 audit(2000000120.630:1662): avc: denied { ioctl } for pid=11726 comm="syz.2.3003" path="/dev/raw-gadget" dev="devtmpfs" ino=734 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 585.594426][ T9] usb 3-1: Using ep0 maxpacket: 16 [ 585.618484][ T29] audit: type=1400 audit(2000000120.760:1663): avc: denied { ioctl } for pid=11726 comm="syz.2.3003" path="/dev/raw-gadget" dev="devtmpfs" ino=734 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 585.898018][ T29] audit: type=1400 audit(2000000120.770:1664): avc: denied { ioctl } for pid=11726 comm="syz.2.3003" path="/dev/raw-gadget" dev="devtmpfs" ino=734 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 585.969177][ T9] usb 3-1: New USB device found, idVendor=0c72, idProduct=000c, bcdDevice=f6.59 [ 586.055675][ T9] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 586.099625][ T9] usb 3-1: Product: syz [ 586.103851][ T9] usb 3-1: Manufacturer: syz [ 586.173706][ T29] audit: type=1400 audit(2000000120.770:1665): avc: denied { ioctl } for pid=11726 comm="syz.2.3003" path="/dev/raw-gadget" dev="devtmpfs" ino=734 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 586.196029][ T9] usb 3-1: SerialNumber: syz [ 586.373989][ T9] usb 3-1: config 0 descriptor?? [ 586.419490][ T29] audit: type=1400 audit(2000000120.890:1666): avc: denied { ioctl } for pid=11726 comm="syz.2.3003" path="/dev/raw-gadget" dev="devtmpfs" ino=734 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 586.610551][ T9] peak_usb 3-1:0.0 can0: sending cmd f=0x6 n=0x1 failure: -22 [ 586.639351][ T9] peak_usb 3-1:0.0: unable to read PCAN-USB serial number (err -22) [ 586.705846][ T29] audit: type=1400 audit(2000000120.930:1667): avc: denied { ioctl } for pid=11726 comm="syz.2.3003" path="/dev/raw-gadget" dev="devtmpfs" ino=734 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 586.935716][ T29] audit: type=1400 audit(2000000120.950:1668): avc: denied { ioctl } for pid=11726 comm="syz.2.3003" path="/dev/raw-gadget" dev="devtmpfs" ino=734 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 587.074131][ T9] peak_usb 3-1:0.0: probe with driver peak_usb failed with error -22 [ 587.083352][ T29] audit: type=1400 audit(2000000120.950:1669): avc: denied { ioctl } for pid=11726 comm="syz.2.3003" path="/dev/raw-gadget" dev="devtmpfs" ino=734 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 587.083439][ T29] audit: type=1400 audit(2000000120.970:1670): avc: denied { read write } for pid=5480 comm="syz-executor" name="loop4" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 587.083539][ T29] audit: type=1400 audit(2000000120.970:1671): avc: denied { read write open } for pid=5480 comm="syz-executor" path="/dev/loop4" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 587.555844][ T9] usb 3-1: USB disconnect, device number 87 [ 590.731034][ T29] kauditd_printk_skb: 89 callbacks suppressed [ 590.731058][ T29] audit: type=1400 audit(2000000125.880:1761): avc: denied { read write } for pid=11758 comm="syz.4.3016" name="raw-gadget" dev="devtmpfs" ino=734 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 590.783921][ T29] audit: type=1400 audit(2000000125.900:1762): avc: denied { read write open } for pid=11758 comm="syz.4.3016" path="/dev/raw-gadget" dev="devtmpfs" ino=734 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 590.935466][ T29] audit: type=1400 audit(2000000125.930:1763): avc: denied { ioctl } for pid=11758 comm="syz.4.3016" path="/dev/raw-gadget" dev="devtmpfs" ino=734 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 591.114465][ T9] usb 5-1: new low-speed USB device number 93 using dummy_hcd [ 591.185733][ T29] audit: type=1400 audit(2000000125.930:1764): avc: denied { ioctl } for pid=11758 comm="syz.4.3016" path="/dev/raw-gadget" dev="devtmpfs" ino=734 ioctlcmd=0x5501 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 591.210719][ C1] vkms_vblank_simulate: vblank timer overrun [ 591.434700][ T29] audit: type=1400 audit(2000000126.040:1765): avc: denied { read } for pid=11760 comm="syz.0.3017" name="card1" dev="devtmpfs" ino=630 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 591.524894][ T9] usb 5-1: config index 0 descriptor too short (expected 1307, got 27) [ 591.615212][ T9] usb 5-1: config 0 has an invalid interface number: 0 but max is -1 [ 591.705426][ T9] usb 5-1: config 0 has 1 interface, different from the descriptor's value: 0 [ 591.705715][ T29] audit: type=1400 audit(2000000126.040:1766): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 591.736695][ C1] vkms_vblank_simulate: vblank timer overrun [ 591.741799][ T9] usb 5-1: too many endpoints for config 0 interface 0 altsetting 0: 246, using maximum allowed: 30 [ 591.741869][ T9] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x84 is Bulk; changing to Interrupt [ 591.741907][ T9] usb 5-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 246 [ 592.071324][ T9] usb 5-1: string descriptor 0 read error: -22 [ 592.114909][ T29] audit: type=1400 audit(2000000126.040:1767): avc: denied { read open } for pid=11760 comm="syz.0.3017" path="/dev/dri/card1" dev="devtmpfs" ino=630 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 592.139155][ C1] vkms_vblank_simulate: vblank timer overrun [ 592.143303][ T9] usb 5-1: New USB device found, idVendor=0460, idProduct=0008, bcdDevice=e2.de [ 592.143351][ T9] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 592.220264][ T29] audit: type=1400 audit(2000000126.040:1768): avc: denied { search } for pid=4656 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 592.292379][ T9] usb 5-1: config 0 descriptor?? [ 592.310052][T11759] raw-gadget.0 gadget.4: fail, usb_ep_enable returned -22 [ 592.380180][ T9] hub 5-1:0.0: bad descriptor, ignoring hub [ 592.412573][ T29] audit: type=1400 audit(2000000126.050:1769): avc: denied { read write } for pid=11288 comm="syz-executor" name="loop1" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 592.435697][ T9] hub 5-1:0.0: probe with driver hub failed with error -5 [ 592.436884][ C1] vkms_vblank_simulate: vblank timer overrun [ 592.561973][ T9] input: USB Acecad 302 Tablet 0460:0008 as /devices/platform/dummy_hcd.4/usb5/5-1/5-1:0.0/input/input33 [ 592.724045][ T29] audit: type=1400 audit(2000000126.050:1770): avc: denied { read write open } for pid=11288 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 593.010460][ T9] usb 5-1: USB disconnect, device number 93 [ 593.010534][ C0] usb_acecad 5-1:0.0: can't resubmit intr, dummy_hcd.4-1/input0, status -19 [ 595.544601][ T5703] usb 1-1: new high-speed USB device number 90 using dummy_hcd [ 595.751521][ T29] kauditd_printk_skb: 105 callbacks suppressed [ 595.751545][ T29] audit: type=1400 audit(2000000130.890:1876): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 595.833730][T11786] netlink: 'syz.4.3028': attribute type 3 has an invalid length. [ 595.838299][ T5703] usb 1-1: Using ep0 maxpacket: 32 [ 596.004263][T11786] netlink: 130984 bytes leftover after parsing attributes in process `syz.4.3028'. [ 596.011893][ T29] audit: type=1400 audit(2000000130.890:1877): avc: denied { search } for pid=4656 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 596.209904][ T5703] usb 1-1: New USB device found, idVendor=0ccd, idProduct=0080, bcdDevice=67.fe [ 596.221440][ T29] audit: type=1400 audit(2000000130.890:1878): avc: denied { append } for pid=4656 comm="syslogd" name="messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 596.221547][ T29] audit: type=1400 audit(2000000130.980:1879): avc: denied { write } for pid=11785 comm="syz.4.3028" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 596.221627][ T29] audit: type=1400 audit(2000000131.050:1880): avc: denied { append open } for pid=4656 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 596.221713][ T29] audit: type=1400 audit(2000000131.050:1881): avc: denied { getattr } for pid=4656 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 596.221803][ T29] audit: type=1400 audit(2000000131.060:1882): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 596.221885][ T29] audit: type=1400 audit(2000000131.060:1883): avc: denied { search } for pid=4656 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 596.221967][ T29] audit: type=1400 audit(2000000131.080:1884): avc: denied { ioctl } for pid=11780 comm="syz.0.3026" path="/dev/raw-gadget" dev="devtmpfs" ino=734 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 596.222054][ T29] audit: type=1400 audit(2000000131.080:1885): avc: denied { read write } for pid=5860 comm="syz-executor" name="loop2" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 596.952700][ T5703] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 597.066301][ T5703] usb 1-1: Product: syz [ 597.070534][ T5703] usb 1-1: Manufacturer: syz [ 597.140323][ T5703] usb 1-1: SerialNumber: syz [ 597.188685][ T5703] usb 1-1: config 0 descriptor?? [ 597.504830][ T9] usb 4-1: new high-speed USB device number 96 using dummy_hcd [ 597.760831][ T9] usb 4-1: Using ep0 maxpacket: 32 [ 597.815882][ T5703] snd-usb-6fire 1-1:0.0: unknown device firmware state received from device: [ 597.875679][ T5703] 00 00 00 00 00 00 00 00 [ 597.880304][ T5703] snd-usb-6fire 1-1:0.0: probe with driver snd-usb-6fire failed with error -5 [ 598.101026][ T5703] usb 1-1: USB disconnect, device number 90 [ 598.244023][ T9] usb 4-1: New USB device found, idVendor=0ccd, idProduct=0080, bcdDevice=67.fe [ 598.386756][ T9] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 598.394844][ T9] usb 4-1: Product: syz [ 598.445390][ T9] usb 4-1: Manufacturer: syz [ 598.477716][ T9] usb 4-1: SerialNumber: syz [ 598.582548][ T9] usb 4-1: config 0 descriptor?? [ 599.125316][ T9] snd-usb-6fire 4-1:0.0: unknown device firmware state received from device: [ 599.197406][ T9] eb 9a 47 80 9b f8 7a f0 [ 599.225359][ T9] snd-usb-6fire 4-1:0.0: probe with driver snd-usb-6fire failed with error -5 [ 599.711624][ T5703] usb 4-1: USB disconnect, device number 96 [ 600.820493][ T29] kauditd_printk_skb: 97 callbacks suppressed [ 600.820514][ T29] audit: type=1400 audit(2000000135.970:1983): avc: denied { create } for pid=11803 comm="syz.1.3037" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 600.994553][ T29] audit: type=1400 audit(2000000136.020:1984): avc: denied { read write } for pid=5471 comm="syz-executor" name="loop3" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 601.101939][T11807] vlan0: entered promiscuous mode [ 601.135627][ T29] audit: type=1400 audit(2000000136.020:1985): avc: denied { read write open } for pid=5471 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 601.380420][ T29] audit: type=1400 audit(2000000136.060:1986): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 601.544228][ T29] audit: type=1400 audit(2000000136.060:1987): avc: denied { search } for pid=4656 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 601.740051][ T29] audit: type=1400 audit(2000000136.080:1988): avc: denied { ioctl } for pid=5471 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=652 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 601.939187][T11814] netlink: 4 bytes leftover after parsing attributes in process `syz.2.3039'. [ 601.963425][ T29] audit: type=1400 audit(2000000136.110:1989): avc: denied { append } for pid=4656 comm="syslogd" name="messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 602.067880][ T29] audit: type=1400 audit(2000000136.110:1990): avc: denied { append open } for pid=4656 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 602.300344][ T29] audit: type=1400 audit(2000000136.110:1991): avc: denied { getattr } for pid=4656 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 602.538489][ T29] audit: type=1400 audit(2000000136.530:1992): avc: denied { module_request } for pid=11808 comm="syz.4.3038" kmod="fs-" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 603.318079][ T942] usb 4-1: new high-speed USB device number 97 using dummy_hcd [ 603.592641][ T942] usb 4-1: Using ep0 maxpacket: 32 [ 603.639490][ T942] usb 4-1: config 4 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 603.728477][ T942] usb 4-1: config 4 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 603.773459][ T942] usb 4-1: New USB device found, idVendor=046d, idProduct=c314, bcdDevice= 0.40 [ 603.838916][ T942] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 604.041004][T11826] netlink: 'syz.2.3045': attribute type 4 has an invalid length. [ 604.059824][ T942] hub 4-1:4.0: USB hub found [ 604.379886][ T942] hub 4-1:4.0: 2 ports detected [ 604.420696][ T942] usb 4-1: selecting invalid altsetting 1 [ 604.435973][ T942] hub 4-1:4.0: Using single TT (err -22) [ 604.597807][ T942] hub 4-1:4.0: hub_hub_status failed (err = -71) [ 604.604907][ T942] hub 4-1:4.0: config failed, can't get hub status (err -71) [ 604.717738][T11832] ntfs3: loop4: try to read out of volume at offset 0x0 [ 604.900429][ T942] usb 4-1: USB disconnect, device number 97 [ 605.845691][ T29] kauditd_printk_skb: 94 callbacks suppressed [ 605.845713][ T29] audit: type=1400 audit(2000000140.970:2087): avc: denied { read write } for pid=5471 comm="syz-executor" name="loop3" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 605.968681][ T29] audit: type=1400 audit(2000000140.980:2088): avc: denied { read write open } for pid=5471 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 606.127000][ T29] audit: type=1400 audit(2000000140.980:2089): avc: denied { ioctl } for pid=5471 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=652 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 606.310146][ T29] audit: type=1400 audit(2000000141.110:2090): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 606.498876][ T29] audit: type=1400 audit(2000000141.110:2091): avc: denied { search } for pid=4656 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 606.654994][ T29] audit: type=1400 audit(2000000141.110:2092): avc: denied { append } for pid=4656 comm="syslogd" name="messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 606.855201][ T29] audit: type=1400 audit(2000000141.110:2093): avc: denied { append open } for pid=4656 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 606.991316][ T29] audit: type=1400 audit(2000000141.200:2094): avc: denied { getattr } for pid=4656 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 607.205138][ T29] audit: type=1400 audit(2000000141.480:2095): avc: denied { prog_load } for pid=11839 comm="syz.0.3052" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 607.336190][ T29] audit: type=1400 audit(2000000141.490:2096): avc: denied { bpf } for pid=11839 comm="syz.0.3052" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 607.802954][T11853] tmpfs: Bad value for 'usrquota_block_hardlimit' [ 610.100880][T11874] netlink: 8 bytes leftover after parsing attributes in process `syz.1.3065'. [ 610.159458][T11874] netlink: 8 bytes leftover after parsing attributes in process `syz.1.3065'. [ 610.881476][ T29] kauditd_printk_skb: 105 callbacks suppressed [ 610.881498][ T29] audit: type=1400 audit(2000000146.030:2202): avc: denied { create } for pid=11878 comm="syz.0.3068" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 611.059043][ T29] audit: type=1400 audit(2000000146.090:2203): avc: denied { ioctl } for pid=11877 comm="syz.3.3067" path="/dev/uinput" dev="devtmpfs" ino=837 ioctlcmd=0x55ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 611.166973][ T29] audit: type=1400 audit(2000000146.120:2204): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 611.354555][ T29] audit: type=1400 audit(2000000146.130:2205): avc: denied { search } for pid=4656 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 611.486304][ T29] audit: type=1400 audit(2000000146.130:2206): avc: denied { append } for pid=4656 comm="syslogd" name="messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 611.508761][ C1] vkms_vblank_simulate: vblank timer overrun [ 611.618220][ T29] audit: type=1400 audit(2000000146.130:2207): avc: denied { append open } for pid=4656 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 611.641448][ C1] vkms_vblank_simulate: vblank timer overrun [ 611.841713][ T29] audit: type=1400 audit(2000000146.150:2209): avc: denied { write } for pid=11878 comm="syz.0.3068" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 611.979318][ T29] audit: type=1400 audit(2000000146.130:2208): avc: denied { getattr } for pid=4656 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 612.144636][ T29] audit: type=1400 audit(2000000146.570:2210): avc: denied { read write } for pid=5471 comm="syz-executor" name="loop3" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 612.275651][ T29] audit: type=1400 audit(2000000146.570:2211): avc: denied { read write open } for pid=5471 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 614.599903][T11912] netlink: 'syz.0.3083': attribute type 4 has an invalid length. [ 614.708929][T11912] netlink: 128124 bytes leftover after parsing attributes in process `syz.0.3083'. [ 615.989526][ T29] kauditd_printk_skb: 96 callbacks suppressed [ 615.989549][ T29] audit: type=1400 audit(2000000151.050:2308): avc: denied { read write } for pid=11288 comm="syz-executor" name="loop1" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 616.135657][ T29] audit: type=1400 audit(2000000151.130:2309): avc: denied { read write open } for pid=11288 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 616.325615][ T29] audit: type=1400 audit(2000000151.130:2310): avc: denied { ioctl } for pid=11288 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=650 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 616.483849][ T29] audit: type=1400 audit(2000000151.150:2311): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 616.625658][ T29] audit: type=1400 audit(2000000151.220:2312): avc: denied { search } for pid=4656 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 616.672693][ T29] audit: type=1400 audit(2000000151.220:2313): avc: denied { append } for pid=4656 comm="syslogd" name="messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 616.815397][ T29] audit: type=1400 audit(2000000151.220:2314): avc: denied { append open } for pid=4656 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 616.975613][ T29] audit: type=1400 audit(2000000151.220:2315): avc: denied { getattr } for pid=4656 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 617.032749][ T29] audit: type=1400 audit(2000000151.240:2316): avc: denied { read write } for pid=5471 comm="syz-executor" name="loop3" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 617.095624][ T29] audit: type=1400 audit(2000000151.240:2317): avc: denied { read write open } for pid=5471 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 618.844268][T11947] kernel profiling enabled (shift: 17) [ 621.038132][ T29] kauditd_printk_skb: 113 callbacks suppressed [ 621.038153][ T29] audit: type=1400 audit(2000000156.190:2431): avc: denied { ioctl } for pid=11966 comm="syz.3.3107" path="socket:[30219]" dev="sockfs" ino=30219 ioctlcmd=0x8991 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 621.118353][T11968] bond0: (slave bond_slave_1): Releasing backup interface [ 621.218454][ T29] audit: type=1400 audit(2000000156.320:2432): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 621.424371][ T29] audit: type=1400 audit(2000000156.350:2433): avc: denied { search } for pid=4656 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 621.538838][T11975] netlink: 'syz.2.3109': attribute type 4 has an invalid length. [ 621.558572][ T29] audit: type=1400 audit(2000000156.360:2434): avc: denied { append } for pid=4656 comm="syslogd" name="messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 621.696403][ T29] audit: type=1400 audit(2000000156.360:2435): avc: denied { create } for pid=11970 comm="syz.4.3111" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 621.859255][ T29] audit: type=1400 audit(2000000156.370:2436): avc: denied { append open } for pid=4656 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 622.031950][ T29] audit: type=1400 audit(2000000156.380:2437): avc: denied { read write } for pid=5470 comm="syz-executor" name="loop0" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 622.204959][ T29] audit: type=1400 audit(2000000156.380:2438): avc: denied { read write open } for pid=5470 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 622.350575][ T29] audit: type=1400 audit(2000000156.390:2439): avc: denied { ioctl } for pid=5470 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=649 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 622.473982][ T29] audit: type=1400 audit(2000000156.390:2440): avc: denied { getattr } for pid=4656 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 622.577631][T11980] autofs4:pid:11980:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1.1000000), cmd(0xc0189378) [ 622.694298][T11980] autofs4:pid:11980:validate_dev_ioctl: invalid device control module version supplied for cmd(0xc0189378) [ 622.722463][T11982] tmpfs: Bad value for 'mpol' [ 626.293035][ T29] kauditd_printk_skb: 84 callbacks suppressed [ 626.293057][ T29] audit: type=1400 audit(2000000161.440:2525): avc: denied { create } for pid=12016 comm="syz.0.3127" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 626.379710][ T29] audit: type=1400 audit(2000000161.460:2526): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 626.401740][ C1] vkms_vblank_simulate: vblank timer overrun [ 626.548526][ T29] audit: type=1400 audit(2000000161.460:2527): avc: denied { search } for pid=4656 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 626.570281][ C1] vkms_vblank_simulate: vblank timer overrun [ 626.761389][ T29] audit: type=1400 audit(2000000161.490:2528): avc: denied { append } for pid=4656 comm="syslogd" name="messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 626.875474][ T29] audit: type=1400 audit(2000000161.490:2529): avc: denied { append open } for pid=4656 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 627.100358][ T29] audit: type=1400 audit(2000000161.490:2530): avc: denied { getattr } for pid=4656 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 627.258793][ T29] audit: type=1400 audit(2000000161.500:2531): avc: denied { create } for pid=12015 comm="syz.4.3129" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 627.374098][ T29] audit: type=1400 audit(2000000161.530:2532): avc: denied { write } for pid=12015 comm="syz.4.3129" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 627.525514][ T29] audit: type=1400 audit(2000000161.600:2533): avc: denied { read write } for pid=5860 comm="syz-executor" name="loop2" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 627.653245][ T29] audit: type=1400 audit(2000000161.630:2534): avc: denied { read write open } for pid=5860 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 627.841958][T12029] netlink: 'syz.4.3132': attribute type 6 has an invalid length. [ 628.109146][T12034] hpfs: Bad magic ... probably not HPFS [ 629.636995][T12044] ISOFS: Unable to identify CD-ROM format. [ 629.777675][ T1271] ieee802154 phy0 wpan0: encryption failed: -22 [ 629.784078][ T1271] ieee802154 phy1 wpan1: encryption failed: -22 [ 631.327133][ T29] kauditd_printk_skb: 95 callbacks suppressed [ 631.327153][ T29] audit: type=1400 audit(2000000166.480:2630): avc: denied { read } for pid=12055 comm="syz.2.3147" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 631.371054][T12060] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 631.475614][ T29] audit: type=1400 audit(2000000166.520:2631): avc: denied { write } for pid=12055 comm="syz.2.3147" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 631.535322][ T29] audit: type=1400 audit(2000000166.520:2632): avc: denied { read } for pid=12055 comm="syz.2.3147" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 631.575000][ T29] audit: type=1400 audit(2000000166.580:2633): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 631.664161][ T29] audit: type=1400 audit(2000000166.590:2634): avc: denied { search } for pid=4656 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 631.765254][ T29] audit: type=1400 audit(2000000166.590:2635): avc: denied { append } for pid=4656 comm="syslogd" name="messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 631.930386][ T29] audit: type=1400 audit(2000000166.600:2636): avc: denied { read write } for pid=11288 comm="syz-executor" name="loop1" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 632.041533][T12052] infiniband syz1: set down [ 632.056597][ T29] audit: type=1400 audit(2000000166.600:2637): avc: denied { read write open } for pid=11288 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 632.138915][T12052] infiniband syz1: added ipvlan1 [ 632.145130][T12052] syz1: rxe_create_cq: returned err = -12 [ 632.200678][T12052] infiniband syz1: Couldn't create ib_mad CQ [ 632.213643][T12052] infiniband syz1: Couldn't open port 1 [ 632.229670][ T29] audit: type=1400 audit(2000000166.650:2638): avc: denied { append open } for pid=4656 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 632.387855][ T29] audit: type=1400 audit(2000000166.650:2639): avc: denied { getattr } for pid=4656 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 632.512621][T12052] RDS/IB: syz1: added [ 632.517461][T12052] smc: adding ib device syz1 with port count 1 [ 632.523662][T12052] smc: ib device syz1 port 1 has pnetid [ 636.068764][T12095] netlink: 'syz.4.3161': attribute type 5 has an invalid length. [ 636.639080][ T29] kauditd_printk_skb: 87 callbacks suppressed [ 636.639102][ T29] audit: type=1400 audit(2000000171.790:2727): avc: denied { prog_load } for pid=12097 comm="syz.2.3164" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 636.758263][ T29] audit: type=1400 audit(2000000171.790:2728): avc: denied { bpf } for pid=12097 comm="syz.2.3164" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 636.905603][ T29] audit: type=1400 audit(2000000171.790:2729): avc: denied { perfmon } for pid=12097 comm="syz.2.3164" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 637.102408][ T29] audit: type=1400 audit(2000000171.790:2730): avc: denied { perfmon } for pid=12097 comm="syz.2.3164" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 637.175621][ T29] audit: type=1400 audit(2000000171.830:2731): avc: denied { perfmon } for pid=12097 comm="syz.2.3164" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 637.309140][ T29] audit: type=1400 audit(2000000171.850:2732): avc: denied { perfmon } for pid=12097 comm="syz.2.3164" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 637.431998][ T29] audit: type=1400 audit(2000000171.850:2733): avc: denied { bpf } for pid=12097 comm="syz.2.3164" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 637.596039][ T29] audit: type=1400 audit(2000000171.870:2734): avc: denied { bpf } for pid=12097 comm="syz.2.3164" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 637.729465][ T29] audit: type=1400 audit(2000000171.880:2735): avc: denied { prog_run } for pid=12097 comm="syz.2.3164" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 637.832352][ T29] audit: type=1400 audit(2000000172.100:2736): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 638.018384][T12107] bridge0: port 3(veth0_to_bridge) entered blocking state [ 638.149809][T12107] bridge0: port 3(veth0_to_bridge) entered disabled state [ 638.300240][T12107] veth0_to_bridge: entered allmulticast mode [ 638.376944][T12107] veth0_to_bridge: entered promiscuous mode [ 638.383118][T12107] bridge0: adding interface veth0_to_bridge with same address as a received packet (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 638.494243][T12107] bridge0: port 3(veth0_to_bridge) entered blocking state [ 638.501612][T12107] bridge0: port 3(veth0_to_bridge) entered forwarding state [ 641.687437][ T29] kauditd_printk_skb: 71 callbacks suppressed [ 641.687460][ T29] audit: type=1400 audit(2000000176.830:2808): avc: denied { ioctl } for pid=5480 comm="syz-executor" path="/dev/loop4" dev="devtmpfs" ino=653 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 641.843941][ T29] audit: type=1400 audit(2000000176.903:2809): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 642.004930][ T29] audit: type=1400 audit(2000000176.903:2810): avc: denied { search } for pid=4656 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 642.211343][ T29] audit: type=1400 audit(2000000176.953:2811): avc: denied { append } for pid=4656 comm="syslogd" name="messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 642.369315][ T29] audit: type=1400 audit(2000000176.953:2812): avc: denied { append open } for pid=4656 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 642.591852][ T29] audit: type=1400 audit(2000000176.953:2813): avc: denied { getattr } for pid=4656 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 642.785859][ T29] audit: type=1400 audit(2000000177.116:2814): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 643.121362][T11298] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1 [ 643.173243][T11298] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9 [ 643.212229][T11298] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9 [ 643.235769][ T29] audit: type=1400 audit(2000000177.116:2815): avc: denied { search } for pid=4656 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 643.378946][T11298] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4 [ 643.407002][ T29] audit: type=1400 audit(2000000177.116:2816): avc: denied { append } for pid=4656 comm="syslogd" name="messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 643.407275][T11298] Bluetooth: hci6: unexpected cc 0x0c25 length: 249 > 3 [ 643.467018][T11298] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2 [ 643.542051][ T29] audit: type=1400 audit(2000000177.167:2817): avc: denied { append open } for pid=4656 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 643.936618][ T942] usb 3-1: new high-speed USB device number 88 using dummy_hcd [ 644.197596][ T942] usb 3-1: Using ep0 maxpacket: 8 [ 644.235051][ T942] usb 3-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 644.323676][ T942] usb 3-1: config 1 has 2 interfaces, different from the descriptor's value: 3 [ 644.402916][ T942] usb 3-1: config 1 has no interface number 1 [ 644.433040][ T942] usb 3-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 644.582459][ T942] usb 3-1: config 1 interface 2 altsetting 1 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 644.695639][ T942] usb 3-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 644.804224][ T942] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 644.898200][ T942] usb 3-1: Product: syz [ 644.902426][ T942] usb 3-1: Manufacturer: syz [ 644.907048][ T942] usb 3-1: SerialNumber: syz [ 645.455872][ T942] usb 3-1: 2:1 : no or invalid class specific endpoint descriptor [ 645.464365][ T942] usb 3-1: 2:1 : unsupported format bits 0x80 [ 645.660506][ T5431] Bluetooth: hci6: command tx timeout [ 645.950516][ T942] usb 3-1: USB disconnect, device number 88 [ 646.679841][ T29] kauditd_printk_skb: 90 callbacks suppressed [ 646.679862][ T29] audit: type=1400 audit(2000000181.966:2908): avc: denied { read write } for pid=5860 comm="syz-executor" name="loop2" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 646.974861][ T29] audit: type=1400 audit(2000000182.058:2909): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 647.070530][ T5431] Bluetooth: hci4: command 0x0406 tx timeout [ 647.215385][ T29] audit: type=1400 audit(2000000182.068:2910): avc: denied { search } for pid=4656 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 647.414108][ T29] audit: type=1400 audit(2000000182.068:2911): avc: denied { append } for pid=4656 comm="syslogd" name="messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 647.689757][T11298] Bluetooth: hci6: command tx timeout [ 647.690241][ T29] audit: type=1400 audit(2000000182.068:2912): avc: denied { append open } for pid=4656 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 648.098887][ T29] audit: type=1400 audit(2000000182.099:2913): avc: denied { read write open } for pid=5860 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 648.362686][ T29] audit: type=1400 audit(2000000182.099:2914): avc: denied { ioctl } for pid=5860 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=651 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 648.610487][ T29] audit: type=1400 audit(2000000182.150:2915): avc: denied { read write } for pid=11288 comm="syz-executor" name="loop1" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 648.704563][T12142] udevd[12142]: error opening ATTR{/sys/devices/platform/dummy_hcd.2/usb3/3-1/3-1:1.0/sound/card3/controlC3/../uevent} for writing: No such file or directory [ 648.848297][ T29] audit: type=1400 audit(2000000182.150:2916): avc: denied { read write open } for pid=11288 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 648.992763][ T29] audit: type=1400 audit(2000000182.150:2917): avc: denied { ioctl } for pid=11288 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=650 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 649.718633][T11298] Bluetooth: hci6: command tx timeout [ 649.939904][ T2552] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 650.627893][T12180] (unnamed net_device) (uninitialized): option ad_user_port_key: mode dependency failed, not supported in mode active-backup(1) [ 651.020635][ T2552] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 651.501597][T12186] xt_l2tp: invalid flags combination: 8 [ 651.669080][ T29] kauditd_printk_skb: 66 callbacks suppressed [ 651.669101][ T29] audit: type=1400 audit(2000000187.055:2984): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 651.775082][T11298] Bluetooth: hci6: command tx timeout [ 651.897008][ T29] audit: type=1400 audit(2000000187.066:2985): avc: denied { read write } for pid=5471 comm="syz-executor" name="loop3" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 651.961463][ T2552] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 652.054241][ T29] audit: type=1400 audit(2000000187.116:2986): avc: denied { search } for pid=4656 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 652.144078][ T29] audit: type=1400 audit(2000000187.116:2987): avc: denied { read write open } for pid=5471 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 652.169166][ C0] vkms_vblank_simulate: vblank timer overrun [ 652.263628][ T29] audit: type=1400 audit(2000000187.137:2988): avc: denied { ioctl } for pid=5471 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=652 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 652.289207][ C0] vkms_vblank_simulate: vblank timer overrun [ 652.405370][ T2552] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 652.441056][ T29] audit: type=1400 audit(2000000187.167:2989): avc: denied { append } for pid=4656 comm="syslogd" name="messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 652.463400][ C0] vkms_vblank_simulate: vblank timer overrun [ 652.580774][ T5705] usb 5-1: new high-speed USB device number 94 using dummy_hcd [ 652.592065][ T29] audit: type=1400 audit(2000000187.177:2990): avc: denied { append open } for pid=4656 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 652.615273][ C0] vkms_vblank_simulate: vblank timer overrun [ 652.681795][ T29] audit: type=1400 audit(2000000187.177:2991): avc: denied { getattr } for pid=4656 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 652.817093][ T5705] usb 5-1: Using ep0 maxpacket: 8 [ 652.882174][ T5705] usb 5-1: config 135 has an invalid interface number: 230 but max is 0 [ 652.883280][ T29] audit: type=1400 audit(2000000187.177:2992): avc: denied { read write } for pid=11288 comm="syz-executor" name="loop1" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 652.931163][ T5705] usb 5-1: config 135 has an invalid descriptor of length 0, skipping remainder of the config [ 653.034562][ T5705] usb 5-1: config 135 has no interface number 0 [ 653.065133][ T29] audit: type=1400 audit(2000000187.187:2993): avc: denied { read write open } for pid=11288 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 653.090275][ C0] vkms_vblank_simulate: vblank timer overrun [ 653.097214][ T5705] usb 5-1: too many endpoints for config 135 interface 230 altsetting 126: 53, using maximum allowed: 30 [ 653.097280][ T5705] usb 5-1: config 135 interface 230 altsetting 126 has 0 endpoint descriptors, different from the interface descriptor's value: 53 [ 653.097325][ T5705] usb 5-1: config 135 interface 230 has no altsetting 0 [ 653.287232][ T5705] usb 5-1: New USB device found, idVendor=18ec, idProduct=3288, bcdDevice=3f.3a [ 653.330399][ T5705] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 653.402078][ T5705] usb 5-1: Product: syz [ 653.413660][ T5705] usb 5-1: Manufacturer: syz [ 653.448037][ T5705] usb 5-1: SerialNumber: syz [ 654.099316][ T5705] usb 5-1: Found UVC 0.00 device syz (18ec:3288) [ 654.130428][ T5705] usb 5-1: No valid video chain found. [ 654.683107][ T2552] bridge_slave_0: left allmulticast mode [ 654.719774][ T9] usb 5-1: USB disconnect, device number 94 [ 654.878162][ T2552] bridge_slave_0: left promiscuous mode [ 654.917545][ T2552] bridge0: port 1(bridge_slave_0) entered disabled state [ 656.614255][ T29] kauditd_printk_skb: 90 callbacks suppressed [ 656.614278][ T29] audit: type=1400 audit(2000000192.077:3084): avc: denied { ioctl } for pid=5860 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=651 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 656.645930][ C0] vkms_vblank_simulate: vblank timer overrun [ 656.902380][ T29] audit: type=1400 audit(2000000192.168:3085): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 657.114911][ T29] audit: type=1400 audit(2000000192.249:3086): avc: denied { search } for pid=4656 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 657.243658][ T29] audit: type=1400 audit(2000000192.249:3087): avc: denied { append } for pid=4656 comm="syslogd" name="messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 657.411825][ T29] audit: type=1400 audit(2000000192.330:3088): avc: denied { append open } for pid=4656 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 657.529913][ T29] audit: type=1400 audit(2000000192.390:3089): avc: denied { getattr } for pid=4656 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 657.577895][ T29] audit: type=1400 audit(2000000192.532:3090): avc: denied { read write } for pid=5471 comm="syz-executor" name="loop3" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 657.763379][ T29] audit: type=1400 audit(2000000192.572:3091): avc: denied { read write open } for pid=5471 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 657.925259][ T29] audit: type=1400 audit(2000000192.572:3092): avc: denied { ioctl } for pid=5471 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=652 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 658.059604][ T29] audit: type=1400 audit(2000000192.704:3093): avc: denied { read write } for pid=11288 comm="syz-executor" name="loop1" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 658.479987][ T2552] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 658.519209][ T2552] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 658.556684][ T2552] bond0 (unregistering): Released all slaves [ 658.842737][T12225] netlink: 'syz.1.3212': attribute type 21 has an invalid length. [ 658.906836][T12225] netlink: 'syz.1.3212': attribute type 1 has an invalid length. [ 659.009466][T12135] chnl_net:caif_netlink_parms(): no params data found [ 660.183643][T12234] netlink: 'syz.4.3216': attribute type 8 has an invalid length. [ 660.247927][T12234] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 661.576992][ T29] kauditd_printk_skb: 74 callbacks suppressed [ 661.577016][ T29] audit: type=1400 audit(2000000197.088:3168): avc: denied { perfmon } for pid=12247 comm="syz.1.3220" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 661.817250][ T29] audit: type=1400 audit(2000000197.159:3169): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 661.979326][ T29] audit: type=1400 audit(2000000197.159:3170): avc: denied { search } for pid=4656 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 662.112565][ T29] audit: type=1400 audit(2000000197.159:3171): avc: denied { append } for pid=4656 comm="syslogd" name="messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 662.304057][ T29] audit: type=1400 audit(2000000197.179:3173): avc: denied { read } for pid=12250 comm="syz.3.3223" dev="nsfs" ino=4026533085 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 662.437075][T12135] bridge0: port 1(bridge_slave_0) entered blocking state [ 662.456405][T12135] bridge0: port 1(bridge_slave_0) entered disabled state [ 662.502075][ T29] audit: type=1400 audit(2000000197.179:3174): avc: denied { perfmon } for pid=12247 comm="syz.1.3220" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 662.535949][T12135] bridge_slave_0: entered allmulticast mode [ 662.556532][T12135] bridge_slave_0: entered promiscuous mode [ 662.660227][T12135] bridge0: port 2(bridge_slave_1) entered blocking state [ 662.690643][ T29] audit: type=1400 audit(2000000197.189:3175): avc: denied { read open } for pid=12250 comm="syz.3.3223" path="net:[4026533085]" dev="nsfs" ino=4026533085 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 662.769381][T12135] bridge0: port 2(bridge_slave_1) entered disabled state [ 662.810051][T12135] bridge_slave_1: entered allmulticast mode [ 662.818197][T12135] bridge_slave_1: entered promiscuous mode [ 662.948279][ T29] audit: type=1400 audit(2000000197.220:3176): avc: denied { create } for pid=12250 comm="syz.3.3223" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 663.094793][ T29] audit: type=1400 audit(2000000197.159:3172): avc: denied { append open } for pid=4656 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 663.240122][ T29] audit: type=1400 audit(2000000197.250:3177): avc: denied { getattr } for pid=4656 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 663.440133][T12135] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 663.583740][ T5705] usb 4-1: new high-speed USB device number 98 using dummy_hcd [ 663.673077][T12135] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 664.238494][ T5705] usb 4-1: New USB device found, idVendor=1a86, idProduct=7522, bcdDevice=35.36 [ 664.254702][ T5705] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 664.313290][ T5705] usb 4-1: Product: syz [ 664.317510][ T5705] usb 4-1: Manufacturer: syz [ 664.390771][T12135] team0: Port device team_slave_0 added [ 664.397119][ T5705] usb 4-1: SerialNumber: syz [ 664.496042][ T5705] usb 4-1: config 0 descriptor?? [ 664.509036][T12135] team0: Port device team_slave_1 added [ 664.600788][ T5705] ch341 4-1:0.0: ch341-uart converter detected [ 665.239575][T12135] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 665.286215][ T5705] usb 4-1: failed to send control message: -71 [ 665.314166][T12135] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 665.380065][ T5705] ch341-uart ttyUSB0: probe with driver ch341-uart failed with error -71 [ 665.392517][ T5705] usb 4-1: USB disconnect, device number 98 [ 665.400168][ T5705] ch341 4-1:0.0: device disconnected [ 665.564670][T12135] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 665.719268][T12135] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 665.726260][T12135] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 665.975792][T12135] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 666.605355][ T29] kauditd_printk_skb: 121 callbacks suppressed [ 666.605377][ T29] audit: type=1400 audit(2000000202.146:3299): avc: denied { read write } for pid=5471 comm="syz-executor" name="loop3" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 666.805597][ T29] audit: type=1400 audit(2000000202.156:3300): avc: denied { read write open } for pid=5471 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 667.002972][ T29] audit: type=1400 audit(2000000202.156:3301): avc: denied { ioctl } for pid=5471 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=652 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 667.187073][ T29] audit: type=1400 audit(2000000202.227:3302): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 667.228878][T12135] hsr_slave_0: entered promiscuous mode [ 667.277453][T12135] hsr_slave_1: entered promiscuous mode [ 667.321487][T12135] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 667.341067][T12135] Cannot create hsr debugfs directory [ 667.398061][ T29] audit: type=1400 audit(2000000202.227:3303): avc: denied { search } for pid=4656 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 667.575052][ T29] audit: type=1400 audit(2000000202.247:3304): avc: denied { append } for pid=4656 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 667.668858][T12281] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 667.694501][ T29] audit: type=1400 audit(2000000202.247:3305): avc: denied { append open } for pid=4656 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 667.851205][ T29] audit: type=1400 audit(2000000202.247:3306): avc: denied { getattr } for pid=4656 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 667.901522][ T29] audit: type=1400 audit(2000000202.358:3307): avc: denied { read } for pid=12275 comm="syz.2.3233" name="video7" dev="devtmpfs" ino=868 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l_device_t tclass=chr_file permissive=1 [ 668.013893][ T29] audit: type=1400 audit(2000000202.358:3308): avc: denied { read open } for pid=12275 comm="syz.2.3233" path="/dev/video7" dev="devtmpfs" ino=868 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l_device_t tclass=chr_file permissive=1 [ 670.316456][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 670.329042][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 670.341918][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 670.354623][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 670.367286][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 670.379911][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 670.387481][ T30] INFO: task syz.1.2680:10989 blocked for more than 143 seconds. [ 670.392395][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 670.393006][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 670.393491][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 670.400771][ T30] Not tainted 6.11.0-rc5-syzkaller-00176-g20371ba12063 #0 [ 670.413297][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 671.477077][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 671.610170][ T29] kauditd_printk_skb: 196 callbacks suppressed [ 671.610190][ T29] audit: type=1400 audit(2000000207.183:3505): avc: denied { search } for pid=12285 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=1410 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 671.667440][ T30] task:syz.1.2680 state:D stack:23760 pid:10989 tgid:10988 ppid:5476 flags:0x00004006 [ 671.830882][ T30] Call Trace: [ 671.863456][ T30] [ 671.878266][ T30] __schedule+0xe37/0x5490 [ 671.882766][ T30] ? __pfx___lock_acquire+0x10/0x10 [ 671.994621][ T29] audit: type=1400 audit(2000000207.234:3506): avc: denied { search } for pid=12285 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=1411 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 672.034922][ T30] ? add_lock_to_list+0x17d/0x380 [ 672.040041][ T30] ? __pfx___schedule+0x10/0x10 [ 672.152762][ T30] ? schedule+0x298/0x350 [ 672.157267][ T30] ? __pfx_lock_release+0x10/0x10 [ 672.162342][ T30] ? mark_lock+0xb5/0xc60 [ 672.238223][ T29] audit: type=1400 audit(2000000207.244:3507): avc: denied { getattr } for pid=4656 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 672.312551][ T30] ? __pfx_mark_lock+0x10/0x10 [ 672.317399][ T30] schedule+0xe7/0x350 [ 672.321517][ T30] schedule_timeout+0x258/0x2a0 [ 672.426708][ T30] ? __pfx_schedule_timeout+0x10/0x10 [ 672.475973][ T30] ? mark_held_locks+0x9f/0xe0 [ 672.480821][ T30] ? _raw_spin_unlock_irq+0x23/0x50 [ 672.521803][ T29] audit: type=1400 audit(2000000207.384:3508): avc: denied { search } for pid=12285 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 672.577605][ T30] __wait_for_common+0x3de/0x5f0 [ 672.617453][ T30] ? __pfx_schedule_timeout+0x10/0x10 [ 672.639759][ T30] ? __pfx___wait_for_common+0x10/0x10 [ 672.680411][ T30] ? ib_cq_pool_cleanup+0x220/0x360 [ 672.685678][ T30] disable_device+0x170/0x280 [ 672.728434][ T29] audit: type=1400 audit(2000000207.384:3509): avc: denied { search } for pid=12285 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=1406 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 672.800874][ T30] ? __pfx_disable_device+0x10/0x10 [ 672.806164][ T30] ? __pfx_mark_lock+0x10/0x10 [ 672.897646][ T29] audit: type=1400 audit(2000000207.384:3510): avc: denied { search } for pid=12285 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=1410 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 672.930332][ T30] __ib_unregister_device+0x2b4/0x470 [ 672.935778][ T30] ? __pfx_ib_device_get_by_index+0x10/0x10 [ 672.999509][ T30] ib_unregister_device_and_put+0x5a/0x80 [ 673.005312][ T30] nldev_dellink+0x215/0x310 [ 673.051004][ T30] ? __pfx_nldev_dellink+0x10/0x10 [ 673.056182][ T30] ? __lock_acquire+0xbdd/0x3cb0 [ 673.065050][ T29] audit: type=1400 audit(2000000207.415:3511): avc: denied { read } for pid=12285 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=1411 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 673.157035][ T30] ? cap_capable+0x1cf/0x240 [ 673.187470][ T30] ? bpf_lsm_capable+0x9/0x10 [ 673.199959][ T30] ? security_capable+0x98/0xd0 [ 673.249949][ T30] ? ns_capable+0xd7/0x110 [ 673.254433][ T30] ? __pfx_nldev_dellink+0x10/0x10 [ 673.283657][T12285] audit: audit_backlog=65 > audit_backlog_limit=64 [ 673.290341][ T29] audit: type=1400 audit(2000000207.415:3512): avc: denied { read open } for pid=12285 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=1411 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 673.347309][ T30] rdma_nl_rcv_msg+0x388/0x6e0 [ 673.372664][T12285] audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 [ 673.398631][ T30] ? __pfx_rdma_nl_rcv_msg+0x10/0x10 [ 673.403995][ T30] ? __pfx___lock_acquire+0x10/0x10 [ 673.510513][ T30] ? __pfx___lock_acquire+0x10/0x10 [ 673.515807][ T30] ? __pfx___lock_acquire+0x10/0x10 [ 673.571858][ T30] ? hlock_class+0x4e/0x130 [ 673.592145][ T30] ? __lock_acquire+0xbdd/0x3cb0 [ 673.629384][ T30] rdma_nl_rcv_skb.constprop.0.isra.0+0x2e6/0x450 [ 673.635971][ T30] ? __pfx_rdma_nl_rcv_skb.constprop.0.isra.0+0x10/0x10 [ 673.710982][ T30] ? netlink_deliver_tap+0x1ae/0xd90 [ 673.749160][ T30] netlink_unicast+0x53c/0x7f0 [ 673.754006][ T30] ? __pfx_netlink_unicast+0x10/0x10 [ 673.808780][ T30] netlink_sendmsg+0x8b8/0xd70 [ 673.813661][ T30] ? __pfx_netlink_sendmsg+0x10/0x10 [ 673.862128][ T30] ? __import_iovec+0x1fd/0x6e0 [ 673.907330][ T30] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 673.912697][ T30] ____sys_sendmsg+0xab5/0xc90 [ 673.997449][ T30] ? copy_msghdr_from_user+0x10b/0x160 [ 674.003072][ T30] ? __pfx_____sys_sendmsg+0x10/0x10 [ 674.070859][ T30] ? __pfx___futex_wait+0x10/0x10 [ 674.115994][ T30] ? __pfx___lock_acquire+0x10/0x10 [ 674.145632][ T30] ? try_to_wake_up+0x14b/0x13e0 [ 674.150645][ T30] ___sys_sendmsg+0x135/0x1e0 [ 674.219133][ T30] ? __pfx____sys_sendmsg+0x10/0x10 [ 674.261662][ T30] ? __fget_light+0x173/0x210 [ 674.269693][ T30] __sys_sendmsg+0x117/0x1f0 [ 674.338983][ T30] ? __pfx___sys_sendmsg+0x10/0x10 [ 674.347155][ T30] ? __x64_sys_futex+0x1e1/0x4c0 [ 674.352176][ T30] do_syscall_64+0xcd/0x250 [ 674.529579][ T30] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 674.618886][ T30] RIP: 0033:0x7fd7a6579ef9 [ 674.706181][ T30] RSP: 002b:00007fd7a728b038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 674.766187][ T30] RAX: ffffffffffffffda RBX: 00007fd7a6715f80 RCX: 00007fd7a6579ef9 [ 674.805027][ T30] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000003 [ 674.847256][ T30] RBP: 00007fd7a65e793e R08: 0000000000000000 R09: 0000000000000000 [ 674.892864][ T30] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 674.928086][ T30] R13: 0000000000000000 R14: 00007fd7a6715f80 R15: 00007fff448f4318 [ 674.995872][ T30] [ 675.044129][ T30] [ 675.044129][ T30] Showing all locks held in the system: [ 675.251063][ T30] 1 lock held by khungtaskd/30: [ 675.255969][ T30] #0: ffffffff8ddb9fe0 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x75/0x340 [ 675.300469][ C0] net_ratelimit: 5170 callbacks suppressed [ 675.300490][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 675.318984][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 675.331627][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 675.344447][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 675.357096][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 675.369800][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 675.382374][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 675.395145][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 675.407705][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 675.420357][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 675.563527][ T30] 4 locks held by kworker/u8:8/2552: [ 675.568896][ T30] #0: ffff8880166e3148 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x1277/0x1b40 [ 675.876119][ T30] #1: ffffc9000937fd80 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x921/0x1b40 [ 675.983045][ T30] #2: ffffffff8fa1d5d0 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0xbb/0xbb0 [ 676.142470][ T30] #3: ffff88807be6c6b0 (&device->unregistration_lock){+.+.}-{3:3}, at: rdma_dev_change_netns+0x30/0x320 [ 676.234991][ T30] 2 locks held by getty/4983: [ 676.329552][ T30] #0: ffff88802b93f0a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x24/0x80 [ 676.448778][ T30] #1: ffffc90002efe2f0 (&ldata->atomic_read_lock){+.+.}-{3:3}, at: n_tty_read+0xfc8/0x1490 [ 676.629713][ T30] 1 lock held by syz-executor/5471: [ 676.658196][ T29] kauditd_printk_skb: 93 callbacks suppressed [ 676.658216][ T29] audit: type=1400 audit(2000000212.243:3593): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 676.705238][ T30] 1 lock held by syz-executor/5480: [ 676.710477][ T30] 5 locks held by kworker/0:5/5563: [ 676.913497][ T30] 3 locks held by kworker/1:7/5704: [ 676.962556][ T30] 3 locks held by kworker/1:8/5705: [ 677.032317][ T30] #0: ffff888015880948 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x1277/0x1b40 [ 677.095265][ T29] audit: type=1400 audit(2000000212.243:3594): avc: denied { search } for pid=4656 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 677.223519][ T30] #1: ffffc90004c97d80 (free_ipc_work){+.+.}-{0:0}, at: process_one_work+0x921/0x1b40 [ 677.300660][ T30] #2: ffffffff8ddc5778 (rcu_state.exp_mutex){+.+.}-{3:3}, at: exp_funnel_lock+0x282/0x3b0 [ 677.441565][ T29] audit: type=1400 audit(2000000212.243:3595): avc: denied { append } for pid=4656 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 677.503820][ T30] 1 lock held by syz-executor/5860: [ 677.509088][ T30] 2 locks held by syz.1.2680/10989: [ 677.653454][ T30] #0: ffffffff95257c98 (&rdma_nl_types[idx].sem){.+.+}-{3:3}, at: rdma_nl_rcv_msg+0x16a/0x6e0 [ 677.800359][ T30] #1: ffff88807be6c6b0 (&device->unregistration_lock){+.+.}-{3:3}, at: __ib_unregister_device+0x23b/0x470 [ 677.896988][ T29] audit: type=1400 audit(2000000212.384:3596): avc: denied { append open } for pid=4656 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 677.942203][ T30] 1 lock held by syz-executor/11288: [ 677.947539][ T30] 8 locks held by syz-executor/12135: [ 678.121291][ T30] #0: ffff88802b336420 (sb_writers#9){.+.+}-{0:0}, at: ksys_write+0x12f/0x260 [ 678.227636][ T30] #1: ffff88802a925c88 (&of->mutex){+.+.}-{3:3}, at: kernfs_fop_write_iter+0x281/0x500 [ 678.346802][ T30] #2: ffff888023790b48 (kn->active#58){.+.+}-{0:0}, at: kernfs_fop_write_iter+0x2a4/0x500 [ 678.358414][ T29] audit: type=1400 audit(2000000212.384:3597): avc: denied { getattr } for pid=4656 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 678.549744][ T30] #3: ffffffff8efc82a8 (nsim_bus_dev_list_lock){+.+.}-{3:3}, at: del_device_store+0xd2/0x4b0 [ 678.648641][ T30] #4: ffff88807d5a90e8 (&dev->mutex){....}-{3:3}, at: device_release_driver_internal+0xa4/0x610 [ 678.700084][ T29] audit: type=1400 audit(2000000213.166:3598): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 678.816203][ T30] #5: ffff88807d5aa250 (&devlink->lock_key#5){+.+.}-{3:3}, at: nsim_drv_remove+0x4a/0x1d0 [ 678.864833][ T30] #6: ffffffff8fa32fe8 (rtnl_mutex){+.+.}-{3:3}, at: nsim_destroy+0x6f/0x6a0 [ 678.934319][ T29] audit: type=1400 audit(2000000213.166:3599): avc: denied { search } for pid=4656 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 678.979848][ T30] #7: ffffffff8ddc5778 (rcu_state.exp_mutex){+.+.}-{3:3}, at: exp_funnel_lock+0x1a4/0x3b0 [ 679.070081][ T30] 3 locks held by dhcpcd-run-hook/12272: [ 679.075768][ T30] 3 locks held by udevd/12298: [ 679.130043][ T29] audit: type=1400 audit(2000000213.267:3600): avc: denied { append } for pid=4656 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 679.199327][ T30] [ 679.201691][ T30] ============================================= [ 679.201691][ T30] [ 679.371108][ T30] NMI backtrace for cpu 1 [ 679.375485][ T30] CPU: 1 UID: 0 PID: 30 Comm: khungtaskd Not tainted 6.11.0-rc5-syzkaller-00176-g20371ba12063 #0 [ 679.386102][ T30] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 679.396196][ T30] Call Trace: [ 679.399504][ T30] [ 679.402460][ T30] dump_stack_lvl+0x116/0x1f0 [ 679.407202][ T30] nmi_cpu_backtrace+0x27b/0x390 [ 679.412186][ T30] ? __pfx_nmi_raise_cpu_backtrace+0x10/0x10 [ 679.418215][ T30] nmi_trigger_cpumask_backtrace+0x29c/0x300 [ 679.424248][ T30] watchdog+0xf0c/0x1240 [ 679.428546][ T30] ? __pfx_watchdog+0x10/0x10 [ 679.433273][ T30] ? lockdep_hardirqs_on+0x7c/0x110 [ 679.438514][ T30] ? __kthread_parkme+0x148/0x220 [ 679.443615][ T30] ? __pfx_watchdog+0x10/0x10 [ 679.448337][ T30] kthread+0x2c1/0x3a0 [ 679.452451][ T30] ? _raw_spin_unlock_irq+0x23/0x50 [ 679.457695][ T30] ? __pfx_kthread+0x10/0x10 [ 679.462329][ T30] ret_from_fork+0x45/0x80 [ 679.466797][ T30] ? __pfx_kthread+0x10/0x10 [ 679.471426][ T30] ret_from_fork_asm+0x1a/0x30 [ 679.476256][ T30] [ 679.490154][ T30] Sending NMI from CPU 1 to CPUs 0: [ 679.497865][ C0] NMI backtrace for cpu 0 [ 679.497878][ C0] CPU: 0 UID: 0 PID: 5563 Comm: kworker/0:5 Not tainted 6.11.0-rc5-syzkaller-00176-g20371ba12063 #0 [ 679.497906][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 679.497921][ C0] Workqueue: events nsim_dev_trap_report_work [ 679.497947][ C0] RIP: 0010:pie_calculate_probability+0x39d/0x850 [ 679.497987][ C0] Code: 00 00 00 00 e8 b4 6d 67 f8 4c 8b 24 24 31 ff 4d 09 ec 4c 89 e6 e8 13 70 67 f8 4d 85 e4 75 31 e8 99 6d 67 f8 44 0f b6 7c 24 2f <31> ff 44 89 fe e8 69 6f 67 f8 45 84 ff 74 17 e8 7f 6d 67 f8 48 8b [ 679.498009][ C0] RSP: 0018:ffffc90000007b90 EFLAGS: 00000246 [ 679.498026][ C0] RAX: 0000000000000000 RBX: ffff8880401776f0 RCX: ffffffff8924524d [ 679.498042][ C0] RDX: ffff888022975a00 RSI: ffffffff89245257 RDI: 0000000000000007 [ 679.498058][ C0] RBP: ffff8880539cb300 R08: 0000000000000007 R09: 0000000000000000 [ 679.498091][ C0] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 679.498106][ C0] R13: 0000000000000000 R14: fffffff0a3da8872 R15: 0000000000000001 [ 679.498122][ C0] FS: 0000000000000000(0000) GS:ffff8880b9200000(0000) knlGS:0000000000000000 [ 679.498146][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 679.498165][ C0] CR2: 00007f16080e52d8 CR3: 000000007b378000 CR4: 00000000003506f0 [ 679.498191][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 679.498205][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 679.498220][ C0] Call Trace: [ 679.498228][ C0] [ 679.498236][ C0] ? show_regs+0x8c/0xa0 [ 679.498271][ C0] ? nmi_cpu_backtrace+0x1d8/0x390 [ 679.498302][ C0] ? nmi_cpu_backtrace_handler+0xc/0x20 [ 679.498335][ C0] ? nmi_handle+0x1a9/0x5c0 [ 679.498357][ C0] ? pie_calculate_probability+0x39d/0x850 [ 679.498394][ C0] ? default_do_nmi+0x6a/0x160 [ 679.498420][ C0] ? exc_nmi+0x170/0x1e0 [ 679.498441][ C0] ? end_repeat_nmi+0xf/0x53 [ 679.498467][ C0] ? pie_calculate_probability+0x38d/0x850 [ 679.498502][ C0] ? pie_calculate_probability+0x397/0x850 [ 679.498538][ C0] ? pie_calculate_probability+0x39d/0x850 [ 679.498574][ C0] ? pie_calculate_probability+0x39d/0x850 [ 679.498612][ C0] ? pie_calculate_probability+0x39d/0x850 [ 679.498649][ C0] [ 679.498656][ C0] [ 679.498669][ C0] fq_pie_timer+0x215/0x5a0 [ 679.498696][ C0] call_timer_fn+0x1a0/0x610 [ 679.498729][ C0] ? __pfx_fq_pie_timer+0x10/0x10 [ 679.498751][ C0] ? __pfx_call_timer_fn+0x10/0x10 [ 679.498783][ C0] ? __pfx_lock_release+0x10/0x10 [ 679.498820][ C0] ? mark_held_locks+0x9f/0xe0 [ 679.498851][ C0] ? __pfx_fq_pie_timer+0x10/0x10 [ 679.498874][ C0] ? __pfx_fq_pie_timer+0x10/0x10 [ 679.498896][ C0] __run_timers+0x74b/0xaf0 [ 679.498933][ C0] ? __pfx___run_timers+0x10/0x10 [ 679.498966][ C0] ? __pfx_lock_acquire+0x10/0x10 [ 679.499004][ C0] ? _raw_spin_unlock_irqrestore+0x3b/0x80 [ 679.499036][ C0] run_timer_base+0x111/0x190 [ 679.499070][ C0] ? __pfx_run_timer_base+0x10/0x10 [ 679.499105][ C0] run_timer_softirq+0x1a/0x40 [ 679.499137][ C0] handle_softirqs+0x216/0x8f0 [ 679.499167][ C0] ? __pfx_handle_softirqs+0x10/0x10 [ 679.499194][ C0] ? nsim_dev_trap_report_work+0x870/0xc80 [ 679.499219][ C0] do_softirq+0xb2/0xf0 [ 679.499242][ C0] [ 679.499249][ C0] [ 679.499257][ C0] __local_bh_enable_ip+0x100/0x120 [ 679.499283][ C0] nsim_dev_trap_report_work+0x870/0xc80 [ 679.499316][ C0] process_one_work+0x9c5/0x1b40 [ 679.499358][ C0] ? __pfx_wg_packet_decrypt_worker+0x10/0x10 [ 679.499396][ C0] ? __pfx_process_one_work+0x10/0x10 [ 679.499441][ C0] ? assign_work+0x1a0/0x250 [ 679.499474][ C0] worker_thread+0x6c8/0xed0 [ 679.499515][ C0] ? __kthread_parkme+0x148/0x220 [ 679.499543][ C0] ? __pfx_worker_thread+0x10/0x10 [ 679.499578][ C0] kthread+0x2c1/0x3a0 [ 679.499603][ C0] ? _raw_spin_unlock_irq+0x23/0x50 [ 679.499629][ C0] ? __pfx_kthread+0x10/0x10 [ 679.499655][ C0] ret_from_fork+0x45/0x80 [ 679.499689][ C0] ? __pfx_kthread+0x10/0x10 [ 679.499715][ C0] ret_from_fork_asm+0x1a/0x30 [ 679.499757][ C0] [ 680.017625][ T29] audit: type=1400 audit(2000000213.267:3601): avc: denied { append open } for pid=4656 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 680.294688][ C0] net_ratelimit: 5274 callbacks suppressed [ 680.294714][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 680.303516][ T29] audit: type=1400 audit(2000000213.447:3602): avc: denied { getattr } for pid=4656 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 680.313185][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 680.313791][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 680.314624][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 680.315213][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)