last executing test programs: 50.18515702s ago: executing program 2 (id=2576): r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x10c4, 0x8acf, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x5}}}}]}}]}}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000400)={0x24, 0x0, 0x0, &(0x7f0000000480)={0x0, 0x22, 0x5, {[@main=@item_4={0x3, 0x0, 0x9, "bc06bbf4"}]}}, 0x0}, 0x0) 47.961037757s ago: executing program 2 (id=2592): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xc, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000071000000850000000800000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4e, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000005c0)='sys_enter\x00', r0}, 0x10) rt_sigqueueinfo(0x0, 0x8, 0x0) 47.612884285s ago: executing program 2 (id=2598): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) sync_file_range(r0, 0x0, 0x0, 0x0) 47.316887465s ago: executing program 2 (id=2602): r0 = fsopen(&(0x7f00000001c0)='romfs\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000b40)='source', &(0x7f0000000040)='c:::\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) 47.091689066s ago: executing program 2 (id=2607): r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x10) mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x184) 46.76132047s ago: executing program 2 (id=2612): sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={0x0}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='oom_adj\x00') writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000140)='15', 0x2}], 0x8) 31.597574549s ago: executing program 32 (id=2612): sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={0x0}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='oom_adj\x00') writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000140)='15', 0x2}], 0x8) 21.941830321s ago: executing program 4 (id=2741): r0 = syz_open_dev$usbfs(&(0x7f0000000140), 0x76, 0x101301) ioctl$USBDEVFS_DISCSIGNAL(r0, 0x8008550e, &(0x7f00000000c0)={0xfffffffb, 0x0}) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, 0x0) 21.31802925s ago: executing program 4 (id=2744): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), r0) sendmsg$NL80211_CMD_GET_WIPHY(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)={0x30, r1, 0x301, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x12}, @val={0x8}, @val={0xc, 0x99, {0x2, 0x3}}}}}, 0x30}}, 0x40) 20.600798888s ago: executing program 4 (id=2748): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000004c0)=ANY=[@ANYBLOB="640000000206030000000000fffff0000000000016000300686173683a6e65742c706f72742c6e6574000000050004000000000005000500020000000900020073797a3200000000050001000700000014000780080013400000000008001240"], 0x64}}, 0x0) 20.284816725s ago: executing program 0 (id=2750): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RATE_GET(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000400)={0x34, r1, 0x1, 0x0, 0x0, {0x49}, [@handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x34}}, 0x0) 19.854803556s ago: executing program 3 (id=2751): r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e"], 0x0, 0x37, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000980)=@base={0x1, 0x4, 0x4, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r0, 0x2, 0x1, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0), &(0x7f0000000240), 0xfff, r1}, 0x38) 19.826971396s ago: executing program 4 (id=2752): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x1c, r1, 0x1, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_CONN_ID={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20008080}, 0x4048806) 19.365165761s ago: executing program 0 (id=2754): r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bind$bt_l2cap(r0, &(0x7f0000000100)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x0, 0x1}, 0xe) getsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000002ac0)=0x2, &(0x7f0000002b00)=0x2) 18.960402948s ago: executing program 3 (id=2755): r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x84, @remote, 0x15, 0x3, 'none\x00', 0x1, 0x4, 0x72}, 0x2c) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, &(0x7f0000000000)={{0x84, @broadcast, 0x4e21, 0x3, 'lc\x00', 0xb, 0x80000000, 0x25}, {@rand_addr=0x64010102, 0x4e23, 0x10000, 0xc3, 0x12d5c, 0x12d5c}}, 0x44) 18.910472163s ago: executing program 4 (id=2756): r0 = syz_io_uring_setup(0x514b, &(0x7f00000003c0)={0x0, 0x86fb, 0x10100}, &(0x7f0000000200)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000240)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x20, 0x4004, @fd_index, 0x0, 0x0, 0x0, 0x8}) io_uring_enter(r0, 0x48e9, 0x0, 0x2, 0x0, 0x0) 18.469583808s ago: executing program 1 (id=2757): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getuid() sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001000)=ANY=[@ANYBLOB="6c0000002000010300000000000000000200000000000000030000000c000c40000000000000ef0a08000100e000000208000100ac1414aa140003006e72300000000000000000000000000005001500000000000c000c4000000000000000010c001400", @ANYRES32=r1, @ANYRES32], 0x6c}, 0x1, 0x0, 0x0, 0x90}, 0x40014) 18.389365871s ago: executing program 0 (id=2758): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="640000000001010400000000141a000002000000240001801400018008000100e000000108000200e00000010c00028005000100000000002400028014000180080001000000000008000200ac1e00010c00028005000100000000000800074000000001"], 0x64}, 0x1, 0x0, 0x0, 0x2004c8d0}, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=ANY=[@ANYBLOB="14010000000101040000000000000000020000001c00188008000140000000020800024000000000082f034000000000240001801400018008000100e000000108000200e00000010c000280050001"], 0x114}, 0x1, 0x0, 0x0, 0x4}, 0x44010) 17.836348796s ago: executing program 3 (id=2759): r0 = gettid() rt_sigtimedwait(&(0x7f0000000080)={[0x3ff]}, 0xffffffffffffffff, 0x0, 0x8) tkill(r0, 0x7) 17.718660393s ago: executing program 4 (id=2760): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000600), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000fc0)={&(0x7f0000000640)={0xbc, r1, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg1\x00'}, @WGDEVICE_A_PEERS={0x70, 0x8, 0x0, 0x1, [{0x28, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24}]}, {0x44, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e23, @broadcast}}, @WGPEER_A_ALLOWEDIPS={0x8, 0x9, 0x0, 0x1, [{0x4}]}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @c_g}]}]}]}, 0xbc}, 0x1, 0x0, 0x0, 0x40000}, 0x20000010) 17.640430435s ago: executing program 1 (id=2761): r0 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x8882, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0x7040, 0x0) read$FUSE(r0, &(0x7f00000040c0)={0x2020}, 0x2020) 17.406823709s ago: executing program 0 (id=2762): r0 = syz_open_dev$vbi(&(0x7f0000000000), 0x0, 0x2) ioctl$VIDIOC_S_INPUT(r0, 0xc0045627, &(0x7f0000000100)=0x3) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f00000000c0)={0xe, 0x0, '\x00', {0x0, @reserved}}) 17.024370165s ago: executing program 3 (id=2763): r0 = timerfd_create(0x8, 0x0) timerfd_settime(r0, 0x3, &(0x7f0000000100)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{}, {0x0, 0x989680}}, 0x0) 16.867642363s ago: executing program 1 (id=2764): prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x800000000, 0xf, &(0x7f0000006680)) timer_create(0x2, 0x0, &(0x7f0000000540)=0x0) timer_gettime(r0, &(0x7f00000005c0)) 16.633321141s ago: executing program 0 (id=2765): r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000040), 0x4) listen(r0, 0x0) 16.408433055s ago: executing program 3 (id=2766): mlock2(&(0x7f00003ee000/0x4000)=nil, 0x4000, 0x0) syz_clone(0x20180080, 0x0, 0x0, 0x0, 0x0, 0x0) mlock(&(0x7f00001b5000/0x400000)=nil, 0x400000) 16.33025602s ago: executing program 1 (id=2767): r0 = syz_open_dev$midi(&(0x7f00000001c0), 0x2, 0x40c01) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS64(r0, 0xc0385720, &(0x7f0000000100)) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)="2d3a99f744d32053ce9125c13311c2af132d2f47f8258f3bb14b7ed98741a506ad9b0446dc1a1427a1314dc05336a44e73a1fc9e15cad569794dcd18e82b4e60bb4d5152a34fc667af80c18b1a8cde80f590271c4258d973a0a5421236a9c54e1f5310aee809929fd8b031db4e280166281db6d243116758c6c3602f42668cb8e4df719f97398e7b0530854b1507b8bfb0764029a4bd6ccc54add3ae8b3bce27ff051705a94a78ae6c6c46c64e6029fc2fb6", 0x2}], 0x10000000000001be) 16.095512151s ago: executing program 0 (id=2768): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nfc(&(0x7f0000003300), r0) sendmsg$NFC_CMD_ENABLE_SE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000033c0)={&(0x7f0000000100)={0x24, r1, 0x1, 0x70bd29, 0x25dfdbfc, {}, [@NFC_ATTR_SE_INDEX={0x8, 0x15, 0x2}, @NFC_ATTR_DEVICE_INDEX={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000044}, 0x20000000) 15.866605561s ago: executing program 1 (id=2769): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = syz_io_uring_setup(0x24fd, &(0x7f0000000300)={0x0, 0xf26e, 0x10100, 0x0, 0x145}, &(0x7f0000000100), &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/123, 0x7a}], 0x10000000000001a2) 15.409173263s ago: executing program 1 (id=2770): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000002c0), r0) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)={0x38, r1, 0x1, 0x70bd26, 0x4000080, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x2}, {0x5, 0x3, 0x80}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x40080}, 0x4014) 15.249076885s ago: executing program 3 (id=2771): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f00000005c0), r0) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f000000b240)={0x4c, r1, 0x1, 0x70bd21, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @broadcast}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @rand_addr=0x64010100}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20008055}, 0x8000) 2.536618224s ago: executing program 33 (id=2760): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000600), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000fc0)={&(0x7f0000000640)={0xbc, r1, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg1\x00'}, @WGDEVICE_A_PEERS={0x70, 0x8, 0x0, 0x1, [{0x28, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24}]}, {0x44, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e23, @broadcast}}, @WGPEER_A_ALLOWEDIPS={0x8, 0x9, 0x0, 0x1, [{0x4}]}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @c_g}]}]}]}, 0xbc}, 0x1, 0x0, 0x0, 0x40000}, 0x20000010) 533.394638ms ago: executing program 34 (id=2768): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nfc(&(0x7f0000003300), r0) sendmsg$NFC_CMD_ENABLE_SE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000033c0)={&(0x7f0000000100)={0x24, r1, 0x1, 0x70bd29, 0x25dfdbfc, {}, [@NFC_ATTR_SE_INDEX={0x8, 0x15, 0x2}, @NFC_ATTR_DEVICE_INDEX={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000044}, 0x20000000) 92.732688ms ago: executing program 35 (id=2770): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000002c0), r0) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)={0x38, r1, 0x1, 0x70bd26, 0x4000080, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x2}, {0x5, 0x3, 0x80}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x40080}, 0x4014) 0s ago: executing program 36 (id=2771): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f00000005c0), r0) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f000000b240)={0x4c, r1, 0x1, 0x70bd21, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @broadcast}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @rand_addr=0x64010100}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20008055}, 0x8000) kernel console output (not intermixed with test programs): bject_r:netif_t tclass=netif permissive=1 [ 296.477576][T11760] xfrm0 speed is unknown, defaulting to 1000 [ 296.580765][ T30] audit: type=1400 audit(2000000055.550:14063): avc: denied { sendto } for pid=10 comm="kworker/0:1" daddr=ff02::16 netif=teql0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:node_t tclass=node permissive=1 [ 296.654725][T11756] xfrm0 speed is unknown, defaulting to 1000 [ 296.668987][ T30] audit: type=1400 audit(2000000055.570:14064): avc: denied { egress } for pid=10 comm="kworker/0:1" daddr=ff02::16 netif=teql0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=1 [ 296.704921][ T30] audit: type=1400 audit(2000000055.570:14065): avc: denied { sendto } for pid=10 comm="kworker/0:1" daddr=ff02::16 netif=teql0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:node_t tclass=node permissive=1 [ 296.735884][ T30] audit: type=1400 audit(2000000055.620:14066): avc: denied { egress } for pid=58 comm="kworker/1:1" saddr=fe80::1c daddr=ff02::2 netif=teql0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=1 [ 296.761087][ T5823] Bluetooth: hci6: command tx timeout [ 296.774370][ T30] audit: type=1400 audit(2000000055.620:14067): avc: denied { sendto } for pid=58 comm="kworker/1:1" saddr=fe80::1c daddr=ff02::2 netif=teql0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:node_t tclass=node permissive=1 [ 296.824874][ T30] audit: type=1400 audit(2000000055.780:14068): avc: denied { egress } for pid=910 comm="kworker/0:2" daddr=ff02::16 netif=teql0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=1 [ 296.860890][ T30] audit: type=1400 audit(2000000055.780:14069): avc: denied { sendto } for pid=910 comm="kworker/0:2" daddr=ff02::16 netif=teql0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:node_t tclass=node permissive=1 [ 296.890493][ T30] audit: type=1400 audit(2000000055.900:14070): avc: denied { egress } for pid=13 comm="kworker/u8:1" daddr=ff02::1:ffaa:aa1c netif=teql0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=1 [ 297.259797][T11752] xfrm0 speed is unknown, defaulting to 1000 [ 297.560879][ T5823] Bluetooth: hci7: command tx timeout [ 297.800952][ T5823] Bluetooth: hci8: command tx timeout [ 297.978068][T11762] xfrm0 speed is unknown, defaulting to 1000 [ 301.365076][ T30] kauditd_printk_skb: 37 callbacks suppressed [ 301.365093][ T30] audit: type=1400 audit(2000000060.750:14108): avc: denied { egress } for pid=1207 comm="kworker/1:2" saddr=fe80::1b daddr=ff02::2 netif=teql0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=1 [ 301.422485][ T30] audit: type=1400 audit(2000000060.750:14109): avc: denied { sendto } for pid=1207 comm="kworker/1:2" saddr=fe80::1b daddr=ff02::2 netif=teql0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:node_t tclass=node permissive=1 [ 301.483445][ T30] audit: type=1400 audit(2000000060.870:14110): avc: denied { recv } for pid=1207 comm="kworker/1:2" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 302.009168][ T30] audit: type=1400 audit(2000000061.390:14111): avc: denied { recv } for pid=1207 comm="kworker/1:2" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 302.047159][ T30] audit: type=1400 audit(2000000061.430:14112): avc: denied { egress } for pid=15 comm="ksoftirqd/0" saddr=fe80::1b daddr=ff02::2 netif=teql0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=1 [ 302.082515][ T30] audit: type=1400 audit(2000000061.430:14113): avc: denied { sendto } for pid=15 comm="ksoftirqd/0" saddr=fe80::1b daddr=ff02::2 netif=teql0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:node_t tclass=node permissive=1 [ 302.128804][ T30] audit: type=1400 audit(2000000061.510:14114): avc: denied { egress } for pid=15 comm="ksoftirqd/0" saddr=fe80::1c daddr=ff02::2 netif=teql0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=1 [ 302.158338][ T30] audit: type=1400 audit(2000000061.510:14115): avc: denied { sendto } for pid=15 comm="ksoftirqd/0" saddr=fe80::1c daddr=ff02::2 netif=teql0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:node_t tclass=node permissive=1 [ 302.487525][ T30] audit: type=1400 audit(2000000061.870:14116): avc: denied { recv } for pid=1207 comm="kworker/1:2" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 303.007394][ T30] audit: type=1400 audit(2000000062.390:14117): avc: denied { recv } for pid=1207 comm="kworker/1:2" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 306.465140][ T30] kauditd_printk_skb: 6 callbacks suppressed [ 306.465155][ T30] audit: type=1400 audit(2000000065.850:14124): avc: denied { egress } for pid=15 comm="ksoftirqd/0" saddr=fe80::1c daddr=ff02::2 netif=teql0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=1 [ 306.518074][ T30] audit: type=1400 audit(2000000065.850:14125): avc: denied { sendto } for pid=15 comm="ksoftirqd/0" saddr=fe80::1c daddr=ff02::2 netif=teql0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:node_t tclass=node permissive=1 [ 306.570372][ T30] audit: type=1400 audit(2000000065.850:14126): avc: denied { egress } for pid=15 comm="ksoftirqd/0" saddr=fe80::1b daddr=ff02::2 netif=teql0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=1 [ 306.600640][ T30] audit: type=1400 audit(2000000065.850:14127): avc: denied { sendto } for pid=15 comm="ksoftirqd/0" saddr=fe80::1b daddr=ff02::2 netif=teql0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:node_t tclass=node permissive=1 [ 306.647320][ T30] audit: type=1400 audit(2000000065.920:14128): avc: denied { recv } for pid=5824 comm="kworker/1:3" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 307.016963][ T30] audit: type=1400 audit(2000000066.390:14129): avc: denied { recv } for pid=1207 comm="kworker/1:2" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 307.070890][ T8827] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 307.108691][T11760] chnl_net:caif_netlink_parms(): no params data found [ 307.159298][ T30] audit: type=1400 audit(2000000066.520:14130): avc: denied { module_request } for pid=11631 comm="syz-executor" kmod="netdev-nicvf0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 307.199680][T11756] chnl_net:caif_netlink_parms(): no params data found [ 307.266538][T11752] chnl_net:caif_netlink_parms(): no params data found [ 307.297332][T11762] chnl_net:caif_netlink_parms(): no params data found [ 307.512685][ T30] audit: type=1400 audit(2000000066.890:14131): avc: denied { recv } for pid=1207 comm="kworker/1:2" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 307.630729][ T30] audit: type=1400 audit(2000000066.990:14132): avc: denied { sys_module } for pid=11631 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 307.692885][ T30] audit: type=1400 audit(2000000066.990:14133): avc: denied { module_request } for pid=11631 comm="syz-executor" kmod="nicvf0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 308.527713][T11760] bridge0: port 1(bridge_slave_0) entered blocking state [ 308.543013][T11760] bridge0: port 1(bridge_slave_0) entered disabled state [ 308.550191][T11760] bridge_slave_0: entered allmulticast mode [ 308.573956][T11760] bridge_slave_0: entered promiscuous mode [ 308.693555][T11756] bridge0: port 1(bridge_slave_0) entered blocking state [ 308.709786][T11756] bridge0: port 1(bridge_slave_0) entered disabled state [ 308.720451][T11756] bridge_slave_0: entered allmulticast mode [ 308.735962][T11756] bridge_slave_0: entered promiscuous mode [ 308.862649][T11760] bridge0: port 2(bridge_slave_1) entered blocking state [ 308.877264][T11760] bridge0: port 2(bridge_slave_1) entered disabled state [ 308.897216][T11760] bridge_slave_1: entered allmulticast mode [ 308.912290][T11760] bridge_slave_1: entered promiscuous mode [ 309.033419][T11756] bridge0: port 2(bridge_slave_1) entered blocking state [ 309.056980][T11756] bridge0: port 2(bridge_slave_1) entered disabled state [ 309.064927][T11756] bridge_slave_1: entered allmulticast mode [ 309.082190][T11756] bridge_slave_1: entered promiscuous mode [ 309.406701][T11762] bridge0: port 1(bridge_slave_0) entered blocking state [ 309.419648][T11762] bridge0: port 1(bridge_slave_0) entered disabled state [ 309.436502][T11762] bridge_slave_0: entered allmulticast mode [ 309.450224][T11762] bridge_slave_0: entered promiscuous mode [ 309.669885][T11752] bridge0: port 1(bridge_slave_0) entered blocking state [ 309.686595][T11752] bridge0: port 1(bridge_slave_0) entered disabled state [ 309.699704][T11752] bridge_slave_0: entered allmulticast mode [ 309.718064][T11752] bridge_slave_0: entered promiscuous mode [ 309.736509][T11752] bridge0: port 2(bridge_slave_1) entered blocking state [ 309.749917][T11752] bridge0: port 2(bridge_slave_1) entered disabled state [ 309.758194][T11752] bridge_slave_1: entered allmulticast mode [ 309.777838][T11752] bridge_slave_1: entered promiscuous mode [ 309.811175][T11756] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 309.862991][T11762] bridge0: port 2(bridge_slave_1) entered blocking state [ 309.870136][T11762] bridge0: port 2(bridge_slave_1) entered disabled state [ 309.889749][T11762] bridge_slave_1: entered allmulticast mode [ 309.907371][T11762] bridge_slave_1: entered promiscuous mode [ 310.047999][T11760] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 310.074268][T11760] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 310.266496][T11756] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 310.398046][T11762] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 310.502120][T11752] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 310.755352][T11762] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 310.886397][T11631] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 310.905798][T11752] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 311.109631][T11756] team0: Port device team_slave_0 added [ 311.505121][T11760] team0: Port device team_slave_0 added [ 311.549555][ T30] kauditd_printk_skb: 14 callbacks suppressed [ 311.550418][ T30] audit: type=1400 audit(2000000070.930:14148): avc: denied { recv } for pid=5871 comm="kworker/1:6" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 311.638155][ T30] audit: type=1400 audit(2000000071.000:14149): avc: denied { egress } for pid=9 comm="kworker/0:0" saddr=fe80::1b daddr=ff02::2 netif=teql0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=1 [ 311.671017][ T30] audit: type=1400 audit(2000000071.000:14150): avc: denied { sendto } for pid=9 comm="kworker/0:0" saddr=fe80::1b daddr=ff02::2 netif=teql0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:node_t tclass=node permissive=1 [ 311.906783][T11752] team0: Port device team_slave_0 added [ 311.915963][T11756] team0: Port device team_slave_1 added [ 311.933350][ T8827] bridge_slave_1: left allmulticast mode [ 311.939181][ T8827] bridge_slave_1: left promiscuous mode [ 311.960351][ T8827] bridge0: port 2(bridge_slave_1) entered disabled state [ 312.015792][ T30] audit: type=1400 audit(2000000071.400:14151): avc: denied { recv } for pid=5910 comm="kworker/1:7" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 312.074152][ T8827] bridge_slave_0: left allmulticast mode [ 312.079821][ T8827] bridge_slave_0: left promiscuous mode [ 312.102627][ T8827] bridge0: port 1(bridge_slave_0) entered disabled state [ 312.545676][ T30] audit: type=1400 audit(2000000071.930:14152): avc: denied { recv } for pid=58 comm="kworker/1:1" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 312.999646][ T30] audit: type=1400 audit(2000000072.380:14153): avc: denied { recv } for pid=58 comm="kworker/1:1" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 313.529277][ T30] audit: type=1400 audit(2000000072.910:14154): avc: denied { recv } for pid=58 comm="kworker/1:1" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 314.035617][ T30] audit: type=1400 audit(2000000073.420:14155): avc: denied { recv } for pid=24 comm="kworker/1:0" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 314.533069][ T30] audit: type=1400 audit(2000000073.920:14156): avc: denied { recv } for pid=24 comm="kworker/1:0" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 315.060611][ T30] audit: type=1400 audit(2000000074.430:14157): avc: denied { recv } for pid=5824 comm="kworker/1:3" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 316.709495][ T1298] ieee802154 phy0 wpan0: encryption failed: -22 [ 316.719597][ T1298] ieee802154 phy1 wpan1: encryption failed: -22 [ 317.037666][ T30] kauditd_printk_skb: 3 callbacks suppressed [ 317.039186][ T30] audit: type=1400 audit(2000000076.420:14161): avc: denied { recv } for pid=1207 comm="kworker/1:2" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 317.540691][ T30] audit: type=1400 audit(2000000076.920:14162): avc: denied { recv } for pid=1207 comm="kworker/1:2" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 317.657786][ T30] audit: type=1400 audit(2000000077.040:14163): avc: denied { execmem } for pid=11799 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 318.039842][ T30] audit: type=1400 audit(2000000077.420:14164): avc: denied { create } for pid=11800 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 318.087293][ T5827] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 318.097502][ T5827] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 318.105346][ T5827] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 318.113561][ T5827] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 318.126540][ T5827] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 318.171038][ T30] audit: type=1400 audit(2000000077.440:14165): avc: denied { recv } for pid=1207 comm="kworker/1:2" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 318.251508][ T30] audit: type=1400 audit(2000000077.450:14166): avc: denied { read write } for pid=11800 comm="syz-executor" name="vhci" dev="devtmpfs" ino=1268 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 318.295585][ T30] audit: type=1400 audit(2000000077.450:14167): avc: denied { read write open } for pid=11800 comm="syz-executor" path="/dev/vhci" dev="devtmpfs" ino=1268 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 318.332165][ T8827] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 318.350030][ T30] audit: type=1400 audit(2000000077.530:14168): avc: denied { ioctl } for pid=11800 comm="syz-executor" path="socket:[29595]" dev="sockfs" ino=29595 ioctlcmd=0x48c9 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 318.377853][ T30] audit: type=1400 audit(2000000077.540:14169): avc: denied { ioctl } for pid=11800 comm="syz-executor" path="socket:[29595]" dev="sockfs" ino=29595 ioctlcmd=0x48dd scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 318.418587][ T30] audit: type=1400 audit(2000000077.550:14170): avc: denied { read } for pid=11800 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 318.467915][ T8827] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 318.517020][ T8827] bond0 (unregistering): Released all slaves [ 318.584666][T11762] team0: Port device team_slave_0 added [ 318.628917][T11762] team0: Port device team_slave_1 added [ 318.644599][T11760] team0: Port device team_slave_1 added [ 318.680305][T11752] team0: Port device team_slave_1 added [ 318.996308][ T10] xfrm0 speed is unknown, defaulting to 1000 [ 319.033656][ T10] syz0: Port: 1 Link DOWN [ 319.576586][T11752] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 319.584295][T11752] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 319.620068][T11752] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 320.116246][T11760] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 320.140211][T11760] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 320.176923][T11760] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 320.202569][ T5827] Bluetooth: hci0: command tx timeout [ 320.209265][T11752] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 320.245835][T11752] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 320.279960][T11752] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 320.304553][T11756] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 320.318537][T11756] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 320.362171][T11756] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 320.387292][T11762] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 320.398483][T11762] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 320.435106][T11762] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 320.462504][T11760] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 320.469462][T11760] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 320.507644][T11760] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 320.555559][T11756] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 320.575892][T11756] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 320.611489][T11756] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 320.632155][T11762] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 320.639096][T11762] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 320.686984][T11762] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 321.184991][T11752] hsr_slave_0: entered promiscuous mode [ 321.196686][T11752] hsr_slave_1: entered promiscuous mode [ 321.207329][T11752] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 321.225741][T11752] Cannot create hsr debugfs directory [ 321.697165][T11760] hsr_slave_0: entered promiscuous mode [ 321.705920][T11760] hsr_slave_1: entered promiscuous mode [ 321.720435][T11760] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 321.736897][T11760] Cannot create hsr debugfs directory [ 321.767334][T11762] hsr_slave_0: entered promiscuous mode [ 321.779510][T11762] hsr_slave_1: entered promiscuous mode [ 321.795102][T11762] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 321.848862][T11762] Cannot create hsr debugfs directory [ 321.872562][T11756] hsr_slave_0: entered promiscuous mode [ 321.887805][T11756] hsr_slave_1: entered promiscuous mode [ 321.911939][T11756] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 321.919512][T11756] Cannot create hsr debugfs directory [ 322.281210][ T5827] Bluetooth: hci0: command tx timeout [ 322.540219][ T30] kauditd_printk_skb: 14 callbacks suppressed [ 322.546803][ T30] audit: type=1400 audit(2000000081.920:14185): avc: denied { recv } for pid=5866 comm="kworker/1:5" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 323.037481][ T30] audit: type=1400 audit(2000000082.410:14186): avc: denied { recv } for pid=5866 comm="kworker/1:5" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 323.424490][ T30] audit: type=1400 audit(2000000082.810:14187): avc: denied { module_request } for pid=11800 comm="syz-executor" kmod="rtnl-link-nicvf" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 323.515869][ T30] audit: type=1400 audit(2000000082.900:14188): avc: denied { recv } for pid=5866 comm="kworker/1:5" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 323.867890][T11800] chnl_net:caif_netlink_parms(): no params data found [ 324.050751][ T30] audit: type=1400 audit(2000000083.420:14189): avc: denied { recv } for pid=5866 comm="kworker/1:5" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 324.362475][ T5827] Bluetooth: hci0: command tx timeout [ 324.506579][T11800] bridge0: port 1(bridge_slave_0) entered blocking state [ 324.518957][T11800] bridge0: port 1(bridge_slave_0) entered disabled state [ 324.536334][T11800] bridge_slave_0: entered allmulticast mode [ 324.548413][T11800] bridge_slave_0: entered promiscuous mode [ 324.586764][ T30] audit: type=1400 audit(2000000083.960:14190): avc: denied { recv } for pid=5871 comm="kworker/1:6" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 324.622622][T11800] bridge0: port 2(bridge_slave_1) entered blocking state [ 324.629813][T11800] bridge0: port 2(bridge_slave_1) entered disabled state [ 324.657980][T11800] bridge_slave_1: entered allmulticast mode [ 324.689242][T11800] bridge_slave_1: entered promiscuous mode [ 324.720968][ T30] audit: type=1400 audit(2000000084.030:14191): avc: denied { create } for pid=11752 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 324.763727][ T30] audit: type=1400 audit(2000000084.030:14192): avc: denied { write } for pid=11752 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 324.801178][ T30] audit: type=1400 audit(2000000084.030:14193): avc: denied { read } for pid=11752 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 324.830199][ T30] audit: type=1400 audit(2000000084.030:14194): avc: denied { read } for pid=11752 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 324.867398][T11752] netdevsim netdevsim6 netdevsim0: renamed from eth0 [ 325.058982][T11800] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 325.076905][T11752] netdevsim netdevsim6 netdevsim1: renamed from eth1 [ 325.124716][T11752] netdevsim netdevsim6 netdevsim2: renamed from eth2 [ 325.248203][T11800] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 325.260334][T11752] netdevsim netdevsim6 netdevsim3: renamed from eth3 [ 325.537202][T11800] team0: Port device team_slave_0 added [ 325.599166][T11800] team0: Port device team_slave_1 added [ 325.785217][T11756] netdevsim netdevsim7 netdevsim0: renamed from eth0 [ 325.938913][T11800] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 325.949161][T11800] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 325.988196][T11800] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 326.027325][T11756] netdevsim netdevsim7 netdevsim1: renamed from eth1 [ 326.070320][T11756] netdevsim netdevsim7 netdevsim2: renamed from eth2 [ 326.155242][T11800] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 326.168533][T11800] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 326.211104][T11800] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 326.253675][T11756] netdevsim netdevsim7 netdevsim3: renamed from eth3 [ 326.441344][ T5823] Bluetooth: hci0: command tx timeout [ 326.787619][T11800] hsr_slave_0: entered promiscuous mode [ 326.817863][T11800] hsr_slave_1: entered promiscuous mode [ 326.834180][T11800] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 326.852366][T11800] Cannot create hsr debugfs directory [ 326.870636][T11760] netdevsim netdevsim8 netdevsim0: renamed from eth0 [ 326.956447][T11760] netdevsim netdevsim8 netdevsim1: renamed from eth1 [ 327.147673][T11760] netdevsim netdevsim8 netdevsim2: renamed from eth2 [ 327.197374][T11760] netdevsim netdevsim8 netdevsim3: renamed from eth3 [ 327.567658][ T30] kauditd_printk_skb: 53 callbacks suppressed [ 327.567674][ T30] audit: type=1400 audit(2000000086.950:14248): avc: denied { recv } for pid=1207 comm="kworker/1:2" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 327.868274][ T30] audit: type=1400 audit(2000000087.240:14249): avc: denied { create } for pid=11762 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 327.942020][ T30] audit: type=1400 audit(2000000087.290:14250): avc: denied { write } for pid=11762 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 327.972495][ T30] audit: type=1400 audit(2000000087.290:14251): avc: denied { read } for pid=11762 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 328.010065][ T30] audit: type=1400 audit(2000000087.290:14252): avc: denied { read } for pid=11762 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 328.042330][ T30] audit: type=1400 audit(2000000087.290:14253): avc: denied { write } for pid=11762 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 328.142676][T11762] netdevsim netdevsim9 netdevsim0: renamed from eth0 [ 328.160744][ T30] audit: type=1400 audit(2000000087.320:14254): avc: denied { read } for pid=11762 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 328.193221][ T30] audit: type=1400 audit(2000000087.430:14255): avc: denied { recv } for pid=1207 comm="kworker/1:2" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 328.300833][T11762] netdevsim netdevsim9 netdevsim1: renamed from eth1 [ 328.369433][T11762] netdevsim netdevsim9 netdevsim2: renamed from eth2 [ 328.539663][ T30] audit: type=1400 audit(2000000087.920:14256): avc: denied { recv } for pid=1207 comm="kworker/1:2" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 328.661079][T11762] netdevsim netdevsim9 netdevsim3: renamed from eth3 [ 328.730321][T11752] 8021q: adding VLAN 0 to HW filter on device bond0 [ 328.749999][ T30] audit: type=1400 audit(2000000088.110:14257): avc: denied { create } for pid=11762 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 329.043437][T11752] 8021q: adding VLAN 0 to HW filter on device team0 [ 329.174862][ T8821] bridge0: port 1(bridge_slave_0) entered blocking state [ 329.182034][ T8821] bridge0: port 1(bridge_slave_0) entered forwarding state [ 329.278420][ T8816] bridge0: port 2(bridge_slave_1) entered blocking state [ 329.285597][ T8816] bridge0: port 2(bridge_slave_1) entered forwarding state [ 329.440374][T11756] 8021q: adding VLAN 0 to HW filter on device bond0 [ 329.756505][T11760] 8021q: adding VLAN 0 to HW filter on device bond0 [ 329.846498][T11756] 8021q: adding VLAN 0 to HW filter on device team0 [ 330.015188][ T8821] bridge0: port 1(bridge_slave_0) entered blocking state [ 330.022340][ T8821] bridge0: port 1(bridge_slave_0) entered forwarding state [ 330.228050][T11760] 8021q: adding VLAN 0 to HW filter on device team0 [ 330.322173][ T8825] bridge0: port 2(bridge_slave_1) entered blocking state [ 330.329307][ T8825] bridge0: port 2(bridge_slave_1) entered forwarding state [ 330.475583][ T82] bridge0: port 1(bridge_slave_0) entered blocking state [ 330.482747][ T82] bridge0: port 1(bridge_slave_0) entered forwarding state [ 330.536521][T11762] 8021q: adding VLAN 0 to HW filter on device bond0 [ 330.810316][ T8821] bridge0: port 2(bridge_slave_1) entered blocking state [ 330.817487][ T8821] bridge0: port 2(bridge_slave_1) entered forwarding state [ 331.000308][T11762] 8021q: adding VLAN 0 to HW filter on device team0 [ 331.528704][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 331.535856][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 331.725540][ T8825] bridge0: port 2(bridge_slave_1) entered blocking state [ 331.732711][ T8825] bridge0: port 2(bridge_slave_1) entered forwarding state [ 332.591343][ T30] kauditd_printk_skb: 72 callbacks suppressed [ 332.591359][ T30] audit: type=1400 audit(2000000091.980:14330): avc: denied { recv } for pid=5871 comm="kworker/1:6" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 332.903764][ T30] audit: type=1400 audit(2000000092.040:14331): avc: denied { egress } for pid=8834 comm="kworker/u8:17" daddr=ff02::1:ff00:1b netif=teql0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=1 [ 333.163817][ T30] audit: type=1400 audit(2000000092.040:14332): avc: denied { sendto } for pid=8834 comm="kworker/u8:17" daddr=ff02::1:ff00:1b netif=teql0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:node_t tclass=node permissive=1 [ 333.390962][ T30] audit: type=1400 audit(2000000092.040:14333): avc: denied { egress } for pid=8834 comm="kworker/u8:17" saddr=fe80::1c daddr=ff02::16 netif=teql0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=1 [ 333.660745][ T30] audit: type=1400 audit(2000000092.040:14334): avc: denied { sendto } for pid=8834 comm="kworker/u8:17" saddr=fe80::1c daddr=ff02::16 netif=teql0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:node_t tclass=node permissive=1 [ 333.770733][T11800] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 333.890215][ T30] audit: type=1400 audit(2000000092.060:14335): avc: denied { egress } for pid=8834 comm="kworker/u8:17" saddr=fe80::1c daddr=ff02::2 netif=teql0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=1 [ 333.993851][T11800] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 334.091031][ T30] audit: type=1400 audit(2000000092.060:14336): avc: denied { sendto } for pid=8834 comm="kworker/u8:17" saddr=fe80::1c daddr=ff02::2 netif=teql0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:node_t tclass=node permissive=1 [ 334.175475][T11800] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 334.246705][ T30] audit: type=1400 audit(2000000092.170:14337): avc: denied { sys_module } for pid=11756 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 334.322640][T11800] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 334.421015][ T30] audit: type=1400 audit(2000000092.170:14338): avc: denied { module_request } for pid=11756 comm="syz-executor" kmod="nicvf0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 334.660658][ T30] audit: type=1400 audit(2000000092.180:14339): avc: denied { egress } for pid=5864 comm="kworker/0:4" daddr=ff02::16 netif=teql0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=1 [ 334.890979][T11752] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 336.651277][T11800] 8021q: adding VLAN 0 to HW filter on device bond0 [ 336.999462][T11800] 8021q: adding VLAN 0 to HW filter on device team0 [ 337.212662][T11756] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 337.362262][ T8831] bridge0: port 1(bridge_slave_0) entered blocking state [ 337.369386][ T8831] bridge0: port 1(bridge_slave_0) entered forwarding state [ 337.498479][ T8831] bridge0: port 2(bridge_slave_1) entered blocking state [ 337.505639][ T8831] bridge0: port 2(bridge_slave_1) entered forwarding state [ 337.727776][ T30] kauditd_printk_skb: 112 callbacks suppressed [ 337.727792][ T30] audit: type=1400 audit(2000000097.110:14452): avc: denied { egress } for pid=5864 comm="kworker/0:4" daddr=ff02::16 netif=teql0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=1 [ 337.975404][ T30] audit: type=1400 audit(2000000097.110:14453): avc: denied { sendto } for pid=5864 comm="kworker/0:4" daddr=ff02::16 netif=teql0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:node_t tclass=node permissive=1 [ 338.029226][T11760] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 338.168927][ T30] audit: type=1400 audit(2000000097.190:14454): avc: denied { egress } for pid=5863 comm="kworker/0:3" daddr=ff02::16 netif=teql0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=1 [ 338.389066][ T30] audit: type=1400 audit(2000000097.200:14455): avc: denied { sendto } for pid=5863 comm="kworker/0:3" daddr=ff02::16 netif=teql0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:node_t tclass=node permissive=1 [ 338.476251][T11762] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 338.567292][T11800] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 338.591050][ T30] audit: type=1400 audit(2000000097.210:14456): avc: denied { egress } for pid=8829 comm="kworker/u8:15" daddr=ff02::1:ff00:1b netif=teql0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=1 [ 338.785874][ T30] audit: type=1400 audit(2000000097.210:14457): avc: denied { sendto } for pid=8829 comm="kworker/u8:15" daddr=ff02::1:ff00:1b netif=teql0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:node_t tclass=node permissive=1 [ 339.036624][ T30] audit: type=1400 audit(2000000097.230:14458): avc: denied { egress } for pid=8831 comm="kworker/u8:16" daddr=ff02::1:ffaa:aa1b netif=teql0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=1 [ 339.240633][ T30] audit: type=1400 audit(2000000097.230:14459): avc: denied { sendto } for pid=8831 comm="kworker/u8:16" daddr=ff02::1:ffaa:aa1b netif=teql0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:node_t tclass=node permissive=1 [ 339.450896][ T30] audit: type=1400 audit(2000000097.240:14460): avc: denied { egress } for pid=910 comm="kworker/0:2" daddr=ff02::16 netif=teql0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=1 [ 339.657508][ T30] audit: type=1400 audit(2000000097.240:14461): avc: denied { sendto } for pid=910 comm="kworker/0:2" daddr=ff02::16 netif=teql0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:node_t tclass=node permissive=1 [ 342.845469][ T30] kauditd_printk_skb: 69 callbacks suppressed [ 342.845486][ T30] audit: type=1400 audit(2000000102.230:14531): avc: denied { egress } for pid=15 comm="ksoftirqd/0" saddr=fe80::1b daddr=ff02::2 netif=teql0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=1 [ 343.030840][ T30] audit: type=1400 audit(2000000102.230:14532): avc: denied { sendto } for pid=15 comm="ksoftirqd/0" saddr=fe80::1b daddr=ff02::2 netif=teql0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:node_t tclass=node permissive=1 [ 343.170950][ T30] audit: type=1400 audit(2000000102.320:14533): avc: denied { egress } for pid=910 comm="kworker/0:2" saddr=fe80::1b daddr=ff02::2 netif=teql0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=1 [ 343.329861][ T30] audit: type=1400 audit(2000000102.320:14534): avc: denied { sendto } for pid=910 comm="kworker/0:2" saddr=fe80::1b daddr=ff02::2 netif=teql0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:node_t tclass=node permissive=1 [ 343.436668][ T30] audit: type=1400 audit(2000000102.470:14535): avc: denied { recv } for pid=58 comm="kworker/1:1" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 343.546664][ T30] audit: type=1400 audit(2000000102.690:14536): avc: denied { sys_module } for pid=11756 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 343.630893][ T30] audit: type=1400 audit(2000000102.690:14537): avc: denied { module_request } for pid=11756 comm="syz-executor" kmod="netdevsim7" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 343.702872][ T30] audit: type=1400 audit(2000000102.790:14538): avc: denied { egress } for pid=910 comm="kworker/0:2" saddr=fe80::1c daddr=ff02::2 netif=teql0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=1 [ 343.776923][ T30] audit: type=1400 audit(2000000102.790:14539): avc: denied { sendto } for pid=910 comm="kworker/0:2" saddr=fe80::1c daddr=ff02::2 netif=teql0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:node_t tclass=node permissive=1 [ 343.857144][ T30] audit: type=1400 audit(2000000102.980:14540): avc: denied { recv } for pid=58 comm="kworker/1:1" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 347.104587][ T5827] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 347.120426][ T5827] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 347.128475][ T5827] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 347.137038][ T5827] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 347.144675][ T5827] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 348.080626][ T30] kauditd_printk_skb: 31 callbacks suppressed [ 348.080644][ T30] audit: type=1400 audit(2000000107.440:14572): avc: denied { recv } for pid=1207 comm="kworker/1:2" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 348.196141][ T30] audit: type=1400 audit(2000000107.580:14573): avc: denied { execmem } for pid=11851 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 348.568946][ T30] audit: type=1400 audit(2000000107.950:14574): avc: denied { recv } for pid=1207 comm="kworker/1:2" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 348.708650][ T5823] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 348.722144][ T5823] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 348.729838][ T5823] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 348.742670][ T5823] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 348.750140][ T5823] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 348.777849][ T30] audit: type=1400 audit(2000000108.040:14575): avc: denied { create } for pid=11853 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 348.857202][ T30] audit: type=1400 audit(2000000108.080:14576): avc: denied { read write } for pid=11853 comm="syz-executor" name="vhci" dev="devtmpfs" ino=1268 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 348.966710][ T30] audit: type=1400 audit(2000000108.080:14577): avc: denied { read write open } for pid=11853 comm="syz-executor" path="/dev/vhci" dev="devtmpfs" ino=1268 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 349.031216][ T30] audit: type=1400 audit(2000000108.160:14578): avc: denied { ioctl } for pid=11853 comm="syz-executor" path="socket:[31111]" dev="sockfs" ino=31111 ioctlcmd=0x48c9 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 349.156993][ T30] audit: type=1400 audit(2000000108.160:14579): avc: denied { ioctl } for pid=11853 comm="syz-executor" path="socket:[31111]" dev="sockfs" ino=31111 ioctlcmd=0x48dd scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 349.240719][ T5823] Bluetooth: hci1: command tx timeout [ 349.280648][ T30] audit: type=1400 audit(2000000108.200:14580): avc: denied { read } for pid=11853 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 349.380598][ T30] audit: type=1400 audit(2000000108.200:14581): avc: denied { read open } for pid=11853 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 349.765724][ T5827] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 349.774917][ T5827] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 349.786020][ T5827] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 349.796313][ T5827] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 349.804048][ T5827] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 350.057716][ T5823] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 350.067868][ T5823] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 350.079511][ T5823] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 350.087337][ T5823] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 350.099502][ T5823] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 350.840968][ T5823] Bluetooth: hci2: command tx timeout [ 351.325966][ T5823] Bluetooth: hci1: command tx timeout [ 351.887898][ T5827] Bluetooth: hci3: command tx timeout [ 352.201076][ T5823] Bluetooth: hci4: command tx timeout [ 352.920939][ T5823] Bluetooth: hci2: command tx timeout [ 353.400807][ T5823] Bluetooth: hci1: command tx timeout [ 353.599805][ T30] kauditd_printk_skb: 32 callbacks suppressed [ 353.606734][ T30] audit: type=1400 audit(2000000112.980:14614): avc: denied { recv } for pid=1207 comm="kworker/1:2" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 353.960902][ T5823] Bluetooth: hci3: command tx timeout [ 354.085265][ T30] audit: type=1400 audit(2000000113.470:14615): avc: denied { recv } for pid=1207 comm="kworker/1:2" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 354.281490][ T5823] Bluetooth: hci4: command tx timeout [ 354.599854][ T30] audit: type=1400 audit(2000000113.980:14616): avc: denied { recv } for pid=1207 comm="kworker/1:2" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 355.001290][ T5823] Bluetooth: hci2: command tx timeout [ 355.069497][ T30] audit: type=1400 audit(2000000114.450:14617): avc: denied { recv } for pid=1207 comm="kworker/1:2" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 355.108931][ T30] audit: type=1400 audit(2000000114.460:14618): avc: denied { recv } for pid=1207 comm="kworker/1:2" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 355.480637][ T5823] Bluetooth: hci1: command tx timeout [ 355.570361][ T30] audit: type=1400 audit(2000000114.950:14619): avc: denied { recv } for pid=1207 comm="kworker/1:2" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 356.040998][ T5823] Bluetooth: hci3: command tx timeout [ 356.080318][ T30] audit: type=1400 audit(2000000115.460:14620): avc: denied { recv } for pid=1207 comm="kworker/1:2" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 356.371188][ T30] audit: type=1400 audit(2000000115.750:14621): avc: denied { egress } for pid=15 comm="ksoftirqd/0" saddr=fe80::1c daddr=ff02::2 netif=teql0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=1 [ 356.395705][ T5823] Bluetooth: hci4: command tx timeout [ 356.410256][ T30] audit: type=1400 audit(2000000115.760:14622): avc: denied { sendto } for pid=15 comm="ksoftirqd/0" saddr=fe80::1c daddr=ff02::2 netif=teql0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:node_t tclass=node permissive=1 [ 356.603558][ T30] audit: type=1400 audit(2000000115.990:14623): avc: denied { recv } for pid=5866 comm="kworker/1:5" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 357.080811][ T5827] Bluetooth: hci2: command tx timeout [ 358.120851][ T5827] Bluetooth: hci3: command tx timeout [ 358.440733][ T5827] Bluetooth: hci4: command tx timeout [ 359.102291][ T30] kauditd_printk_skb: 11 callbacks suppressed [ 359.102309][ T30] audit: type=1400 audit(2000000118.480:14635): avc: denied { recv } for pid=5866 comm="kworker/1:5" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 359.581706][ T30] audit: type=1400 audit(2000000118.960:14636): avc: denied { recv } for pid=5866 comm="kworker/1:5" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 360.118650][ T30] audit: type=1400 audit(2000000119.500:14637): avc: denied { recv } for pid=5866 comm="kworker/1:5" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 360.621004][ T30] audit: type=1400 audit(2000000119.960:14638): avc: denied { recv } for pid=58 comm="kworker/1:1" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 361.105648][ T30] audit: type=1400 audit(2000000120.490:14639): avc: denied { recv } for pid=5866 comm="kworker/1:5" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 361.504986][ T30] audit: type=1400 audit(2000000120.880:14640): avc: denied { egress } for pid=8829 comm="kworker/u8:15" saddr=fe80::1c daddr=ff02::2 netif=teql0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=1 [ 361.690693][ T30] audit: type=1400 audit(2000000120.880:14641): avc: denied { sendto } for pid=8829 comm="kworker/u8:15" saddr=fe80::1c daddr=ff02::2 netif=teql0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:node_t tclass=node permissive=1 [ 361.890054][ T30] audit: type=1400 audit(2000000120.890:14642): avc: denied { egress } for pid=8829 comm="kworker/u8:15" saddr=fe80::1b daddr=ff02::2 netif=teql0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=1 [ 362.018866][T11800] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 362.058054][ T30] audit: type=1400 audit(2000000120.890:14643): avc: denied { sendto } for pid=8829 comm="kworker/u8:15" saddr=fe80::1b daddr=ff02::2 netif=teql0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:node_t tclass=node permissive=1 [ 362.225375][ T30] audit: type=1400 audit(2000000121.000:14644): avc: denied { recv } for pid=5866 comm="kworker/1:5" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 364.316002][ T30] kauditd_printk_skb: 21 callbacks suppressed [ 364.316017][ T30] audit: type=1400 audit(2000000123.700:14666): avc: denied { module_request } for pid=11800 comm="syz-executor" kmod="netdev-netdevsim5" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 364.579703][ T30] audit: type=1400 audit(2000000123.960:14667): avc: denied { recv } for pid=5866 comm="kworker/1:5" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 364.745686][ T30] audit: type=1400 audit(2000000123.970:14668): avc: denied { recv } for pid=5866 comm="kworker/1:5" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 364.909493][ T30] audit: type=1400 audit(2000000124.080:14669): avc: denied { egress } for pid=11873 comm="modprobe" saddr=fe80::1b daddr=ff02::2 netif=teql0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=1 [ 364.960617][ T30] audit: type=1400 audit(2000000124.080:14670): avc: denied { sendto } for pid=11873 comm="modprobe" saddr=fe80::1b daddr=ff02::2 netif=teql0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:node_t tclass=node permissive=1 [ 365.020632][ T30] audit: type=1400 audit(2000000124.210:14671): avc: denied { module_request } for pid=11849 comm="syz-executor" kmod="rtnl-link-nicvf" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 365.202458][ T30] audit: type=1400 audit(2000000124.240:14672): avc: denied { module_request } for pid=11856 comm="syz-executor" kmod="rtnl-link-nicvf" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 365.380637][ T30] audit: type=1400 audit(2000000124.470:14673): avc: denied { recv } for pid=5871 comm="kworker/1:6" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 365.590545][ T30] audit: type=1400 audit(2000000124.690:14674): avc: denied { sys_module } for pid=11800 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 365.749322][T11849] chnl_net:caif_netlink_parms(): no params data found [ 365.778067][ T30] audit: type=1400 audit(2000000124.690:14675): avc: denied { module_request } for pid=11800 comm="syz-executor" kmod="netdevsim5" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 369.604035][ T30] kauditd_printk_skb: 12 callbacks suppressed [ 369.604051][ T30] audit: type=1400 audit(2000000128.990:14688): avc: denied { recv } for pid=58 comm="kworker/1:1" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 369.827719][ T30] audit: type=1400 audit(2000000129.190:14689): avc: denied { egress } for pid=15 comm="ksoftirqd/0" saddr=fe80::1c daddr=ff02::2 netif=teql0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=1 [ 369.857794][ T30] audit: type=1400 audit(2000000129.190:14690): avc: denied { sendto } for pid=15 comm="ksoftirqd/0" saddr=fe80::1c daddr=ff02::2 netif=teql0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:node_t tclass=node permissive=1 [ 370.092748][ T30] audit: type=1400 audit(2000000129.480:14691): avc: denied { recv } for pid=58 comm="kworker/1:1" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 370.588245][ T30] audit: type=1400 audit(2000000129.970:14692): avc: denied { recv } for pid=58 comm="kworker/1:1" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 371.133206][ T30] audit: type=1400 audit(2000000130.520:14693): avc: denied { recv } for pid=58 comm="kworker/1:1" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 371.598640][ T30] audit: type=1400 audit(2000000130.980:14694): avc: denied { recv } for pid=58 comm="kworker/1:1" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 372.109064][ T30] audit: type=1400 audit(2000000131.480:14695): avc: denied { recv } for pid=58 comm="kworker/1:1" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 372.599668][ T30] audit: type=1400 audit(2000000131.980:14696): avc: denied { recv } for pid=58 comm="kworker/1:1" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 373.007030][ T30] audit: type=1400 audit(2000000132.390:14697): avc: denied { egress } for pid=15 comm="ksoftirqd/0" saddr=fe80::1c daddr=ff02::2 netif=teql0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=1 [ 375.108728][ T30] kauditd_printk_skb: 5 callbacks suppressed [ 375.108744][ T30] audit: type=1400 audit(2000000134.490:14703): avc: denied { recv } for pid=24 comm="kworker/1:0" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 375.604696][ T30] audit: type=1400 audit(2000000134.980:14704): avc: denied { recv } for pid=58 comm="kworker/1:1" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 376.124205][ T30] audit: type=1400 audit(2000000135.510:14705): avc: denied { recv } for pid=5871 comm="kworker/1:6" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 376.597500][ T30] audit: type=1400 audit(2000000135.980:14706): avc: denied { recv } for pid=5862 comm="kworker/1:4" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 377.098527][ T30] audit: type=1400 audit(2000000136.480:14707): avc: denied { recv } for pid=58 comm="kworker/1:1" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 377.630303][ T30] audit: type=1400 audit(2000000137.010:14708): avc: denied { recv } for pid=58 comm="kworker/1:1" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 377.792196][ T30] audit: type=1400 audit(2000000137.180:14709): avc: denied { execmem } for pid=11883 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 378.135465][ T1298] ieee802154 phy0 wpan0: encryption failed: -22 [ 378.144635][ T1298] ieee802154 phy1 wpan1: encryption failed: -22 [ 378.167569][ T30] audit: type=1400 audit(2000000137.550:14710): avc: denied { recv } for pid=58 comm="kworker/1:1" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 378.279860][ T30] audit: type=1400 audit(2000000137.660:14711): avc: denied { create } for pid=11884 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 378.326929][ T5823] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 378.335223][ T5823] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 378.347093][ T5823] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 378.355143][ T5823] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 378.363090][ T5823] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 [ 378.408320][ T30] audit: type=1400 audit(2000000137.690:14712): avc: denied { read write } for pid=11884 comm="syz-executor" name="vhci" dev="devtmpfs" ino=1268 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 380.111488][ T30] kauditd_printk_skb: 9 callbacks suppressed [ 380.111503][ T30] audit: type=1400 audit(2000000139.500:14722): avc: denied { recv } for pid=1207 comm="kworker/1:2" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 380.441345][ T5823] Bluetooth: hci5: command tx timeout [ 380.610836][ T30] audit: type=1400 audit(2000000140.000:14723): avc: denied { recv } for pid=1207 comm="kworker/1:2" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 381.118248][ T30] audit: type=1400 audit(2000000140.500:14724): avc: denied { recv } for pid=1207 comm="kworker/1:2" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 381.619641][ T30] audit: type=1400 audit(2000000141.000:14725): avc: denied { recv } for pid=1207 comm="kworker/1:2" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 382.119851][ T30] audit: type=1400 audit(2000000141.500:14726): avc: denied { recv } for pid=1207 comm="kworker/1:2" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 382.520843][ T5823] Bluetooth: hci5: command tx timeout [ 382.614672][ T30] audit: type=1400 audit(2000000142.000:14727): avc: denied { recv } for pid=1207 comm="kworker/1:2" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 382.657150][ T30] audit: type=1400 audit(2000000142.000:14728): avc: denied { recv } for pid=1207 comm="kworker/1:2" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 382.696060][ T30] audit: type=1400 audit(2000000142.000:14729): avc: denied { recv } for pid=1207 comm="kworker/1:2" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 383.149932][ T30] audit: type=1400 audit(2000000142.530:14730): avc: denied { recv } for pid=1207 comm="kworker/1:2" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 383.608841][ T30] audit: type=1400 audit(2000000142.990:14731): avc: denied { recv } for pid=1207 comm="kworker/1:2" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 384.600958][ T5823] Bluetooth: hci5: command tx timeout [ 385.153175][ T30] kauditd_printk_skb: 2 callbacks suppressed [ 385.154405][ T30] audit: type=1400 audit(2000000144.540:14734): avc: denied { recv } for pid=5862 comm="kworker/1:4" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 385.624344][ T30] audit: type=1400 audit(2000000145.010:14735): avc: denied { recv } for pid=5862 comm="kworker/1:4" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 386.147215][ T30] audit: type=1400 audit(2000000145.530:14736): avc: denied { recv } for pid=5862 comm="kworker/1:4" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 386.634256][ T30] audit: type=1400 audit(2000000146.020:14737): avc: denied { recv } for pid=58 comm="kworker/1:1" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 386.680814][ T5823] Bluetooth: hci5: command tx timeout [ 387.155764][ T30] audit: type=1400 audit(2000000146.540:14738): avc: denied { recv } for pid=58 comm="kworker/1:1" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 387.655951][ T30] audit: type=1400 audit(2000000147.040:14739): avc: denied { recv } for pid=58 comm="kworker/1:1" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 388.113972][ T30] audit: type=1400 audit(2000000147.500:14740): avc: denied { recv } for pid=58 comm="kworker/1:1" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 388.375553][ T30] audit: type=1400 audit(2000000147.760:14741): avc: denied { egress } for pid=15 comm="ksoftirqd/0" saddr=fe80::1b daddr=ff02::2 netif=teql0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=1 [ 388.415660][ T30] audit: type=1400 audit(2000000147.760:14742): avc: denied { sendto } for pid=15 comm="ksoftirqd/0" saddr=fe80::1b daddr=ff02::2 netif=teql0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:node_t tclass=node permissive=1 [ 388.653471][ T30] audit: type=1400 audit(2000000148.040:14743): avc: denied { recv } for pid=58 comm="kworker/1:1" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 390.620299][ T30] kauditd_printk_skb: 6 callbacks suppressed [ 390.627133][ T30] audit: type=1400 audit(2000000150.000:14750): avc: denied { recv } for pid=5862 comm="kworker/1:4" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 391.119130][ T30] audit: type=1400 audit(2000000150.500:14751): avc: denied { recv } for pid=5862 comm="kworker/1:4" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 391.644591][ T30] audit: type=1400 audit(2000000151.030:14752): avc: denied { recv } for pid=5862 comm="kworker/1:4" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 392.119338][ T30] audit: type=1400 audit(2000000151.500:14753): avc: denied { recv } for pid=5862 comm="kworker/1:4" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 392.651488][ T30] audit: type=1400 audit(2000000152.040:14754): avc: denied { recv } for pid=5862 comm="kworker/1:4" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 392.860617][ T30] audit: type=1400 audit(2000000152.230:14755): avc: denied { egress } for pid=8816 comm="kworker/u8:10" saddr=fe80::1c daddr=ff02::2 netif=teql0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=1 [ 392.891419][ T30] audit: type=1400 audit(2000000152.230:14756): avc: denied { sendto } for pid=8816 comm="kworker/u8:10" saddr=fe80::1c daddr=ff02::2 netif=teql0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:node_t tclass=node permissive=1 [ 393.165782][ T30] audit: type=1400 audit(2000000152.550:14757): avc: denied { recv } for pid=5862 comm="kworker/1:4" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 393.487791][ T30] audit: type=1400 audit(2000000152.870:14758): avc: denied { egress } for pid=15 comm="ksoftirqd/0" saddr=fe80::1b daddr=ff02::2 netif=teql0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=1 [ 393.519899][ T30] audit: type=1400 audit(2000000152.870:14759): avc: denied { sendto } for pid=15 comm="ksoftirqd/0" saddr=fe80::1b daddr=ff02::2 netif=teql0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:node_t tclass=node permissive=1 [ 395.644178][ T30] kauditd_printk_skb: 5 callbacks suppressed [ 395.645245][ T30] audit: type=1400 audit(2000000155.030:14765): avc: denied { recv } for pid=58 comm="kworker/1:1" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 396.045547][ T30] audit: type=1400 audit(2000000155.430:14766): avc: denied { egress } for pid=15 comm="ksoftirqd/0" saddr=fe80::1c daddr=ff02::2 netif=teql0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=1 [ 396.078460][ T30] audit: type=1400 audit(2000000155.430:14767): avc: denied { sendto } for pid=15 comm="ksoftirqd/0" saddr=fe80::1c daddr=ff02::2 netif=teql0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:node_t tclass=node permissive=1 [ 396.160982][ T30] audit: type=1400 audit(2000000155.550:14768): avc: denied { recv } for pid=58 comm="kworker/1:1" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 396.656433][ T30] audit: type=1400 audit(2000000156.040:14769): avc: denied { recv } for pid=58 comm="kworker/1:1" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 396.710677][ T30] audit: type=1400 audit(2000000156.080:14770): avc: denied { egress } for pid=15 comm="ksoftirqd/0" saddr=fe80::1c daddr=ff02::2 netif=teql0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=1 [ 396.759157][ T30] audit: type=1400 audit(2000000156.080:14771): avc: denied { sendto } for pid=15 comm="ksoftirqd/0" saddr=fe80::1c daddr=ff02::2 netif=teql0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:node_t tclass=node permissive=1 [ 397.138495][ T30] audit: type=1400 audit(2000000156.520:14772): avc: denied { recv } for pid=58 comm="kworker/1:1" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 397.640009][ T30] audit: type=1400 audit(2000000157.020:14773): avc: denied { recv } for pid=58 comm="kworker/1:1" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 397.973218][ T30] audit: type=1400 audit(2000000157.360:14774): avc: denied { egress } for pid=15 comm="ksoftirqd/0" saddr=fe80::1b daddr=ff02::2 netif=teql0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=1 [ 400.675049][ T30] kauditd_printk_skb: 10 callbacks suppressed [ 400.676697][ T30] audit: type=1400 audit(2000000160.060:14785): avc: denied { recv } for pid=58 comm="kworker/1:1" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 401.155512][ T30] audit: type=1400 audit(2000000160.540:14786): avc: denied { recv } for pid=5862 comm="kworker/1:4" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 401.639337][ T30] audit: type=1400 audit(2000000161.020:14787): avc: denied { recv } for pid=5862 comm="kworker/1:4" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 402.166786][ T30] audit: type=1400 audit(2000000161.550:14788): avc: denied { recv } for pid=5862 comm="kworker/1:4" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 402.645990][ T30] audit: type=1400 audit(2000000162.030:14789): avc: denied { recv } for pid=5862 comm="kworker/1:4" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 403.172252][ T30] audit: type=1400 audit(2000000162.560:14790): avc: denied { recv } for pid=5862 comm="kworker/1:4" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 403.317275][T11853] chnl_net:caif_netlink_parms(): no params data found [ 403.369430][T11858] chnl_net:caif_netlink_parms(): no params data found [ 403.437945][T11856] chnl_net:caif_netlink_parms(): no params data found [ 403.686080][ T30] audit: type=1400 audit(2000000163.050:14791): avc: denied { recv } for pid=5862 comm="kworker/1:4" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 404.166062][ T30] audit: type=1400 audit(2000000163.550:14792): avc: denied { recv } for pid=5862 comm="kworker/1:4" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 404.686221][ T30] audit: type=1400 audit(2000000164.070:14793): avc: denied { recv } for pid=58 comm="kworker/1:1" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 405.106253][T11849] bridge0: port 1(bridge_slave_0) entered blocking state [ 405.119929][T11849] bridge0: port 1(bridge_slave_0) entered disabled state [ 405.140754][T11849] bridge_slave_0: entered allmulticast mode [ 405.148998][T11849] bridge_slave_0: entered promiscuous mode [ 405.181741][ T30] audit: type=1400 audit(2000000164.560:14794): avc: denied { recv } for pid=58 comm="kworker/1:1" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 405.403556][T11849] bridge0: port 2(bridge_slave_1) entered blocking state [ 405.419019][T11849] bridge0: port 2(bridge_slave_1) entered disabled state [ 405.430054][T11849] bridge_slave_1: entered allmulticast mode [ 405.459014][T11849] bridge_slave_1: entered promiscuous mode [ 405.679097][T11856] bridge0: port 1(bridge_slave_0) entered blocking state [ 405.686306][ T30] audit: type=1400 audit(2000000165.050:14795): avc: denied { recv } for pid=5862 comm="kworker/1:4" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 405.723867][T11856] bridge0: port 1(bridge_slave_0) entered disabled state [ 405.745472][T11856] bridge_slave_0: entered allmulticast mode [ 405.765982][T11856] bridge_slave_0: entered promiscuous mode [ 406.144530][ T30] audit: type=1400 audit(2000000165.530:14796): avc: denied { recv } for pid=5862 comm="kworker/1:4" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 406.210346][T11856] bridge0: port 2(bridge_slave_1) entered blocking state [ 406.230710][T11856] bridge0: port 2(bridge_slave_1) entered disabled state [ 406.237940][T11856] bridge_slave_1: entered allmulticast mode [ 406.267198][T11856] bridge_slave_1: entered promiscuous mode [ 406.387560][T11853] bridge0: port 1(bridge_slave_0) entered blocking state [ 406.399063][T11853] bridge0: port 1(bridge_slave_0) entered disabled state [ 406.418491][T11853] bridge_slave_0: entered allmulticast mode [ 406.429925][T11853] bridge_slave_0: entered promiscuous mode [ 406.454496][T11853] bridge0: port 2(bridge_slave_1) entered blocking state [ 406.475362][T11853] bridge0: port 2(bridge_slave_1) entered disabled state [ 406.488632][T11853] bridge_slave_1: entered allmulticast mode [ 406.502909][T11853] bridge_slave_1: entered promiscuous mode [ 406.670950][ T30] audit: type=1400 audit(2000000166.040:14797): avc: denied { recv } for pid=5862 comm="kworker/1:4" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 406.790910][ T30] audit: type=1400 audit(2000000166.170:14798): avc: denied { execmem } for pid=11899 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 406.850690][T11858] bridge0: port 1(bridge_slave_0) entered blocking state [ 406.857810][T11858] bridge0: port 1(bridge_slave_0) entered disabled state [ 406.901070][T11858] bridge_slave_0: entered allmulticast mode [ 406.908450][T11858] bridge_slave_0: entered promiscuous mode [ 406.925053][ T30] audit: type=1400 audit(2000000166.310:14799): avc: denied { egress } for pid=15 comm="ksoftirqd/0" saddr=fe80::1c daddr=ff02::2 netif=teql0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=1 [ 406.998082][T11858] bridge0: port 2(bridge_slave_1) entered blocking state [ 407.070616][ T30] audit: type=1400 audit(2000000166.310:14800): avc: denied { sendto } for pid=15 comm="ksoftirqd/0" saddr=fe80::1c daddr=ff02::2 netif=teql0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:node_t tclass=node permissive=1 [ 407.095706][T11858] bridge0: port 2(bridge_slave_1) entered disabled state [ 407.133122][T11858] bridge_slave_1: entered allmulticast mode [ 407.162604][T11858] bridge_slave_1: entered promiscuous mode [ 407.210769][ T30] audit: type=1400 audit(2000000166.550:14801): avc: denied { recv } for pid=5862 comm="kworker/1:4" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 407.394508][T11856] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 407.617187][T11853] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 407.685031][ T30] audit: type=1400 audit(2000000167.070:14802): avc: denied { recv } for pid=5862 comm="kworker/1:4" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 407.856275][ T30] audit: type=1400 audit(2000000167.240:14803): avc: denied { create } for pid=11900 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 407.925095][ T5827] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 407.946218][ T5827] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 407.961649][ T5827] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 407.969374][ T5827] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 407.985424][ T5827] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 408.036224][ T30] audit: type=1400 audit(2000000167.260:14804): avc: denied { read write } for pid=11900 comm="syz-executor" name="vhci" dev="devtmpfs" ino=1268 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 408.134116][T11856] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 408.368229][T11853] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 408.953496][T11858] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 409.018066][T11858] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 409.139369][ T5823] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 409.159152][ T5823] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 409.181576][ T5823] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 409.193951][ T5823] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 409.201599][ T5823] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 410.044317][ T5823] Bluetooth: hci0: command tx timeout [ 410.690608][ T30] kauditd_printk_skb: 23 callbacks suppressed [ 410.690625][ T30] audit: type=1400 audit(2000000170.070:14828): avc: denied { recv } for pid=5862 comm="kworker/1:4" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 410.870664][ T30] audit: type=1400 audit(2000000170.220:14829): avc: denied { create } for pid=11909 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 410.918652][ T5827] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 410.936520][ T5827] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 410.944541][ T5827] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 410.952959][ T5827] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 410.960803][ T5827] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 411.070633][ T30] audit: type=1400 audit(2000000170.240:14830): avc: denied { read write } for pid=11909 comm="syz-executor" name="vhci" dev="devtmpfs" ino=1268 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 411.130945][ T5827] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 411.157237][ T5827] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 411.180657][ T5827] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 411.188551][ T5827] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 411.210883][ T5827] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 411.302016][ T30] audit: type=1400 audit(2000000170.240:14831): avc: denied { read write open } for pid=11909 comm="syz-executor" path="/dev/vhci" dev="devtmpfs" ino=1268 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 411.330575][ T5827] Bluetooth: hci1: command tx timeout [ 411.419097][ T30] audit: type=1400 audit(2000000170.300:14832): avc: denied { ioctl } for pid=11909 comm="syz-executor" path="socket:[31539]" dev="sockfs" ino=31539 ioctlcmd=0x48c9 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 411.523015][ T30] audit: type=1400 audit(2000000170.360:14833): avc: denied { ioctl } for pid=11909 comm="syz-executor" path="socket:[31539]" dev="sockfs" ino=31539 ioctlcmd=0x48dd scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 411.610932][ T30] audit: type=1400 audit(2000000170.380:14834): avc: denied { read } for pid=11909 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 411.653203][ T30] audit: type=1400 audit(2000000170.380:14835): avc: denied { read open } for pid=11909 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 411.706347][ T30] audit: type=1400 audit(2000000170.410:14836): avc: denied { create } for pid=11911 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 411.737970][ T30] audit: type=1400 audit(2000000170.410:14837): avc: denied { read write } for pid=11911 comm="syz-executor" name="vhci" dev="devtmpfs" ino=1268 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 411.933620][T11884] chnl_net:caif_netlink_parms(): no params data found [ 412.121820][ T5827] Bluetooth: hci0: command tx timeout [ 412.921358][T11884] bridge0: port 1(bridge_slave_0) entered blocking state [ 412.928496][T11884] bridge0: port 1(bridge_slave_0) entered disabled state [ 412.970402][T11884] bridge_slave_0: entered allmulticast mode [ 412.992701][T11884] bridge_slave_0: entered promiscuous mode [ 413.081490][ T5827] Bluetooth: hci2: command tx timeout [ 413.140861][T11884] bridge0: port 2(bridge_slave_1) entered blocking state [ 413.147980][T11884] bridge0: port 2(bridge_slave_1) entered disabled state [ 413.212509][T11884] bridge_slave_1: entered allmulticast mode [ 413.250662][T11884] bridge_slave_1: entered promiscuous mode [ 413.320906][ T5827] Bluetooth: hci3: command tx timeout [ 413.401213][ T5823] Bluetooth: hci1: command tx timeout [ 413.662937][T11884] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 413.858890][T11884] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 414.201142][ T5823] Bluetooth: hci0: command tx timeout [ 414.270838][T11900] chnl_net:caif_netlink_parms(): no params data found [ 414.295578][T11903] chnl_net:caif_netlink_parms(): no params data found [ 414.342442][T11884] team0: Port device team_slave_0 added [ 414.523961][T11884] team0: Port device team_slave_1 added [ 415.163623][ T5823] Bluetooth: hci2: command tx timeout [ 415.337335][T11911] chnl_net:caif_netlink_parms(): no params data found [ 415.381274][T11884] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 415.388235][T11884] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 415.421344][ T5823] Bluetooth: hci3: command tx timeout [ 415.446963][T11884] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 415.491150][ T5823] Bluetooth: hci1: command tx timeout [ 415.645929][T11909] chnl_net:caif_netlink_parms(): no params data found [ 415.703315][T11884] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 415.710275][T11884] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 415.737176][ T30] kauditd_printk_skb: 22 callbacks suppressed [ 415.737191][ T30] audit: type=1400 audit(2000000175.100:14860): avc: denied { recv } for pid=5862 comm="kworker/1:4" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 415.810395][T11884] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 416.172535][ T30] audit: type=1400 audit(2000000175.560:14861): avc: denied { recv } for pid=5862 comm="kworker/1:4" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 416.280968][ T5823] Bluetooth: hci0: command tx timeout [ 416.377844][T11900] bridge0: port 1(bridge_slave_0) entered blocking state [ 416.390849][T11900] bridge0: port 1(bridge_slave_0) entered disabled state [ 416.414166][T11900] bridge_slave_0: entered allmulticast mode [ 416.436044][T11900] bridge_slave_0: entered promiscuous mode [ 416.585775][T11903] bridge0: port 1(bridge_slave_0) entered blocking state [ 416.599185][T11903] bridge0: port 1(bridge_slave_0) entered disabled state [ 416.620865][T11903] bridge_slave_0: entered allmulticast mode [ 416.640778][T11903] bridge_slave_0: entered promiscuous mode [ 416.654858][T11900] bridge0: port 2(bridge_slave_1) entered blocking state [ 416.670644][T11900] bridge0: port 2(bridge_slave_1) entered disabled state [ 416.677890][T11900] bridge_slave_1: entered allmulticast mode [ 416.711561][T11900] bridge_slave_1: entered promiscuous mode [ 416.730550][ T30] audit: type=1400 audit(2000000176.100:14862): avc: denied { recv } for pid=5862 comm="kworker/1:4" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 417.126350][T11903] bridge0: port 2(bridge_slave_1) entered blocking state [ 417.140639][T11903] bridge0: port 2(bridge_slave_1) entered disabled state [ 417.147884][T11903] bridge_slave_1: entered allmulticast mode [ 417.172128][ T30] audit: type=1400 audit(2000000176.550:14863): avc: denied { recv } for pid=5862 comm="kworker/1:4" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 417.202159][T11903] bridge_slave_1: entered promiscuous mode [ 417.243661][ T5823] Bluetooth: hci2: command tx timeout [ 417.480952][ T5823] Bluetooth: hci3: command tx timeout [ 417.505622][T11884] hsr_slave_0: entered promiscuous mode [ 417.525824][T11884] hsr_slave_1: entered promiscuous mode [ 417.553005][T11884] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 417.561309][ T5823] Bluetooth: hci1: command tx timeout [ 417.584095][T11884] Cannot create hsr debugfs directory [ 417.685500][ T30] audit: type=1400 audit(2000000177.060:14864): avc: denied { recv } for pid=5862 comm="kworker/1:4" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 417.930451][T11900] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 417.975109][T11900] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 418.116777][T11911] bridge0: port 1(bridge_slave_0) entered blocking state [ 418.133982][T11911] bridge0: port 1(bridge_slave_0) entered disabled state [ 418.154073][T11911] bridge_slave_0: entered allmulticast mode [ 418.171709][T11911] bridge_slave_0: entered promiscuous mode [ 418.190630][ T30] audit: type=1400 audit(2000000177.570:14865): avc: denied { recv } for pid=5862 comm="kworker/1:4" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 418.233482][T11911] bridge0: port 2(bridge_slave_1) entered blocking state [ 418.251540][T11911] bridge0: port 2(bridge_slave_1) entered disabled state [ 418.258795][T11911] bridge_slave_1: entered allmulticast mode [ 418.288807][T11911] bridge_slave_1: entered promiscuous mode [ 418.311571][T11903] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 418.361731][T11903] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 418.699446][ T30] audit: type=1400 audit(2000000178.080:14866): avc: denied { recv } for pid=5862 comm="kworker/1:4" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 419.200276][ T30] audit: type=1400 audit(2000000178.580:14867): avc: denied { recv } for pid=5862 comm="kworker/1:4" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 419.322652][ T5823] Bluetooth: hci2: command tx timeout [ 419.561680][ T5823] Bluetooth: hci3: command tx timeout [ 419.575107][T11909] bridge0: port 1(bridge_slave_0) entered blocking state [ 419.590689][T11909] bridge0: port 1(bridge_slave_0) entered disabled state [ 419.597968][T11909] bridge_slave_0: entered allmulticast mode [ 419.624757][T11909] bridge_slave_0: entered promiscuous mode [ 419.703930][ T30] audit: type=1400 audit(2000000179.090:14868): avc: denied { recv } for pid=5862 comm="kworker/1:4" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 419.773769][T11900] team0: Port device team_slave_0 added [ 419.848717][T11911] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 419.892896][T11911] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 419.927649][T11903] team0: Port device team_slave_0 added [ 419.941228][T11909] bridge0: port 2(bridge_slave_1) entered blocking state [ 419.948335][T11909] bridge0: port 2(bridge_slave_1) entered disabled state [ 419.977731][T11909] bridge_slave_1: entered allmulticast mode [ 420.000976][T11909] bridge_slave_1: entered promiscuous mode [ 420.110375][T11900] team0: Port device team_slave_1 added [ 420.175976][ T30] audit: type=1400 audit(2000000179.560:14869): avc: denied { recv } for pid=5862 comm="kworker/1:4" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 420.502607][T11911] team0: Port device team_slave_0 added [ 420.510380][T11903] team0: Port device team_slave_1 added [ 420.868960][T11909] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 420.992634][T11900] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 421.010530][T11900] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 421.091152][T11900] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 421.158530][T11911] team0: Port device team_slave_1 added [ 421.208395][ T30] kauditd_printk_skb: 1 callbacks suppressed [ 421.208410][ T30] audit: type=1400 audit(2000000180.590:14871): avc: denied { recv } for pid=5862 comm="kworker/1:4" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 421.278019][ T30] audit: type=1400 audit(2000000180.600:14872): avc: denied { recv } for pid=5862 comm="kworker/1:4" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 421.674927][T11909] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 421.737118][ T30] audit: type=1400 audit(2000000181.120:14873): avc: denied { recv } for pid=5862 comm="kworker/1:4" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 421.862891][T11900] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 421.869863][T11900] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 421.919014][T11900] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 422.070006][T11911] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 422.089327][T11911] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 422.130043][T11911] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 422.171258][T11903] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 422.178213][T11903] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 422.220552][ T30] audit: type=1400 audit(2000000181.590:14874): avc: denied { recv } for pid=5862 comm="kworker/1:4" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 422.276921][T11903] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 422.413887][T11911] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 422.422666][T11911] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 422.522452][T11911] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 422.563293][T11903] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 422.570257][T11903] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 422.629509][T11903] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 422.691706][ T30] audit: type=1400 audit(2000000182.070:14875): avc: denied { recv } for pid=5862 comm="kworker/1:4" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 422.942021][T11909] team0: Port device team_slave_0 added [ 423.195538][ T30] audit: type=1400 audit(2000000182.580:14876): avc: denied { recv } for pid=5862 comm="kworker/1:4" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 423.265080][T11900] hsr_slave_0: entered promiscuous mode [ 423.294483][T11900] hsr_slave_1: entered promiscuous mode [ 423.311489][T11900] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 423.319061][T11900] Cannot create hsr debugfs directory [ 423.586151][T11909] team0: Port device team_slave_1 added [ 423.711427][ T30] audit: type=1400 audit(2000000183.100:14877): avc: denied { recv } for pid=5862 comm="kworker/1:4" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 423.846935][T11911] hsr_slave_0: entered promiscuous mode [ 423.881788][T11911] hsr_slave_1: entered promiscuous mode [ 423.888517][T11911] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 423.910685][T11911] Cannot create hsr debugfs directory [ 424.240710][ T30] audit: type=1400 audit(2000000183.610:14878): avc: denied { recv } for pid=5862 comm="kworker/1:4" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 424.626074][T11909] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 424.656991][T11909] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 424.706775][T11909] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 424.735009][ T30] audit: type=1400 audit(2000000184.110:14879): avc: denied { recv } for pid=5862 comm="kworker/1:4" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 424.770693][T11909] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 424.777646][T11909] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 424.827762][T11909] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 424.861935][T11903] hsr_slave_0: entered promiscuous mode [ 424.871934][T11903] hsr_slave_1: entered promiscuous mode [ 424.878649][T11903] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 424.912880][T11903] Cannot create hsr debugfs directory [ 425.194452][ T30] audit: type=1400 audit(2000000184.580:14880): avc: denied { recv } for pid=5862 comm="kworker/1:4" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 425.917772][T11909] hsr_slave_0: entered promiscuous mode [ 425.931787][T11909] hsr_slave_1: entered promiscuous mode [ 425.952331][T11909] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 425.959907][T11909] Cannot create hsr debugfs directory [ 426.226588][ T30] kauditd_printk_skb: 1 callbacks suppressed [ 426.226603][ T30] audit: type=1400 audit(2000000185.610:14882): avc: denied { recv } for pid=58 comm="kworker/1:1" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 426.686646][ T30] audit: type=1400 audit(2000000186.070:14883): avc: denied { recv } for pid=5866 comm="kworker/1:5" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 427.228987][ T30] audit: type=1400 audit(2000000186.610:14884): avc: denied { recv } for pid=5866 comm="kworker/1:5" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 427.676772][ T30] audit: type=1400 audit(2000000187.060:14885): avc: denied { recv } for pid=1207 comm="kworker/1:2" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 428.234951][ T30] audit: type=1400 audit(2000000187.620:14886): avc: denied { recv } for pid=24 comm="kworker/1:0" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 428.705738][ T30] audit: type=1400 audit(2000000188.090:14887): avc: denied { recv } for pid=24 comm="kworker/1:0" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 429.213787][ T30] audit: type=1400 audit(2000000188.600:14888): avc: denied { recv } for pid=24 comm="kworker/1:0" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 429.256891][ T30] audit: type=1400 audit(2000000188.600:14889): avc: denied { recv } for pid=24 comm="kworker/1:0" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 429.334121][ T30] audit: type=1400 audit(2000000188.720:14890): avc: denied { egress } for pid=15 comm="ksoftirqd/0" saddr=fe80::1b daddr=ff02::2 netif=teql0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=1 [ 429.357757][ T30] audit: type=1400 audit(2000000188.720:14891): avc: denied { sendto } for pid=15 comm="ksoftirqd/0" saddr=fe80::1b daddr=ff02::2 netif=teql0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:node_t tclass=node permissive=1 [ 431.744847][ T30] kauditd_printk_skb: 4 callbacks suppressed [ 431.746658][ T30] audit: type=1400 audit(2000000191.130:14896): avc: denied { recv } for pid=24 comm="kworker/1:0" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 432.202851][ T30] audit: type=1400 audit(2000000191.590:14897): avc: denied { recv } for pid=5862 comm="kworker/1:4" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 432.713603][ T30] audit: type=1400 audit(2000000192.100:14898): avc: denied { recv } for pid=5862 comm="kworker/1:4" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 433.219334][ T30] audit: type=1400 audit(2000000192.600:14899): avc: denied { recv } for pid=24 comm="kworker/1:0" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 433.737033][ T30] audit: type=1400 audit(2000000193.120:14900): avc: denied { recv } for pid=5866 comm="kworker/1:5" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 434.193255][ T30] audit: type=1400 audit(2000000193.580:14901): avc: denied { recv } for pid=5824 comm="kworker/1:3" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 434.727686][ T30] audit: type=1400 audit(2000000194.110:14902): avc: denied { recv } for pid=5913 comm="kworker/1:8" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 435.254311][ T30] audit: type=1400 audit(2000000194.640:14903): avc: denied { recv } for pid=5913 comm="kworker/1:8" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 435.292317][ T30] audit: type=1400 audit(2000000194.640:14904): avc: denied { recv } for pid=5913 comm="kworker/1:8" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 435.744226][ T30] audit: type=1400 audit(2000000195.130:14905): avc: denied { recv } for pid=5913 comm="kworker/1:8" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 437.220232][ T30] kauditd_printk_skb: 4 callbacks suppressed [ 437.220247][ T30] audit: type=1400 audit(2000000196.600:14910): avc: denied { recv } for pid=5913 comm="kworker/1:8" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 437.703163][ T30] audit: type=1400 audit(2000000197.090:14911): avc: denied { recv } for pid=5913 comm="kworker/1:8" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 438.243973][ T30] audit: type=1400 audit(2000000197.630:14912): avc: denied { recv } for pid=5913 comm="kworker/1:8" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 438.400989][ T30] audit: type=1400 audit(2000000197.780:14913): avc: denied { execmem } for pid=11945 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 438.718445][ T30] audit: type=1400 audit(2000000198.100:14914): avc: denied { recv } for pid=5913 comm="kworker/1:8" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 438.923660][ T30] audit: type=1400 audit(2000000198.310:14915): avc: denied { create } for pid=11946 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 438.962563][ T5827] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 438.975655][ T5827] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 438.993777][ T5827] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 439.001916][ T5827] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 439.009395][ T5827] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 439.070957][ T30] audit: type=1400 audit(2000000198.340:14916): avc: denied { read write } for pid=11946 comm="syz-executor" name="vhci" dev="devtmpfs" ino=1268 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 439.150708][ T30] audit: type=1400 audit(2000000198.340:14917): avc: denied { read write open } for pid=11946 comm="syz-executor" path="/dev/vhci" dev="devtmpfs" ino=1268 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 439.230789][ T30] audit: type=1400 audit(2000000198.420:14918): avc: denied { ioctl } for pid=11946 comm="syz-executor" path="socket:[31862]" dev="sockfs" ino=31862 ioctlcmd=0x48c9 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 439.322471][ T30] audit: type=1400 audit(2000000198.420:14919): avc: denied { ioctl } for pid=11946 comm="syz-executor" path="socket:[31862]" dev="sockfs" ino=31862 ioctlcmd=0x48dd scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 439.581785][ T1298] ieee802154 phy0 wpan0: encryption failed: -22 [ 439.588100][ T1298] ieee802154 phy1 wpan1: encryption failed: -22 [ 439.999477][T11946] chnl_net:caif_netlink_parms(): no params data found [ 441.081248][ T5823] Bluetooth: hci4: command tx timeout [ 442.716025][ T30] kauditd_printk_skb: 11 callbacks suppressed [ 442.716042][ T30] audit: type=1400 audit(2000000202.100:14931): avc: denied { recv } for pid=5862 comm="kworker/1:4" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 443.160940][ T5823] Bluetooth: hci4: command tx timeout [ 443.250741][ T30] audit: type=1400 audit(2000000202.620:14932): avc: denied { recv } for pid=5862 comm="kworker/1:4" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 443.703965][ T30] audit: type=1400 audit(2000000203.090:14933): avc: denied { recv } for pid=5862 comm="kworker/1:4" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 444.234541][ T30] audit: type=1400 audit(2000000203.620:14934): avc: denied { recv } for pid=5871 comm="kworker/1:6" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 444.277363][ T30] audit: type=1400 audit(2000000203.620:14935): avc: denied { recv } for pid=5871 comm="kworker/1:6" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 444.739046][ T30] audit: type=1400 audit(2000000204.120:14936): avc: denied { recv } for pid=5871 comm="kworker/1:6" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 445.229219][ T30] audit: type=1400 audit(2000000204.610:14937): avc: denied { recv } for pid=5871 comm="kworker/1:6" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 445.255593][ T5823] Bluetooth: hci4: command tx timeout [ 445.708967][ T30] audit: type=1400 audit(2000000205.090:14938): avc: denied { recv } for pid=5871 comm="kworker/1:6" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 446.260251][ T30] audit: type=1400 audit(2000000205.640:14939): avc: denied { recv } for pid=5871 comm="kworker/1:6" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 446.724111][ T30] audit: type=1400 audit(2000000206.110:14940): avc: denied { recv } for pid=5871 comm="kworker/1:6" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 447.322978][ T5823] Bluetooth: hci4: command tx timeout [ 447.732534][ T30] kauditd_printk_skb: 1 callbacks suppressed [ 447.732563][ T30] audit: type=1400 audit(2000000207.120:14942): avc: denied { recv } for pid=5871 comm="kworker/1:6" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 448.267332][ T30] audit: type=1400 audit(2000000207.650:14943): avc: denied { recv } for pid=5871 comm="kworker/1:6" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 448.749485][ T30] audit: type=1400 audit(2000000208.130:14944): avc: denied { recv } for pid=5871 comm="kworker/1:6" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 449.232478][ T30] audit: type=1400 audit(2000000208.610:14945): avc: denied { recv } for pid=5913 comm="kworker/1:8" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 449.717128][ T30] audit: type=1400 audit(2000000209.100:14946): avc: denied { recv } for pid=24 comm="kworker/1:0" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 449.832401][ T30] audit: type=1400 audit(2000000209.210:14947): avc: denied { egress } for pid=15 comm="ksoftirqd/0" saddr=fe80::1c daddr=ff02::2 netif=teql0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=1 [ 449.872341][ T30] audit: type=1400 audit(2000000209.210:14948): avc: denied { sendto } for pid=15 comm="ksoftirqd/0" saddr=fe80::1c daddr=ff02::2 netif=teql0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:node_t tclass=node permissive=1 [ 449.914587][ T30] audit: type=1400 audit(2000000209.220:14949): avc: denied { egress } for pid=15 comm="ksoftirqd/0" saddr=fe80::1b daddr=ff02::2 netif=teql0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=1 [ 449.956837][ T30] audit: type=1400 audit(2000000209.220:14950): avc: denied { sendto } for pid=15 comm="ksoftirqd/0" saddr=fe80::1b daddr=ff02::2 netif=teql0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:node_t tclass=node permissive=1 [ 450.224804][ T30] audit: type=1400 audit(2000000209.610:14951): avc: denied { recv } for pid=24 comm="kworker/1:0" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 452.751558][ T30] kauditd_printk_skb: 5 callbacks suppressed [ 452.751574][ T30] audit: type=1400 audit(2000000212.140:14957): avc: denied { recv } for pid=1207 comm="kworker/1:2" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 452.835471][ T30] audit: type=1400 audit(2000000212.140:14958): avc: denied { recv } for pid=1207 comm="kworker/1:2" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 453.236572][ T30] audit: type=1400 audit(2000000212.620:14959): avc: denied { recv } for pid=1207 comm="kworker/1:2" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 453.277348][ T30] audit: type=1400 audit(2000000212.620:14960): avc: denied { recv } for pid=1207 comm="kworker/1:2" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 453.766982][ T30] audit: type=1400 audit(2000000213.150:14961): avc: denied { recv } for pid=5862 comm="kworker/1:4" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 454.229998][ T30] audit: type=1400 audit(2000000213.610:14962): avc: denied { recv } for pid=5862 comm="kworker/1:4" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 454.756549][ T30] audit: type=1400 audit(2000000214.140:14963): avc: denied { recv } for pid=5862 comm="kworker/1:4" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 454.966681][ T30] audit: type=1400 audit(2000000214.350:14964): avc: denied { egress } for pid=15 comm="ksoftirqd/0" saddr=fe80::1b daddr=ff02::2 netif=teql0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=1 [ 455.016505][ T30] audit: type=1400 audit(2000000214.350:14965): avc: denied { sendto } for pid=15 comm="ksoftirqd/0" saddr=fe80::1b daddr=ff02::2 netif=teql0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:node_t tclass=node permissive=1 [ 455.054472][ T30] audit: type=1400 audit(2000000214.350:14966): avc: denied { egress } for pid=15 comm="ksoftirqd/0" saddr=fe80::1c daddr=ff02::2 netif=teql0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=1 [ 457.772778][ T30] kauditd_printk_skb: 6 callbacks suppressed [ 457.772793][ T30] audit: type=1400 audit(2000000217.160:14973): avc: denied { recv } for pid=5913 comm="kworker/1:8" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 458.238243][ T30] audit: type=1400 audit(2000000217.620:14974): avc: denied { recv } for pid=1207 comm="kworker/1:2" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 458.274631][ T30] audit: type=1400 audit(2000000217.630:14975): avc: denied { recv } for pid=1207 comm="kworker/1:2" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 458.774930][ T30] audit: type=1400 audit(2000000218.160:14976): avc: denied { recv } for pid=1207 comm="kworker/1:2" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 459.259795][ T30] audit: type=1400 audit(2000000218.640:14977): avc: denied { recv } for pid=1207 comm="kworker/1:2" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 459.747445][ T30] audit: type=1400 audit(2000000219.130:14978): avc: denied { recv } for pid=1207 comm="kworker/1:2" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 460.080570][ T30] audit: type=1400 audit(2000000219.460:14979): avc: denied { egress } for pid=15 comm="ksoftirqd/0" saddr=fe80::1c daddr=ff02::2 netif=teql0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=1 [ 460.130630][ T30] audit: type=1400 audit(2000000219.460:14980): avc: denied { sendto } for pid=15 comm="ksoftirqd/0" saddr=fe80::1c daddr=ff02::2 netif=teql0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:node_t tclass=node permissive=1 [ 460.262924][ T30] audit: type=1400 audit(2000000219.650:14981): avc: denied { recv } for pid=1207 comm="kworker/1:2" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 460.741741][ T30] audit: type=1400 audit(2000000220.120:14982): avc: denied { recv } for pid=1207 comm="kworker/1:2" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 463.258369][ T30] kauditd_printk_skb: 5 callbacks suppressed [ 463.258385][ T30] audit: type=1400 audit(2000000222.640:14988): avc: denied { recv } for pid=5862 comm="kworker/1:4" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 463.781601][ T30] audit: type=1400 audit(2000000223.170:14989): avc: denied { recv } for pid=5862 comm="kworker/1:4" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 464.247026][ T30] audit: type=1400 audit(2000000223.630:14990): avc: denied { recv } for pid=5913 comm="kworker/1:8" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 464.286533][ T30] audit: type=1400 audit(2000000223.630:14991): avc: denied { recv } for pid=5913 comm="kworker/1:8" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 464.759024][ T30] audit: type=1400 audit(2000000224.140:14992): avc: denied { recv } for pid=5913 comm="kworker/1:8" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 464.808129][ T30] audit: type=1400 audit(2000000224.150:14993): avc: denied { recv } for pid=5913 comm="kworker/1:8" saddr=10.128.0.169 src=30006 daddr=10.128.0.63 dest=36440 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 465.177118][ T30] audit: type=1400 audit(2000000224.550:14994): avc: denied { egress } for pid=15 comm="ksoftirqd/0" saddr=fe80::1b daddr=ff02::2 netif=teql0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=1 [ 465.218239][ T30] audit: type=1400 audit(2000000224.550:14995): avc: denied { sendto } for pid=15 comm="ksoftirqd/0" saddr=fe80::1b daddr=ff02::2 netif=teql0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:node_t tclass=node permissive=1 [ 465.276137][ T30] audit: type=1400 audit(2000000224.560:14996): avc: denied { egress } for pid=15 comm="ksoftirqd/0" saddr=fe80::1b daddr=ff02::2 netif=teql0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=1 [ 465.320011][ T30] audit: type=1400 audit(2000000224.560:14997): avc: denied { sendto } for pid=15 comm="ksoftirqd/0" saddr=fe80::1b daddr=ff02::2 netif=teql0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:node_t tclass=node permissive=1 [ 467.091769][ T31] INFO: task kworker/u8:2:36 blocked for more than 143 seconds. [ 467.099435][ T31] Not tainted 6.15.0-rc7-syzkaller-00007-g4a95bc121ccd #0 SYZFAIL: failed to recv rpc [ 467.150582][ T31] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 467.159281][ T31] task:kworker/u8:2 state:D stack:23512 pid:36 tgid:36 ppid:2 task_flags:0x4208060 flags:0x00004000 fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 467.250617][ T31] Workqueue: ib-unreg-wq ib_unregister_work [ 467.256565][ T31] Call Trace: [ 467.259840][ T31] [ 467.347586][ T31] __schedule+0x116f/0x5de0 [ 467.403784][ T31] ? __lock_acquire+0x5ca/0x1ba0 [ 467.408777][ T31] ? __pfx_pn_socket_create+0x5/0x10 [ 467.469448][ T31] ? __pfx___schedule+0x10/0x10 [ 467.491046][ T31] ? find_held_lock+0x2b/0x80 [ 467.495767][ T31] ? schedule+0x2d7/0x3a0 [ 467.500107][ T31] schedule+0xe7/0x3a0 [ 467.570785][ T31] schedule_timeout+0x257/0x290 [ 467.575683][ T31] ? __pfx_schedule_timeout+0x10/0x10 [ 467.616907][ T31] ? mark_held_locks+0x49/0x80 [ 467.641344][ T31] ? _raw_spin_unlock_irq+0x23/0x50 [ 467.646591][ T31] __wait_for_common+0x2ff/0x4e0 [ 467.683205][ T31] ? __pfx_schedule_timeout+0x10/0x10 [ 467.688623][ T31] ? __pfx___wait_for_common+0x10/0x10 [ 467.730625][ T31] ? ib_cq_pool_cleanup+0x220/0x360 [ 467.735881][ T31] disable_device+0x16f/0x280 [ 467.754185][ T31] ? __pfx_disable_device+0x10/0x10 [ 467.759432][ T31] __ib_unregister_device+0x2b4/0x480 [ 467.779183][ T31] ? rcu_is_watching+0x12/0xc0 [ 467.797815][ T31] ib_unregister_work+0x19/0x30 [ 467.811558][ T31] process_one_work+0x9cf/0x1b70 [ 467.816540][ T31] ? __pfx_process_one_work+0x10/0x10 [ 467.836277][ T31] ? assign_work+0x1a0/0x250 [ 467.850490][ T31] worker_thread+0x6c8/0xf10 [ 467.855124][ T31] ? __kthread_parkme+0x19e/0x250 [ 467.860162][ T31] ? __pfx_worker_thread+0x10/0x10 [ 467.881503][ T31] kthread+0x3c2/0x780 [ 467.885607][ T31] ? __pfx_kthread+0x10/0x10 [ 467.890198][ T31] ? __pfx_kthread+0x10/0x10 [ 467.920740][ T31] ? __pfx_kthread+0x10/0x10 [ 467.925370][ T31] ? __pfx_kthread+0x10/0x10 [ 467.929960][ T31] ? rcu_is_watching+0x12/0xc0 [ 467.949872][ T31] ? __pfx_kthread+0x10/0x10 [ 467.956261][ T31] ret_from_fork+0x45/0x80 [ 467.971623][ T31] ? __pfx_kthread+0x10/0x10 [ 467.976238][ T31] ret_from_fork_asm+0x1a/0x30 [ 467.994283][ T31] [ 467.997439][ T31] [ 467.997439][ T31] Showing all locks held in the system: [ 468.030167][ T31] 2 locks held by kworker/1:0/24: [ 468.052003][ T31] 1 lock held by khungtaskd/31: [ 468.056879][ T31] #0: ffffffff8e3bfc00 (rcu_read_lock){....}-{1:3}, at: debug_show_all_locks+0x36/0x1c0 [ 468.086185][ T31] 3 locks held by kworker/u8:2/36: [ 468.099319][ T31] #0: ffff888146ab9148 ((wq_completion)ib-unreg-wq){+.+.}-{0:0}, at: process_one_work+0x12a2/0x1b70 [ 468.123959][ T31] #1: ffffc90000ad7d18 ((work_completion)(&device->unregistration_work)){+.+.}-{0:0}, at: process_one_work+0x929/0x1b70 [ 468.155137][ T31] #2: ffff88807fdcc6d0 (&device->unregistration_lock){+.+.}-{4:4}, at: __ib_unregister_device+0x23b/0x480 [ 468.180594][ T31] 2 locks held by kworker/1:2/1207: [ 468.185822][ T31] 2 locks held by getty/5577: [ 468.204003][ T31] #0: ffff88814dd160a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x24/0x80 [ 468.240858][ T31] #1: ffffc9000333b2f0 (&ldata->atomic_read_lock){+.+.}-{4:4}, at: n_tty_read+0x41b/0x14f0 [ 468.260524][ T31] 3 locks held by kworker/1:3/5824: [ 468.265746][ T31] 2 locks held by kworker/1:4/5862: [ 468.286079][ T31] 2 locks held by kworker/1:6/5871: [ 468.300839][ T31] 7 locks held by kworker/1:8/5913: [ 468.306058][ T31] 3 locks held by kworker/u8:12/8821: [ 468.328272][ T31] #0: ffff8880b8439dd8 (&rq->__lock){-.-.}-{2:2}, at: raw_spin_rq_lock_nested+0x29/0x130 [ 468.351484][ T31] #1: ffffc9000f0d7d18 ((work_completion)(&(&bat_priv->nc.work)->work)){+.+.}-{0:0}, at: process_one_work+0x929/0x1b70 [ 468.379209][ T31] #2: ffff8880b84256d8 (&base->lock){-.-.}-{2:2}, at: lock_timer_base+0x127/0x1d0 [ 468.400585][ T31] 3 locks held by kworker/u8:13/8825: [ 468.405972][ T31] #0: ffff88814d5dd948 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: process_one_work+0x12a2/0x1b70 [ 468.434942][ T31] #1: ffffc9000b18fd18 ((work_completion)(&(&net->ipv6.addr_chk_work)->work)){+.+.}-{0:0}, at: process_one_work+0x929/0x1b70 [ 468.469934][ T31] #2: ffffffff901289e8 (rtnl_mutex){+.+.}-{4:4}, at: addrconf_verify_work+0x12/0x30 [ 468.490580][ T31] 4 locks held by kworker/u8:14/8827: [ 468.495970][ T31] #0: ffff88801c2f3948 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x12a2/0x1b70 [ 468.523212][ T31] #1: ffffc9001badfd18 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x929/0x1b70 [ 468.540715][ T31] #2: ffffffff90112b50 (pernet_ops_rwsem){++++}-{4:4}, at: cleanup_net+0xc9/0xb30 [ 468.550069][ T31] #3: ffffffff901289e8 (rtnl_mutex){+.+.}-{4:4}, at: netdev_run_todo+0xe33/0x1320 [ 468.587768][ T31] 3 locks held by kworker/u8:15/8829: [ 468.596994][ T31] #0: ffff88801b481148 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_one_work+0x12a2/0x1b70 [ 468.640664][ T31] #1: ffffc9000ac4fd18 ((linkwatch_work).work){+.+.}-{0:0}, at: process_one_work+0x929/0x1b70 [ 468.660598][ T31] #2: ffffffff901289e8 (rtnl_mutex){+.+.}-{4:4}, at: linkwatch_event+0x51/0xc0 [ 468.669706][ T31] 1 lock held by syz-executor/11800: [ 468.709962][ T31] #0: ffffffff8e3cb000 (rcu_state.barrier_mutex){+.+.}-{4:4}, at: rcu_barrier+0x48/0x6e0 [ 468.728347][ T31] 1 lock held by syz-executor/11849: [ 468.740874][ T31] #0: ffffffff8e3cb000 (rcu_state.barrier_mutex){+.+.}-{4:4}, at: rcu_barrier+0x48/0x6e0 [ 468.766795][ T31] 1 lock held by syz-executor/11853: [ 468.774788][ T31] #0: ffffffff8e3cb000 (rcu_state.barrier_mutex){+.+.}-{4:4}, at: rcu_barrier+0x48/0x6e0 [ 468.801344][ T31] 1 lock held by syz-executor/11856: [ 468.806641][ T31] #0: ffffffff8e3cb000 (rcu_state.barrier_mutex){+.+.}-{4:4}, at: rcu_barrier+0x48/0x6e0 [ 468.836312][ T31] 1 lock held by syz-executor/11858: [ 468.849815][ T31] #0: ffffffff8e3cb000 (rcu_state.barrier_mutex){+.+.}-{4:4}, at: rcu_barrier+0x48/0x6e0 [ 468.870541][ T31] 7 locks held by syz-executor/11884: [ 468.875926][ T31] #0: ffff888024406420 (sb_writers#8){.+.+}-{0:0}, at: ksys_write+0x12a/0x240 [ 468.911354][ T31] #1: ffff88803462d088 (&of->mutex){+.+.}-{4:4}, at: kernfs_fop_write_iter+0x28f/0x510 [ 468.932909][ T31] #2: ffff888141fe4008 (kn->active#52){.+.+}-{0:0}, at: kernfs_fop_write_iter+0x2b2/0x510 [ 468.956523][ T31] #3: ffffffff8f6caa28 (nsim_bus_dev_list_lock){+.+.}-{4:4}, at: del_device_store+0xd1/0x4a0 [ 468.980683][ T31] #4: ffff8880691b10e8 (&dev->mutex){....}-{4:4}, at: device_release_driver_internal+0xa4/0x620 [ 469.008811][ T31] #5: ffff8880691b2250 (&devlink->lock_key#11){+.+.}-{4:4}, at: nsim_drv_remove+0x4a/0x1d0 [ 469.040756][ T31] #6: ffffffff8e3cb000 (rcu_state.barrier_mutex){+.+.}-{4:4}, at: rcu_barrier+0x48/0x6e0 [ 469.060924][ T31] 4 locks held by syz-executor/11900: [ 469.066309][ T31] #0: ffff888024406420 (sb_writers#8){.+.+}-{0:0}, at: ksys_write+0x12a/0x240 [ 469.098439][ T31] #1: ffff88805c42c088 (&of->mutex){+.+.}-{4:4}, at: kernfs_fop_write_iter+0x28f/0x510 [ 469.121412][ T31] #2: ffff888141fe4008 (kn->active#52){.+.+}-{0:0}, at: kernfs_fop_write_iter+0x2b2/0x510 [ 469.150796][ T31] #3: ffffffff8f6caa28 (nsim_bus_dev_list_lock){+.+.}-{4:4}, at: del_device_store+0xd1/0x4a0 [ 469.178708][ T31] 4 locks held by syz-executor/11903: [ 469.191687][ T31] #0: ffff888024406420 (sb_writers#8){.+.+}-{0:0}, at: ksys_write+0x12a/0x240 [ 469.213810][ T31] #1: ffff88804b79ac88 (&of->mutex){+.+.}-{4:4}, at: kernfs_fop_write_iter+0x28f/0x510 [ 469.243348][ T31] #2: ffff888141fe4008 (kn->active#52){.+.+}-{0:0}, at: kernfs_fop_write_iter+0x2b2/0x510 [ 469.270762][ T31] #3: ffffffff8f6caa28 (nsim_bus_dev_list_lock){+.+.}-{4:4}, at: del_device_store+0xd1/0x4a0 [ 469.290800][ T31] 4 locks held by syz-executor/11909: [ 469.296195][ T31] #0: ffff888024406420 (sb_writers#8){.+.+}-{0:0}, at: ksys_write+0x12a/0x240 [ 469.320182][ T31] #1: ffff88806c2fc088 (&of->mutex){+.+.}-{4:4}, at: kernfs_fop_write_iter+0x28f/0x510 [ 469.338269][ T31] #2: ffff888141fe4008 (kn->active#52){.+.+}-{0:0}, at: kernfs_fop_write_iter+0x2b2/0x510 [ 469.370623][ T31] #3: ffffffff8f6caa28 (nsim_bus_dev_list_lock){+.+.}-{4:4}, at: del_device_store+0xd1/0x4a0 [ 469.394934][ T31] 4 locks held by syz-executor/11911: [ 469.400321][ T31] #0: ffff888024406420 (sb_writers#8){.+.+}-{0:0}, at: ksys_write+0x12a/0x240 [ 469.420589][ T31] #1: ffff8880672ff488 (&of->mutex){+.+.}-{4:4}, at: kernfs_fop_write_iter+0x28f/0x510 [ 469.430378][ T31] #2: ffff888141fe4008 (kn->active#52){.+.+}-{0:0}, at: kernfs_fop_write_iter+0x2b2/0x510 [ 469.467131][ T31] #3: ffffffff8f6caa28 (nsim_bus_dev_list_lock){+.+.}-{4:4}, at: del_device_store+0xd1/0x4a0 [ 469.491414][ T31] 3 locks held by syz-executor/11946: [ 469.496810][ T31] #0: ffffffff8f4f1e00 (&ops->srcu#2){.+.+}-{0:0}, at: rtnl_link_ops_get+0x113/0x2c0 [ 469.524555][ T31] #1: ffffffff901289e8 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_newlink+0x600/0x2000 [ 469.548739][ T31] #2: ffffffff8e3cb138 (rcu_state.exp_mutex){+.+.}-{4:4}, at: exp_funnel_lock+0x280/0x3c0 [ 469.576926][ T31] [ 469.579279][ T31] ============================================= [ 469.579279][ T31] [ 469.605135][ T31] NMI backtrace for cpu 0 [ 469.605153][ T31] CPU: 0 UID: 0 PID: 31 Comm: khungtaskd Not tainted 6.15.0-rc7-syzkaller-00007-g4a95bc121ccd #0 PREEMPT(full) [ 469.605174][ T31] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 469.605184][ T31] Call Trace: [ 469.605190][ T31] [ 469.605197][ T31] dump_stack_lvl+0x116/0x1f0 [ 469.605227][ T31] nmi_cpu_backtrace+0x27b/0x390 [ 469.605248][ T31] ? __pfx_nmi_raise_cpu_backtrace+0x10/0x10 [ 469.605267][ T31] nmi_trigger_cpumask_backtrace+0x29c/0x300 [ 469.605290][ T31] watchdog+0xf70/0x12c0 [ 469.605313][ T31] ? __pfx_watchdog+0x10/0x10 [ 469.605329][ T31] ? lockdep_hardirqs_on+0x7c/0x110 [ 469.605355][ T31] ? __kthread_parkme+0x19e/0x250 [ 469.605381][ T31] ? __pfx_watchdog+0x10/0x10 [ 469.605398][ T31] kthread+0x3c2/0x780 [ 469.605416][ T31] ? __pfx_kthread+0x10/0x10 [ 469.605430][ T31] ? __pfx_kthread+0x10/0x10 [ 469.605445][ T31] ? __pfx_kthread+0x10/0x10 [ 469.605461][ T31] ? __pfx_kthread+0x10/0x10 [ 469.605476][ T31] ? rcu_is_watching+0x12/0xc0 [ 469.605498][ T31] ? __pfx_kthread+0x10/0x10 [ 469.605515][ T31] ret_from_fork+0x45/0x80 [ 469.605531][ T31] ? __pfx_kthread+0x10/0x10 [ 469.605548][ T31] ret_from_fork_asm+0x1a/0x30 [ 469.605585][ T31] [ 469.605591][ T31] Sending NMI from CPU 0 to CPUs 1: [ 469.739715][ C1] NMI backtrace for cpu 1 [ 469.739729][ C1] CPU: 1 UID: 0 PID: 5871 Comm: kworker/1:6 Not tainted 6.15.0-rc7-syzkaller-00007-g4a95bc121ccd #0 PREEMPT(full) [ 469.739748][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 469.739757][ C1] Workqueue: wg-crypt-wg1 wg_packet_decrypt_worker [ 469.739780][ C1] RIP: 0010:stack_trace_consume_entry+0x93/0x170 [ 469.739800][ C1] Code: 00 00 00 fc ff df 48 8d 7b 0c 48 89 fa 48 c1 ea 03 0f b6 14 02 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 98 00 00 00 <8b> 43 0c 85 c0 75 57 48 b8 00 00 00 00 00 fc ff df 48 89 da 48 c1 [ 469.739814][ C1] RSP: 0018:ffffc90000a07aa8 EFLAGS: 00000246 [ 469.739824][ C1] RAX: 0000000000000007 RBX: ffffc90000a07b88 RCX: ffffc90000a07a1c [ 469.739833][ C1] RDX: 0000000000000000 RSI: ffffffff89d60bbe RDI: ffffc90000a07b94 [ 469.739842][ C1] RBP: 000000000000000d R08: 0000000000000001 R09: 0000000000000000 [ 469.739850][ C1] R10: 0000000000000005 R11: 000000000008d5fb R12: ffffffff81a708b0 [ 469.739858][ C1] R13: ffffc90000a07b88 R14: 0000000000000000 R15: ffff888025e44880 [ 469.739867][ C1] FS: 0000000000000000(0000) GS:ffff888124ada000(0000) knlGS:0000000000000000 [ 469.739881][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 469.739890][ C1] CR2: 000055556e4015c8 CR3: 000000000e180000 CR4: 00000000003526f0 [ 469.739898][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 469.739906][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 469.739914][ C1] Call Trace: [ 469.739918][ C1] [ 469.739923][ C1] ? unwind_get_return_address+0x59/0xa0 [ 469.739941][ C1] arch_stack_walk+0x85/0x100 [ 469.739960][ C1] ? ip_local_out+0x33e/0x4a0 [ 469.739979][ C1] stack_trace_save+0x8e/0xc0 [ 469.739995][ C1] ? __pfx_stack_trace_save+0x10/0x10 [ 469.740011][ C1] ? __pfx_type_attribute_bounds_av+0x10/0x10 [ 469.740032][ C1] kasan_save_stack+0x33/0x60 [ 469.740044][ C1] ? kasan_save_stack+0x33/0x60 [ 469.740055][ C1] ? kasan_save_track+0x14/0x30 [ 469.740067][ C1] ? __kasan_slab_alloc+0x89/0x90 [ 469.740078][ C1] ? kmem_cache_alloc_noprof+0x1cb/0x3b0 [ 469.740091][ C1] ? avc_alloc_node+0x24/0x6a0 [ 469.740103][ C1] ? avc_compute_av+0x100/0x7f0 [ 469.740114][ C1] ? avc_perm_nonode+0xab/0x180 [ 469.740126][ C1] ? avc_has_perm_noaudit+0x2de/0x3b0 [ 469.740139][ C1] ? avc_has_perm+0xc0/0x1c0 [ 469.740150][ C1] ? selinux_ip_postroute+0xba7/0xde0 [ 469.740166][ C1] ? nf_hook_slow+0xbb/0x200 [ 469.740178][ C1] ? nf_hook+0x370/0x680 [ 469.740191][ C1] ? ip_output+0x1bc/0x2a0 [ 469.740219][ C1] kasan_save_track+0x14/0x30 [ 469.740231][ C1] __kasan_slab_alloc+0x89/0x90 [ 469.740244][ C1] kmem_cache_alloc_noprof+0x1cb/0x3b0 [ 469.740256][ C1] ? do_raw_spin_lock+0x12c/0x2b0 [ 469.740270][ C1] ? avc_alloc_node+0x24/0x6a0 [ 469.740284][ C1] avc_alloc_node+0x24/0x6a0 [ 469.740296][ C1] ? mark_held_locks+0x49/0x80 [ 469.740314][ C1] ? _raw_spin_unlock_irqrestore+0x52/0x80 [ 469.740333][ C1] avc_compute_av+0x100/0x7f0 [ 469.740348][ C1] avc_perm_nonode+0xab/0x180 [ 469.740361][ C1] ? __pfx_avc_perm_nonode+0x10/0x10 [ 469.740375][ C1] ? find_held_lock+0x2b/0x80 [ 469.740391][ C1] ? avc_has_perm_noaudit+0x2bd/0x3b0 [ 469.740406][ C1] avc_has_perm_noaudit+0x2de/0x3b0 [ 469.740421][ C1] avc_has_perm+0xc0/0x1c0 [ 469.740435][ C1] ? __pfx_avc_has_perm+0x10/0x10 [ 469.740452][ C1] ? sel_netif_sid+0x1fe/0x950 [ 469.740472][ C1] selinux_ip_postroute+0xba7/0xde0 [ 469.740491][ C1] ? __pfx_selinux_ip_postroute+0x10/0x10 [ 469.740510][ C1] ? __pfx_ipt_do_table+0x10/0x10 [ 469.740533][ C1] ? nf_nat_ipv4_out+0xb2/0x520 [ 469.740559][ C1] ? __pfx_selinux_ip_postroute+0x10/0x10 [ 469.740575][ C1] nf_hook_slow+0xbb/0x200 [ 469.740589][ C1] nf_hook+0x370/0x680 [ 469.740603][ C1] ? __pfx_ip_finish_output+0x10/0x10 [ 469.740619][ C1] ? __pfx_nf_hook+0x10/0x10 [ 469.740633][ C1] ? rcu_is_watching+0x12/0xc0 [ 469.740649][ C1] ? __pfx_ip_finish_output+0x10/0x10 [ 469.740665][ C1] ? do_csum+0x26f/0x2d0 [ 469.740679][ C1] ip_output+0x1bc/0x2a0 [ 469.740694][ C1] ? __pfx_ip_finish_output+0x10/0x10 [ 469.740709][ C1] ? __pfx_ip_output+0x10/0x10 [ 469.740725][ C1] ip_local_out+0x33e/0x4a0 [ 469.740741][ C1] synproxy_send_tcp.isra.0+0x439/0x630 [ 469.740757][ C1] synproxy_send_client_synack+0x6f6/0x8f0 [ 469.740775][ C1] ? __pfx_synproxy_send_client_synack+0x10/0x10 [ 469.740791][ C1] ? nft_masq_dump+0x128/0x200 [ 469.740807][ C1] nft_synproxy_do_eval+0xa63/0xd80 [ 469.740826][ C1] ? __pfx_nft_synproxy_do_eval+0x10/0x10 [ 469.740844][ C1] ? ip_vs_conn_out_get+0x67f/0xb20 [ 469.740864][ C1] ? ip_vs_service_find+0x19d/0x1020 [ 469.740885][ C1] ? __pfx_nft_synproxy_eval+0x10/0x10 [ 469.740903][ C1] nft_do_chain+0x2e9/0x1920 [ 469.740923][ C1] ? __pfx_nft_do_chain+0x10/0x10 [ 469.740943][ C1] ? ip_vs_in_hook+0xe10/0x27a0 [ 469.740955][ C1] ? ip_vs_in_hook+0x329/0x27a0 [ 469.740975][ C1] nft_do_chain_inet+0x18a/0x340 [ 469.740992][ C1] ? __pfx_nft_do_chain_inet+0x10/0x10 [ 469.741010][ C1] ? nf_nat_ipv4_local_in+0x181/0x720 [ 469.741030][ C1] ? __pfx_nft_do_chain_inet+0x10/0x10 [ 469.741045][ C1] nf_hook_slow+0xbb/0x200 [ 469.741059][ C1] nf_hook.constprop.0+0x422/0x750 [ 469.741071][ C1] ? __pfx_ip_local_deliver_finish+0x10/0x10 [ 469.741085][ C1] ? __pfx_nf_hook.constprop.0+0x10/0x10 [ 469.741098][ C1] ? __pfx_ip_rcv_finish+0x10/0x10 [ 469.741113][ C1] ? __pfx_ip_local_deliver_finish+0x10/0x10 [ 469.741130][ C1] ip_local_deliver+0x169/0x1f0 [ 469.741142][ C1] ? __pfx_ip_local_deliver+0x10/0x10 [ 469.741155][ C1] ip_rcv+0x2c3/0x5d0 [ 469.741168][ C1] ? __pfx_ip_rcv+0x10/0x10 [ 469.741180][ C1] __netif_receive_skb_one_core+0x197/0x1e0 [ 469.741194][ C1] ? __pfx___netif_receive_skb_one_core+0x10/0x10 [ 469.741208][ C1] ? lock_acquire+0x179/0x350 [ 469.741229][ C1] ? process_backlog+0x3f0/0x15e0 [ 469.741241][ C1] __netif_receive_skb+0x1d/0x160 [ 469.741253][ C1] process_backlog+0x442/0x15e0 [ 469.741268][ C1] __napi_poll.constprop.0+0xba/0x550 [ 469.741282][ C1] net_rx_action+0xa97/0x1010 [ 469.741298][ C1] ? __pfx_net_rx_action+0x10/0x10 [ 469.741311][ C1] ? mark_held_locks+0x49/0x80 [ 469.741330][ C1] ? lockdep_hardirqs_on+0x7c/0x110 [ 469.741348][ C1] ? tmigr_handle_remote+0x132/0x380 [ 469.741366][ C1] ? run_timer_base+0x121/0x190 [ 469.741384][ C1] ? __pfx_run_timer_base+0x10/0x10 [ 469.741404][ C1] handle_softirqs+0x216/0x8e0 [ 469.741422][ C1] ? __pfx_handle_softirqs+0x10/0x10 [ 469.741438][ C1] ? irqtime_account_irq+0x18d/0x2e0 [ 469.741457][ C1] ? wg_packet_decrypt_worker+0x35d/0x540 [ 469.741474][ C1] do_softirq+0xb2/0xf0 [ 469.741489][ C1] [ 469.741493][ C1] [ 469.741498][ C1] __local_bh_enable_ip+0x100/0x120 [ 469.741514][ C1] wg_packet_decrypt_worker+0x35d/0x540 [ 469.741534][ C1] process_one_work+0x9cf/0x1b70 [ 469.741557][ C1] ? __pfx_nsim_dev_hwstats_traffic_work+0x10/0x10 [ 469.741574][ C1] ? __pfx_process_one_work+0x10/0x10 [ 469.741591][ C1] ? assign_work+0x1a0/0x250 [ 469.741604][ C1] worker_thread+0x6c8/0xf10 [ 469.741623][ C1] ? __pfx_worker_thread+0x10/0x10 [ 469.741636][ C1] kthread+0x3c2/0x780 [ 469.741649][ C1] ? __pfx_kthread+0x10/0x10 [ 469.741660][ C1] ? __pfx_kthread+0x10/0x10 [ 469.741672][ C1] ? __pfx_kthread+0x10/0x10 [ 469.741683][ C1] ? __pfx_kthread+0x10/0x10 [ 469.741695][ C1] ? rcu_is_watching+0x12/0xc0 [ 469.741710][ C1] ? __pfx_kthread+0x10/0x10 [ 469.741723][ C1] ret_from_fork+0x45/0x80 [ 469.741736][ C1] ? __pfx_kthread+0x10/0x10 [ 469.741748][ C1] ret_from_fork_asm+0x1a/0x30 [ 469.741772][ C1] [ 470.560721][ T30] kauditd_printk_skb: 21 callbacks suppressed [ 470.560739][ T30] audit: type=1400 audit(2000000229.690:15019): avc: denied { egress } for pid=8821 comm="kworker/u8:12" saddr=fe80::1b daddr=ff02::2 netif=teql0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=1 [ 470.636617][ T30] audit: type=1400 audit(2000000229.690:15020): avc: denied { sendto } for pid=8821 comm="kworker/u8:12" saddr=fe80::1b daddr=ff02::2 netif=teql0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:node_t tclass=node permissive=1 [ 470.660791][ T31] Kernel panic - not syncing: hung_task: blocked tasks [ 470.667641][ T31] CPU: 0 UID: 0 PID: 31 Comm: khungtaskd Not tainted 6.15.0-rc7-syzkaller-00007-g4a95bc121ccd #0 PREEMPT(full) [ 470.679440][ T31] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 470.689496][ T31] Call Trace: [ 470.692773][ T31] [ 470.695703][ T31] dump_stack_lvl+0x3d/0x1f0 [ 470.700305][ T31] panic+0x71c/0x800 [ 470.704301][ T31] ? __pfx_panic+0x10/0x10 [ 470.708728][ T31] ? preempt_schedule_thunk+0x16/0x30 [ 470.714106][ T31] ? __pfx_nmi_raise_cpu_backtrace+0x10/0x10 [ 470.720083][ T31] ? preempt_schedule_thunk+0x16/0x30 [ 470.725630][ T31] ? watchdog+0xdda/0x12c0 [ 470.730043][ T31] ? watchdog+0xdcd/0x12c0 [ 470.734464][ T31] watchdog+0xdeb/0x12c0 [ 470.738711][ T31] ? __pfx_watchdog+0x10/0x10 [ 470.743383][ T31] ? lockdep_hardirqs_on+0x7c/0x110 [ 470.748586][ T31] ? __kthread_parkme+0x19e/0x250 [ 470.753617][ T31] ? __pfx_watchdog+0x10/0x10 [ 470.758297][ T31] kthread+0x3c2/0x780 [ 470.762364][ T31] ? __pfx_kthread+0x10/0x10 [ 470.766947][ T31] ? __pfx_kthread+0x10/0x10 [ 470.771534][ T31] ? __pfx_kthread+0x10/0x10 [ 470.776118][ T31] ? __pfx_kthread+0x10/0x10 [ 470.780701][ T31] ? rcu_is_watching+0x12/0xc0 [ 470.785464][ T31] ? __pfx_kthread+0x10/0x10 [ 470.790051][ T31] ret_from_fork+0x45/0x80 [ 470.794463][ T31] ? __pfx_kthread+0x10/0x10 [ 470.799050][ T31] ret_from_fork_asm+0x1a/0x30 [ 470.803831][ T31] [ 470.807046][ T31] Kernel Offset: disabled [ 470.811351][ T31] Rebooting in 86400 seconds..