last executing test programs: 1m34.800658363s ago: executing program 1 (id=6680): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1000, 0x0) faccessat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x2) 1m34.121192593s ago: executing program 1 (id=6688): mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0xa) mount$cgroup(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000100)={[{@subsystem='cpuset'}, {@subsystem='memory'}, {@subsystem='cpuacct'}]}) mount$cgroup(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x100002c, 0x0) 1m33.301654121s ago: executing program 1 (id=6700): r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000740)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000009080)=[{{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000001580)=""/4096, 0x1000}, {&(0x7f0000000040)=""/190, 0xbe}, {&(0x7f0000000580)=""/68, 0x44}, {&(0x7f00000043c0)=""/4088, 0xff8}], 0x4}, 0x5f}], 0x1, 0x2, 0x0) 1m32.822024079s ago: executing program 2 (id=6707): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CAP_X86_NOTIFY_VMEXIT(r1, 0x4068aea3, &(0x7f0000000080)={0xdb, 0x0, 0x3}) 1m32.537285295s ago: executing program 2 (id=6711): r0 = syz_usb_connect$hid(0x3, 0x36, &(0x7f0000000240)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x56a, 0x4001, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x40, 0xb0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x0, 0x1, 0x0, {0x9, 0x21, 0x101, 0x0, 0x1, {0x22, 0x5}}, {{{0x9, 0x5, 0x81, 0x3, 0x3ff, 0xc, 0x0, 0x40}}}}}]}}]}}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000040)={0x20, 0xa, 0x7, {0xfffffffffffffddb, 0xf, "00f4000000"}}, 0x0, 0x0, 0x0, 0x0}, 0x0) 1m32.341297197s ago: executing program 1 (id=6714): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SIGNAL_MSI(r1, 0x4020aea5, 0x0) 1m31.60037147s ago: executing program 0 (id=6724): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000dc0), r0) sendmsg$NL80211_CMD_REQ_SET_REG(r0, &(0x7f0000003d40)={0x0, 0x0, &(0x7f0000003d00)={&(0x7f0000003cc0)={0x1c, r1, 0x1, 0x70bd26, 0x25dfdbfb, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20}, 0x4000) 1m31.26985004s ago: executing program 1 (id=6726): r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000080)=""/36, 0x24) getdents(r0, 0xfffffffffffffffd, 0x58) 1m31.266369099s ago: executing program 0 (id=6727): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000001600)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000180)="db9063a5f12b400000a3529de2db", 0xfffffd0c}, {&(0x7f00000005c0)="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"}, {&(0x7f0000000900)="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"}, {&(0x7f0000000380)="f2003c9f4470d75916"}, {&(0x7f0000000740)="6b9e35b0dc1cbe029c907ce2f9982f19e8f8a6b1a13bd80ae6915a324910b1cdabf00cbe1da78bc5f541d813224909db55c615b88c668dfc8b1bc1d814520a5441f5b97ab3d2bd001732385892ebf60e3189d7a91e1a1e2232f5f725e1bc1bd694414e718b1ae37e98a389dfd2cce354c8b5da37dda52307ed1351df4853f6f582767ac83352463f8965a93da6310e365623c91c"}], 0x1}, 0x4091) sendmsg$inet(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000001c0)="04", 0x1}], 0x1}, 0x41) 1m30.755785169s ago: executing program 2 (id=6732): r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000380)={0xa, 0x4e24, 0x5, @initdev={0xfe, 0x88, '\x00', 0xfd, 0x0}, 0x2}, 0x1c) sendmmsg$inet(r0, &(0x7f0000006d40)=[{{&(0x7f00000003c0)={0x2, 0x4e23, @local}, 0x10, &(0x7f0000000680)=[{&(0x7f0000000500)="1fd4787488b1f24058b8199d33a8178ba1174e104ae1b3abb3faffaeb1a08aaeb8993c5fefff92daa06a331e595157761f72d282866c198c75e5f4c1f114555440e2c923df89b8a29cf82b51cddfc9f6855b9358722868848277b2ffaa380219e2103ad94a5c527d277624d6e0957baa3bbba59334916fb41475e5e891320186c1ee0e2a48e51a93311a4d776025dafd266c7cff569c60e008e76b2c734411ad8c57", 0xa2}, {&(0x7f00000005c0)="a2e1f75a5acb51fba68f72d473a1438b2fa6aee9bc10efc70b7f16e654f340c9fd9b40fcd7c2f55583cf7a2ca7be4c18b181cd1ccf007f5650ff7e01c64ccd85f8d4ed226e4ca0399034a0a45619339ff79f9c8ced0dfced5782fa0ce482417b8e9343ed19679dda57256a0078754e47388b9b107af79c32c54fc29793a2d05dd1f732e60edeb9", 0x87}, {&(0x7f0000000780)="395b7b9931074d3e26deed94dab0ab3d30a80a8806029d7a7f1e0367db29c9eac20789979cad7071d6bf4e4f222296281cfaf2c95f85adcf76cf8be4345a9bf66ad6baac6c502e0894d518279c8c310b355c34da938cdab36a66f17bfa8986708fb9fc296c5a48e8ed5f67758de22b2ae9c2f6bdb5fe832560470db8c522cfccf093eff1eb8f12ee44ac52a236b3cc2c068f94fd39e24151f6f3ee9cb32efb", 0x9f}, {&(0x7f0000001040)="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", 0x3bd}], 0x4, &(0x7f0000000840)=[@ip_retopts={{0x38, 0x0, 0x7, {[@noop, @timestamp_addr={0x44, 0x24, 0xdf, 0x1, 0x8, [{@rand_addr=0x64010102, 0x3}, {@local, 0x9}, {@local, 0xfffffff8}, {@remote, 0x7}]}]}}}], 0x38}}], 0x1, 0x0) 1m29.911340209s ago: executing program 1 (id=6733): r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000100)={0x0, {'syz1\x00', 'syz1\x00', 'syz1\x00', &(0x7f0000000040)=""/90, 0x5a, 0x3, 0x8, 0xf, 0x0, 0x3}}, 0x120) write$UHID_INPUT2(r0, &(0x7f0000000280), 0x6) 1m29.699231081s ago: executing program 0 (id=6734): r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0xc, &(0x7f0000000080)=0x4, 0x4) sendmsg$netlink(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000240)={0x30, 0x12, 0x1, 0x0, 0x0, "", [@nested={0x10, 0x0, 0x0, 0x0, [@typed={0xc, 0x0, 0x0, 0x0, @u64}]}, @typed={0xd, 0x35, 0x0, 0x0, @str='\xd0@:-}-+)\x00'}]}, 0x30}], 0x1}, 0x0) 1m29.619384745s ago: executing program 2 (id=6735): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000002540)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)={0x38, r1, 0x1, 0x70bd27, 0x25dfdbfd, {}, [@ETHTOOL_A_FEATURES_WANTED={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x4}]}, @ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x4c045}, 0x40) 1m27.692624618s ago: executing program 2 (id=6736): unshare(0x22020600) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount$cgroup(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000100)={[{@subsystem='cpuset'}, {@subsystem='memory'}, {@subsystem='cpuacct'}]}) 1m27.357394137s ago: executing program 0 (id=6738): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400), r0) sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x18, r1, 0x1, 0x0, 0x0, {0x3}, [@TIPC_NLA_BEARER={0x4}]}, 0x18}}, 0x0) 1m19.737623721s ago: executing program 2 (id=6740): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CAP_X86_APIC_BUS_CYCLES_NS(r1, 0x4068aea3, &(0x7f00000000c0)={0xe1, 0x0, 0x95c}) 1m19.087474839s ago: executing program 0 (id=6741): timer_create(0xfffffffc, 0x0, &(0x7f0000000040)=0x0) timer_settime(r0, 0x1, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_gettime(r0, &(0x7f0000000100)) 1m14.553486094s ago: executing program 32 (id=6733): r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000100)={0x0, {'syz1\x00', 'syz1\x00', 'syz1\x00', &(0x7f0000000040)=""/90, 0x5a, 0x3, 0x8, 0xf, 0x0, 0x3}}, 0x120) write$UHID_INPUT2(r0, &(0x7f0000000280), 0x6) 1m13.723497152s ago: executing program 0 (id=6745): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140), 0x42000, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000001c40)=0x1) ioctl$PPPIOCSMAXCID(r0, 0x40047451, 0x0) 1m2.676469436s ago: executing program 33 (id=6740): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CAP_X86_APIC_BUS_CYCLES_NS(r1, 0x4068aea3, &(0x7f00000000c0)={0xe1, 0x0, 0x95c}) 58.103227742s ago: executing program 34 (id=6745): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140), 0x42000, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000001c40)=0x1) ioctl$PPPIOCSMAXCID(r0, 0x40047451, 0x0) 44.195313603s ago: executing program 3 (id=6752): r0 = syz_open_dev$usbfs(&(0x7f0000003f00), 0x1ff, 0xa401) ioctl$USBDEVFS_DISCONNECT_CLAIM(r0, 0x8108551b, &(0x7f0000000000)={0x0, 0x0, "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"}) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f00000001c0)={0xa1, 0x0, 0x0, 0x300, 0x1100, 0x3, 0x0}) 32.706652093s ago: executing program 3 (id=6753): r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x8, 0x0, 0xfffffffd}, 0x24) write(r0, &(0x7f0000000080)="240000001a007f0214f9f4070009040803000000000000000002000008000f40fe00000e", 0x24) 25.875491841s ago: executing program 3 (id=6754): mknod$loop(&(0x7f0000000140)='./file0\x00', 0xfff, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) 21.551089003s ago: executing program 3 (id=6755): r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000007540), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r1, &(0x7f0000007640)={0x0, 0x0, &(0x7f0000007600)={&(0x7f0000000040)={0x34, r0, 0x1, 0x70bd2a, 0x25dfdbfa, {}, [@ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x6}, @ETHTOOL_A_CHANNELS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}]}]}, 0x34}}, 0x4) 19.594775697s ago: executing program 3 (id=6756): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x34, r1, 0x1, 0x70bd2a, 0x25dfdbfd, {{}, {}, {0x18, 0x17, {0x2, 0x1ff, @l2={'eth', 0x3a, 'vlan1\x00'}}}}}, 0x34}, 0x1, 0x0, 0x0, 0x40000}, 0x4040044) 16.883279315s ago: executing program 3 (id=6757): r0 = openat$kvm(0xffffff9c, &(0x7f00000000c0), 0x800, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_MEMORY_ENCRYPT_REG_REGION(r1, 0x8010aebb, &(0x7f0000000040)={0x1000, 0x11a000}) 0s ago: executing program 35 (id=6757): r0 = openat$kvm(0xffffff9c, &(0x7f00000000c0), 0x800, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_MEMORY_ENCRYPT_REG_REGION(r1, 0x8010aebb, &(0x7f0000000040)={0x1000, 0x11a000}) kernel console output (not intermixed with test programs): 460.771:30244): avc: denied { read write } for pid=293 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 264.407578][ T36] audit: type=1400 audit(2000000460.771:30245): avc: denied { read write open } for pid=293 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 264.452778][ T45] usb 4-1: USB disconnect, device number 101 [ 264.505265][T13411] fido_id[13411]: Failed to open report descriptor at '/sys/devices/platform/dummy_hcd.3/usb4/report_descriptor': No such file or directory [ 264.580569][ T9] belkin 0003:050D:3201.0020: item fetching failed at offset 2/5 [ 264.596532][ T9] belkin 0003:050D:3201.0020: parse failed [ 264.607977][ T9] belkin 0003:050D:3201.0020: probe with driver belkin failed with error -22 [ 264.793864][ T64] usb 3-1: USB disconnect, device number 100 [ 264.897983][ T9] usb 1-1: new high-speed USB device number 100 using dummy_hcd [ 265.001439][T13426] support for the xor transformation has been removed. [ 265.058282][ T9] usb 1-1: Using ep0 maxpacket: 8 [ 265.074781][ T9] usb 1-1: config 0 interface 0 has no altsetting 0 [ 265.087947][ T9] usb 1-1: New USB device found, idVendor=06a3, idProduct=0621, bcdDevice= 0.00 [ 265.117953][ T9] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 265.127774][ T9] usb 1-1: config 0 descriptor?? [ 265.570664][ T9] saitek 0003:06A3:0621.0021: item fetching failed at offset 0/1 [ 265.578700][ T9] saitek 0003:06A3:0621.0021: parse failed [ 265.584572][ T9] saitek 0003:06A3:0621.0021: probe with driver saitek failed with error -22 [ 265.667962][ T45] usb 3-1: new high-speed USB device number 101 using dummy_hcd [ 265.754431][ T9] usb 2-1: new full-speed USB device number 98 using dummy_hcd [ 265.806413][ T64] usb 1-1: USB disconnect, device number 100 [ 265.847721][ T45] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 265.884318][ T45] usb 3-1: New USB device found, idVendor=1e7d, idProduct=319c, bcdDevice= 0.00 [ 265.903577][ T45] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 265.922325][ T45] usb 3-1: config 0 descriptor?? [ 265.998754][ T9] usb 2-1: config 0 interface 0 altsetting 6 endpoint 0x81 has an invalid bInterval 0, changing to 10 [ 266.018810][ T9] usb 2-1: config 0 interface 0 altsetting 6 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 266.059018][ T9] usb 2-1: config 0 interface 0 has no altsetting 0 [ 266.065677][ T9] usb 2-1: New USB device found, idVendor=056a, idProduct=00ce, bcdDevice= 0.00 [ 266.089000][ T9] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 266.123358][ T9] usb 2-1: config 0 descriptor?? [ 266.357761][ T45] isku 0003:1E7D:319C.0022: hidraw0: USB HID vda.00 Device [HID 1e7d:319c] on usb-dummy_hcd.2-1/input0 [ 266.561170][ T331] usb 3-1: USB disconnect, device number 101 [ 266.641871][T13495] fido_id[13495]: Failed to open report descriptor at '/sys/devices/platform/dummy_hcd.2/usb3/report_descriptor': No such file or directory [ 266.665680][ T9] wacom 0003:056A:00CE.0023: hidraw0: USB HID v0.07 Device [HID 056a:00ce] on usb-dummy_hcd.1-1/input0 [ 266.863951][ T9] usb 2-1: USB disconnect, device number 98 [ 266.948886][T13501] fido_id[13501]: Failed to open report descriptor at '/sys/devices/platform/dummy_hcd.1/usb2/report_descriptor': No such file or directory [ 267.807957][ T45] usb 1-1: new high-speed USB device number 101 using dummy_hcd [ 267.970620][ T45] usb 1-1: too many endpoints for config 0 interface 0 altsetting 3: 65, using maximum allowed: 30 [ 268.001585][ T45] usb 1-1: config 0 interface 0 altsetting 3 has 1 endpoint descriptor, different from the interface descriptor's value: 65 [ 268.044983][ T45] usb 1-1: config 0 interface 0 has no altsetting 0 [ 268.065206][ T45] usb 1-1: New USB device found, idVendor=5543, idProduct=0064, bcdDevice= 0.00 [ 268.097937][ T45] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 268.106902][T13545] overlayfs: workdir and upperdir must be separate subtrees [ 268.127882][ T45] usb 1-1: config 0 descriptor?? [ 268.580925][ T45] uclogic 0003:5543:0064.0024: unbalanced delimiter at end of report description [ 268.608224][ T45] uclogic 0003:5543:0064.0024: parse failed [ 268.627007][ T45] uclogic 0003:5543:0064.0024: probe with driver uclogic failed with error -22 [ 268.638125][ T331] usb 3-1: new high-speed USB device number 102 using dummy_hcd [ 268.721375][T13562] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=13562 comm=syz.3.6457 [ 268.771421][T13565] incfs_lookup_dentry err:-13 [ 268.776213][T13565] incfs: Can't find or create .index dir in ./bus [ 268.783607][T13565] incfs: mount failed -13 [ 268.803325][ T45] usb 1-1: USB disconnect, device number 101 [ 268.819213][ T331] usb 3-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 5 [ 268.857963][ T331] usb 3-1: New USB device found, idVendor=5543, idProduct=004d, bcdDevice= 0.00 [ 268.894415][ T331] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 268.919637][ T331] usb 3-1: config 0 descriptor?? [ 269.068165][ T36] kauditd_printk_skb: 463 callbacks suppressed [ 269.068184][ T36] audit: type=1400 audit(2000000465.501:30709): avc: denied { execmem } for pid=13569 comm="syz.3.6461" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 269.117117][ T36] audit: type=1400 audit(2000000465.541:30710): avc: denied { read write } for pid=294 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 269.175552][ T36] audit: type=1400 audit(2000000465.571:30711): avc: denied { read write open } for pid=294 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 269.230511][ T36] audit: type=1400 audit(2000000465.571:30712): avc: denied { ioctl } for pid=294 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 269.290560][ T36] audit: type=1400 audit(2000000465.591:30713): avc: denied { ioctl } for pid=13555 comm="syz.2.6455" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 269.343021][ T36] audit: type=1400 audit(2000000465.591:30714): avc: denied { ioctl } for pid=13555 comm="syz.2.6455" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5504 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 269.465835][ T36] audit: type=1400 audit(2000000465.601:30715): avc: denied { create } for pid=13571 comm="syz.3.6462" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 269.567940][ T36] audit: type=1400 audit(2000000465.601:30716): avc: denied { write } for pid=13571 comm="syz.3.6462" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 269.593775][ T331] usb 3-1: string descriptor 0 read error: -71 [ 269.626520][ T331] uclogic 0003:5543:004D.0025: failed retrieving string descriptor #200: -71 [ 269.654710][ T331] uclogic 0003:5543:004D.0025: failed retrieving pen parameters: -71 [ 269.665641][T13582] Invalid logical block size (14) [ 269.677968][ T36] audit: type=1400 audit(2000000465.601:30717): avc: denied { nlmsg_write } for pid=13571 comm="syz.3.6462" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 269.705032][ T331] uclogic 0003:5543:004D.0025: failed probing pen v2 parameters: -71 [ 269.758861][ T331] uclogic 0003:5543:004D.0025: failed probing parameters: -71 [ 269.782111][ T331] uclogic 0003:5543:004D.0025: probe with driver uclogic failed with error -71 [ 269.800644][ T36] audit: type=1400 audit(2000000465.641:30718): avc: denied { read write } for pid=294 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 269.839076][ T331] usb 3-1: USB disconnect, device number 102 [ 270.087961][ T45] usb 4-1: new full-speed USB device number 102 using dummy_hcd [ 270.261496][ T45] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 10 [ 270.286804][T13598] netlink: 'syz.2.6475': attribute type 3 has an invalid length. [ 270.294637][ T45] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 270.314325][T13598] netlink: 8 bytes leftover after parsing attributes in process `syz.2.6475'. [ 270.327948][ T45] usb 4-1: New USB device found, idVendor=17ef, idProduct=6047, bcdDevice= 0.00 [ 270.354107][ T45] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 270.383960][ T45] usb 4-1: config 0 descriptor?? [ 270.486872][T13606] netlink: 72 bytes leftover after parsing attributes in process `syz.0.6478'. [ 270.859887][ T45] lenovo 0003:17EF:6047.0026: hidraw0: USB HID v0.00 Device [HID 17ef:6047] on usb-dummy_hcd.3-1/input0 [ 271.062314][ T45] usb 4-1: USB disconnect, device number 102 [ 271.327960][ T31] usb 1-1: new high-speed USB device number 102 using dummy_hcd [ 271.477978][ T31] usb 1-1: Using ep0 maxpacket: 16 [ 271.486907][ T31] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 271.499425][ T31] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 271.510063][ T31] usb 1-1: New USB device found, idVendor=054c, idProduct=05c4, bcdDevice= 0.00 [ 271.519866][ T31] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 271.531339][ T31] usb 1-1: config 0 descriptor?? [ 271.963539][ T31] playstation 0003:054C:05C4.0027: hidraw0: USB HID v0.00 Device [HID 054c:05c4] on usb-dummy_hcd.0-1/input0 [ 272.161850][ T31] playstation 0003:054C:05C4.0027: Failed to retrieve feature with reportID 18: -71 [ 272.217950][ T31] playstation 0003:054C:05C4.0027: Failed to retrieve DualShock4 pairing info: -71 [ 272.261923][ T31] playstation 0003:054C:05C4.0027: Failed to get MAC address from DualShock4 [ 272.289539][ T31] playstation 0003:054C:05C4.0027: Failed to create dualshock4. [ 272.313019][ T31] playstation 0003:054C:05C4.0027: probe with driver playstation failed with error -71 [ 272.329554][T13652] SELinux: policydb table sizes (0,0) do not match mine (6,6) [ 272.349250][T13652] SELinux: failed to load policy [ 272.358042][ T31] usb 1-1: USB disconnect, device number 102 [ 272.829597][T13671] netlink: 'syz.0.6509': attribute type 2 has an invalid length. [ 272.919811][T13673] overlayfs: at least 2 lowerdir are needed while upperdir nonexistent [ 273.397979][ T45] usb 3-1: new full-speed USB device number 103 using dummy_hcd [ 273.580477][ T45] usb 3-1: config 0 interface 0 altsetting 6 endpoint 0x81 has an invalid bInterval 0, changing to 10 [ 273.601865][ T45] usb 3-1: config 0 interface 0 altsetting 6 endpoint 0x81 has invalid maxpacket 1024, setting to 64 [ 273.635653][ T45] usb 3-1: config 0 interface 0 altsetting 6 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 273.682223][ T45] usb 3-1: config 0 interface 0 has no altsetting 0 [ 273.708339][ T45] usb 3-1: New USB device found, idVendor=0810, idProduct=0001, bcdDevice= 0.00 [ 273.738763][ T45] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 273.758031][ T31] usb 4-1: new full-speed USB device number 103 using dummy_hcd [ 273.786053][ T45] usb 3-1: config 0 descriptor?? [ 273.794795][T13683] raw-gadget.0 gadget.2: fail, usb_ep_enable returned -22 [ 273.944990][ T31] usb 4-1: unable to get BOS descriptor or descriptor too short [ 273.982383][ T31] usb 4-1: not running at top speed; connect to a high speed hub [ 274.029439][ T31] usb 4-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 274.060843][ T31] usb 4-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 274.091975][ T36] kauditd_printk_skb: 439 callbacks suppressed [ 274.091989][ T36] audit: type=1400 audit(2000000470.521:31158): avc: denied { ioctl } for pid=13697 comm="syz.3.6521" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 274.147074][ T31] usb 4-1: string descriptor 0 read error: -22 [ 274.153742][ T31] usb 4-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 274.172986][ T31] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 274.183806][ T36] audit: type=1400 audit(2000000470.551:31159): avc: denied { ioctl } for pid=13697 comm="syz.3.6521" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 274.219929][ T31] usb 4-1: 0:2 : does not exist [ 274.256619][ T45] pantherlord 0003:0810:0001.0028: hidraw0: USB HID v0.07 Device [HID 0810:0001] on usb-dummy_hcd.2-1/input0 [ 274.322917][ T45] pantherlord 0003:0810:0001.0028: no output reports found [ 274.330360][ T36] audit: type=1400 audit(2000000470.551:31160): avc: denied { ioctl } for pid=13697 comm="syz.3.6521" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 274.448085][ T36] audit: type=1400 audit(2000000470.551:31161): avc: denied { ioctl } for pid=13697 comm="syz.3.6521" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 274.494726][ T45] usb 3-1: USB disconnect, device number 103 [ 274.587939][ T36] audit: type=1400 audit(2000000470.561:31162): avc: denied { ioctl } for pid=13697 comm="syz.3.6521" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 274.678055][ T36] audit: type=1400 audit(2000000470.561:31163): avc: denied { ioctl } for pid=13697 comm="syz.3.6521" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 274.764172][T13715] fido_id[13715]: Failed to open report descriptor at '/sys/devices/platform/dummy_hcd.2/usb3/report_descriptor': No such file or directory [ 274.798165][ T36] audit: type=1400 audit(2000000470.561:31164): avc: denied { ioctl } for pid=13697 comm="syz.3.6521" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 274.892272][ T36] audit: type=1400 audit(2000000470.571:31165): avc: denied { ioctl } for pid=13697 comm="syz.3.6521" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 274.946596][ T31] usb 4-1: 5:0: cannot get min/max values for control 2 (id 5) [ 275.004992][ T31] usb 4-1: 5:0: cannot get min/max values for control 3 (id 5) [ 275.018706][ T36] audit: type=1400 audit(2000000470.571:31166): avc: denied { ioctl } for pid=13697 comm="syz.3.6521" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 275.080344][ T31] usb 4-1: 5:0: failed to get current value for ch 1 (-22) [ 275.123105][ T31] usb 4-1: USB disconnect, device number 103 [ 275.159241][ T36] audit: type=1400 audit(2000000470.571:31167): avc: denied { ioctl } for pid=13697 comm="syz.3.6521" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 275.233647][ T344] udevd[344]: error opening ATTR{/sys/devices/platform/dummy_hcd.3/usb4/4-1/4-1:1.0/sound/card0/controlC0/../uevent} for writing: No such file or directory [ 276.121336][ T9] usb 2-1: new full-speed USB device number 99 using dummy_hcd [ 276.450246][ T9] usb 2-1: too many endpoints for config 0 interface 0 altsetting 2: 254, using maximum allowed: 30 [ 276.478766][ T9] usb 2-1: config 0 interface 0 altsetting 2 endpoint 0x81 has an invalid bInterval 0, changing to 10 [ 276.493490][ T466] usb 3-1: new high-speed USB device number 104 using dummy_hcd [ 276.519176][ T9] usb 2-1: config 0 interface 0 altsetting 2 endpoint 0x81 has invalid wMaxPacketSize 0 [ 276.552548][ T9] usb 2-1: config 0 interface 0 altsetting 2 has 1 endpoint descriptor, different from the interface descriptor's value: 254 [ 276.588556][ T9] usb 2-1: config 0 interface 0 has no altsetting 0 [ 276.629459][ T9] usb 2-1: New USB device found, idVendor=1e7d, idProduct=3138, bcdDevice= 0.00 [ 276.649288][ T9] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 276.682311][ T9] usb 2-1: config 0 descriptor?? [ 276.734881][ T466] usb 3-1: Using ep0 maxpacket: 16 [ 276.988709][ T466] usb 3-1: too many endpoints for config 0 interface 0 altsetting 3: 63, using maximum allowed: 30 [ 277.019103][ T466] usb 3-1: config 0 interface 0 altsetting 3 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 277.049492][ T466] usb 3-1: config 0 interface 0 altsetting 3 has 1 endpoint descriptor, different from the interface descriptor's value: 63 [ 277.075251][ T466] usb 3-1: config 0 interface 0 has no altsetting 0 [ 277.098346][ T466] usb 3-1: New USB device found, idVendor=046d, idProduct=c211, bcdDevice= 0.00 [ 277.107434][ T466] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 277.189806][ T466] usb 3-1: config 0 descriptor?? [ 277.251103][ T9] ryos 0003:1E7D:3138.0029: unknown main item tag 0x0 [ 277.261109][ T9] ryos 0003:1E7D:3138.0029: unknown main item tag 0x0 [ 277.279104][ T9] ryos 0003:1E7D:3138.0029: unknown main item tag 0x0 [ 277.299682][ T9] ryos 0003:1E7D:3138.0029: unknown main item tag 0x0 [ 277.318972][ T9] ryos 0003:1E7D:3138.0029: unknown main item tag 0x0 [ 277.333408][T13802] random: crng reseeded on system resumption [ 277.378840][ T9] ryos 0003:1E7D:3138.0029: hidraw0: USB HID v0.00 Device [HID 1e7d:3138] on usb-dummy_hcd.1-1/input0 [ 277.477799][ T9] usb 2-1: USB disconnect, device number 99 [ 277.583208][T13805] fido_id[13805]: Failed to open report descriptor at '/sys/devices/platform/dummy_hcd.1/usb2/2-1/report_descriptor': No such file or directory [ 277.653002][ T466] logitech 0003:046D:C211.002A: unknown main item tag 0x0 [ 277.688818][ T466] logitech 0003:046D:C211.002A: unknown main item tag 0x0 [ 277.696013][ T466] logitech 0003:046D:C211.002A: unknown main item tag 0x0 [ 277.740014][ T466] logitech 0003:046D:C211.002A: unknown main item tag 0x0 [ 277.752973][ T466] logitech 0003:046D:C211.002A: unknown main item tag 0x0 [ 277.782077][ T466] logitech 0003:046D:C211.002A: hidraw0: USB HID v0.0b Device [HID 046d:c211] on usb-dummy_hcd.2-1/input0 [ 277.817552][ T466] logitech 0003:046D:C211.002A: no inputs found [ 277.890576][ T466] usb 3-1: USB disconnect, device number 104 [ 278.067344][T13809] fido_id[13809]: Failed to open report descriptor at '/sys/devices/platform/dummy_hcd.2/usb3/report_descriptor': No such file or directory [ 278.669185][ T332] usb 3-1: new high-speed USB device number 105 using dummy_hcd [ 278.861537][ T332] usb 3-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 278.872842][ T31] usb 4-1: new high-speed USB device number 104 using dummy_hcd [ 278.880583][ T45] usb 1-1: new high-speed USB device number 103 using dummy_hcd [ 278.888307][ T332] usb 3-1: config 1 interface 1 altsetting 1 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 278.908531][ T332] usb 3-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 278.918164][ T332] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 278.926181][ T332] usb 3-1: Product: syz [ 278.931788][ T332] usb 3-1: Manufacturer: syz [ 278.936431][ T332] usb 3-1: SerialNumber: syz [ 278.948480][ T332] cdc_ncm 3-1:1.0: skipping garbage [ 278.964017][ T332] cdc_ncm 3-1:1.0: NCM or ECM functional descriptors missing [ 278.976378][ T332] cdc_ncm 3-1:1.0: bind() failure [ 278.983922][ T332] cdc_ncm 3-1:1.1: CDC Union missing and no IAD found [ 278.991413][ T332] cdc_ncm 3-1:1.1: bind() failure [ 279.047951][ T31] usb 4-1: Using ep0 maxpacket: 16 [ 279.057102][ T45] usb 1-1: config 0 has an invalid interface number: 1 but max is 0 [ 279.066203][ T31] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 279.085994][ T45] usb 1-1: config 0 has no interface number 0 [ 279.093429][ T31] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 279.103891][ T45] usb 1-1: config 0 interface 1 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 279.114843][ T31] usb 4-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 9 [ 279.128722][ T45] usb 1-1: config 0 interface 1 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 279.139170][ T31] usb 4-1: New USB device found, idVendor=045e, idProduct=07da, bcdDevice= 0.00 [ 279.157986][ T45] usb 1-1: New USB device found, idVendor=041e, idProduct=2801, bcdDevice= 0.00 [ 279.167072][ T45] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 279.176197][ T31] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 279.192510][ T560] usb 3-1: USB disconnect, device number 105 [ 279.211400][ T45] usb 1-1: config 0 descriptor?? [ 279.217701][ T31] usb 4-1: config 0 descriptor?? [ 279.224146][ T36] kauditd_printk_skb: 381 callbacks suppressed [ 279.224161][ T36] audit: type=1400 audit(2000000475.651:31549): avc: denied { ioctl } for pid=13815 comm="syz.0.6576" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x550a scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 279.327947][ T36] audit: type=1400 audit(2000000475.651:31550): avc: denied { ioctl } for pid=13815 comm="syz.0.6576" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5509 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 279.435280][ T36] audit: type=1400 audit(2000000475.651:31551): avc: denied { ioctl } for pid=13815 comm="syz.0.6576" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5505 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 279.485692][ T36] audit: type=1400 audit(2000000475.651:31552): avc: denied { ioctl } for pid=13815 comm="syz.0.6576" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5504 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 279.513207][ T36] audit: type=1400 audit(2000000475.691:31553): avc: denied { ioctl } for pid=13814 comm="syz.3.6578" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x550a scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 279.540393][ T36] audit: type=1400 audit(2000000475.691:31554): avc: denied { ioctl } for pid=13814 comm="syz.3.6578" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5509 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 279.566296][ T36] audit: type=1400 audit(2000000475.691:31555): avc: denied { ioctl } for pid=13814 comm="syz.3.6578" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5505 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 279.592138][ T36] audit: type=1400 audit(2000000475.691:31556): avc: denied { ioctl } for pid=13814 comm="syz.3.6578" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5504 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 279.619277][ T36] audit: type=1400 audit(2000000475.801:31557): avc: denied { read write } for pid=13818 comm="syz.1.6579" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 279.638538][ T466] usb 2-1: new high-speed USB device number 100 using dummy_hcd [ 279.646648][ T36] audit: type=1400 audit(2000000475.801:31558): avc: denied { read write open } for pid=13818 comm="syz.1.6579" path="/dev/raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 279.687841][ T31] microsoft 0003:045E:07DA.002B: report is too long [ 279.695531][ T31] microsoft 0003:045E:07DA.002B: item 0 1 0 8 parsing failed [ 279.706107][ T45] prodikeys 0003:041E:2801.002C: item fetching failed at offset 3/7 [ 279.737165][ T31] microsoft 0003:045E:07DA.002B: parse failed [ 279.748525][ T45] prodikeys 0003:041E:2801.002C: hid parse failed [ 279.755220][ T45] prodikeys 0003:041E:2801.002C: probe with driver prodikeys failed with error -22 [ 279.777065][ T31] microsoft 0003:045E:07DA.002B: probe with driver microsoft failed with error -22 [ 279.903046][ T31] usb 4-1: USB disconnect, device number 104 [ 279.921606][ T466] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 279.952864][ T466] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 279.978194][ T467] usb 1-1: USB disconnect, device number 103 [ 280.048537][ T466] usb 2-1: New USB device found, idVendor=10c4, idProduct=ea90, bcdDevice= 0.00 [ 280.069100][ T466] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 280.087984][ T45] usb 3-1: new high-speed USB device number 106 using dummy_hcd [ 280.094754][ T466] usb 2-1: config 0 descriptor?? [ 280.267964][ T45] usb 3-1: Using ep0 maxpacket: 32 [ 280.275897][ T45] usb 3-1: config 4 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 280.289059][ T45] usb 3-1: config 4 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 280.302604][ T45] usb 3-1: New USB device found, idVendor=046d, idProduct=c314, bcdDevice= 0.40 [ 280.312732][ T45] usb 3-1: New USB device strings: Mfr=255, Product=255, SerialNumber=0 [ 280.322479][ T45] usb 3-1: Product: syz [ 280.326723][ T45] usb 3-1: Manufacturer: syz [ 280.338532][ T45] hub 3-1:4.0: USB hub found [ 280.583993][ T45] hub 3-1:4.0: 3 ports detected [ 280.613791][ T466] cp2112 0003:10C4:EA90.002D: unknown main item tag 0x0 [ 280.635038][ T466] cp2112 0003:10C4:EA90.002D: hidraw0: USB HID v0.00 Device [HID 10c4:ea90] on usb-dummy_hcd.1-1/input0 [ 280.741997][ T467] usb 4-1: new high-speed USB device number 105 using dummy_hcd [ 280.793552][ T45] hub 3-1:4.0: hub_hub_status failed (err = -71) [ 280.816417][ T466] cp2112 0003:10C4:EA90.002D: error requesting version [ 280.818170][ T45] hub 3-1:4.0: config failed, can't get hub status (err -71) [ 280.852534][ T466] cp2112 0003:10C4:EA90.002D: probe with driver cp2112 failed with error -71 [ 280.878817][ T45] usb 3-1: USB disconnect, device number 106 [ 280.900604][ T466] usb 2-1: USB disconnect, device number 100 [ 280.959127][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 280.971499][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 280.983672][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 280.995807][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 281.008035][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 281.020226][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 281.032380][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 281.044530][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 281.056668][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 281.068972][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 281.233826][T13832] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=56 sclass=netlink_route_socket pid=13832 comm=syz.0.6585 [ 281.288682][ T467] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 281.309418][ T467] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 281.349056][ T467] usb 4-1: New USB device found, idVendor=056a, idProduct=030c, bcdDevice= 0.00 [ 281.362198][ T467] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 281.397695][ T467] usb 4-1: config 0 descriptor?? [ 281.677182][T13844] netlink: 44 bytes leftover after parsing attributes in process `syz.2.6592'. [ 281.707003][T13844] netlink: 'syz.2.6592': attribute type 6 has an invalid length. [ 281.737356][T13844] netlink: 'syz.2.6592': attribute type 5 has an invalid length. [ 281.767968][T13844] netlink: 'syz.2.6592': attribute type 4 has an invalid length. [ 281.873955][ T467] wacom 0003:056A:030C.002E: hidraw0: USB HID v0.06 Device [HID 056a:030c] on usb-dummy_hcd.3-1/input0 [ 282.065011][ T45] usb 4-1: USB disconnect, device number 105 [ 282.186874][T13851] fido_id[13851]: Failed to open report descriptor at '/sys/devices/platform/dummy_hcd.3/usb4/report_descriptor': No such file or directory [ 282.888477][T13880] netlink: 'syz.2.6609': attribute type 4 has an invalid length. [ 282.904308][T13880] netlink: 17 bytes leftover after parsing attributes in process `syz.2.6609'. [ 283.445762][ T45] kernel write not supported for file /rfkill (pid: 45 comm: kworker/1:1) [ 283.917262][T13923] netlink: 24 bytes leftover after parsing attributes in process `syz.2.6628'. [ 284.228154][ T36] kauditd_printk_skb: 372 callbacks suppressed [ 284.228172][ T36] audit: type=1400 audit(2000000480.661:31931): avc: denied { read write open } for pid=294 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 284.279190][ T36] audit: type=1400 audit(2000000480.691:31932): avc: denied { ioctl } for pid=294 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 284.316282][ T36] audit: type=1400 audit(2000000480.741:31933): avc: denied { append } for pid=13936 comm="syz.3.6636" name="001" dev="devtmpfs" ino=95 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 284.340146][ T36] audit: type=1400 audit(2000000480.741:31934): avc: denied { append } for pid=13936 comm="syz.3.6636" path="/dev/bus/usb/001/001" dev="devtmpfs" ino=95 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 284.389950][ T36] audit: type=1400 audit(2000000480.811:31935): avc: denied { read write } for pid=295 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 284.451225][ T36] audit: type=1400 audit(2000000480.811:31936): avc: denied { read write open } for pid=295 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 284.547250][ T36] audit: type=1400 audit(2000000480.811:31937): avc: denied { ioctl } for pid=295 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 284.628220][ T36] audit: type=1400 audit(2000000480.861:31938): avc: denied { read } for pid=13939 comm="syz.2.6637" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 284.653407][ T36] audit: type=1400 audit(2000000480.861:31939): avc: denied { read open } for pid=13939 comm="syz.2.6637" path="/dev/kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 284.697428][ T36] audit: type=1400 audit(2000000480.861:31940): avc: denied { ioctl } for pid=13939 comm="syz.2.6637" path="/dev/kvm" dev="devtmpfs" ino=13 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 284.817940][ T45] usb 4-1: new high-speed USB device number 106 using dummy_hcd [ 284.967946][ T45] usb 4-1: Using ep0 maxpacket: 32 [ 284.976125][ T45] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 284.990082][ T45] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 285.007259][ T45] usb 4-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 5 [ 285.036735][ T45] usb 4-1: New USB device found, idVendor=0458, idProduct=5011, bcdDevice= 0.00 [ 285.056906][ T45] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 285.078230][ T45] usb 4-1: config 0 descriptor?? [ 285.417255][T13977] netlink: 'syz.2.6655': attribute type 10 has an invalid length. [ 285.425484][T13977] netlink: 'syz.2.6655': attribute type 10 has an invalid length. [ 285.528611][ T45] input: HID 0458:5011 as /devices/platform/dummy_hcd.3/usb4/4-1/4-1:0.0/0003:0458:5011.002F/input/input62 [ 285.588916][ T45] input: HID 0458:5011 as /devices/platform/dummy_hcd.3/usb4/4-1/4-1:0.0/0003:0458:5011.002F/input/input63 [ 285.651605][ T45] kye 0003:0458:5011.002F: input,hiddev96,hidraw0: USB HID v0.00 Mouse [HID 0458:5011] on usb-dummy_hcd.3-1/input0 [ 285.741421][ T45] usb 4-1: USB disconnect, device number 106 [ 285.959222][T13984] fido_id[13984]: Failed to open report descriptor at '/sys/devices/platform/dummy_hcd.3/usb4/report_descriptor': No such file or directory [ 285.968332][ C0] net_ratelimit: 21967 callbacks suppressed [ 285.968384][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 285.991567][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 286.003721][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 286.015859][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 286.028099][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 286.040355][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 286.052524][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 286.064681][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 286.076842][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 286.089023][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 286.798980][ T45] usb 4-1: new high-speed USB device number 107 using dummy_hcd [ 286.971546][ T45] usb 4-1: config 0 has an invalid interface number: 64 but max is 0 [ 286.990582][ T45] usb 4-1: config 0 has no interface number 0 [ 287.010522][ T45] usb 4-1: New USB device found, idVendor=046d, idProduct=0823, bcdDevice= 0.07 [ 287.047962][ T45] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 287.056005][ T45] usb 4-1: Product: syz [ 287.100555][ T45] usb 4-1: Manufacturer: syz [ 287.105183][ T45] usb 4-1: SerialNumber: syz [ 287.132329][ T45] usb 4-1: config 0 descriptor?? [ 287.248630][T14022] incfs: Can't find or create .index dir in ./file0 [ 287.255474][T14022] incfs: mount failed -28 [ 287.357955][ T31] usb 3-1: new high-speed USB device number 107 using dummy_hcd [ 287.391976][ T45] usb 4-1: Found UVC 0.08 device syz (046d:0823) [ 287.413785][ T45] usb 4-1: No valid video chain found. [ 287.439248][ T45] usb 4-1: USB disconnect, device number 107 [ 287.548051][ T31] usb 3-1: Using ep0 maxpacket: 16 [ 287.560476][ T31] usb 3-1: config 1 has an invalid interface number: 105 but max is 0 [ 287.578425][ T31] usb 3-1: config 1 has no interface number 0 [ 287.587703][ T31] usb 3-1: config 1 interface 105 altsetting 2 bulk endpoint 0x4 has invalid maxpacket 16 [ 287.599019][ T31] usb 3-1: config 1 interface 105 altsetting 2 bulk endpoint 0x82 has invalid maxpacket 64 [ 287.610675][ T31] usb 3-1: config 1 interface 105 has no altsetting 0 [ 287.629879][ T31] usb 3-1: New USB device found, idVendor=20f4, idProduct=e05a, bcdDevice=6c.6d [ 287.660473][ T31] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 287.680657][ T31] usb 3-1: Product: syz [ 287.684835][ T31] usb 3-1: Manufacturer: syz [ 287.708046][ T31] usb 3-1: SerialNumber: syz [ 287.732422][T14018] raw-gadget.0 gadget.2: fail, usb_ep_enable returned -22 [ 287.760499][T14018] raw-gadget.0 gadget.2: fail, usb_ep_enable returned -22 [ 288.204335][T14039] SELinux: policydb table sizes (8,9) do not match mine (8,7) [ 288.222113][T14039] SELinux: failed to load policy [ 288.250878][T14018] raw-gadget.0 gadget.2: fail, usb_ep_enable returned -22 [ 288.262394][T14018] raw-gadget.0 gadget.2: fail, usb_ep_enable returned -22 [ 288.523211][ T31] aqc111 3-1:1.105 (unnamed net_device) (uninitialized): Failed to read(0x20) reg index 0x0000: -71 [ 288.574006][ T31] aqc111 3-1:1.105: probe with driver aqc111 failed with error -71 [ 288.622505][ T31] usb 3-1: USB disconnect, device number 107 [ 289.003465][T14065] option changes via remount are deprecated (pid=14064 comm=syz.1.6688) [ 289.237291][T14073] rust_binder: Failure in copy_transaction_data: BR_FAILED_REPLY { source: EINVAL } [ 289.237326][T14073] rust_binder: Transaction failed: BR_FAILED_REPLY { source: EINVAL } my_pid:3138 [ 289.269847][ T36] kauditd_printk_skb: 464 callbacks suppressed [ 289.269863][ T36] audit: type=1400 audit(2000000485.701:32405): avc: denied { read } for pid=14075 comm="syz.2.6703" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 289.387938][ T36] audit: type=1400 audit(2000000485.741:32406): avc: denied { read open } for pid=14075 comm="syz.2.6703" path="/dev/kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 289.483572][ T36] audit: type=1400 audit(2000000485.741:32407): avc: denied { read write } for pid=294 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 289.579735][ T36] audit: type=1400 audit(2000000485.741:32408): avc: denied { read write open } for pid=294 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 289.664551][ T36] audit: type=1400 audit(2000000485.741:32409): avc: denied { ioctl } for pid=294 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 289.785046][ T36] audit: type=1400 audit(2000000485.751:32410): avc: denied { ioctl } for pid=14075 comm="syz.2.6703" path="/dev/kvm" dev="devtmpfs" ino=13 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 289.873368][ T36] audit: type=1400 audit(2000000485.791:32411): avc: denied { read write } for pid=289 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 289.987935][ T36] audit: type=1400 audit(2000000485.791:32412): avc: denied { read write open } for pid=289 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 290.094492][ T36] audit: type=1400 audit(2000000485.791:32413): avc: denied { ioctl } for pid=289 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 290.179063][ T31] usb 3-1: new high-speed USB device number 108 using dummy_hcd [ 290.189917][T14102] audit: audit_backlog=65 > audit_backlog_limit=64 [ 290.311144][T14107] overlayfs: The uuid=off requires a single fs for lower and upper, falling back to uuid=null. [ 290.351055][ T31] usb 3-1: New USB device found, idVendor=056a, idProduct=4001, bcdDevice= 0.00 [ 290.364851][ T31] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 290.399680][ T31] usb 3-1: config 0 descriptor?? [ 290.837049][ T31] wacom 0003:056A:4001.0030: hidraw0: USB HID v1.01 Device [HID 056a:4001] on usb-dummy_hcd.2-1/input0 [ 290.904399][T14121] netlink: 16 bytes leftover after parsing attributes in process `syz.3.6725'. [ 290.931472][T14121] netlink: 17 bytes leftover after parsing attributes in process `syz.3.6725'. [ 290.955882][T14121] tipc: Invalid UDP bearer configuration [ 290.955905][T14121] tipc: Enabling of bearer rejected, failed to enable media [ 290.977958][ C0] net_ratelimit: 22741 callbacks suppressed [ 290.977977][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 290.996048][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 291.008260][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 291.020465][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 291.032599][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 291.044862][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 291.057021][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 291.069141][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 291.081255][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 291.084604][ T31] usb 3-1: USB disconnect, device number 108 [ 291.093807][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 291.144780][T14122] fido_id[14122]: Failed to open report descriptor at '/sys/devices/platform/dummy_hcd.2/usb3/report_descriptor': No such file or directory [ 291.434487][T14133] netlink: 8 bytes leftover after parsing attributes in process `syz.3.6730'. [ 292.593233][ T31] usb 4-1: new high-speed USB device number 108 using dummy_hcd [ 293.030118][ T31] usb 4-1: Using ep0 maxpacket: 16 [ 293.322323][ T31] usb 4-1: too many endpoints for config 0 interface 0 altsetting 3: 63, using maximum allowed: 30 [ 293.465740][ T466] hid-generic 0003:0008:000F.0031: unknown main item tag 0x0 [ 293.861982][ T466] hid-generic 0003:0008:000F.0031: unknown main item tag 0x0 [ 293.880346][ T31] usb 4-1: config 0 interface 0 altsetting 3 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 294.020407][ T466] hid-generic 0003:0008:000F.0031: unknown main item tag 0x0 [ 294.138521][ T31] usb 4-1: config 0 interface 0 altsetting 3 has 2 endpoint descriptors, different from the interface descriptor's value: 63 [ 294.269364][ T31] usb 4-1: config 0 interface 0 has no altsetting 0 [ 294.276025][ T31] usb 4-1: New USB device found, idVendor=1e7d, idProduct=31ce, bcdDevice= 0.00 [ 294.312916][ T36] kauditd_printk_skb: 222 callbacks suppressed [ 294.312952][ T36] audit: type=1400 audit(2000000490.741:32625): avc: denied { write } for pid=14142 comm="syz.2.6735" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 294.528803][ T466] hid-generic 0003:0008:000F.0031: unknown main item tag 0x0 [ 294.536248][ T466] hid-generic 0003:0008:000F.0031: unknown main item tag 0x0 [ 294.952154][ T36] audit: type=1400 audit(2000000490.881:32626): avc: denied { read write } for pid=295 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 294.982764][ T31] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 295.277205][ T466] hid-generic 0003:0008:000F.0031: unknown main item tag 0x0 [ 295.289980][ T31] usb 4-1: config 0 descriptor?? [ 295.340908][ T466] hid-generic 0003:0008:000F.0031: unknown main item tag 0x0 [ 295.491134][ T466] hid-generic 0003:0008:000F.0031: unknown main item tag 0x0 [ 295.702201][ T31] usb 4-1: can't set config #0, error -71 [ 295.710278][ T466] hid-generic 0003:0008:000F.0031: unknown main item tag 0x0 [ 295.710309][ T466] hid-generic 0003:0008:000F.0031: unknown main item tag 0x0 [ 295.710334][ T466] hid-generic 0003:0008:000F.0031: unknown main item tag 0x0 [ 295.710359][ T466] hid-generic 0003:0008:000F.0031: unknown main item tag 0x0 [ 295.710383][ T466] hid-generic 0003:0008:000F.0031: unknown main item tag 0x0 [ 295.710407][ T466] hid-generic 0003:0008:000F.0031: unknown main item tag 0x0 [ 295.710431][ T466] hid-generic 0003:0008:000F.0031: unknown main item tag 0x0 [ 295.710455][ T466] hid-generic 0003:0008:000F.0031: unknown main item tag 0x0 [ 295.710487][ T466] hid-generic 0003:0008:000F.0031: unknown main item tag 0x0 [ 295.710511][ T466] hid-generic 0003:0008:000F.0031: unknown main item tag 0x0 [ 295.710535][ T466] hid-generic 0003:0008:000F.0031: unknown main item tag 0x0 [ 295.710558][ T466] hid-generic 0003:0008:000F.0031: unknown main item tag 0x0 [ 295.710583][ T466] hid-generic 0003:0008:000F.0031: unknown main item tag 0x0 [ 295.710607][ T466] hid-generic 0003:0008:000F.0031: unknown main item tag 0x0 [ 295.710630][ T466] hid-generic 0003:0008:000F.0031: unknown main item tag 0x0 [ 295.710654][ T466] hid-generic 0003:0008:000F.0031: unknown main item tag 0x0 [ 295.710678][ T466] hid-generic 0003:0008:000F.0031: unknown main item tag 0x0 [ 295.710702][ T466] hid-generic 0003:0008:000F.0031: unknown main item tag 0x0 [ 295.710725][ T466] hid-generic 0003:0008:000F.0031: unknown main item tag 0x0 [ 295.752886][ T31] usb 4-1: USB disconnect, device number 108 [ 295.926408][ T36] audit: type=1400 audit(2000000490.881:32627): avc: denied { read write open } for pid=295 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 295.987964][ C0] net_ratelimit: 99150 callbacks suppressed [ 295.987984][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 295.988012][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 295.994347][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 296.006105][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 296.018126][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 296.029995][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 296.041958][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 296.053821][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 296.066055][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 296.077883][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 296.179910][ T36] audit: type=1400 audit(2000000490.881:32628): avc: denied { ioctl } for pid=295 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 296.571235][ T36] audit: type=1400 audit(2000000490.981:32629): avc: denied { read write } for pid=294 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 300.997936][ C1] net_ratelimit: 120977 callbacks suppressed [ 300.997960][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 300.998033][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 301.004196][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 301.016347][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 301.028213][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 301.039939][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 301.051839][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 301.063823][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 301.075739][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 301.088066][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 301.709866][ T36] audit: type=1400 audit(2000000490.981:32630): avc: denied { read write open } for pid=294 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 301.939344][ T466] hid-generic 0003:0008:000F.0031: unknown main item tag 0x0 [ 301.946805][ T466] hid-generic 0003:0008:000F.0031: unknown main item tag 0x0 [ 302.539527][ T466] hid-generic 0003:0008:000F.0031: unknown main item tag 0x0 [ 302.547002][ T466] hid-generic 0003:0008:000F.0031: unknown main item tag 0x0 [ 303.079206][ T36] audit: type=1400 audit(2000000490.981:32631): avc: denied { ioctl } for pid=294 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 303.418949][ T466] hid-generic 0003:0008:000F.0031: unknown main item tag 0x0 [ 303.426402][ T466] hid-generic 0003:0008:000F.0031: unknown main item tag 0x0 [ 304.312438][ T36] audit: type=1400 audit(2000000491.201:32632): avc: denied { read write } for pid=289 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 304.611647][ T466] hid-generic 0003:0008:000F.0031: unknown main item tag 0x0 [ 304.962815][ T466] hid-generic 0003:0008:000F.0031: unknown main item tag 0x0 [ 305.341978][ T466] hid-generic 0003:0008:000F.0031: unknown main item tag 0x0 [ 305.521317][ T466] hid-generic 0003:0008:000F.0031: unknown main item tag 0x0 [ 305.531164][ T36] audit: type=1400 audit(2000000491.201:32633): avc: denied { read write open } for pid=289 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 305.629671][ T466] hid-generic 0003:0008:000F.0031: unknown main item tag 0x0 [ 305.637130][ T466] hid-generic 0003:0008:000F.0031: unknown main item tag 0x0 [ 306.007939][ C1] net_ratelimit: 111227 callbacks suppressed [ 306.007966][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 306.007974][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 306.008161][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 306.014203][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 306.026188][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 306.038124][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 306.050300][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 306.061911][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 306.073911][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 306.085960][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 306.174045][ T466] hid-generic 0003:0008:000F.0031: unknown main item tag 0x0 [ 306.203034][ T466] hid-generic 0003:0008:000F.0031: unknown main item tag 0x0 [ 306.212731][ T36] audit: type=1400 audit(2000000491.201:32634): avc: denied { ioctl } for pid=289 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 306.316671][ T466] hid-generic 0003:0008:000F.0031: unknown main item tag 0x0 [ 306.330179][ T466] hid-generic 0003:0008:000F.0031: unknown main item tag 0x0 [ 306.998473][ T466] hid-generic 0003:0008:000F.0031: unknown main item tag 0x0 [ 307.006003][ T466] hid-generic 0003:0008:000F.0031: unknown main item tag 0x0 [ 307.170317][ T36] audit: type=1400 audit(2000000491.961:32635): avc: denied { read } for pid=14146 comm="syz.3.6737" name="binder0" dev="binder" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 307.196611][ T466] hid-generic 0003:0008:000F.0031: unknown main item tag 0x0 [ 307.543036][ T466] hid-generic 0003:0008:000F.0031: unknown main item tag 0x0 [ 307.552789][ T466] hid-generic 0003:0008:000F.0031: unknown main item tag 0x0 [ 307.579228][ T466] hid-generic 0003:0008:000F.0031: unknown main item tag 0x0 [ 307.586646][ T466] hid-generic 0003:0008:000F.0031: unknown main item tag 0x0 [ 307.682060][ T36] audit: type=1400 audit(2000000492.041:32636): avc: denied { read open } for pid=14146 comm="syz.3.6737" path="/dev/binderfs/binder0" dev="binder" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 307.748602][ T36] audit: type=1400 audit(2000000492.661:32637): avc: denied { create } for pid=14146 comm="syz.3.6737" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 308.114664][ T466] hid-generic 0003:0008:000F.0031: unknown main item tag 0x0 [ 308.223480][ T466] hid-generic 0003:0008:000F.0031: unknown main item tag 0x0 [ 308.279282][ T466] hid-generic 0003:0008:000F.0031: unknown main item tag 0x0 [ 308.286725][ T466] hid-generic 0003:0008:000F.0031: unknown main item tag 0x0 [ 308.303343][ T36] audit: type=1400 audit(2000000492.661:32638): avc: denied { write } for pid=14146 comm="syz.3.6737" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 309.441996][ T36] audit: type=1400 audit(2000000493.211:32639): avc: denied { create } for pid=14148 comm="syz.0.6738" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 309.769034][ T466] hid-generic 0003:0008:000F.0031: unknown main item tag 0x0 [ 309.776481][ T466] hid-generic 0003:0008:000F.0031: unknown main item tag 0x0 [ 310.242355][ T36] audit: type=1400 audit(2000000493.231:32640): avc: denied { write } for pid=14148 comm="syz.0.6738" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 310.469561][ T466] hid-generic 0003:0008:000F.0031: unknown main item tag 0x0 [ 310.728961][ T466] hid-generic 0003:0008:000F.0031: unknown main item tag 0x0 [ 310.736488][ T466] hid-generic 0003:0008:000F.0031: unknown main item tag 0x0 [ 310.882517][ T36] audit: type=1400 audit(2000000493.491:32641): avc: denied { mounton } for pid=14149 comm="syz.2.6736" path="/1706/file0" dev="tmpfs" ino=8625 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 310.959144][ T36] audit: type=1400 audit(2000000493.501:32642): avc: denied { mount } for pid=14149 comm="syz.2.6736" name="/" dev="cgroup" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 311.017922][ C1] net_ratelimit: 107956 callbacks suppressed [ 311.017944][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 311.018076][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 311.024259][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 311.036536][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 311.048241][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 311.060132][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 311.072124][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 311.084102][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 311.096032][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 311.108346][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 312.123004][ T36] audit: type=1400 audit(2000000493.981:32643): avc: denied { read write } for pid=294 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 312.262504][ T466] hid-generic 0003:0008:000F.0031: unknown main item tag 0x0 [ 312.278268][ T466] hid-generic 0003:0008:000F.0031: unknown main item tag 0x0 [ 312.285705][ T466] hid-generic 0003:0008:000F.0031: unknown main item tag 0x0 [ 312.316931][ T36] audit: type=1400 audit(2000000493.981:32644): avc: denied { read write open } for pid=294 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 312.588674][ T466] hid-generic 0003:0008:000F.0031: unknown main item tag 0x0 [ 312.828439][ T466] hid-generic 0003:0008:000F.0031: unknown main item tag 0x0 [ 312.859399][ T466] hid-generic 0003:0008:000F.0031: unknown main item tag 0x0 [ 312.866831][ T466] hid-generic 0003:0008:000F.0031: unknown main item tag 0x0 [ 313.809362][ T466] hid-generic 0003:0008:000F.0031: unknown main item tag 0x0 [ 313.816806][ T466] hid-generic 0003:0008:000F.0031: unknown main item tag 0x0 [ 313.929266][ T36] audit: type=1400 audit(2000000493.981:32645): avc: denied { ioctl } for pid=294 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 314.933099][ T466] hid-generic 0003:0008:000F.0031: unknown main item tag 0x0 [ 315.124600][ T36] audit: type=1400 audit(2000000498.561:32646): avc: denied { read write } for pid=289 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 315.508755][ T466] hid-generic 0003:0008:000F.0031: unknown main item tag 0x0 [ 315.516199][ T466] hid-generic 0003:0008:000F.0031: unknown main item tag 0x0 [ 315.539489][ T466] hid-generic 0003:0008:000F.0031: unknown main item tag 0x0 [ 315.546913][ T466] hid-generic 0003:0008:000F.0031: unknown main item tag 0x0 [ 315.667903][ C1] sched: DL replenish lagged too much [ 315.671009][ T36] audit: type=1400 audit(2000000498.561:32647): avc: denied { read write open } for pid=289 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 315.941288][ T466] hid-generic 0003:0008:000F.0031: unknown main item tag 0x0 [ 316.027924][ C1] net_ratelimit: 110028 callbacks suppressed [ 316.027946][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 316.028066][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 316.034103][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 316.046223][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 316.058223][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 316.070003][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 316.081871][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 316.094029][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 316.105879][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 316.117627][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 316.212117][ T466] hid-generic 0003:0008:000F.0031: unknown main item tag 0x0 [ 316.539375][ T466] hid-generic 0003:0008:000F.0031: unknown main item tag 0x0 [ 316.546831][ T466] hid-generic 0003:0008:000F.0031: unknown main item tag 0x0 [ 317.297247][ T466] hid-generic 0003:0008:000F.0031: unknown main item tag 0x0 [ 317.317493][ T36] audit: type=1400 audit(2000000498.561:32648): avc: denied { ioctl } for pid=289 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 319.658655][ T466] hid-generic 0003:0008:000F.0031: unknown main item tag 0x0 [ 319.666117][ T466] hid-generic 0003:0008:000F.0031: unknown main item tag 0x0 [ 319.749787][ T36] audit: type=1400 audit(2000000498.951:32649): avc: denied { read write } for pid=295 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 320.362011][ T466] hid-generic 0003:0008:000F.0031: unknown main item tag 0x0 [ 320.415030][ T466] hid-generic 0003:0008:000F.0031: unknown main item tag 0x0 [ 320.438434][ T466] hid-generic 0003:0008:000F.0031: unknown main item tag 0x0 [ 320.445872][ T466] hid-generic 0003:0008:000F.0031: unknown main item tag 0x0 [ 320.455569][ T36] audit: type=1400 audit(2000000498.951:32650): avc: denied { read write open } for pid=295 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 320.828408][ T466] hid-generic 0003:0008:000F.0031: unknown main item tag 0x0 [ 320.835849][ T466] hid-generic 0003:0008:000F.0031: unknown main item tag 0x0 [ 321.037908][ C1] net_ratelimit: 116713 callbacks suppressed [ 321.037930][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 321.037934][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 321.038431][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 321.044216][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 321.056105][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 321.068152][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 321.080033][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 321.092024][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 321.104133][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 321.115879][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 321.370662][ T36] audit: type=1400 audit(2000000498.951:32651): avc: denied { ioctl } for pid=295 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 321.679490][ T466] hid-generic 0003:0008:000F.0031: unknown main item tag 0x0 [ 321.889270][ T36] audit: type=1400 audit(2000000501.851:32652): avc: denied { read write } for pid=294 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 321.917120][ T466] hid-generic 0003:0008:000F.0031: unknown main item tag 0x0 [ 321.926997][ T466] hid-generic 0003:0008:000F.0031: unknown main item tag 0x0 [ 321.940668][T14172] netlink: 4 bytes leftover after parsing attributes in process `syz.3.6747'. [ 322.303564][ T466] hid-generic 0003:0008:000F.0031: unknown main item tag 0x0 [ 322.828876][ T36] audit: type=1400 audit(2000000501.851:32653): avc: denied { read write open } for pid=294 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 323.161509][ T466] hid-generic 0003:0008:000F.0031: hidraw0: USB HID v0.00 Device [syz1] on syz1 [ 323.431986][ T36] audit: type=1400 audit(2000000501.851:32654): avc: denied { ioctl } for pid=294 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 324.283366][ T36] audit: type=1400 audit(2000000502.301:32655): avc: denied { read } for pid=14155 comm="syz.2.6740" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 326.047938][ C1] net_ratelimit: 109776 callbacks suppressed [ 326.047962][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 326.047964][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 326.048151][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 326.054261][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8a:27:b8:57:68:52, vlan:0) [ 326.066173][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 326.078112][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 326.090182][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 326.101938][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 326.113806][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 326.125995][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 326.848497][ T36] audit: type=1400 audit(2000000502.301:32656): avc: denied { read open } for pid=14155 comm="syz.2.6740" path="/dev/kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 328.300233][ T36] audit: type=1400 audit(2000000502.301:32657): avc: denied { ioctl } for pid=14155 comm="syz.2.6740" path="/dev/kvm" dev="devtmpfs" ino=13 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 328.641201][T14176] fido_id[14176]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 329.141096][ T36] audit: type=1400 audit(2000000504.101:32658): avc: denied { read write } for pid=289 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 331.057901][ C1] net_ratelimit: 113925 callbacks suppressed [ 331.057924][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 331.057950][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 331.064176][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 331.076158][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 331.088133][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 331.100019][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 331.111849][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 331.124048][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 331.135735][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8a:27:b8:57:68:52, vlan:0) [ 331.147595][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 331.659052][T14140] bridge0: port 3(syz_tun) entered disabled state [ 331.719480][ T36] audit: type=1400 audit(2000000504.101:32659): avc: denied { read write open } for pid=289 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 332.901151][ T36] audit: type=1400 audit(2000000504.101:32660): avc: denied { ioctl } for pid=289 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 335.438951][T14140] syz_tun (unregistering): left allmulticast mode [ 335.948733][T14140] syz_tun (unregistering): left promiscuous mode [ 335.974863][T14140] bridge0: port 3(syz_tun) entered disabled state [ 336.067906][ C0] net_ratelimit: 115741 callbacks suppressed [ 336.067927][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 336.067936][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8a:27:b8:57:68:52, vlan:0) [ 336.068147][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 336.074178][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 336.086079][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 336.098414][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 336.109992][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 336.121958][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 336.133927][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 336.145871][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 336.559344][ T36] audit: type=1400 audit(2000000504.211:32661): avc: denied { read write } for pid=294 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 337.528824][ T36] audit: type=1400 audit(2000000504.211:32662): avc: denied { read write open } for pid=294 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 337.588811][ T36] audit: type=1400 audit(2000000504.211:32663): avc: denied { ioctl } for pid=294 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 337.900536][ T36] audit: type=1400 audit(2000000504.561:32664): avc: denied { execmem } for pid=14161 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 341.077931][ C1] net_ratelimit: 120226 callbacks suppressed [ 341.077956][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 341.078409][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 341.084305][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 341.096078][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 341.108222][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8a:27:b8:57:68:52, vlan:0) [ 341.120098][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 341.131857][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 341.144182][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 341.155858][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 341.167801][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 344.070000][ T36] audit: type=1400 audit(2000000507.591:32665): avc: denied { read } for pid=14163 comm="syz.0.6745" name="ppp" dev="devtmpfs" ino=86 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 346.087921][ C1] net_ratelimit: 121800 callbacks suppressed [ 346.087944][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8a:27:b8:57:68:52, vlan:0) [ 346.088657][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 346.094218][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 346.106142][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 346.118218][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 346.130039][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 346.142032][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 346.154316][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 346.165990][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 346.178009][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 346.719188][ T36] audit: type=1400 audit(2000000507.591:32666): avc: denied { read open } for pid=14163 comm="syz.0.6745" path="/dev/ppp" dev="devtmpfs" ino=86 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 347.388122][ T36] audit: type=1400 audit(2000000507.611:32667): avc: denied { ioctl } for pid=14163 comm="syz.0.6745" path="/dev/ppp" dev="devtmpfs" ino=86 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 348.155690][ T36] audit: type=1400 audit(2000000507.901:32668): avc: denied { read write } for pid=294 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 349.377919][ T36] audit: type=1400 audit(2000000507.901:32669): avc: denied { read write open } for pid=294 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 350.810355][T14166] bridge0: port 1(bridge_slave_0) entered blocking state [ 350.817438][T14166] bridge0: port 1(bridge_slave_0) entered disabled state [ 351.097919][ C1] net_ratelimit: 118093 callbacks suppressed [ 351.097942][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 351.098233][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 351.104234][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8a:27:b8:57:68:52, vlan:0) [ 351.116101][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 351.128096][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 351.140054][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 351.151941][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 351.164305][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 351.175939][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 351.187917][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 351.205518][ T36] audit: type=1400 audit(2000000507.901:32670): avc: denied { ioctl } for pid=294 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 351.358718][T14166] bridge_slave_0: entered allmulticast mode [ 351.779710][T14166] bridge_slave_0: entered promiscuous mode [ 352.311452][T14166] bridge0: port 2(bridge_slave_1) entered blocking state [ 352.488421][T14166] bridge0: port 2(bridge_slave_1) entered disabled state [ 352.495682][T14166] bridge_slave_1: entered allmulticast mode [ 352.531152][ T36] audit: type=1400 audit(2000000508.941:32671): avc: denied { ioctl } for pid=14163 comm="syz.0.6745" path="/dev/ppp" dev="devtmpfs" ino=86 ioctlcmd=0x7451 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 354.458381][ T36] audit: type=1400 audit(2000000508.991:32672): avc: denied { read } for pid=14166 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 355.322271][T14166] bridge_slave_1: entered promiscuous mode [ 355.750306][ T36] audit: type=1400 audit(2000000508.991:32673): avc: denied { read open } for pid=14166 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 356.107946][ C1] net_ratelimit: 119776 callbacks suppressed [ 356.107971][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 356.108006][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 356.114308][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8a:27:b8:57:68:52, vlan:0) [ 356.126120][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 356.138229][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 356.150125][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 356.162005][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 356.174228][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 356.185959][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 356.197974][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 357.057924][ T36] audit: type=1400 audit(2000000508.991:32674): avc: denied { mounton } for pid=14166 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 357.598144][ T36] audit: type=1400 audit(2000000509.281:32675): avc: denied { sys_module } for pid=14166 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 357.639761][ T36] audit: type=1400 audit(2000000511.391:32676): avc: denied { sys_module } for pid=14166 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 358.919877][ T36] audit: type=1400 audit(2000000511.401:32677): avc: denied { sys_module } for pid=14166 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 360.398692][ T36] audit: type=1400 audit(2000000511.541:32678): avc: denied { sys_module } for pid=14166 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 360.530736][ T36] audit: type=1400 audit(2000000513.721:32679): avc: denied { read } for pid=14168 comm="syz.3.6746" name="event2" dev="devtmpfs" ino=208 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 361.054215][ T36] audit: type=1400 audit(2000000513.721:32680): avc: denied { read open } for pid=14168 comm="syz.3.6746" path="/dev/input/event2" dev="devtmpfs" ino=208 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 361.117881][ C0] net_ratelimit: 115485 callbacks suppressed [ 361.117901][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 361.117974][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 361.124460][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 361.136120][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 361.148019][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 361.160017][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8a:27:b8:57:68:52, vlan:0) [ 361.171775][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 361.183673][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 361.195996][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 361.207702][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 362.210047][ T36] audit: type=1400 audit(2000000513.721:32681): avc: denied { ioctl } for pid=14168 comm="syz.3.6746" path="/dev/input/event2" dev="devtmpfs" ino=208 ioctlcmd=0x4504 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 362.858774][ T36] audit: type=1400 audit(2000000514.051:32682): avc: denied { read write } for pid=294 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 363.659431][ T36] audit: type=1400 audit(2000000514.051:32683): avc: denied { read write open } for pid=294 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 364.393147][ T36] audit: type=1400 audit(2000000514.051:32684): avc: denied { ioctl } for pid=294 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 364.988203][T14199] tipc: Started in network mode [ 364.996147][T14199] tipc: Node identity aaaaaaaaaa33, cluster identity 4711 [ 365.029932][ T36] audit: type=1400 audit(2000000517.181:32685): avc: denied { execmem } for pid=14170 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 365.080301][T14199] tipc: Enabled bearer , priority 2 [ 365.992158][ T36] audit: type=1400 audit(2000000519.621:32686): avc: denied { read write } for pid=294 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 366.127868][ C1] net_ratelimit: 109655 callbacks suppressed [ 366.128041][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 366.133960][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 366.146475][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 366.158187][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8a:27:b8:57:68:52, vlan:0) [ 366.169898][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 366.182016][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 366.193849][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 366.205837][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 366.218194][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 366.229822][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 366.884118][ T31] tipc: Node number set to 10070698 [ 366.950835][ T36] audit: type=1400 audit(2000000519.621:32687): avc: denied { read write open } for pid=294 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 367.292047][ T36] audit: type=1400 audit(2000000519.621:32688): avc: denied { ioctl } for pid=294 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 367.940380][ T36] audit: type=1400 audit(2000000520.691:32689): avc: denied { read } for pid=14174 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 370.128285][ T36] audit: type=1400 audit(2000000520.691:32690): avc: denied { read open } for pid=14174 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 370.480814][T14182] bridge0: port 1(bridge_slave_0) entered blocking state [ 370.608234][ T36] audit: type=1400 audit(2000000520.801:32691): avc: denied { mounton } for pid=14174 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 370.650496][T14182] bridge0: port 1(bridge_slave_0) entered disabled state [ 371.103669][T14182] bridge_slave_0: entered allmulticast mode [ 371.137921][ C1] net_ratelimit: 116691 callbacks suppressed [ 371.137940][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8a:27:b8:57:68:52, vlan:0) [ 371.138393][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 371.144177][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 371.156127][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 371.168113][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 371.180048][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 371.191930][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 371.204169][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 371.215826][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 371.227889][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 371.332754][T14182] bridge_slave_0: entered promiscuous mode [ 371.509515][ T36] audit: type=1400 audit(2000000520.801:32692): avc: denied { sys_module } for pid=14174 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 371.621618][T14182] bridge0: port 2(bridge_slave_1) entered blocking state [ 371.639268][T14182] bridge0: port 2(bridge_slave_1) entered disabled state [ 371.646369][T14182] bridge_slave_1: entered allmulticast mode [ 371.759664][T14182] bridge_slave_1: entered promiscuous mode [ 372.121065][ T36] audit: type=1400 audit(2000000520.871:32693): avc: denied { execmem } for pid=14175 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 373.781646][ T36] audit: type=1400 audit(2000000524.981:32694): avc: denied { create } for pid=14178 comm="syz.3.6749" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 375.670015][ T36] audit: type=1400 audit(2000000525.041:32695): avc: denied { read write } for pid=294 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 376.147883][ C1] net_ratelimit: 115722 callbacks suppressed [ 376.147908][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 376.148444][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 376.154142][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 376.166086][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 376.178024][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 376.189994][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 376.201934][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 376.214038][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 376.225747][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 376.237636][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 377.468443][ T36] audit: type=1400 audit(2000000525.041:32696): avc: denied { read write open } for pid=294 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 380.542043][ T36] audit: type=1400 audit(2000000525.041:32697): avc: denied { ioctl } for pid=294 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 381.157896][ C1] net_ratelimit: 116578 callbacks suppressed [ 381.157919][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 381.157955][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 381.164195][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 381.176156][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 381.188147][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 381.200326][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 381.211959][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 381.223989][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 381.235892][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 381.247885][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 381.310341][ T36] audit: type=1400 audit(2000000525.131:32698): avc: denied { sys_module } for pid=14174 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 381.620176][ T36] audit: type=1400 audit(2000000525.141:32699): avc: denied { sys_module } for pid=14174 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 382.409785][ T36] audit: type=1400 audit(2000000525.151:32700): avc: denied { sys_module } for pid=14174 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 383.043512][T14174] bridge0: port 1(bridge_slave_0) entered blocking state [ 383.068335][ T36] audit: type=1400 audit(2000000533.831:32701): avc: denied { read } for pid=14182 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 383.085277][T14174] bridge0: port 1(bridge_slave_0) entered disabled state [ 383.189581][T14174] bridge_slave_0: entered allmulticast mode [ 383.209322][ T36] audit: type=1400 audit(2000000533.831:32702): avc: denied { read open } for pid=14182 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 383.249297][T14174] bridge_slave_0: entered promiscuous mode [ 383.550112][ T36] audit: type=1400 audit(2000000533.831:32703): avc: denied { mounton } for pid=14182 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 383.844150][ T36] audit: type=1400 audit(2000000533.931:32704): avc: denied { sys_module } for pid=14182 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 385.110829][ T36] audit: type=1400 audit(2000000534.071:32705): avc: denied { sys_module } for pid=14182 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 386.167895][ C0] net_ratelimit: 109468 callbacks suppressed [ 386.167917][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 386.168044][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 386.174227][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 386.186082][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 386.198508][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 386.210063][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 386.222035][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 386.233953][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 386.245850][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 386.257758][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 386.299773][ T36] audit: type=1400 audit(2000000534.101:32706): avc: denied { sys_module } for pid=14182 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 388.039494][ T36] audit: type=1400 audit(2000000534.111:32707): avc: denied { sys_module } for pid=14182 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 391.177926][ C1] net_ratelimit: 121831 callbacks suppressed [ 391.177952][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 391.178071][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 391.184237][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8a:27:b8:57:68:52, vlan:0) [ 391.196075][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 391.208082][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 391.220050][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 391.231943][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 391.244214][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 391.255940][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 391.268094][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 392.384537][ T36] audit: type=1400 audit(2000000534.411:32708): avc: denied { read write } for pid=294 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 393.399419][ T36] audit: type=1400 audit(2000000534.411:32709): avc: denied { read write open } for pid=294 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 396.187920][ C1] net_ratelimit: 120883 callbacks suppressed [ 396.187945][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 396.187974][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 396.194190][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 396.206175][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 396.218073][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 396.230092][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 396.242043][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 396.254222][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 396.265869][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 396.277733][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 397.336307][ T36] audit: type=1400 audit(2000000534.411:32710): avc: denied { ioctl } for pid=294 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 398.050150][ T36] audit: type=1400 audit(2000000544.851:32711): avc: denied { append } for pid=14188 comm="syz.3.6752" name="001" dev="devtmpfs" ino=95 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 398.530714][ T36] audit: type=1400 audit(2000000544.851:32712): avc: denied { append } for pid=14188 comm="syz.3.6752" path="/dev/bus/usb/001/001" dev="devtmpfs" ino=95 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 398.650875][ T36] audit: type=1400 audit(2000000547.201:32713): avc: denied { read write } for pid=294 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 399.719271][ T36] audit: type=1400 audit(2000000547.201:32714): avc: denied { read write open } for pid=294 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 400.362171][T14216] audit: audit_backlog=65 > audit_backlog_limit=64 [ 400.974712][ T36] audit: type=1400 audit(2000000547.201:32715): avc: denied { ioctl } for pid=294 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 401.080834][T14216] audit: audit_lost=42 audit_rate_limit=0 audit_backlog_limit=64 [ 401.183585][T14216] audit: backlog limit exceeded [ 401.197875][ C0] net_ratelimit: 111401 callbacks suppressed [ 401.197896][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 401.197957][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 401.204372][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 401.216125][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 401.228018][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 401.239956][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 401.251777][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 401.263853][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8a:27:b8:57:68:52, vlan:0) [ 401.275822][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 401.287599][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 401.370033][T14216] audit: audit_backlog=65 > audit_backlog_limit=64 [ 401.376586][T14216] audit: audit_lost=43 audit_rate_limit=0 audit_backlog_limit=64 [ 406.207903][ C1] net_ratelimit: 113029 callbacks suppressed [ 406.207928][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 406.207969][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 406.214255][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 406.226211][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 406.238199][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8a:27:b8:57:68:52, vlan:0) [ 406.250151][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 406.261894][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 406.273916][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 406.285784][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 406.297771][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 408.682288][ T36] kauditd_printk_skb: 66 callbacks suppressed [ 408.682307][ T36] audit: type=1400 audit(2000000605.101:32781): avc: denied { sys_module } for pid=14216 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 409.314130][ T36] audit: type=1400 audit(2000000605.111:32782): avc: denied { sys_module } for pid=14216 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 409.575537][ T36] audit: type=1400 audit(2000000605.181:32783): avc: denied { sys_module } for pid=14216 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 411.217918][ C1] net_ratelimit: 115471 callbacks suppressed [ 411.217943][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 411.218152][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 411.224242][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 411.236083][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 411.248125][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8a:27:b8:57:68:52, vlan:0) [ 411.259887][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 411.271785][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 411.284050][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 411.295852][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 411.307901][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 416.227910][ C0] net_ratelimit: 119287 callbacks suppressed [ 416.227932][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 416.228047][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 416.234371][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 416.246100][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 416.258140][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 416.270058][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 416.281896][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 416.293899][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 416.305910][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 416.317816][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8a:27:b8:57:68:52, vlan:0) [ 416.800959][T14210] bridge0: port 1(bridge_slave_0) entered blocking state [ 416.812600][T14210] bridge0: port 1(bridge_slave_0) entered disabled state [ 416.839225][T14210] bridge_slave_0: entered allmulticast mode [ 416.870350][T14210] bridge_slave_0: entered promiscuous mode [ 417.702406][T14210] bridge0: port 2(bridge_slave_1) entered blocking state [ 417.717948][T14210] bridge0: port 2(bridge_slave_1) entered disabled state [ 417.725049][T14210] bridge_slave_1: entered allmulticast mode [ 417.779484][T14210] bridge_slave_1: entered promiscuous mode [ 418.651251][T14213] bridge0: port 1(bridge_slave_0) entered blocking state [ 418.661352][ T36] audit: type=1400 audit(2000000615.071:32784): avc: denied { sys_module } for pid=14210 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 418.693045][T14213] bridge0: port 1(bridge_slave_0) entered disabled state [ 418.713601][T14213] bridge_slave_0: entered allmulticast mode [ 418.758234][T14213] bridge_slave_0: entered promiscuous mode [ 418.869753][T14213] bridge0: port 2(bridge_slave_1) entered blocking state [ 418.876823][T14213] bridge0: port 2(bridge_slave_1) entered disabled state [ 419.008652][T14213] bridge_slave_1: entered allmulticast mode [ 419.061190][T14213] bridge_slave_1: entered promiscuous mode [ 419.279681][ T36] audit: type=1400 audit(2000000615.701:32785): avc: denied { sys_module } for pid=14210 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 419.458240][ T36] audit: type=1400 audit(2000000615.811:32786): avc: denied { sys_module } for pid=14213 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 419.608450][ T36] audit: type=1400 audit(2000000616.031:32787): avc: denied { sys_module } for pid=14213 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 419.940957][ T36] audit: type=1400 audit(2000000616.301:32788): avc: denied { sys_module } for pid=14210 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 420.350959][ T36] audit: type=1400 audit(2000000616.761:32789): avc: denied { sys_module } for pid=14213 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 420.601008][T14214] bridge0: port 1(bridge_slave_0) entered blocking state [ 420.610211][T14214] bridge0: port 1(bridge_slave_0) entered disabled state [ 420.617303][T14214] bridge_slave_0: entered allmulticast mode [ 420.630532][ T36] audit: type=1400 audit(2000000616.781:32790): avc: denied { sys_module } for pid=14210 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 420.692833][T14214] bridge_slave_0: entered promiscuous mode [ 420.711667][ T36] audit: type=1400 audit(2000000616.841:32791): avc: denied { sys_module } for pid=14213 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 420.853696][T14216] bridge0: port 1(bridge_slave_0) entered blocking state [ 420.879193][T14216] bridge0: port 1(bridge_slave_0) entered disabled state [ 420.886366][T14216] bridge_slave_0: entered allmulticast mode [ 420.932752][T14216] bridge_slave_0: entered promiscuous mode [ 421.092119][ T36] audit: type=1400 audit(2000000617.521:32792): avc: denied { sys_module } for pid=14213 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 421.201010][T14214] bridge0: port 2(bridge_slave_1) entered blocking state [ 421.228421][T14214] bridge0: port 2(bridge_slave_1) entered disabled state [ 421.235643][T14214] bridge_slave_1: entered allmulticast mode [ 421.241611][ C1] net_ratelimit: 110497 callbacks suppressed [ 421.241627][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 421.241711][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 421.241755][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 421.241772][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 421.241828][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 421.241857][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 421.241915][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 421.241948][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 421.242053][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8a:27:b8:57:68:52, vlan:0) [ 421.242128][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 421.394039][ T36] audit: type=1400 audit(2000000617.651:32793): avc: denied { sys_module } for pid=14210 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 421.638204][T14214] bridge_slave_1: entered promiscuous mode [ 421.674590][T14216] bridge0: port 2(bridge_slave_1) entered blocking state [ 421.690917][T14216] bridge0: port 2(bridge_slave_1) entered disabled state [ 421.718030][T14216] bridge_slave_1: entered allmulticast mode [ 421.729398][T14216] bridge_slave_1: entered promiscuous mode [ 426.247870][ C1] net_ratelimit: 122323 callbacks suppressed [ 426.247894][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 426.247937][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 426.254166][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8a:27:b8:57:68:52, vlan:0) [ 426.266365][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 426.278212][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 426.290089][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 426.302006][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 426.313933][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 426.325905][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 426.338312][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 426.463956][ T36] kauditd_printk_skb: 5 callbacks suppressed [ 426.463972][ T36] audit: type=1400 audit(2000000622.891:32799): avc: denied { sys_module } for pid=14216 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 426.721822][ T36] audit: type=1400 audit(2000000623.141:32800): avc: denied { sys_module } for pid=14214 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 428.119200][ T36] audit: type=1400 audit(2000000624.521:32801): avc: denied { sys_module } for pid=14216 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 428.488171][ T36] audit: type=1400 audit(2000000624.761:32802): avc: denied { sys_module } for pid=14214 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 429.029247][ T36] audit: type=1400 audit(2000000624.781:32803): avc: denied { sys_module } for pid=14216 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 429.489512][ T36] audit: type=1400 audit(2000000625.231:32804): avc: denied { sys_module } for pid=14214 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 430.159247][ T36] audit: type=1400 audit(2000000625.451:32805): avc: denied { sys_module } for pid=14214 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 430.633639][ T36] audit: type=1400 audit(2000000625.551:32806): avc: denied { sys_module } for pid=14216 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 431.008478][ T36] audit: type=1400 audit(2000000625.571:32807): avc: denied { sys_module } for pid=14216 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 431.257864][ C1] net_ratelimit: 116212 callbacks suppressed [ 431.257891][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 431.258189][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 431.264119][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 431.276100][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 431.287983][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 431.300043][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 431.311904][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 431.324161][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 431.335804][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 431.347693][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 431.701524][ T36] audit: type=1400 audit(2000000627.371:32808): avc: denied { execmem } for pid=14229 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 434.041755][ T36] audit: type=1400 audit(2000000630.471:32809): avc: denied { read } for pid=14230 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 434.079220][ T36] audit: type=1400 audit(2000000630.471:32810): avc: denied { read open } for pid=14230 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 434.838129][ T36] audit: type=1400 audit(2000000630.471:32811): avc: denied { mounton } for pid=14230 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 436.267872][ C0] net_ratelimit: 117207 callbacks suppressed [ 436.267896][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 436.267934][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8a:27:b8:57:68:52, vlan:0) [ 436.274175][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 436.286107][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 436.298129][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 436.310242][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 436.322462][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 436.334236][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 436.346209][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 436.358099][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 438.680779][ T36] audit: type=1400 audit(2000000631.291:32812): avc: denied { sys_module } for pid=14230 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 439.040622][ T37] INFO: task syz.0.6745:14163 blocked for more than 123 seconds. [ 439.104380][ T37] Not tainted syzkaller #0 [ 439.109427][ T37] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 439.118154][ T37] task:syz.0.6745 state:D stack:0 pid:14163 tgid:14163 ppid:289 flags:0x00004004 [ 439.128396][ T37] Call Trace: [ 439.131704][ T37] [ 439.134654][ T37] __schedule+0x134f/0x1ea0 [ 439.139216][ T37] ? __sched_text_start+0x10/0x10 [ 439.144273][ T37] ? __mutex_add_waiter+0xd0/0x2a0 [ 439.149510][ T37] ? __kasan_check_write+0x18/0x20 [ 439.154647][ T37] ? trace_contention_begin+0xc0/0xc0 [ 439.160060][ T37] schedule+0xc5/0x240 [ 439.164152][ T37] schedule_preempt_disabled+0x14/0x30 [ 439.169671][ T37] __mutex_lock+0x960/0x1bb0 [ 439.174295][ T37] ? __ww_mutex_lock_interruptible_slowpath+0x30/0x30 [ 439.181095][ T37] ? __kasan_check_write+0x18/0x20 [ 439.186231][ T37] ? _raw_spin_lock+0x92/0x120 [ 439.191039][ T37] ? __kasan_check_write+0x18/0x20 [ 439.196174][ T37] ? wake_up_q+0x10f/0x1c0 [ 439.200646][ T37] ? __mutex_unlock_slowpath+0x4b7/0x780 [ 439.206311][ T37] ? mutex_unlock+0x240/0x240 [ 439.211027][ T37] ? unregister_netdevice_many_notify+0x1a68/0x1c30 [ 439.217644][ T37] __mutex_lock_slowpath+0xe/0x20 [ 439.222718][ T37] mutex_lock+0x113/0x1d0 [ 439.227077][ T37] ? __cfi_mutex_lock+0x10/0x10 [ 439.231966][ T37] rcu_barrier+0x4d/0x540 [ 439.236329][ T37] netdev_run_todo+0x118/0xce0 [ 439.241157][ T37] ? __kasan_check_read+0x15/0x20 [ 439.246208][ T37] ? __cfi_netdev_run_todo+0x10/0x10 [ 439.251527][ T37] ? unregister_netdevice_queue+0x341/0x390 [ 439.257446][ T37] ? __cfi_mutex_lock+0x10/0x10 [ 439.262477][ T37] ? __cfi_unregister_netdevice_queue+0x10/0x10 [ 439.268770][ T37] ? __kasan_check_write+0x18/0x20 [ 439.273918][ T37] rtnl_unlock+0x12/0x20 [ 439.278228][ T37] ppp_release+0xf5/0x200 [ 439.282595][ T37] ? __cfi_ppp_release+0x10/0x10 [ 439.287566][ T37] __fput+0x1fe/0xa00 [ 439.291603][ T37] ? __cfi__raw_spin_lock_irq+0x10/0x10 [ 439.297193][ T37] ____fput+0x20/0x30 [ 439.301251][ T37] task_work_run+0x1e5/0x260 [ 439.305889][ T37] ? __cfi_task_work_run+0x10/0x10 [ 439.311053][ T37] ? __kasan_check_read+0x15/0x20 [ 439.316108][ T37] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 439.322236][ T37] resume_user_mode_work+0x35/0x50 [ 439.327462][ T37] syscall_exit_to_user_mode+0x63/0xb0 [ 439.332984][ T37] do_syscall_64+0x63/0xf0 [ 439.337458][ T37] ? clear_bhb_loop+0x50/0xa0 [ 439.342190][ T37] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 439.348127][ T37] RIP: 0033:0x7f40d2b9aeb9 [ 439.352592][ T37] RSP: 002b:00007ffe2eeddcf8 EFLAGS: 00000246 ORIG_RAX: 00000000000001b4 [ 439.361046][ T37] RAX: 0000000000000000 RBX: 00007ffe2eeddde0 RCX: 00007f40d2b9aeb9 [ 439.369049][ T37] RDX: 0000000000000000 RSI: 000000000000001e RDI: 0000000000000003 [ 439.377043][ T37] RBP: 000000000004bd6d R08: 0000000000000001 R09: 0000000000000000 [ 439.385066][ T37] R10: 0000001b2dd20000 R11: 0000000000000246 R12: 00007ffe2eedde20 [ 439.393074][ T37] R13: 00007f40d2e1609c R14: 000000000004c37e R15: 00007f40d2e16090 [ 439.401128][ T37] [ 439.404272][ T37] NMI backtrace for cpu 1 [ 439.404286][ T37] CPU: 1 UID: 0 PID: 37 Comm: khungtaskd Not tainted syzkaller #0 001c7e68fa735976e9f6b7ad125989e1d2b10b0e [ 439.404310][ T37] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 439.404323][ T37] Call Trace: [ 439.404330][ T37] [ 439.404338][ T37] __dump_stack+0x21/0x30 [ 439.404365][ T37] dump_stack_lvl+0x140/0x1c0 [ 439.404389][ T37] ? __cfi_dump_stack_lvl+0x10/0x10 [ 439.404416][ T37] dump_stack+0x19/0x20 [ 439.404439][ T37] nmi_cpu_backtrace+0x2ba/0x2d0 [ 439.404466][ T37] ? rcu_read_unlock_special+0xb7/0x420 [ 439.404489][ T37] ? __cfi_nmi_cpu_backtrace+0x10/0x10 [ 439.404515][ T37] ? sched_show_task+0x371/0x530 [ 439.404538][ T37] ? __rcu_read_unlock+0xc0/0xc0 [ 439.404561][ T37] ? __cfi_nmi_raise_cpu_backtrace+0x10/0x10 [ 439.404584][ T37] ? __cfi_nmi_raise_cpu_backtrace+0x10/0x10 [ 439.404607][ T37] nmi_trigger_cpumask_backtrace+0x142/0x2c0 [ 439.404635][ T37] arch_trigger_cpumask_backtrace+0x14/0x20 [ 439.404658][ T37] watchdog+0xdad/0xf00 [ 439.404685][ T37] ? __kasan_check_write+0x18/0x20 [ 439.404710][ T37] ? __cfi_watchdog+0x10/0x10 [ 439.404737][ T37] ? __kasan_check_read+0x15/0x20 [ 439.404759][ T37] ? __kthread_parkme+0x137/0x180 [ 439.404787][ T37] ? schedule+0xc5/0x240 [ 439.404805][ T37] kthread+0x2c9/0x370 [ 439.404822][ T37] ? __cfi_watchdog+0x10/0x10 [ 439.404850][ T37] ? __cfi_kthread+0x10/0x10 [ 439.404868][ T37] ret_from_fork+0x67/0xa0 [ 439.404893][ T37] ? __cfi_kthread+0x10/0x10 [ 439.404911][ T37] ret_from_fork_asm+0x1a/0x30 [ 439.404941][ T37] [ 439.404949][ T37] Sending NMI from CPU 1 to CPUs 0: [ 439.622042][ C0] NMI backtrace for cpu 0 [ 439.622060][ C0] CPU: 0 UID: 0 PID: 33 Comm: rcuop/1 Not tainted syzkaller #0 001c7e68fa735976e9f6b7ad125989e1d2b10b0e [ 439.622079][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 439.622089][ C0] RIP: 0010:unwind_get_return_address+0xa/0x90 [ 439.622111][ C0] Code: 9a 00 e9 79 ff ff ff cc cc cc cc cc cc cc cc cc b8 ce 54 8b a1 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 55 48 89 e5 41 57 <41> 56 53 48 89 fb 49 be 00 00 00 00 00 fc ff df 48 89 f8 48 c1 e8 [ 439.622124][ C0] RSP: 0018:ffffc90000007550 EFLAGS: 00000202 [ 439.622138][ C0] RAX: 0000000000007501 RBX: ffffc90000007620 RCX: 0000000000007501 [ 439.622149][ C0] RDX: ffffc90000007690 RSI: 1ffff92000000eae RDI: ffffc90000007568 [ 439.622159][ C0] RBP: ffffc90000007558 R08: ffffc90000007630 R09: ffffc90000007628 [ 439.622170][ C0] R10: 0000000000000000 R11: ffffffff8175cb90 R12: ffff88810367df00 [ 439.622180][ C0] R13: 0000000000000000 R14: ffffffff8175cb90 R15: ffffc90000007568 [ 439.622191][ C0] FS: 0000000000000000(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 439.622203][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 439.622212][ C0] CR2: 00007f4874347e20 CR3: 00000000074a8000 CR4: 00000000003526b0 [ 439.622226][ C0] Call Trace: [ 439.622231][ C0] [ 439.622238][ C0] arch_stack_walk+0x10a/0x170 [ 439.622259][ C0] ? kasan_save_track+0x3e/0x80 [ 439.622279][ C0] stack_trace_save+0xaa/0x100 [ 439.622293][ C0] ? __cfi_stack_trace_save+0x10/0x10 [ 439.622305][ C0] ? netif_receive_skb+0x161/0x7b0 [ 439.622323][ C0] kasan_save_track+0x3e/0x80 [ 439.622346][ C0] kasan_save_free_info+0x4a/0x60 [ 439.622361][ C0] __kasan_slab_free+0x5f/0x80 [ 439.622379][ C0] kmem_cache_free+0x1bd/0x4f0 [ 439.622396][ C0] ? __kfree_skb+0x18f/0x210 [ 439.622430][ C0] __kfree_skb+0x18f/0x210 [ 439.622446][ C0] ? ip6_mc_input+0x516/0x6c0 [ 439.622462][ C0] sk_skb_reason_drop+0xd8/0x310 [ 439.622480][ C0] ip6_mc_input+0x516/0x6c0 [ 439.622496][ C0] ? __cfi_ip6_mc_input+0x10/0x10 [ 439.622512][ C0] ? __cfi_ip6table_mangle_hook+0x10/0x10 [ 439.622544][ C0] ip6_rcv_finish+0x363/0x3e0 [ 439.622559][ C0] ipv6_rcv+0xf1/0x240 [ 439.622574][ C0] ? __cfi_ipv6_rcv+0x10/0x10 [ 439.622605][ C0] ? __cfi_ip6_rcv_finish+0x10/0x10 [ 439.622634][ C0] ? __cfi__raw_spin_lock_irq+0x10/0x10 [ 439.622654][ C0] process_backlog+0x44b/0xad0 [ 439.622673][ C0] __napi_poll+0xd3/0x610 [ 439.622688][ C0] net_rx_action+0x5ea/0xd80 [ 439.622706][ C0] ? __cfi_net_rx_action+0x10/0x10 [ 439.622723][ C0] ? sched_clock+0x44/0x60 [ 439.622739][ C0] ? __cfi_sched_clock_cpu+0x10/0x10 [ 439.622757][ C0] ? irqtime_account_irq+0x51/0x1c0 [ 439.622773][ C0] handle_softirqs+0x1aa/0x630 [ 439.622794][ C0] __do_softirq+0xf/0x16 [ 439.622806][ C0] do_softirq+0xb8/0x110 [ 439.622824][ C0] [ 439.622829][ C0] [ 439.622834][ C0] ? __cfi_do_softirq+0x10/0x10 [ 439.622852][ C0] ? dst_destroy+0x37d/0x460 [ 439.622871][ C0] ? __cfi_dst_destroy_rcu+0x10/0x10 [ 439.622896][ C0] __local_bh_enable_ip+0x74/0x80 [ 439.622914][ C0] rcu_do_batch+0x5d9/0xd40 [ 439.622934][ C0] ? rcu_core+0xd30/0xd30 [ 439.622950][ C0] ? preempt_schedule_thunk+0x1a/0x40 [ 439.622991][ C0] ? __kasan_check_read+0x15/0x20 [ 439.623022][ C0] ? rcu_nocb_cb_kthread+0x50f/0xb30 [ 439.623042][ C0] rcu_nocb_cb_kthread+0x524/0xb30 [ 439.623062][ C0] ? __cfi_rcu_nocb_cb_kthread+0x10/0x10 [ 439.623081][ C0] ? __kasan_check_write+0x18/0x20 [ 439.623114][ C0] ? _raw_spin_lock_irqsave+0xc1/0x160 [ 439.623135][ C0] ? __cfi__raw_spin_lock_irqsave+0x10/0x10 [ 439.623156][ C0] ? _raw_spin_lock_irqsave+0xc1/0x160 [ 439.623189][ C0] ? set_cpus_allowed_ptr+0xa1/0xf0 [ 439.623209][ C0] ? __cfi_set_cpus_allowed_ptr+0x10/0x10 [ 439.623247][ C0] ? __kasan_check_read+0x15/0x20 [ 439.623263][ C0] ? __kthread_parkme+0x137/0x180 SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 439.623284][ C0] ? schedule+0xc5/0x240 [ 439.623297][ C0] kthread+0x2c9/0x370 [ 439.623310][ C0] ? __cfi_rcu_nocb_cb_kthread+0x10/0x10 [ 439.623331][ C0] ? __cfi_kthread+0x10/0x10 [ 439.623344][ C0] ret_from_fork+0x67/0xa0 [ 439.623361][ C0] ? __cfi_kthread+0x10/0x10 [ 439.623375][ C0] ret_from_fork_asm+0x1a/0x30 [ 439.623395][ C0] [ 440.078827][ T36] audit: type=1400 audit(2000000635.871:32813): avc: denied { write } for pid=282 comm="syz-executor" path="pipe:[646]" dev="pipefs" ino=646 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 440.109239][ T36] audit: type=1400 audit(2000000635.871:32814): avc: denied { write } for pid=282 comm="syz-executor" path="pipe:[646]" dev="pipefs" ino=646 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 440.134878][ T36] audit: type=1400 audit(2000000635.871:32815): avc: denied { write } for pid=282 comm="syz-executor" path="pipe:[646]" dev="pipefs" ino=646 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 441.277838][ C1] net_ratelimit: 98123 callbacks suppressed [ 441.277877][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 441.283811][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 441.296022][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 441.307929][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 441.320278][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 441.331787][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8a:27:b8:57:68:52, vlan:0) [ 441.343589][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 441.355584][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 441.367535][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 441.379488][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 446.287900][ C0] net_ratelimit: 118374 callbacks suppressed [ 446.287927][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 446.287940][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8a:27:b8:57:68:52, vlan:0) [ 446.288206][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 446.294448][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 446.306240][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 446.318166][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 446.330197][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 446.342061][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 446.354014][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 446.366336][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)