last executing test programs: 49.070723924s ago: executing program 1 (id=5892): ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_usb_connect(0x2, 0x36, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x3a, 0xfe, 0x6, 0x20, 0x4e6, 0xb, 0x100, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x10, 0x0, [{{0x9, 0x4, 0x14, 0x0, 0x2, 0xa0, 0x24, 0x26, 0x0, [], [{{0x9, 0x5, 0x6, 0x2, 0x3ff}}, {{0x9, 0x5, 0x82, 0x2, 0x8}}]}}]}}]}}, 0x0) r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="380000000314010000000000000000000900020025797a30000000000800410072786500140033"], 0x38}}, 0x0) 46.781836629s ago: executing program 1 (id=5894): r0 = syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000540)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_NEW_KEY(r1, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000400)={0x48, r0, 0x801, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_KEY={0x2c, 0x50, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPES={0xc}, @NL80211_KEY_IDX={0x5}, @NL80211_KEY_DEFAULT]}]}, 0x48}}, 0x0) 45.703149935s ago: executing program 1 (id=5898): bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2c, &(0x7f0000000000)='/proc/sys/net/\x00\x00v4\x00\x00s/\x92ync_\x00le\xf44.\xab%nN\xd4\xa2\x88\x00\xd1l,'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) fchdir(r0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x0, 0x0) 45.132851212s ago: executing program 1 (id=5899): r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'macsec0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x3c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_ICV_LEN={0x5, 0x3, 0x8}]}}}]}, 0x3c}}, 0x0) 44.424995735s ago: executing program 1 (id=5903): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000100000000fdffffffffffffff00", @ANYRES32=r2, @ANYBLOB="000000000000000014001680100001800c0004"], 0x3c}}, 0x0) 43.66584002s ago: executing program 1 (id=5907): r0 = socket$nl_route(0x10, 0x3, 0x0) mknod(&(0x7f0000000040)='./file0\x00', 0x8001420, 0x0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x2, 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000005c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 34.559584333s ago: executing program 0 (id=5940): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0xfee4, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000440)={0x0, 0x807164}, &(0x7f0000000880)=0x8) 33.114975643s ago: executing program 0 (id=5945): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x8, 0xc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000980)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) 31.777089066s ago: executing program 0 (id=5948): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0x6, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="18"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000cc0)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) getsockopt$inet6_mptcp_buf(r0, 0x11c, 0x3, &(0x7f00000001c0)=""/207, &(0x7f0000000000)=0xcf) 31.117990534s ago: executing program 3 (id=5874): r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="800000001000030500"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000580012800c0001006d6163766c616e00480002800800010010000000280005800a000400aaaaaaaaaabb00000a000400aaaaaaaaaa0000000a000400aaaaaaaaaa00000008000300030000000a000400aaaaaaaaaabb000008000500", @ANYRES32=r1], 0x80}}, 0x0) 30.982784949s ago: executing program 0 (id=5951): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x11, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000dc0)={&(0x7f0000000100)='neigh_update\x00', r0}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000040)={{0x2, 0x0, @multicast2}, {}, 0x0, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 'ip6gre0\x00'}) 30.445987109s ago: executing program 0 (id=5953): r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f00000002c0)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000240)=""/11, 0xb}}, 0x120) syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f0000000100)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) write$UHID_INPUT2(r0, &(0x7f0000000500)=ANY=[@ANYBLOB='\f'], 0xaf) 30.102833978s ago: executing program 3 (id=5955): prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x0, &(0x7f0000006680)) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x19) 29.609532236s ago: executing program 2 (id=5956): r0 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) clock_nanosleep(0x2, 0xffc99a3b, &(0x7f0000000100)={0x77359400}, 0x0) 29.261381666s ago: executing program 2 (id=5957): r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000800)={'bridge0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x7, &(0x7f00000000c0)={&(0x7f00000004c0)=@bridge_newvlan={0x24, 0x71, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_INFO={0x8, 0x1, {0x0, 0x1}}}]}, 0x24}}, 0x0) 28.943246955s ago: executing program 4 (id=5958): r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f7, &(0x7f00000001c0)={'syztnl0\x00', &(0x7f0000000540)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x2000, {{0x5, 0x4, 0x0, 0x0, 0x14, 0xfffd, 0x0, 0x0, 0x0, 0x0, @rand_addr, @empty}}}}) 28.629714332s ago: executing program 3 (id=5959): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000740)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_REGISTER_FRAME(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000780)={0x1c, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}}, 0x1c}}, 0x0) 28.352386023s ago: executing program 2 (id=5960): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$sock_int(r1, 0x1, 0x21, &(0x7f0000000040), 0x4) 28.019816384s ago: executing program 4 (id=5961): r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000003c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_CHANNEL_SWITCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000032c0)={0x1c, r0, 0x1, 0x0, 0x0, {{0x45}, {@val={0x8, 0x3, r2}, @void}}}, 0x1c}}, 0x0) 24.030787201s ago: executing program 3 (id=5962): ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000040)=0x3, 0x4) syz_emit_ethernet(0x6e, &(0x7f0000000c40)={@multicast, @link_local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "02adf7", 0x38, 0x3a, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, '\x00', {0x0, 0x6, "f43395", 0x0, 0x3a, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast2, [], "caa7c1b7f4c336af"}}}}}}}, 0x0) 15.280488655s ago: executing program 0 (id=5963): r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) syz_usb_disconnect(r0) syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x56a, 0x30a, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x8, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x0, 0x2, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x7}}, {{{0x9, 0x5, 0x81, 0x3, 0x200}}}}}]}}]}}, 0x0) ioctl$EVIOCRMFF(r0, 0x4004550e, 0x0) 14.951721564s ago: executing program 2 (id=5964): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x8aec2, 0x1ff) write$binfmt_elf64(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000100000000000000000400000000000000000000000000000000000000000003800010000000000000003"], 0x78) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0) 14.638927571s ago: executing program 4 (id=5965): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r1) sendmsg$IEEE802154_LLSEC_ADD_DEV(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)={0x28, r2, 0x852dd6c070cd7e4d, 0x0, 0x0, {}, [@IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}]}, 0x28}, 0x4, 0x700000000000000, 0x0, 0x4000050}, 0x0) 13.748927316s ago: executing program 3 (id=5966): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000013c0)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000040)='contention_end\x00', r0}, 0x10) r1 = syz_open_dev$video(&(0x7f0000000580), 0x7, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r1, 0xc0205647, &(0x7f0000000100)={0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000040)={0x980913, 0x0, '\x00', @p_u8=0x0}}) 10.903355058s ago: executing program 2 (id=5967): open(&(0x7f0000000100)='./file0\x00', 0x80ff, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) fcntl$setlease(r0, 0x400, 0x1) 7.647509262s ago: executing program 4 (id=5968): sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x8) r0 = add_key$user(&(0x7f0000000040), &(0x7f0000000000), &(0x7f00000002c0)='X', 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000640), &(0x7f0000000540), &(0x7f00000000c0), 0xc6, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000480)={r0, r1, r1}, &(0x7f0000000380)=""/82, 0x52, &(0x7f00000000c0)={&(0x7f0000000100)={'md5-generic\x00'}}) 7.494066296s ago: executing program 3 (id=5969): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x80a, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000000)=@newlink={0x38, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @bond={{0x9}, {0x8, 0x2, 0x0, 0x1, [@IFLA_BOND_ARP_IP_TARGET={0x4}]}}}]}, 0x38}}, 0x0) 5.841169352s ago: executing program 2 (id=5970): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x18, 0x3, &(0x7f0000000200)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='contention_end\x00', r0}, 0x10) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848470000005e2f0042180000180e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) 5.840920637s ago: executing program 4 (id=5971): r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = socket$inet6(0xa, 0x2, 0x3a) bind(r1, &(0x7f0000000000)=@hci={0xa, 0x2}, 0x80) close_range(r0, 0xffffffffffffffff, 0x0) 0s ago: executing program 4 (id=5975): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_NEW_KEY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x34, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_KEY={0x18, 0x50, 0x0, 0x1, [@NL80211_KEY_IDX={0x5, 0x2, 0x2}, @NL80211_KEY_DATA_WEP40={0x9, 0xa}]}]}, 0x34}}, 0x40) kernel console output (not intermixed with test programs): xt=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 801.009756][ T29] audit: type=1400 audit(2000000453.663:17104): avc: denied { append open } for pid=4659 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 801.100398][ T29] audit: type=1400 audit(2000000453.663:17105): avc: denied { getattr } for pid=4659 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 801.161971][ T29] audit: type=1400 audit(2000000453.813:17106): avc: denied { recv } for pid=14046 comm="syz-executor" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 801.229678][ T29] audit: type=1400 audit(2000000453.823:17107): avc: denied { recv } for pid=4666 comm="klogd" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 801.346571][T16808] binder: Binderfs stats mode cannot be changed during a remount [ 801.448123][ T1169] usb 5-1: new full-speed USB device number 102 using dummy_hcd [ 801.556502][ T5690] usb 3-1: new high-speed USB device number 89 using dummy_hcd [ 801.661140][ T1169] usb 5-1: config 4 has an invalid interface number: 231 but max is 0 [ 801.679989][ T1169] usb 5-1: config 4 has no interface number 0 [ 801.738201][ T1169] usb 5-1: New USB device found, idVendor=13d3, idProduct=3224, bcdDevice=cb.0d [ 801.756094][ T5690] usb 3-1: Using ep0 maxpacket: 8 [ 801.765938][ T1169] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 801.801203][ T1169] usb 5-1: Product: syz [ 801.817925][ T1169] usb 5-1: Manufacturer: syz [ 801.822600][ T1169] usb 5-1: SerialNumber: syz [ 801.828132][ T5690] usb 3-1: config 0 has an invalid interface number: 151 but max is 1 [ 801.849621][ T5690] usb 3-1: config 0 has no interface number 1 [ 801.862794][ T5690] usb 3-1: config 0 interface 151 altsetting 0 has an invalid descriptor for endpoint zero, skipping [ 801.873994][ T5690] usb 3-1: config 0 interface 151 altsetting 0 has an endpoint descriptor with address 0xA3, changing to 0x83 [ 801.918199][ T5690] usb 3-1: config 0 interface 151 altsetting 0 endpoint 0x83 has invalid maxpacket 64466, setting to 1024 [ 801.931168][ T1169] dvb-usb: found a 'DigitalNow TinyUSB 2 DVB-t Receiver' in warm state. [ 801.969544][ T5690] usb 3-1: config 0 interface 151 altsetting 0 bulk endpoint 0x83 has invalid maxpacket 1024 [ 801.991541][ T5690] usb 3-1: config 0 interface 151 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 1 [ 802.006499][ T5690] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x2 has an invalid bInterval 0, changing to 7 [ 802.019065][ T5690] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x2 has invalid wMaxPacketSize 0 [ 802.072043][ T5690] usb 3-1: New USB device found, idVendor=0499, idProduct=500a, bcdDevice=e7.b7 [ 802.095932][ T5690] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 802.163779][ T5690] usb 3-1: Product: syz [ 802.169029][ T1169] vp7045: USB control message 'out' went wrong. [ 802.176738][ T5690] usb 3-1: Manufacturer: syz [ 802.185496][ T1169] dvb-usb: This USB2.0 device cannot be run on a USB1.1 port. (it lacks a hardware PID filter) [ 802.196128][ T5690] usb 3-1: SerialNumber: syz [ 802.220931][ T1169] dvb-usb: DigitalNow TinyUSB 2 DVB-t Receiver error while loading driver (-19) [ 802.244098][ T1169] usb 5-1: USB disconnect, device number 102 [ 802.252098][ T5690] usb 3-1: config 0 descriptor?? [ 802.280574][T16806] raw-gadget.1 gadget.2: fail, usb_ep_enable returned -22 [ 802.349425][ T5690] usb 3-1: Quirk or no altset; falling back to MIDI 1.0 [ 802.402289][ T5690] usb 3-1: Quirk or no altset; falling back to MIDI 1.0 [ 802.423459][ T5690] usb 3-1: invalid MIDI in EP 0 [ 802.634069][ T5690] snd-usb-audio 3-1:0.0: probe with driver snd-usb-audio failed with error -22 [ 802.664291][ T5690] usb 3-1: USB disconnect, device number 89 [ 805.354852][ T1169] IPVS: starting estimator thread 0... [ 805.387691][T16849] IPVS: wrr: FWM 4 0x00000004 - no destination available [ 805.465789][T16851] IPVS: using max 18 ests per chain, 43200 per kthread [ 805.536096][ T29] kauditd_printk_skb: 260 callbacks suppressed [ 805.536116][ T29] audit: type=1400 audit(2000000458.604:17368): avc: denied { read write } for pid=5608 comm="syz-executor" name="loop1" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 805.640400][ T29] audit: type=1400 audit(2000000458.604:17369): avc: denied { read write open } for pid=5608 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 805.736311][ T29] audit: type=1400 audit(2000000458.624:17370): avc: denied { prog_load } for pid=16852 comm="syz.4.5339" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 805.807109][ T29] audit: type=1400 audit(2000000458.624:17371): avc: denied { bpf } for pid=16852 comm="syz.4.5339" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 805.875690][ T29] audit: type=1400 audit(2000000458.654:17372): avc: denied { ioctl } for pid=5608 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=650 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 805.996131][ T29] audit: type=1400 audit(2000000458.654:17373): avc: denied { recv } for pid=1169 comm="kworker/0:2" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 806.096293][ T29] audit: type=1400 audit(2000000458.674:17374): avc: denied { recv } for pid=5214 comm="syz-executor" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 806.211456][ T29] audit: type=1400 audit(2000000458.674:17375): avc: denied { recv } for pid=5214 comm="syz-executor" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 806.304265][ T29] audit: type=1400 audit(2000000458.714:17376): avc: denied { read write } for pid=5601 comm="syz-executor" name="loop0" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 806.335982][ T29] audit: type=1400 audit(2000000458.714:17377): avc: denied { read write open } for pid=5601 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 806.477141][T16332] usb 1-1: new high-speed USB device number 100 using dummy_hcd [ 806.675643][T16332] usb 1-1: Using ep0 maxpacket: 32 [ 806.702935][T16332] usb 1-1: config index 0 descriptor too short (expected 65324, got 44) [ 806.726948][T16332] usb 1-1: config 0 has too many interfaces: 255, using maximum allowed: 32 [ 806.771427][T16332] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 806.805418][T16332] usb 1-1: config 0 has 0 interfaces, different from the descriptor's value: 255 [ 806.878033][T16332] usb 1-1: New USB device found, idVendor=0499, idProduct=1010, bcdDevice= 5.f5 [ 806.915404][T16332] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 806.954700][T16332] usb 1-1: Product: syz [ 806.994275][T16332] usb 1-1: Manufacturer: syz [ 807.007960][T16332] usb 1-1: SerialNumber: syz [ 807.042374][T16332] usb 1-1: config 0 descriptor?? [ 807.424734][ T5777] usb 1-1: USB disconnect, device number 100 [ 808.625742][ T1266] ieee802154 phy0 wpan0: encryption failed: -22 [ 808.633988][ T1266] ieee802154 phy1 wpan1: encryption failed: -22 [ 809.733684][T16332] usb 4-1: new high-speed USB device number 99 using dummy_hcd [ 809.988037][T16332] usb 4-1: Using ep0 maxpacket: 32 [ 810.087172][T16332] usb 4-1: New USB device found, idVendor=09fb, idProduct=ebbe, bcdDevice=ea.fe [ 810.112256][T16332] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 810.133867][T16332] usb 4-1: Product: syz [ 810.147271][T16332] usb 4-1: Manufacturer: syz [ 810.159882][T16332] usb 4-1: SerialNumber: syz [ 810.203174][T16332] usb 4-1: config 0 descriptor?? [ 810.608976][ T29] kauditd_printk_skb: 273 callbacks suppressed [ 810.608996][ T29] audit: type=1400 audit(2000000463.694:17651): avc: denied { mount } for pid=16912 comm="syz.1.5366" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 810.662629][T16332] usb 4-1: USB disconnect, device number 99 [ 810.717808][ T29] audit: type=1400 audit(2000000463.784:17652): avc: denied { recv } for pid=5214 comm="syz-executor" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 810.833596][ T29] audit: type=1400 audit(2000000463.854:17653): avc: denied { recv } for pid=5214 comm="syz-executor" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 810.895431][ T29] audit: type=1400 audit(2000000463.884:17654): avc: denied { read write } for pid=14046 comm="syz-executor" name="loop2" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 810.985942][ T29] audit: type=1400 audit(2000000463.884:17655): avc: denied { recv } for pid=5214 comm="syz-executor" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 811.040107][ T29] audit: type=1400 audit(2000000463.884:17656): avc: denied { read write open } for pid=14046 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 811.109028][ T29] audit: type=1400 audit(2000000463.894:17657): avc: denied { recv } for pid=5214 comm="syz-executor" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 811.219799][ T29] audit: type=1400 audit(2000000463.914:17658): avc: denied { ioctl } for pid=14046 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=651 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 811.287125][ T29] audit: type=1400 audit(2000000463.914:17659): avc: denied { recv } for pid=5214 comm="syz-executor" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 811.377981][ T29] audit: type=1400 audit(2000000463.964:17660): avc: denied { read write } for pid=5608 comm="syz-executor" name="loop1" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 812.139364][T16925] can0: slcan on ttyS3. [ 812.295741][T16925] can0 (unregistered): slcan off ttyS3. [ 812.362423][T16932] team0: entered allmulticast mode [ 812.395487][T16932] C: entered allmulticast mode [ 812.405820][T16932] team_slave_1: entered allmulticast mode [ 812.424088][T16932] team0: Cannot enslave team device to itself [ 813.905931][ T5757] usb 3-1: new high-speed USB device number 90 using dummy_hcd [ 814.125525][ T5757] usb 3-1: Using ep0 maxpacket: 32 [ 814.243208][ T5757] usb 3-1: New USB device found, idVendor=09fb, idProduct=ebbe, bcdDevice=ea.fe [ 814.268282][ T5757] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 814.286754][ T5757] usb 3-1: Product: syz [ 814.291191][ T5757] usb 3-1: Manufacturer: syz [ 814.299363][ T5757] usb 3-1: SerialNumber: syz [ 814.333511][ T5757] usb 3-1: config 0 descriptor?? [ 814.671137][ T5777] usb 3-1: USB disconnect, device number 90 [ 815.500719][T16973] team0: entered allmulticast mode [ 815.525123][T16973] team_slave_0: entered allmulticast mode [ 815.530991][T16973] team_slave_1: entered allmulticast mode [ 815.555237][T16973] net veth1_virt_wifi virt_wifi0: entered allmulticast mode [ 815.608232][T16973] team0: Cannot enslave team device to itself [ 815.689080][ T29] kauditd_printk_skb: 261 callbacks suppressed [ 815.689101][ T29] audit: type=1400 audit(2000000468.774:17922): avc: denied { create } for pid=16977 comm="syz.4.5391" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 815.755280][ T29] audit: type=1400 audit(2000000468.824:17923): avc: denied { recv } for pid=16977 comm="syz.4.5391" saddr=172.20.20.0 daddr=172.20.20.10 dest=36984 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 815.865347][ T29] audit: type=1400 audit(2000000468.864:17924): avc: denied { write } for pid=16977 comm="syz.4.5391" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 815.987008][ T29] audit: type=1400 audit(2000000468.874:17925): avc: denied { nlmsg_read } for pid=16977 comm="syz.4.5391" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 816.095183][ T29] audit: type=1400 audit(2000000468.874:17926): avc: denied { bpf } for pid=16977 comm="syz.4.5391" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 816.205168][ T29] audit: type=1400 audit(2000000468.884:17927): avc: denied { recv } for pid=5214 comm="syz-executor" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 816.298705][ T29] audit: type=1400 audit(2000000468.884:17928): avc: denied { recv } for pid=5214 comm="syz-executor" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 816.386931][ T29] audit: type=1400 audit(2000000468.914:17929): avc: denied { recv } for pid=5214 comm="syz-executor" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 816.489434][ T29] audit: type=1400 audit(2000000468.924:17930): avc: denied { recv } for pid=5214 comm="syz-executor" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 816.589355][ T29] audit: type=1400 audit(2000000468.934:17931): avc: denied { recv } for pid=5214 comm="syz-executor" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 816.698577][T16989] mkiss: ax0: crc mode is auto. [ 817.558229][ T5690] usb 3-1: new full-speed USB device number 91 using dummy_hcd [ 817.861088][ T5690] usb 3-1: unable to get BOS descriptor or descriptor too short [ 817.899774][ T5690] usb 3-1: unable to read config index 0 descriptor/start: -71 [ 817.928571][ T5690] usb 3-1: can't read configurations, error -71 [ 820.677604][ T5690] usb 2-1: new high-speed USB device number 102 using dummy_hcd [ 820.709336][ T29] kauditd_printk_skb: 229 callbacks suppressed [ 820.709355][ T29] audit: type=1400 audit(2000000473.794:18161): avc: denied { ioctl } for pid=17025 comm="syz.1.5413" path="/dev/raw-gadget" dev="devtmpfs" ino=734 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 820.824863][ T29] audit: type=1400 audit(2000000473.794:18162): avc: denied { read } for pid=4659 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 820.900962][ T29] audit: type=1400 audit(2000000473.804:18163): avc: denied { search } for pid=4659 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 820.947629][ T29] audit: type=1400 audit(2000000473.814:18164): avc: denied { append } for pid=4659 comm="syslogd" name="messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 820.975130][ T5690] usb 2-1: Using ep0 maxpacket: 32 [ 821.086831][ T29] audit: type=1400 audit(2000000473.814:18165): avc: denied { append open } for pid=4659 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 821.132140][ T5690] usb 2-1: New USB device found, idVendor=09fb, idProduct=ebbe, bcdDevice=ea.fe [ 821.147812][ T5690] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 821.159166][ T29] audit: type=1400 audit(2000000473.814:18166): avc: denied { getattr } for pid=4659 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 821.184366][ T5690] usb 2-1: Product: syz [ 821.192594][ T5690] usb 2-1: Manufacturer: syz [ 821.208507][ T5690] usb 2-1: SerialNumber: syz [ 821.224654][ T29] audit: type=1400 audit(2000000473.824:18167): avc: denied { ioctl } for pid=17025 comm="syz.1.5413" path="/dev/raw-gadget" dev="devtmpfs" ino=734 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 821.264027][ T5690] usb 2-1: config 0 descriptor?? [ 821.287842][ T29] audit: type=1400 audit(2000000473.834:18168): avc: denied { recv } for pid=14193 comm="kworker/u8:3" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 821.338932][ T29] audit: type=1400 audit(2000000473.834:18169): avc: denied { recv } for pid=14193 comm="kworker/u8:3" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 821.393394][ T29] audit: type=1400 audit(2000000473.844:18170): avc: denied { recv } for pid=14193 comm="kworker/u8:3" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 821.730049][ T5690] usb 2-1: USB disconnect, device number 102 [ 822.320643][T17052] bridge0: port 2(bridge_slave_1) entered disabled state [ 822.328647][T17052] bridge0: port 1(bridge_slave_0) entered disabled state [ 825.715632][ T29] kauditd_printk_skb: 257 callbacks suppressed [ 825.715651][ T29] audit: type=1400 audit(2000000478.805:18428): avc: denied { ioctl } for pid=5601 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=649 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 825.918696][ T29] audit: type=1400 audit(2000000479.005:18429): avc: denied { read } for pid=17096 comm="syz.3.5446" name="cec3" dev="devtmpfs" ino=882 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 826.035750][ T29] audit: type=1400 audit(2000000479.005:18430): avc: denied { read open } for pid=17096 comm="syz.3.5446" path="/dev/cec3" dev="devtmpfs" ino=882 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 826.124863][ T29] audit: type=1400 audit(2000000479.035:18431): avc: denied { recv } for pid=16 comm="ksoftirqd/0" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 826.204652][ T29] audit: type=1400 audit(2000000479.035:18432): avc: denied { recv } for pid=16 comm="ksoftirqd/0" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 826.281532][ T29] audit: type=1400 audit(2000000479.045:18433): avc: denied { recv } for pid=16 comm="ksoftirqd/0" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 826.364703][ T29] audit: type=1400 audit(2000000479.045:18434): avc: denied { ioctl } for pid=17096 comm="syz.3.5446" path="/dev/cec3" dev="devtmpfs" ino=882 ioctlcmd=0x6105 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 826.500761][ T29] audit: type=1400 audit(2000000479.045:18435): avc: denied { recv } for pid=133 comm="kworker/u8:5" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 826.610683][ T29] audit: type=1400 audit(2000000479.055:18436): avc: denied { recv } for pid=133 comm="kworker/u8:5" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 826.667517][ T29] audit: type=1400 audit(2000000479.145:18437): avc: denied { recv } for pid=133 comm="kworker/u8:5" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 828.764744][ T5757] usb 3-1: new high-speed USB device number 93 using dummy_hcd [ 829.037794][ T5757] usb 3-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 829.071499][ T5757] usb 3-1: New USB device found, idVendor=0471, idProduct=0304, bcdDevice=e4.df [ 829.120837][ T5757] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 829.178188][ T5757] usb 3-1: config 0 descriptor?? [ 829.239621][ T5757] pwc: Askey VC010 type 2 USB webcam detected. [ 829.659159][ T5757] pwc: recv_control_msg error -32 req 02 val 2b00 [ 829.887446][ T5757] pwc: recv_control_msg error -71 req 02 val 2c00 [ 829.906394][ T5757] pwc: recv_control_msg error -71 req 04 val 1000 [ 829.932976][ T5757] pwc: recv_control_msg error -71 req 04 val 1300 [ 829.958219][ T5757] pwc: recv_control_msg error -71 req 04 val 1400 [ 829.981811][ T5757] pwc: recv_control_msg error -71 req 02 val 2000 [ 830.001890][ T5757] pwc: recv_control_msg error -71 req 02 val 2100 [ 830.034130][ T5757] pwc: recv_control_msg error -71 req 04 val 1500 [ 830.061622][ T5757] pwc: recv_control_msg error -71 req 02 val 2500 [ 830.084075][ T5757] pwc: recv_control_msg error -71 req 02 val 2400 [ 830.104072][ T5757] pwc: recv_control_msg error -71 req 02 val 2600 [ 830.123941][ T5757] pwc: recv_control_msg error -71 req 02 val 2900 [ 830.150282][ T5757] pwc: recv_control_msg error -71 req 02 val 2800 [ 830.172442][ T5757] pwc: recv_control_msg error -71 req 04 val 1100 [ 830.190715][ T5757] pwc: recv_control_msg error -71 req 04 val 1200 [ 830.227944][ T5757] pwc: Registered as video71. [ 830.246468][ T5757] input: PWC snapshot button as /devices/platform/dummy_hcd.2/usb3/3-1/input/input41 [ 830.345898][ T5757] usb 3-1: USB disconnect, device number 93 [ 830.730727][ T29] kauditd_printk_skb: 221 callbacks suppressed [ 830.730746][ T29] audit: type=1400 audit(2000000483.815:18659): avc: denied { read write } for pid=5601 comm="syz-executor" name="loop0" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 830.827792][ T29] audit: type=1400 audit(2000000483.855:18660): avc: denied { read write open } for pid=5601 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 830.914379][ T29] audit: type=1400 audit(2000000483.875:18661): avc: denied { ioctl } for pid=5601 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=649 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 831.034408][ T29] audit: type=1400 audit(2000000483.915:18662): avc: denied { create } for pid=17149 comm="syz.4.5467" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 831.119122][ T29] audit: type=1400 audit(2000000483.965:18663): avc: denied { create } for pid=17149 comm="syz.4.5467" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 831.218717][ T29] audit: type=1400 audit(2000000484.005:18664): avc: denied { write } for pid=17149 comm="syz.4.5467" name="raw" dev="proc" ino=4026533773 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 831.322836][ T29] audit: type=1400 audit(2000000484.035:18665): avc: denied { read } for pid=4659 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 831.393832][ T29] audit: type=1400 audit(2000000484.035:18666): avc: denied { search } for pid=4659 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 831.496740][ T29] audit: type=1400 audit(2000000484.065:18667): avc: denied { recv } for pid=17137 comm="syz.1.5463" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 831.568482][ T29] audit: type=1400 audit(2000000484.065:18668): avc: denied { write } for pid=17149 comm="syz.4.5467" path="/proc/2249/net/raw" dev="proc" ino=4026533773 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 835.618873][T17217] netlink: 4 bytes leftover after parsing attributes in process `syz.2.5494'. [ 835.737991][ T29] kauditd_printk_skb: 264 callbacks suppressed [ 835.738011][ T29] audit: type=1400 audit(2000000488.825:18933): avc: denied { recv } for pid=17201 comm="syz.0.5490" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 835.864402][ T29] audit: type=1400 audit(2000000488.825:18934): avc: denied { recv } for pid=17201 comm="syz.0.5490" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 835.975687][ T29] audit: type=1400 audit(2000000488.835:18935): avc: denied { unmount } for pid=5608 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 836.060627][ T29] audit: type=1400 audit(2000000488.915:18936): avc: denied { recv } for pid=5690 comm="kworker/0:5" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 836.129964][ T29] audit: type=1400 audit(2000000488.915:18937): avc: denied { recv } for pid=16 comm="ksoftirqd/0" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 836.203571][ T29] audit: type=1400 audit(2000000488.925:18938): avc: denied { recv } for pid=16 comm="ksoftirqd/0" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 836.273551][ T29] audit: type=1400 audit(2000000488.935:18939): avc: denied { read write } for pid=5613 comm="syz-executor" name="loop4" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 836.396666][ T29] audit: type=1400 audit(2000000488.935:18940): avc: denied { read write open } for pid=5613 comm="syz-executor" path="/dev/loop4" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 836.476806][ T29] audit: type=1400 audit(2000000488.955:18941): avc: denied { recv } for pid=14193 comm="kworker/u8:3" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 836.539679][ T29] audit: type=1400 audit(2000000488.955:18942): avc: denied { read write } for pid=5604 comm="syz-executor" name="loop3" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 838.704123][ T5757] usb 3-1: new high-speed USB device number 94 using dummy_hcd [ 839.044187][ T5757] usb 3-1: New USB device found, idVendor=1604, idProduct=8001, bcdDevice=44.1f [ 839.079103][ T5757] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 839.111567][ T5757] usb 3-1: Product: syz [ 839.130748][ T5757] usb 3-1: Manufacturer: syz [ 839.153912][ T5757] usb 3-1: SerialNumber: syz [ 839.213177][ T5757] usb 3-1: config 0 descriptor?? [ 839.701792][T16332] usb 3-1: USB disconnect, device number 94 [ 840.754257][ T0] NOHZ tick-stop error: local softirq work is pending, handler #200!!! [ 840.776624][ T29] kauditd_printk_skb: 311 callbacks suppressed [ 840.776643][ T29] audit: type=1400 audit(2000000493.835:19254): avc: denied { ioctl } for pid=14046 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=651 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 840.890785][ T29] audit: type=1400 audit(2000000493.855:19255): avc: denied { read } for pid=4659 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 840.998559][ T29] audit: type=1400 audit(2000000493.855:19256): avc: denied { search } for pid=4659 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 841.119326][ T29] audit: type=1400 audit(2000000493.855:19257): avc: denied { append } for pid=4659 comm="syslogd" name="messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 841.186022][ T29] audit: type=1400 audit(2000000493.895:19258): avc: denied { append open } for pid=4659 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 841.264192][ T29] audit: type=1400 audit(2000000493.895:19259): avc: denied { getattr } for pid=4659 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 841.318365][ T29] audit: type=1400 audit(2000000494.045:19260): avc: denied { read } for pid=4659 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 841.373836][ T29] audit: type=1400 audit(2000000494.045:19261): avc: denied { search } for pid=4659 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 841.442720][ T29] audit: type=1400 audit(2000000494.055:19262): avc: denied { recv } for pid=5214 comm="syz-executor" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 841.524198][ T29] audit: type=1400 audit(2000000494.065:19264): avc: denied { recv } for pid=5214 comm="syz-executor" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 842.765451][T17301] PKCS7: Unknown OID: [5] 0.0 [ 842.770188][T17301] PKCS7: Only support pkcs7_signedData type [ 843.931840][T17322] option changes via remount are deprecated (pid=17314 comm=syz.4.5536) [ 844.555996][T17325] netlink: 4 bytes leftover after parsing attributes in process `syz.3.5539'. [ 844.844973][T17328] bridge0: port 2(bridge_slave_1) entered disabled state [ 844.852321][T17328] bridge0: port 1(bridge_slave_0) entered disabled state [ 845.803732][ T29] kauditd_printk_skb: 235 callbacks suppressed [ 845.803752][ T29] audit: type=1400 audit(2000000498.886:19499): avc: denied { recv } for pid=5608 comm="syz-executor" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 845.923514][ T29] audit: type=1400 audit(2000000498.896:19500): avc: denied { recv } for pid=29 comm="kauditd" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 846.004646][ T29] audit: type=1400 audit(2000000498.896:19501): avc: denied { recv } for pid=29 comm="kauditd" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 846.086786][ T29] audit: type=1400 audit(2000000498.936:19502): avc: denied { read } for pid=4659 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 846.137031][ T29] audit: type=1400 audit(2000000498.936:19503): avc: denied { search } for pid=4659 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 846.190160][ T29] audit: type=1400 audit(2000000498.936:19504): avc: denied { append } for pid=4659 comm="syslogd" name="messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 846.262578][ T29] audit: type=1400 audit(2000000498.946:19505): avc: denied { recv } for pid=5214 comm="syz-executor" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 846.310989][ T29] audit: type=1400 audit(2000000498.976:19506): avc: denied { recv } for pid=5214 comm="syz-executor" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 846.358555][ T29] audit: type=1400 audit(2000000498.976:19507): avc: denied { append open } for pid=4659 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 846.386290][ T29] audit: type=1400 audit(2000000498.986:19508): avc: denied { recv } for pid=5214 comm="syz-executor" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 848.281776][T17367] sctp: failed to load transform for md5: -2 [ 849.385554][T17393] overlayfs: option "uuid=on" requires an upper fs, falling back to uuid=null. [ 850.346705][T17402] netlink: 32 bytes leftover after parsing attributes in process `syz.1.5571'. [ 850.840331][ T29] kauditd_printk_skb: 317 callbacks suppressed [ 850.840351][ T29] audit: type=1400 audit(2000000503.926:19826): avc: denied { read write } for pid=14046 comm="syz-executor" name="loop2" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 850.961236][ T29] audit: type=1400 audit(2000000503.936:19827): avc: denied { read write open } for pid=14046 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 851.067050][ T29] audit: type=1400 audit(2000000503.946:19828): avc: denied { ioctl } for pid=14046 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=651 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 851.153756][ T29] audit: type=1400 audit(2000000503.976:19829): avc: denied { recv } for pid=5214 comm="syz-executor" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 851.211703][ T29] audit: type=1400 audit(2000000503.986:19830): avc: denied { recv } for pid=5214 comm="syz-executor" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 851.317592][ T29] audit: type=1400 audit(2000000504.036:19831): avc: denied { map_create } for pid=17414 comm="syz.1.5576" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 851.359442][ T29] audit: type=1400 audit(2000000504.046:19832): avc: denied { perfmon } for pid=17414 comm="syz.1.5576" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 851.432575][ T29] audit: type=1400 audit(2000000504.046:19833): avc: denied { map_read } for pid=17414 comm="syz.1.5576" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 851.513949][ T29] audit: type=1400 audit(2000000504.046:19834): avc: denied { read write } for pid=5613 comm="syz-executor" name="loop4" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 851.608034][ T29] audit: type=1400 audit(2000000504.046:19835): avc: denied { read write open } for pid=5613 comm="syz-executor" path="/dev/loop4" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 851.776696][T17425] netlink: 'syz.1.5580': attribute type 12 has an invalid length. [ 851.860007][T17425] netlink: 8 bytes leftover after parsing attributes in process `syz.1.5580'. [ 854.022180][T17461] netlink: 132 bytes leftover after parsing attributes in process `syz.4.5593'. [ 854.076222][T17461] netlink: 'syz.4.5593': attribute type 10 has an invalid length. [ 854.142821][T17461] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 855.845380][ T29] kauditd_printk_skb: 331 callbacks suppressed [ 855.845401][ T29] audit: type=1400 audit(2000000508.936:20167): avc: denied { create } for pid=17486 comm="syz.2.5607" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 855.916135][ T29] audit: type=1400 audit(2000000508.966:20168): avc: denied { recv } for pid=16 comm="ksoftirqd/0" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 856.055900][ T29] audit: type=1400 audit(2000000508.976:20169): avc: denied { recv } for pid=16 comm="ksoftirqd/0" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 856.149066][ T29] audit: type=1400 audit(2000000508.976:20170): avc: denied { recv } for pid=16 comm="ksoftirqd/0" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 856.253010][ T29] audit: type=1400 audit(2000000508.986:20171): avc: denied { recv } for pid=16 comm="ksoftirqd/0" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 856.352998][ T29] audit: type=1400 audit(2000000508.996:20172): avc: denied { read } for pid=4659 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 856.438269][ T29] audit: type=1400 audit(2000000508.996:20173): avc: denied { search } for pid=4659 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 856.526990][ T29] audit: type=1400 audit(2000000509.006:20174): avc: denied { getopt } for pid=17486 comm="syz.2.5607" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 856.590888][T17496] wg2: entered promiscuous mode [ 856.596708][T17496] wg2: entered allmulticast mode [ 856.613525][ T29] audit: type=1400 audit(2000000509.006:20175): avc: denied { read write } for pid=5604 comm="syz-executor" name="loop3" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 856.723071][ T29] audit: type=1400 audit(2000000509.006:20176): avc: denied { read write open } for pid=5604 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 856.969527][T17500] netlink: 32 bytes leftover after parsing attributes in process `syz.2.5612'. [ 858.195943][ T5777] usb 2-1: new high-speed USB device number 103 using dummy_hcd [ 858.412881][ T5777] usb 2-1: Using ep0 maxpacket: 8 [ 858.457888][ T5777] usb 2-1: config 16 interface 0 altsetting 0 endpoint 0x5 has invalid maxpacket 56832, setting to 1024 [ 858.508080][ T5777] usb 2-1: config 16 interface 0 altsetting 0 bulk endpoint 0x5 has invalid maxpacket 1024 [ 858.525570][ T5777] usb 2-1: config 16 interface 0 altsetting 0 bulk endpoint 0x8B has invalid maxpacket 32 [ 858.578806][ T5777] usb 2-1: config 16 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 3 [ 858.615409][ T5777] usb 2-1: New USB device found, idVendor=ee8d, idProduct=db1a, bcdDevice=61.23 [ 858.631708][ T5777] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 858.915891][ T5777] usb 2-1: GET_CAPABILITIES returned 0 [ 858.992838][ T5777] usbtmc 2-1:16.0: can't read capabilities [ 859.164246][ T5777] usb 2-1: USB disconnect, device number 103 [ 860.869742][ T29] kauditd_printk_skb: 347 callbacks suppressed [ 860.869762][ T29] audit: type=1400 audit(2000000513.956:20524): avc: denied { read } for pid=17551 comm="syz.2.5636" name="nullb0" dev="devtmpfs" ino=682 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 860.914936][ T29] audit: type=1400 audit(2000000513.966:20525): avc: denied { read } for pid=17548 comm="syz.4.5634" dev="nsfs" ino=4026533742 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 860.977496][ T29] audit: type=1400 audit(2000000513.976:20526): avc: denied { read open } for pid=17548 comm="syz.4.5634" path="net:[4026533742]" dev="nsfs" ino=4026533742 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 861.092181][ T29] audit: type=1400 audit(2000000514.006:20527): avc: denied { read open } for pid=17551 comm="syz.2.5636" path="/dev/nullb0" dev="devtmpfs" ino=682 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 861.238118][ T29] audit: type=1400 audit(2000000514.006:20528): avc: denied { read } for pid=4659 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 861.299164][ T29] audit: type=1400 audit(2000000514.006:20529): avc: denied { create } for pid=17548 comm="syz.4.5634" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 861.362971][ T29] audit: type=1400 audit(2000000514.026:20530): avc: denied { search } for pid=4659 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 861.442811][ T29] audit: type=1400 audit(2000000514.036:20531): avc: denied { append } for pid=4659 comm="syslogd" name="messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 861.542818][ T29] audit: type=1400 audit(2000000514.046:20532): avc: denied { append open } for pid=4659 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 861.618213][ T29] audit: type=1400 audit(2000000514.056:20533): avc: denied { getattr } for pid=4659 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 865.905100][ T29] kauditd_printk_skb: 249 callbacks suppressed [ 865.905119][ T29] audit: type=1400 audit(2000000518.997:20783): avc: denied { ioctl } for pid=17602 comm="syz.4.5658" path="socket:[45956]" dev="sockfs" ino=45956 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 865.936356][ C1] vkms_vblank_simulate: vblank timer overrun [ 866.023757][ T29] audit: type=1400 audit(2000000518.997:20784): avc: denied { recv } for pid=17605 comm="syz-executor" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 866.049425][ C1] vkms_vblank_simulate: vblank timer overrun [ 866.147416][ T29] audit: type=1400 audit(2000000518.997:20785): avc: denied { recv } for pid=17605 comm="syz-executor" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 866.173074][ C1] vkms_vblank_simulate: vblank timer overrun [ 866.254668][ T29] audit: type=1400 audit(2000000518.997:20786): avc: denied { recv } for pid=17605 comm="syz-executor" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 866.402497][ T29] audit: type=1400 audit(2000000519.037:20787): avc: denied { read } for pid=4659 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 866.482516][ T29] audit: type=1400 audit(2000000519.037:20788): avc: denied { search } for pid=4659 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 866.577211][ T29] audit: type=1400 audit(2000000519.067:20789): avc: denied { append } for pid=4659 comm="syslogd" name="messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 866.599658][ C1] vkms_vblank_simulate: vblank timer overrun [ 866.682475][ T29] audit: type=1400 audit(2000000519.067:20790): avc: denied { append open } for pid=4659 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 866.758442][ T29] audit: type=1400 audit(2000000519.067:20791): avc: denied { getattr } for pid=4659 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 866.845463][ T29] audit: type=1400 audit(2000000519.087:20792): avc: denied { map_create } for pid=17605 comm="syz.1.5661" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 866.908285][T17619] netlink: 8 bytes leftover after parsing attributes in process `syz.0.5666'. [ 868.205600][T17634] overlayfs: disabling nfs_export due to verity=require [ 868.622483][ T5777] usb 3-1: new high-speed USB device number 95 using dummy_hcd [ 868.833023][ T5777] usb 3-1: Using ep0 maxpacket: 16 [ 868.866406][ T5777] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 868.866451][ T5777] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 868.866503][ T5777] usb 3-1: New USB device found, idVendor=1e7d, idProduct=2d5a, bcdDevice= 0.00 [ 868.866536][ T5777] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 868.886565][ T5777] usb 3-1: config 0 descriptor?? [ 869.379453][ T5777] savu 0003:1E7D:2D5A.0010: item fetching failed at offset 3/5 [ 869.380425][ T5777] savu 0003:1E7D:2D5A.0010: parse failed [ 869.380711][ T5777] savu 0003:1E7D:2D5A.0010: probe with driver savu failed with error -22 [ 869.584349][ T5754] usb 3-1: USB disconnect, device number 95 [ 870.058408][ T1266] ieee802154 phy0 wpan0: encryption failed: -22 [ 870.067480][ T1266] ieee802154 phy1 wpan1: encryption failed: -22 [ 870.131509][T17656] netlink: 8 bytes leftover after parsing attributes in process `syz.1.5682'. [ 870.164170][T17656] (unnamed net_device) (uninitialized): peer notification delay (2) is not a multiple of miimon (129), value rounded to 0 ms [ 870.250839][T17656] (unnamed net_device) (uninitialized): option resend_igmp: invalid value (511) [ 870.282573][T17656] (unnamed net_device) (uninitialized): option resend_igmp: allowed values 0 - 255 [ 870.929510][ T29] kauditd_printk_skb: 286 callbacks suppressed [ 870.929530][ T29] audit: type=1400 audit(2000000524.017:21079): avc: denied { read write } for pid=5601 comm="syz-executor" name="loop0" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 871.072215][ T29] audit: type=1400 audit(2000000524.057:21080): avc: denied { read } for pid=4659 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 871.142216][ T29] audit: type=1400 audit(2000000524.057:21081): avc: denied { search } for pid=4659 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 871.233881][ T29] audit: type=1400 audit(2000000524.057:21082): avc: denied { append } for pid=4659 comm="syslogd" name="messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 871.270517][ T5754] kernel write not supported for file /snd/seq (pid: 5754 comm: kworker/1:5) [ 871.335234][ T29] audit: type=1400 audit(2000000524.067:21083): avc: denied { read write open } for pid=5601 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 871.427841][ T29] audit: type=1400 audit(2000000524.067:21084): avc: denied { ioctl } for pid=5601 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=649 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 871.512324][ T29] audit: type=1400 audit(2000000524.077:21085): avc: denied { recv } for pid=5214 comm="syz-executor" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 871.585231][ T29] audit: type=1400 audit(2000000524.097:21086): avc: denied { unmount } for pid=5613 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 871.646524][ T29] audit: type=1400 audit(2000000524.097:21087): avc: denied { append open } for pid=4659 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 871.708265][ T5690] usb 1-1: new high-speed USB device number 101 using dummy_hcd [ 871.763316][ T29] audit: type=1400 audit(2000000524.097:21088): avc: denied { getattr } for pid=4659 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 872.073374][ T5690] usb 1-1: New USB device found, idVendor=2770, idProduct=9052, bcdDevice=15.f5 [ 872.092247][ T5690] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 872.115020][ T5690] usb 1-1: Product: syz [ 872.119320][ T5690] usb 1-1: Manufacturer: syz [ 872.144242][ T5690] usb 1-1: SerialNumber: syz [ 872.180092][ T5690] usb 1-1: config 0 descriptor?? [ 872.235001][ T5690] gspca_main: sq905c-2.14.0 probing 2770:9052 [ 872.609367][T17691] team0: entered promiscuous mode [ 872.615374][T17691] team_slave_0: entered promiscuous mode [ 872.621722][T17691] team_slave_1: entered promiscuous mode [ 872.656841][T17691] team0: left promiscuous mode [ 872.676690][T17691] team_slave_0: left promiscuous mode [ 872.683111][T17691] team_slave_1: left promiscuous mode [ 872.861542][T17693] netlink: 8 bytes leftover after parsing attributes in process `syz.2.5699'. [ 873.105702][ T5690] usb 1-1: USB disconnect, device number 101 [ 874.940851][T17722] netlink: 209852 bytes leftover after parsing attributes in process `syz.3.5711'. [ 874.969030][T17722] openvswitch: netlink: VXLAN extension message has 13 unknown bytes. [ 875.824340][T17734] ax25_connect(): syz.1.5718 uses autobind, please contact jreuter@yaina.de [ 875.950711][ T29] kauditd_printk_skb: 398 callbacks suppressed [ 875.950732][ T29] audit: type=1400 audit(2000000529.037:21487): avc: denied { recv } for pid=14046 comm="syz-executor" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 876.069637][ T29] audit: type=1400 audit(2000000529.037:21488): avc: denied { recv } for pid=14046 comm="syz-executor" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 876.149526][ T29] audit: type=1400 audit(2000000529.047:21489): avc: denied { recv } for pid=29 comm="kauditd" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 876.235839][ T29] audit: type=1400 audit(2000000529.077:21490): avc: denied { read } for pid=4659 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 876.328331][ T29] audit: type=1400 audit(2000000529.087:21491): avc: denied { recv } for pid=16 comm="ksoftirqd/0" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 876.369092][T17738] netlink: 'syz.4.5720': attribute type 11 has an invalid length. [ 876.434372][ T29] audit: type=1400 audit(2000000529.087:21492): avc: denied { recv } for pid=16 comm="ksoftirqd/0" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 876.465429][ T29] audit: type=1400 audit(2000000529.087:21493): avc: denied { search } for pid=4659 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 876.584811][ T29] audit: type=1400 audit(2000000529.097:21494): avc: denied { append } for pid=4659 comm="syslogd" name="messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 876.607248][ C1] vkms_vblank_simulate: vblank timer overrun [ 876.701932][ T29] audit: type=1400 audit(2000000529.117:21495): avc: denied { recv } for pid=17724 comm="syz.0.5714" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 876.727419][ C1] vkms_vblank_simulate: vblank timer overrun [ 876.747109][T17744] netlink: 2548 bytes leftover after parsing attributes in process `syz.0.5723'. [ 876.779699][T17744] netlink: 100 bytes leftover after parsing attributes in process `syz.0.5723'. [ 876.823532][ T29] audit: type=1400 audit(2000000529.127:21496): avc: denied { append open } for pid=4659 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 878.218266][T17767] overlayfs: failed to clone lowerpath [ 878.661011][T17772] wireguard0: entered promiscuous mode [ 878.666666][T17772] wireguard0: entered allmulticast mode [ 881.016210][ T29] kauditd_printk_skb: 340 callbacks suppressed [ 881.016230][ T29] audit: type=1400 audit(2000000534.107:21837): avc: denied { recv } for pid=5214 comm="syz-executor" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 881.145228][ T29] audit: type=1400 audit(2000000534.127:21838): avc: denied { read } for pid=4659 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 881.202178][ T29] audit: type=1400 audit(2000000534.147:21839): avc: denied { recv } for pid=5690 comm="kworker/0:5" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 881.266910][ T29] audit: type=1400 audit(2000000534.167:21840): avc: denied { search } for pid=4659 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 881.318976][T17811] netlink: 'syz.1.5752': attribute type 1 has an invalid length. [ 881.329179][ T29] audit: type=1400 audit(2000000534.167:21841): avc: denied { append } for pid=4659 comm="syslogd" name="messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 881.371698][T17811] netlink: 9344 bytes leftover after parsing attributes in process `syz.1.5752'. [ 881.390301][T17811] netlink: 16 bytes leftover after parsing attributes in process `syz.1.5752'. [ 881.436057][ T29] audit: type=1400 audit(2000000534.167:21842): avc: denied { append open } for pid=4659 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 881.590635][ T29] audit: type=1400 audit(2000000534.167:21843): avc: denied { getattr } for pid=4659 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 881.701850][ T29] audit: type=1400 audit(2000000534.187:21844): avc: denied { recv } for pid=5214 comm="syz-executor" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 881.797755][ T29] audit: type=1400 audit(2000000534.287:21845): avc: denied { read write } for pid=14046 comm="syz-executor" name="loop2" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 881.883223][ T29] audit: type=1400 audit(2000000534.287:21846): avc: denied { read write open } for pid=14046 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 882.283793][T17823] misc userio: Can't change port type on an already running userio instance [ 882.763361][T17829] netlink: 'syz.0.5759': attribute type 10 has an invalid length. [ 882.806797][T17829] netlink: 40 bytes leftover after parsing attributes in process `syz.0.5759'. [ 882.842544][T17829] bridge0: port 2(erspan0) entered blocking state [ 882.849186][T17829] bridge0: port 2(erspan0) entered forwarding state [ 882.856575][T17829] bridge0: port 1(bridge_slave_0) entered blocking state [ 882.863866][T17829] bridge0: port 1(bridge_slave_0) entered forwarding state [ 882.904093][T17829] A link change request failed with some changes committed already. Interface bridge0 may have been left with an inconsistent configuration, please check. [ 883.530705][T17840] netlink: 168 bytes leftover after parsing attributes in process `syz.0.5764'. [ 883.551574][T17840] netlink: 'syz.0.5764': attribute type 1 has an invalid length. [ 883.582074][ T5757] usb 3-1: new high-speed USB device number 96 using dummy_hcd [ 883.890971][ T5757] usb 3-1: New USB device found, idVendor=1604, idProduct=8001, bcdDevice=44.1f [ 883.911529][ T5757] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 883.961992][ T5757] usb 3-1: Product: syz [ 883.966250][ T5757] usb 3-1: Manufacturer: syz [ 883.992471][ T5757] usb 3-1: SerialNumber: syz [ 884.029356][ T5757] usb 3-1: config 0 descriptor?? [ 884.344624][ T5757] usb 3-1: USB disconnect, device number 96 [ 884.609041][T17854] use of bytesused == 0 is deprecated and will be removed in the future, [ 884.713926][T17854] use the actual size instead. [ 884.796730][T17859] netlink: 169 bytes leftover after parsing attributes in process `syz.0.5772'. [ 885.189764][T17862] netlink: 12 bytes leftover after parsing attributes in process `syz.3.5773'. [ 886.038828][ T29] kauditd_printk_skb: 323 callbacks suppressed [ 886.038848][ T29] audit: type=1400 audit(2000000539.128:22170): avc: denied { recv } for pid=2543 comm="kworker/u8:9" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 886.074987][T17879] sch_tbf: burst 0 is lower than device lo mtu (1075109906) ! [ 886.111936][ T29] audit: type=1400 audit(2000000539.178:22171): avc: denied { read } for pid=4659 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 886.203241][ T29] audit: type=1400 audit(2000000539.178:22172): avc: denied { search } for pid=4659 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 886.283114][ T29] audit: type=1400 audit(2000000539.198:22173): avc: denied { append } for pid=4659 comm="syslogd" name="messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 886.393953][ T29] audit: type=1400 audit(2000000539.228:22174): avc: denied { append open } for pid=4659 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 886.497093][ T29] audit: type=1400 audit(2000000539.228:22175): avc: denied { getattr } for pid=4659 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 886.569888][ T29] audit: type=1400 audit(2000000539.228:22176): avc: denied { recv } for pid=17880 comm="syz-executor" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 886.669626][ T29] audit: type=1400 audit(2000000539.238:22177): avc: denied { recv } for pid=16 comm="ksoftirqd/0" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 886.771671][ T29] audit: type=1400 audit(2000000539.248:22178): avc: denied { recv } for pid=16 comm="ksoftirqd/0" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 886.885448][ T29] audit: type=1400 audit(2000000539.248:22179): avc: denied { recv } for pid=16 comm="ksoftirqd/0" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 886.942043][ T5754] usb 4-1: new high-speed USB device number 100 using dummy_hcd [ 887.221657][ T5754] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 887.261602][ T5754] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 887.290597][ T5754] usb 4-1: New USB device found, idVendor=045e, idProduct=009d, bcdDevice= 0.00 [ 887.311031][ T5754] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 887.370817][ T5754] usb 4-1: config 0 descriptor?? [ 887.864684][T17899] netlink: 209852 bytes leftover after parsing attributes in process `syz.0.5791'. [ 887.924378][ T5754] microsoft 0003:045E:009D.0011: unknown main item tag 0x0 [ 887.951322][ T5754] microsoft 0003:045E:009D.0011: unknown main item tag 0x0 [ 887.951608][T17899] openvswitch: netlink: IP tunnel attribute has 3048 unknown bytes. [ 887.958577][ T5754] microsoft 0003:045E:009D.0011: unknown main item tag 0x0 [ 887.958615][ T5754] microsoft 0003:045E:009D.0011: unknown main item tag 0x0 [ 888.045700][ T5754] microsoft 0003:045E:009D.0011: unknown main item tag 0x0 [ 888.085250][ T5754] microsoft 0003:045E:009D.0011: unknown main item tag 0x0 [ 888.110081][ T5754] microsoft 0003:045E:009D.0011: unknown main item tag 0x0 [ 888.185225][ T5754] microsoft 0003:045E:009D.0011: hidraw0: USB HID v0.00 Device [HID 045e:009d] on usb-dummy_hcd.3-1/input0 [ 888.235377][ T5754] microsoft 0003:045E:009D.0011: no inputs found [ 888.264310][ T5754] microsoft 0003:045E:009D.0011: could not initialize ff, continuing anyway [ 888.311884][ T5754] usb 4-1: USB disconnect, device number 100 [ 888.854102][T17911] netlink: 'syz.2.5797': attribute type 1 has an invalid length. [ 888.890226][T17911] netlink: 168864 bytes leftover after parsing attributes in process `syz.2.5797'. [ 891.047716][ T29] kauditd_printk_skb: 301 callbacks suppressed [ 891.047738][ T29] audit: type=1400 audit(2000000544.138:22481): avc: denied { recv } for pid=17945 comm="syz-executor" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 891.145931][ T29] audit: type=1400 audit(2000000544.188:22482): avc: denied { read } for pid=4659 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 891.225137][ T29] audit: type=1400 audit(2000000544.188:22483): avc: denied { search } for pid=4659 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 891.287788][ T29] audit: type=1400 audit(2000000544.218:22484): avc: denied { append } for pid=4659 comm="syslogd" name="messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 891.377031][ T29] audit: type=1400 audit(2000000544.218:22485): avc: denied { append open } for pid=4659 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 891.440655][ T29] audit: type=1400 audit(2000000544.218:22486): avc: denied { getattr } for pid=4659 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 891.551134][ T29] audit: type=1400 audit(2000000544.278:22487): avc: denied { recv } for pid=5214 comm="syz-executor" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 891.682211][ T29] audit: type=1400 audit(2000000544.298:22488): avc: denied { recv } for pid=5214 comm="syz-executor" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 891.791156][ T29] audit: type=1400 audit(2000000544.368:22489): avc: denied { create } for pid=17945 comm="syz.2.5810" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 891.874149][ T29] audit: type=1400 audit(2000000544.398:22490): avc: denied { read write } for pid=5601 comm="syz-executor" name="loop0" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 892.147565][T17960] input: syz1 as /devices/virtual/input/input43 [ 895.031379][T16332] usb 2-1: new high-speed USB device number 104 using dummy_hcd [ 895.051151][ T5754] usb 5-1: new high-speed USB device number 103 using dummy_hcd [ 895.339492][T16332] usb 2-1: config 1 has too many interfaces: 66, using maximum allowed: 32 [ 895.368881][ T5754] usb 5-1: New USB device found, idVendor=0bed, idProduct=1100, bcdDevice=ec.c3 [ 895.383795][T16332] usb 2-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 895.400291][ T5754] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 895.408832][T16332] usb 2-1: config 1 has 1 interface, different from the descriptor's value: 66 [ 895.438880][T16332] usb 2-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 895.461643][ T5754] usb 5-1: config 0 descriptor?? [ 895.489862][ T5754] cp210x 5-1:0.0: cp210x converter detected [ 895.527525][T16332] usb 2-1: New USB device found, idVendor=7d25, idProduct=a415, bcdDevice= 0.40 [ 895.567438][T16332] usb 2-1: New USB device strings: Mfr=1, Product=4, SerialNumber=0 [ 895.594192][T18003] netlink: 'syz.0.5836': attribute type 1 has an invalid length. [ 895.600997][T16332] usb 2-1: Product: syz [ 895.609823][T16332] usb 2-1: Manufacturer: syz [ 895.611258][T18003] netlink: 8 bytes leftover after parsing attributes in process `syz.0.5836'. [ 895.615747][T18004] ptrace attach of ""[18005] was attempted by "./syz-executor exec"[18004] [ 895.688329][T16332] cdc_wdm 2-1:1.0: skipping garbage [ 895.694381][T16332] cdc_wdm 2-1:1.0: skipping garbage [ 895.717651][T16332] cdc_wdm 2-1:1.0: cdc-wdm0: USB WDM device [ 895.730899][T16332] cdc_wdm 2-1:1.0: Unknown control protocol [ 896.055361][ T29] kauditd_printk_skb: 299 callbacks suppressed [ 896.055381][ T29] audit: type=1400 audit(2000000549.138:22790): avc: denied { recv } for pid=5604 comm="syz-executor" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 896.072653][ T5754] cp210x 5-1:0.0: failed to get vendor val 0x000e size 3: -32 [ 896.152574][ T29] audit: type=1400 audit(2000000549.138:22791): avc: denied { recv } for pid=5604 comm="syz-executor" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 896.178134][ C0] vkms_vblank_simulate: vblank timer overrun [ 896.199096][ T9] usb 2-1: USB disconnect, device number 104 [ 896.232982][ T5754] usb 5-1: cp210x converter now attached to ttyUSB0 [ 896.250997][ T29] audit: type=1400 audit(2000000549.148:22792): avc: denied { recv } for pid=5604 comm="syz-executor" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 896.276571][ C0] vkms_vblank_simulate: vblank timer overrun [ 896.366138][ T29] audit: type=1400 audit(2000000549.158:22793): avc: denied { ioctl } for pid=17991 comm="syz.4.5830" path="/dev/raw-gadget" dev="devtmpfs" ino=734 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 896.403501][ T29] audit: type=1400 audit(2000000549.158:22794): avc: denied { ioctl } for pid=17991 comm="syz.4.5830" path="/dev/raw-gadget" dev="devtmpfs" ino=734 ioctlcmd=0x550c scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 896.428565][ C0] vkms_vblank_simulate: vblank timer overrun [ 896.466093][ T29] audit: type=1400 audit(2000000549.198:22795): avc: denied { recv } for pid=5604 comm="syz-executor" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 896.506307][ T29] audit: type=1400 audit(2000000549.218:22796): avc: denied { ioctl } for pid=17991 comm="syz.4.5830" path="/dev/raw-gadget" dev="devtmpfs" ino=734 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 896.516393][ T5754] usb 5-1: USB disconnect, device number 103 [ 896.531378][ C0] vkms_vblank_simulate: vblank timer overrun [ 896.546379][ T29] audit: type=1400 audit(2000000549.238:22797): avc: denied { read } for pid=4659 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 896.558382][T18014] netlink: 24 bytes leftover after parsing attributes in process `syz.2.5840'. [ 896.617019][ T29] audit: type=1400 audit(2000000549.248:22798): avc: denied { search } for pid=4659 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 896.638917][ T5754] cp210x ttyUSB0: cp210x converter now disconnected from ttyUSB0 [ 896.665483][ T29] audit: type=1400 audit(2000000549.248:22799): avc: denied { append } for pid=4659 comm="syslogd" name="messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 896.699350][ T5777] usb 4-1: new full-speed USB device number 101 using dummy_hcd [ 896.734283][ T5754] cp210x 5-1:0.0: device disconnected [ 896.916613][ T5777] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 10 [ 896.933869][ T5777] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 896.964906][ T5777] usb 4-1: New USB device found, idVendor=046d, idProduct=c31c, bcdDevice= 0.40 [ 896.979169][ T5777] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 897.011496][ T5777] usb 4-1: config 0 descriptor?? [ 897.067269][ T5777] hub 4-1:0.0: USB hub found [ 897.419956][ T5777] hub 4-1:0.0: 1 port detected [ 897.790981][T18022] trusted_key: syz.2.5844 sent an empty control message without MSG_MORE. [ 897.899100][ T5777] usb 4-1: USB disconnect, device number 101 [ 898.520915][T16332] usb 3-1: new high-speed USB device number 97 using dummy_hcd [ 898.722256][T16332] usb 3-1: Using ep0 maxpacket: 16 [ 898.779695][T16332] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 898.821050][T16332] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 898.857029][T16332] usb 3-1: New USB device found, idVendor=6161, idProduct=4d15, bcdDevice= 0.00 [ 898.897159][T16332] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 898.971221][T16332] usb 3-1: config 0 descriptor?? [ 899.174956][T18040] ubi0: attaching mtd0 [ 899.195420][T18040] ubi0: scanning is finished [ 899.200100][T18040] ubi0: empty MTD device detected [ 899.290548][T18044] IPVS: Error connecting to the multicast addr [ 899.338325][T18040] ubi0: attached mtd0 (name "mtdram test device", size 0 MiB) [ 899.370837][T18040] ubi0: PEB size: 4096 bytes (4 KiB), LEB size: 3968 bytes [ 899.390859][T18040] ubi0: min./max. I/O unit sizes: 1/64, sub-page size 1 [ 899.418863][T18040] ubi0: VID header offset: 64 (aligned 64), data offset: 128 [ 899.437586][T18040] ubi0: good PEBs: 32, bad PEBs: 0, corrupted PEBs: 0 [ 899.469495][T18040] ubi0: user volume: 0, internal volumes: 1, max. volumes count: 23 [ 899.493476][T18040] ubi0: max/mean erase counter: 0/0, WL threshold: 4096, image sequence number: 382445141 [ 899.542774][T18040] ubi0: available PEBs: 28, total reserved PEBs: 4, PEBs reserved for bad PEB handling: 0 [ 899.543151][T18032] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 899.607293][T18046] ubi0: background thread "ubi_bgt0d" started, PID 18046 [ 899.644650][T18032] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 900.016921][T16332] usb 3-1: string descriptor 0 read error: -71 [ 900.083394][T16332] usb 3-1: Max retries (5) exceeded reading string descriptor 200 [ 900.111242][T16332] letsketch 0003:6161:4D15.0012: probe with driver letsketch failed with error -32 [ 900.154080][T16332] usb 3-1: USB disconnect, device number 97 [ 900.342366][T18056] mkiss: ax0: crc mode is auto. [ 901.067737][ T29] kauditd_printk_skb: 327 callbacks suppressed [ 901.067757][ T29] audit: type=1400 audit(2000000554.159:23127): avc: denied { read write open } for pid=14046 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 901.209509][ T29] audit: type=1400 audit(2000000554.169:23128): avc: denied { ioctl } for pid=14046 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=651 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 901.290670][ T29] audit: type=1400 audit(2000000554.189:23129): avc: denied { read } for pid=4659 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 901.380378][ T29] audit: type=1400 audit(2000000554.209:23130): avc: denied { search } for pid=4659 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 901.451624][ T29] audit: type=1400 audit(2000000554.219:23131): avc: denied { append } for pid=4659 comm="syslogd" name="messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 901.558487][ T29] audit: type=1400 audit(2000000554.229:23132): avc: denied { append open } for pid=4659 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 901.643640][T18071] netlink: 16 bytes leftover after parsing attributes in process `syz.0.5862'. [ 901.682126][ T29] audit: type=1400 audit(2000000554.239:23133): avc: denied { getattr } for pid=4659 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 901.793746][ T29] audit: type=1400 audit(2000000554.289:23134): avc: denied { recv } for pid=5214 comm="syz-executor" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 901.890148][ T29] audit: type=1400 audit(2000000554.299:23135): avc: denied { recv } for pid=29 comm="kauditd" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 902.040661][ T29] audit: type=1400 audit(2000000554.459:23136): avc: denied { read write } for pid=5608 comm="syz-executor" name="loop1" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 902.053200][T18074] netlink: 84 bytes leftover after parsing attributes in process `syz.1.5865'. [ 902.150794][T18074] netem: invalid attributes len -16 [ 902.156060][T18074] netem: change failed [ 903.423954][ T2543] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 903.713220][ T2543] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 903.952122][ T2543] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 904.235724][ T2543] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 904.772153][ T2543] bridge_slave_1: left allmulticast mode [ 904.798214][ T2543] bridge_slave_1: left promiscuous mode [ 904.808643][ T2543] bridge0: port 2(bridge_slave_1) entered disabled state [ 904.854473][ T2543] bridge_slave_0: left allmulticast mode [ 904.884601][ T2543] bridge_slave_0: left promiscuous mode [ 904.895832][ T2543] bridge0: port 1(bridge_slave_0) entered disabled state [ 905.226307][T18026] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 905.240918][T18026] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 905.255636][T18026] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 905.271297][T18026] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 905.282342][T18026] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 905.292870][T18026] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 906.106383][ T29] kauditd_printk_skb: 246 callbacks suppressed [ 906.106404][ T29] audit: type=1400 audit(2000000559.159:23383): avc: denied { recv } for pid=5613 comm="syz-executor" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 906.162075][ T29] audit: type=1400 audit(2000000559.159:23384): avc: denied { recv } for pid=18107 comm="syz.1.5881" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 906.187999][ T29] audit: type=1400 audit(2000000559.169:23385): avc: denied { recv } for pid=18107 comm="syz.1.5881" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 906.216078][ T29] audit: type=1400 audit(2000000559.179:23386): avc: denied { recv } for pid=18107 comm="syz.1.5881" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 906.312936][ T29] audit: type=1400 audit(2000000559.189:23387): avc: denied { recv } for pid=14193 comm="kworker/u8:3" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 906.434313][ T29] audit: type=1400 audit(2000000559.239:23388): avc: denied { read } for pid=4659 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 906.508181][ T29] audit: type=1400 audit(2000000559.249:23389): avc: denied { search } for pid=4659 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 906.576412][ T29] audit: type=1400 audit(2000000559.249:23390): avc: denied { append } for pid=4659 comm="syslogd" name="messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 906.645065][ T29] audit: type=1400 audit(2000000559.249:23391): avc: denied { append open } for pid=4659 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 906.723753][ T29] audit: type=1400 audit(2000000559.259:23392): avc: denied { getattr } for pid=4659 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 907.007370][ T2543] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 907.103616][ T2543] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 907.126276][ T2543] bond0 (unregistering): Released all slaves [ 907.417297][T18026] Bluetooth: hci1: command tx timeout [ 908.127157][T14048] Bluetooth: hci3: sending frame failed (-49) [ 908.136201][T18026] Bluetooth: hci3: Opcode 0x1003 failed: -49 [ 908.364446][ T2543] hsr_slave_0: left promiscuous mode [ 908.471307][ T2543] hsr_slave_1: left promiscuous mode [ 908.518844][ T2543] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 908.550378][ T2543] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 908.613104][ T2543] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 908.621317][ T2543] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 908.707010][ T2543] veth1_macvtap: left promiscuous mode [ 908.727393][ T2543] veth0_macvtap: left promiscuous mode [ 908.742298][ T2543] veth1_vlan: left promiscuous mode [ 909.490459][T14048] Bluetooth: hci1: command tx timeout [ 909.750891][T16332] usb 2-1: new full-speed USB device number 105 using dummy_hcd [ 909.990786][T16332] usb 2-1: config 0 has an invalid interface number: 20 but max is 0 [ 909.999951][T16332] usb 2-1: config 0 has no interface number 0 [ 910.037120][T16332] usb 2-1: config 0 interface 20 altsetting 0 endpoint 0x6 has invalid maxpacket 1023, setting to 64 [ 910.115263][T16332] usb 2-1: New USB device found, idVendor=04e6, idProduct=000b, bcdDevice= 1.00 [ 910.124874][T16332] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 910.142938][T16332] usb 2-1: Product: syz [ 910.147156][T16332] usb 2-1: Manufacturer: syz [ 910.169213][T16332] usb 2-1: SerialNumber: syz [ 910.197954][T16332] usb 2-1: config 0 descriptor?? [ 910.199963][ T2543] team0 (unregistering): Port device team_slave_1 removed [ 910.227308][T18135] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 910.257263][T16332] usb-storage 2-1:0.20: USB Mass Storage device detected [ 910.287917][T16332] usb-storage 2-1:0.20: Quirks match for vid 04e6 pid 000b: 4 [ 910.355761][ T2543] team0 (unregistering): Port device team_slave_0 removed [ 910.553636][T16332] scsi host1: usb-storage 2-1:0.20 [ 910.572915][T16332] usb 2-1: USB disconnect, device number 105 [ 911.145258][ T29] kauditd_printk_skb: 180 callbacks suppressed [ 911.145277][ T29] audit: type=1400 audit(2000000564.239:23573): avc: denied { create } for pid=18139 comm="syz.0.5893" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 911.225838][ T29] audit: type=1400 audit(2000000564.249:23574): avc: denied { ioctl } for pid=18139 comm="syz.0.5893" path="socket:[47960]" dev="sockfs" ino=47960 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 911.276194][ T29] audit: type=1400 audit(2000000564.259:23575): avc: denied { module_request } for pid=18139 comm="syz.0.5893" kmod="netdev-team_slave_0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 911.339527][ T29] audit: type=1400 audit(2000000564.269:23576): avc: denied { read } for pid=4659 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 911.367965][ T29] audit: type=1400 audit(2000000564.279:23577): avc: denied { search } for pid=4659 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 911.418806][ T29] audit: type=1400 audit(2000000564.279:23578): avc: denied { append } for pid=4659 comm="syslogd" name="messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 911.475936][ T29] audit: type=1400 audit(2000000564.279:23579): avc: denied { append open } for pid=4659 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 911.534514][ T29] audit: type=1400 audit(2000000564.319:23580): avc: denied { getattr } for pid=4659 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 911.587505][T14048] Bluetooth: hci1: command tx timeout [ 911.621282][ T29] audit: type=1400 audit(2000000564.429:23581): avc: denied { recv } for pid=5214 comm="syz-executor" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 911.744200][ T29] audit: type=1400 audit(2000000564.459:23582): avc: denied { recv } for pid=5214 comm="syz-executor" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 912.290134][T18132] netlink: 20 bytes leftover after parsing attributes in process `syz.4.5889'. [ 913.425198][ T2543] IPVS: stop unused estimator thread 0... [ 913.442266][T18103] chnl_net:caif_netlink_parms(): no params data found [ 913.650317][T14048] Bluetooth: hci1: command tx timeout [ 913.996474][T18103] bridge0: port 1(bridge_slave_0) entered blocking state [ 914.012074][T18103] bridge0: port 1(bridge_slave_0) entered disabled state [ 914.021982][T18103] bridge_slave_0: entered allmulticast mode [ 914.059875][T18103] bridge_slave_0: entered promiscuous mode [ 914.106706][T18103] bridge0: port 2(bridge_slave_1) entered blocking state [ 914.140066][T18103] bridge0: port 2(bridge_slave_1) entered disabled state [ 914.147354][T18103] bridge_slave_1: entered allmulticast mode [ 914.192559][T18103] bridge_slave_1: entered promiscuous mode [ 914.388406][T18169] netlink: 8 bytes leftover after parsing attributes in process `syz.1.5903'. [ 914.463287][T18103] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 914.497880][T18103] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 914.726834][T18103] team0: Port device team_slave_0 added [ 914.841158][T18103] team0: Port device team_slave_1 added [ 914.997360][T18103] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 915.024725][T18103] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 915.089312][T18103] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 915.128285][T18103] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 915.154757][T18103] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 915.213858][ T5777] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=5777 comm=kworker/0:6 [ 915.225484][T18103] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 915.396749][T18103] hsr_slave_0: entered promiscuous mode [ 915.425367][T18103] hsr_slave_1: entered promiscuous mode [ 915.434981][T18103] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 915.446183][T18103] Cannot create hsr debugfs directory [ 916.157167][ T29] kauditd_printk_skb: 247 callbacks suppressed [ 916.157193][ T29] audit: type=1400 audit(2000000569.249:23830): avc: denied { read write } for pid=5613 comm="syz-executor" name="loop4" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 916.231720][ T29] audit: type=1400 audit(2000000569.269:23831): avc: denied { read } for pid=4659 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 916.274419][ T29] audit: type=1400 audit(2000000569.269:23832): avc: denied { search } for pid=4659 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 916.337240][ T29] audit: type=1400 audit(2000000569.269:23833): avc: denied { append } for pid=4659 comm="syslogd" name="messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 916.363430][ T29] audit: type=1400 audit(2000000569.269:23834): avc: denied { append open } for pid=4659 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 916.392747][ T29] audit: type=1400 audit(2000000569.289:23835): avc: denied { getattr } for pid=4659 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 916.432986][ T29] audit: type=1400 audit(2000000569.289:23836): avc: denied { read write open } for pid=5613 comm="syz-executor" path="/dev/loop4" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 916.463824][ T29] audit: type=1400 audit(2000000569.299:23837): avc: denied { ioctl } for pid=5613 comm="syz-executor" path="/dev/loop4" dev="devtmpfs" ino=653 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 916.503454][ T29] audit: type=1400 audit(2000000569.369:23838): avc: denied { create } for pid=18188 comm="syz.0.5912" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 916.612832][ T29] audit: type=1400 audit(2000000569.399:23839): avc: denied { prog_load } for pid=18188 comm="syz.0.5912" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 916.904644][T18103] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 917.016724][T18103] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 917.107312][T18103] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 917.159825][T18103] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 917.784590][T18203] netlink: 'syz.4.5918': attribute type 3 has an invalid length. [ 917.809279][T18203] netlink: 130984 bytes leftover after parsing attributes in process `syz.4.5918'. [ 918.002112][T18103] 8021q: adding VLAN 0 to HW filter on device bond0 [ 918.190683][T18103] 8021q: adding VLAN 0 to HW filter on device team0 [ 918.262711][ T2543] bridge0: port 1(bridge_slave_0) entered blocking state [ 918.269959][ T2543] bridge0: port 1(bridge_slave_0) entered forwarding state [ 918.455077][ T11] bridge0: port 2(bridge_slave_1) entered blocking state [ 918.462361][ T11] bridge0: port 2(bridge_slave_1) entered forwarding state [ 921.167017][ T29] kauditd_printk_skb: 277 callbacks suppressed [ 921.167036][ T29] audit: type=1400 audit(2000000574.260:24117): avc: denied { create } for pid=18232 comm="syz.2.5931" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 921.177319][ T29] audit: type=1400 audit(2000000574.270:24118): avc: denied { write } for pid=18232 comm="syz.2.5931" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 921.183215][ T29] audit: type=1400 audit(2000000574.280:24119): avc: denied { read } for pid=4659 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 921.190469][T18233] netlink: 201400 bytes leftover after parsing attributes in process `syz.2.5931'. [ 921.227807][ T29] audit: type=1400 audit(2000000574.310:24120): avc: denied { search } for pid=4659 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 921.509902][ T29] audit: type=1400 audit(2000000574.320:24121): avc: denied { append } for pid=4659 comm="syslogd" name="messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 921.509978][ T29] audit: type=1400 audit(2000000574.320:24122): avc: denied { append open } for pid=4659 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 921.510038][ T29] audit: type=1400 audit(2000000574.320:24123): avc: denied { getattr } for pid=4659 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 921.510092][ T29] audit: type=1400 audit(2000000574.400:24124): avc: denied { module_request } for pid=18103 comm="syz-executor" kmod="netdev-nicvf0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 921.510137][ T29] audit: type=1400 audit(2000000574.470:24125): avc: denied { recv } for pid=5214 comm="syz-executor" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 921.510194][ T29] audit: type=1400 audit(2000000574.480:24126): avc: denied { recv } for pid=5214 comm="syz-executor" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 922.381698][ T5757] usb 5-1: new high-speed USB device number 104 using dummy_hcd [ 922.591124][ T5757] usb 5-1: Using ep0 maxpacket: 16 [ 922.642410][ T5757] usb 5-1: config 0 interface 0 altsetting 0 has an endpoint descriptor with address 0xF3, changing to 0x83 [ 922.680743][ T5757] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x83 has an invalid bInterval 0, changing to 7 [ 922.745400][ T5757] usb 5-1: New USB device found, idVendor=2040, idProduct=0264, bcdDevice=4e.d1 [ 922.766151][ T5757] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 922.790038][ T5757] usb 5-1: Product: syz [ 922.794253][ T5757] usb 5-1: Manufacturer: syz [ 922.821516][ T5757] usb 5-1: SerialNumber: syz [ 922.850499][ T5757] usb 5-1: config 0 descriptor?? [ 922.887712][ T5757] em28xx 5-1:0.0: New device syz syz @ 480 Mbps (2040:0264, interface 0, class 0) [ 922.909469][ T5757] em28xx 5-1:0.0: Audio interface 0 found (Vendor Class) [ 923.134965][T18103] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 923.454121][T18103] veth0_vlan: entered promiscuous mode [ 923.532826][T18103] veth1_vlan: entered promiscuous mode [ 923.561814][ T5757] em28xx 5-1:0.0: chip ID is em2870 [ 923.772211][T18103] veth0_macvtap: entered promiscuous mode [ 923.868822][T18103] veth1_macvtap: entered promiscuous mode [ 923.963257][ T1169] usb 5-1: USB disconnect, device number 104 [ 923.970759][ T1169] em28xx 5-1:0.0: Disconnecting em28xx [ 924.023604][ T1169] em28xx 5-1:0.0: Freeing device [ 924.132903][T18103] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 924.153799][T18103] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 924.173752][T18103] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 924.192501][T18103] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 924.207462][T18103] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 924.231365][T18103] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 924.246311][T18103] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 924.263120][T18103] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 924.281305][T18103] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 924.383334][T18103] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 924.397222][T18103] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 924.411729][T18103] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 924.426230][T18103] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 924.436188][T18103] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 924.447914][T18103] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 924.463986][T18103] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 924.474491][T18103] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 924.487435][T18103] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 924.524033][T18103] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 924.533943][T18103] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 924.559368][T18103] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 924.568117][T18103] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 925.432753][T18265] netlink: 9286 bytes leftover after parsing attributes in process `syz.4.5944'. [ 925.609368][T14193] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 925.617238][T14193] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 925.963190][ T11] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 925.995757][ T11] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 926.116187][T18026] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 926.132459][T18026] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 926.141214][T18026] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 926.159542][T18026] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 926.170093][ T29] kauditd_printk_skb: 262 callbacks suppressed [ 926.170110][ T29] audit: type=1400 audit(2000000579.260:24389): avc: denied { mount } for pid=18103 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 926.200541][T18026] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 926.221884][T18026] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 926.254659][ T29] audit: type=1400 audit(2000000579.270:24390): avc: denied { create } for pid=18269 comm="syz.2.5946" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 926.282942][ T29] audit: type=1400 audit(2000000579.270:24391): avc: denied { write } for pid=18269 comm="syz.2.5946" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 926.399493][ T29] audit: type=1400 audit(2000000579.300:24392): avc: denied { read } for pid=18269 comm="syz.2.5946" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 926.421489][ T29] audit: type=1400 audit(2000000579.300:24393): avc: denied { read } for pid=18269 comm="syz.2.5946" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 926.443907][ T29] audit: type=1400 audit(2000000579.310:24394): avc: denied { mounton } for pid=18103 comm="syz-executor" path="/root/syzkaller.oYlS11/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 926.509526][ T29] audit: type=1400 audit(2000000579.330:24395): avc: denied { read write } for pid=18273 comm="syz.4.5947" name="video0" dev="devtmpfs" ino=849 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l_device_t tclass=chr_file permissive=1 [ 926.618226][ T29] audit: type=1400 audit(2000000579.330:24396): avc: denied { read write open } for pid=18273 comm="syz.4.5947" path="/dev/video0" dev="devtmpfs" ino=849 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l_device_t tclass=chr_file permissive=1 [ 926.729492][ T29] audit: type=1400 audit(2000000579.350:24397): avc: denied { ioctl } for pid=18270 comm="syz-executor" path="socket:[48548]" dev="sockfs" ino=48548 ioctlcmd=0x48dd scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 926.839331][ T29] audit: type=1400 audit(2000000579.380:24398): avc: denied { mounton } for pid=18103 comm="syz-executor" path="/root/syzkaller.oYlS11/syz-tmp/newroot/proc" dev="tmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 928.369713][T18026] Bluetooth: hci3: command tx timeout [ 928.400733][ T5757] hid-generic 0000:0000:0000.0013: unknown main item tag 0x0 [ 928.408872][ T5757] hid-generic 0000:0000:0000.0013: unknown main item tag 0x0 [ 928.416367][ T5757] hid-generic 0000:0000:0000.0013: unknown main item tag 0x0 [ 928.434206][ T5757] hid-generic 0000:0000:0000.0013: unknown main item tag 0x0 [ 928.442220][ T5757] hid-generic 0000:0000:0000.0013: unknown main item tag 0x0 [ 928.450417][ T5757] hid-generic 0000:0000:0000.0013: unknown main item tag 0x0 [ 928.460764][ T5757] hid-generic 0000:0000:0000.0013: unknown main item tag 0x0 [ 928.468188][ T5757] hid-generic 0000:0000:0000.0013: unknown main item tag 0x0 [ 928.475823][ T5757] hid-generic 0000:0000:0000.0013: unknown main item tag 0x0 [ 928.517218][ T5757] hid-generic 0000:0000:0000.0013: unknown main item tag 0x0 [ 928.549157][ T5757] hid-generic 0000:0000:0000.0013: unknown main item tag 0x0 [ 928.594807][ T5757] hid-generic 0000:0000:0000.0013: hidraw0: HID v0.00 Device [syz0] on syz0 [ 928.605655][T18270] chnl_net:caif_netlink_parms(): no params data found [ 928.789219][ T1169] usb 1-1: new high-speed USB device number 102 using dummy_hcd [ 928.964156][T18270] bridge0: port 1(bridge_slave_0) entered blocking state [ 928.981730][T18270] bridge0: port 1(bridge_slave_0) entered disabled state [ 929.027395][T18270] bridge_slave_0: entered allmulticast mode [ 929.057017][T18270] bridge_slave_0: entered promiscuous mode [ 929.136192][ T1169] usb 1-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 929.146537][T18270] bridge0: port 2(bridge_slave_1) entered blocking state [ 929.156090][ T1169] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 929.166057][T18270] bridge0: port 2(bridge_slave_1) entered disabled state [ 929.178457][ T1169] usb 1-1: Product: syz [ 929.182994][T18270] bridge_slave_1: entered allmulticast mode [ 929.197498][ T1169] usb 1-1: Manufacturer: syz [ 929.205204][T18270] bridge_slave_1: entered promiscuous mode [ 929.211196][ T1169] usb 1-1: SerialNumber: syz [ 929.391417][ T1169] usb 1-1: ath9k_htc: Firmware ath9k_htc/htc_9271-1.4.0.fw requested [ 929.447980][T18270] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 929.508199][T18270] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 929.750180][T18270] team0: Port device team_slave_0 added [ 929.770734][T18261] usb 1-1: ath9k_htc: Transferred FW: ath9k_htc/htc_9271-1.4.0.fw, size: 51008 [ 929.834161][T18270] team0: Port device team_slave_1 added [ 930.070367][T18270] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 930.077365][T18270] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 930.209236][T18270] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 930.286609][T18270] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 930.328002][T18270] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 930.451794][T18026] Bluetooth: hci3: command tx timeout [ 930.504063][T18270] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 931.202387][ T29] kauditd_printk_skb: 244 callbacks suppressed [ 931.202406][ T29] audit: type=1400 audit(2000000584.300:24643): avc: denied { create } for pid=18315 comm="syz.4.5961" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 931.432449][ T29] audit: type=1400 audit(2000000584.360:24644): avc: denied { write } for pid=18315 comm="syz.4.5961" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 931.629406][ T29] audit: type=1400 audit(2000000584.360:24645): avc: denied { read } for pid=18315 comm="syz.4.5961" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 931.773923][ T29] audit: type=1400 audit(2000000584.360:24646): avc: denied { read } for pid=18315 comm="syz.4.5961" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 931.939100][ T29] audit: type=1400 audit(2000000584.390:24647): avc: denied { read } for pid=4659 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 932.124118][ T29] audit: type=1400 audit(2000000584.470:24648): avc: denied { search } for pid=4659 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 932.364480][ T29] audit: type=1400 audit(2000000584.470:24649): avc: denied { append } for pid=4659 comm="syslogd" name="messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 932.535594][T18026] Bluetooth: hci3: command tx timeout [ 932.548700][ T29] audit: type=1400 audit(2000000584.470:24650): avc: denied { append open } for pid=4659 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 932.737360][ T29] audit: type=1400 audit(2000000584.470:24651): avc: denied { getattr } for pid=4659 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 932.908071][ T29] audit: type=1400 audit(2000000584.480:24652): avc: denied { write } for pid=18315 comm="syz.4.5961" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 934.064346][ C0] hrtimer: interrupt took 15570740 ns [ 934.283365][T18261] ath9k_htc 1-1:1.0: ath9k_htc: Target is unresponsive [ 934.619037][T18026] Bluetooth: hci3: command tx timeout [ 934.873025][ T1266] ieee802154 phy0 wpan0: encryption failed: -22 [ 934.873105][ T1266] ieee802154 phy1 wpan1: encryption failed: -22 [ 937.103248][ T29] kauditd_printk_skb: 106 callbacks suppressed [ 937.103268][ T29] audit: type=1400 audit(2000000590.190:24759): avc: denied { recv } for pid=18261 comm="kworker/0:0" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 937.126385][ T29] audit: type=1400 audit(2000000590.220:24760): avc: denied { read } for pid=4659 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 937.141717][ T29] audit: type=1400 audit(2000000590.240:24761): avc: denied { search } for pid=4659 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 937.143762][ T29] audit: type=1400 audit(2000000590.240:24762): avc: denied { append } for pid=4659 comm="syslogd" name="messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 937.160582][ T29] audit: type=1400 audit(2000000590.260:24763): avc: denied { append open } for pid=4659 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 937.164815][ T29] audit: type=1400 audit(2000000590.260:24764): avc: denied { getattr } for pid=4659 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 937.371277][ T29] audit: type=1400 audit(2000000590.450:24765): avc: denied { recv } for pid=18261 comm="kworker/0:0" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 937.665136][ T29] audit: type=1400 audit(2000000590.750:24766): avc: denied { recv } for pid=18261 comm="kworker/0:0" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 937.877104][ T29] audit: type=1400 audit(2000000590.940:24767): avc: denied { recv } for pid=18261 comm="kworker/0:0" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 938.215349][ T29] audit: type=1400 audit(2000000591.300:24768): avc: denied { recv } for pid=18261 comm="kworker/0:0" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 942.800583][ T29] kauditd_printk_skb: 24 callbacks suppressed [ 942.800601][ T29] audit: type=1400 audit(2000000595.871:24793): avc: denied { recv } for pid=18261 comm="kworker/0:0" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 942.828661][ T29] audit: type=1400 audit(2000000595.911:24794): avc: denied { read } for pid=4659 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 942.842211][ T29] audit: type=1400 audit(2000000595.931:24795): avc: denied { search } for pid=4659 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 942.855543][ T29] audit: type=1400 audit(2000000595.941:24796): avc: denied { append } for pid=4659 comm="syslogd" name="messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 942.855612][ T29] audit: type=1400 audit(2000000595.941:24797): avc: denied { append open } for pid=4659 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 942.855673][ T29] audit: type=1400 audit(2000000595.941:24798): avc: denied { getattr } for pid=4659 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 943.155818][ T29] audit: type=1400 audit(2000000596.231:24799): avc: denied { recv } for pid=18261 comm="kworker/0:0" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 943.180239][ T29] audit: type=1400 audit(2000000596.261:24800): avc: denied { read } for pid=4659 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 943.213283][ T29] audit: type=1400 audit(2000000596.281:24801): avc: denied { search } for pid=4659 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 943.215310][ T29] audit: type=1400 audit(2000000596.311:24802): avc: denied { append } for pid=4659 comm="syslogd" name="messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 948.152710][ T29] kauditd_printk_skb: 22 callbacks suppressed [ 948.152735][ T29] audit: type=1400 audit(2000000601.191:24825): avc: denied { recv } for pid=18261 comm="kworker/0:0" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 948.218175][ T29] audit: type=1400 audit(2000000601.301:24826): avc: denied { read } for pid=4659 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 948.218249][ T29] audit: type=1400 audit(2000000601.301:24827): avc: denied { search } for pid=4659 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 948.218307][ T29] audit: type=1400 audit(2000000601.301:24828): avc: denied { append } for pid=4659 comm="syslogd" name="messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 948.218366][ T29] audit: type=1400 audit(2000000601.301:24829): avc: denied { append open } for pid=4659 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 948.253165][ T29] audit: type=1400 audit(2000000601.341:24830): avc: denied { getattr } for pid=4659 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 948.416413][ T29] audit: type=1400 audit(2000000601.501:24831): avc: denied { mounton } for pid=18349 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 948.447469][ T29] audit: type=1400 audit(2000000601.531:24832): avc: denied { mount } for pid=18349 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 948.464965][ T29] audit: type=1400 audit(2000000601.551:24833): avc: denied { create } for pid=18349 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 948.481683][ T29] audit: type=1400 audit(2000000601.571:24834): avc: denied { read write } for pid=18349 comm="syz-executor" name="vhci" dev="devtmpfs" ino=1078 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 948.546192][T14048] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1 [ 948.558846][T14048] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9 [ 948.560822][T14048] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9 [ 948.562182][T14048] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4 [ 948.563085][T14048] Bluetooth: hci6: unexpected cc 0x0c25 length: 249 > 3 [ 948.563541][T14048] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2 [ 950.064017][T18026] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1 [ 950.100230][T18026] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9 [ 950.103949][T18026] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9 [ 950.107445][T18026] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4 [ 950.118723][T18026] Bluetooth: hci7: unexpected cc 0x0c25 length: 249 > 3 [ 950.119225][T18026] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2 [ 950.691044][T14048] Bluetooth: hci6: command tx timeout [ 951.844125][T18026] Bluetooth: hci8: unexpected cc 0x0c03 length: 249 > 1 [ 951.847724][T18026] Bluetooth: hci8: unexpected cc 0x1003 length: 249 > 9 [ 951.866207][T18026] Bluetooth: hci8: unexpected cc 0x1001 length: 249 > 9 [ 951.877653][T18026] Bluetooth: hci8: unexpected cc 0x0c23 length: 249 > 4 [ 951.878731][T18026] Bluetooth: hci8: unexpected cc 0x0c25 length: 249 > 3 [ 951.879214][T18026] Bluetooth: hci8: unexpected cc 0x0c38 length: 249 > 2 [ 952.208037][T18026] Bluetooth: hci7: command tx timeout [ 952.768363][T18026] Bluetooth: hci6: command tx timeout [ 953.184720][ T29] kauditd_printk_skb: 57 callbacks suppressed [ 953.184742][ T29] audit: type=1400 audit(2000000606.251:24892): avc: denied { recv } for pid=18261 comm="kworker/0:0" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 953.303598][ T29] audit: type=1400 audit(2000000606.371:24893): avc: denied { read } for pid=4659 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 953.303668][ T29] audit: type=1400 audit(2000000606.371:24894): avc: denied { search } for pid=4659 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 953.303733][ T29] audit: type=1400 audit(2000000606.381:24895): avc: denied { append } for pid=4659 comm="syslogd" name="messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 953.303794][ T29] audit: type=1400 audit(2000000606.381:24896): avc: denied { append open } for pid=4659 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 953.303854][ T29] audit: type=1400 audit(2000000606.381:24897): avc: denied { getattr } for pid=4659 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 953.555098][ T29] audit: type=1400 audit(2000000606.621:24898): avc: denied { recv } for pid=18261 comm="kworker/0:0" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 953.884953][ T29] audit: type=1400 audit(2000000606.951:24899): avc: denied { recv } for pid=18261 comm="kworker/0:0" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 953.925637][ T29] audit: type=1400 audit(2000000607.001:24900): avc: denied { read } for pid=4659 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 953.925706][ T29] audit: type=1400 audit(2000000607.011:24901): avc: denied { search } for pid=4659 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 953.968436][T18026] Bluetooth: hci8: command tx timeout [ 954.288061][T18026] Bluetooth: hci7: command tx timeout [ 954.850387][T18026] Bluetooth: hci6: command tx timeout [ 956.054576][T18026] Bluetooth: hci8: command tx timeout [ 956.368043][T18026] Bluetooth: hci7: command tx timeout [ 956.929269][T18026] Bluetooth: hci6: command tx timeout [ 958.135596][T18026] Bluetooth: hci8: command tx timeout [ 958.197668][ T29] kauditd_printk_skb: 34 callbacks suppressed [ 958.197687][ T29] audit: type=1400 audit(2000000611.281:24936): avc: denied { read } for pid=4659 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 958.199934][ T29] audit: type=1400 audit(2000000611.291:24937): avc: denied { search } for pid=4659 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 958.201897][ T29] audit: type=1400 audit(2000000611.291:24938): avc: denied { append } for pid=4659 comm="syslogd" name="messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 958.204008][ T29] audit: type=1400 audit(2000000611.291:24939): avc: denied { append open } for pid=4659 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 958.206107][ T29] audit: type=1400 audit(2000000611.291:24940): avc: denied { getattr } for pid=4659 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 958.444664][ T29] audit: type=1400 audit(2000000611.522:24941): avc: denied { recv } for pid=18261 comm="kworker/0:0" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 958.448016][T18026] Bluetooth: hci7: command tx timeout [ 958.637217][ T29] audit: type=1400 audit(2000000611.722:24942): avc: denied { recv } for pid=18261 comm="kworker/0:0" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 959.944734][ T29] audit: type=1400 audit(2000000613.022:24943): avc: denied { recv } for pid=18261 comm="kworker/0:0" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 959.994254][ T29] audit: type=1400 audit(2000000613.072:24944): avc: denied { read } for pid=4659 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 960.035368][ T29] audit: type=1400 audit(2000000613.102:24945): avc: denied { search } for pid=4659 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 960.207980][T18026] Bluetooth: hci8: command tx timeout [ 960.942968][ T19] rcu: INFO: rcu_preempt detected expedited stalls on CPUs/tasks: { 0-.... } 2665 jiffies s: 14657 root: 0x1/. [ 960.943023][ T19] rcu: blocking rcu_node structures (internal RCU debug): [ 960.943050][ T19] Sending NMI from CPU 1 to CPUs 0: [ 960.943081][ C0] NMI backtrace for cpu 0 [ 960.943102][ C0] CPU: 0 UID: 0 PID: 18261 Comm: kworker/0:0 Not tainted 6.11.0-syzkaller-02574-ga430d95c5efa #0 [ 960.943133][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 960.943151][ C0] Workqueue: events request_firmware_work_func [ 960.943189][ C0] RIP: 0010:__sanitizer_cov_trace_pc+0x1e/0x70 [ 960.943235][ C0] Code: 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 65 48 8b 15 d4 ff 77 7e 65 8b 05 d5 ff 77 7e a9 00 01 ff 00 48 8b 34 24 74 1d c4 01 74 43 a9 00 00 0f 00 75 3c a9 00 00 f0 00 75 35 8b 82 1c SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 960.943260][ C0] RSP: 0018:ffffc900000063d0 EFLAGS: 00000006 [ 960.943280][ C0] RAX: 0000000000010102 RBX: ffffc90000006458 RCX: ffffffff813d0689 [ 960.943299][ C0] RDX: ffff88807c2cda00 RSI: ffffffff813d1253 RDI: 0000000000000001 [ 960.943316][ C0] RBP: 0000000000000002 R08: 0000000000000001 R09: 0000000000000004 [ 960.943332][ C0] R10: 0000000000000003 R11: 0000000000000000 R12: ffffffff9161cebc [ 960.943349][ C0] R13: ffffc90000006ed8 R14: ffffffff9161cec0 R15: 0000000000000003 [ 960.943366][ C0] FS: 0000000000000000(0000) GS:ffff8880b8800000(0000) knlGS:0000000000000000 [ 960.943392][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 960.943410][ C0] CR2: 0000001b31e06ff8 CR3: 000000000db7c000 CR4: 00000000003506f0 [ 960.943427][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 960.943443][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 960.943460][ C0] Call Trace: [ 960.943468][ C0] [ 960.943478][ C0] ? show_regs+0x8c/0xa0 [ 960.943518][ C0] ? nmi_cpu_backtrace+0x1d8/0x390 [ 960.943559][ C0] ? nmi_cpu_backtrace_handler+0xc/0x20 [ 960.943596][ C0] ? nmi_handle+0x1a9/0x5c0 [ 960.943622][ C0] ? __sanitizer_cov_trace_pc+0x1e/0x70 [ 960.943664][ C0] ? default_do_nmi+0x6a/0x160 [ 960.943698][ C0] ? exc_nmi+0x170/0x1e0 [ 960.943730][ C0] ? end_repeat_nmi+0xf/0x53 [ 960.943759][ C0] ? unwind_next_frame+0x789/0x23a0 [ 960.943785][ C0] ? unwind_next_frame+0x1353/0x23a0 [ 960.943813][ C0] ? __sanitizer_cov_trace_pc+0x1e/0x70 [ 960.943855][ C0] ? __sanitizer_cov_trace_pc+0x1e/0x70 [ 960.943899][ C0] ? __sanitizer_cov_trace_pc+0x1e/0x70 [ 960.943947][ C0] [ 960.943955][ C0] [ 960.943963][ C0] unwind_next_frame+0x1353/0x23a0 [ 960.943991][ C0] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 960.944036][ C0] ? __pfx_stack_trace_consume_entry+0x10/0x10 [ 960.944071][ C0] arch_stack_walk+0x100/0x170 [ 960.944104][ C0] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 960.944151][ C0] stack_trace_save+0x95/0xd0 [ 960.944184][ C0] ? __pfx_stack_trace_save+0x10/0x10 [ 960.944218][ C0] ? hlock_class+0x4e/0x130 [ 960.944248][ C0] ? __lock_acquire+0x1620/0x3cb0 [ 960.944289][ C0] kasan_save_stack+0x33/0x60 [ 960.944329][ C0] ? kasan_save_stack+0x33/0x60 [ 960.944368][ C0] ? kasan_save_track+0x14/0x30 [ 960.944406][ C0] ? __kasan_kmalloc+0xaa/0xb0 [ 960.944444][ C0] ? dummy_urb_enqueue+0x8d/0x8a0 [ 960.944483][ C0] ? usb_hcd_submit_urb+0x2d1/0x2090 [ 960.944523][ C0] ? usb_submit_urb+0x87c/0x1730 [ 960.944551][ C0] ? ath9k_hif_usb_reg_in_cb+0x500/0x720 [ 960.944583][ C0] ? __usb_hcd_giveback_urb+0x389/0x6e0 [ 960.944622][ C0] ? usb_hcd_giveback_urb+0x396/0x450 [ 960.944661][ C0] ? dummy_timer+0x17c3/0x38d0 [ 960.944699][ C0] ? __hrtimer_run_queues+0x20c/0xcc0 [ 960.944728][ C0] ? hrtimer_interrupt+0x31b/0x800 [ 960.944757][ C0] ? __sysvec_apic_timer_interrupt+0x10f/0x450 [ 960.944784][ C0] ? sysvec_apic_timer_interrupt+0x43/0xb0 [ 960.944824][ C0] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 960.944891][ C0] kasan_save_track+0x14/0x30 [ 960.944935][ C0] __kasan_kmalloc+0xaa/0xb0 [ 960.944976][ C0] dummy_urb_enqueue+0x8d/0x8a0 [ 960.945015][ C0] ? usb_hcd_map_urb_for_dma+0x39e/0x1190 [ 960.945060][ C0] usb_hcd_submit_urb+0x2d1/0x2090 [ 960.945106][ C0] ? __pfx_usb_hcd_submit_urb+0x10/0x10 [ 960.945147][ C0] ? lock_acquire+0x1b1/0x560 [ 960.945189][ C0] ? __pfx_lock_acquire+0x10/0x10 [ 960.945227][ C0] ? find_held_lock+0x2d/0x110 [ 960.945260][ C0] ? ath9k_hif_usb_reg_in_cb+0x4f3/0x720 [ 960.945296][ C0] usb_submit_urb+0x87c/0x1730 [ 960.945328][ C0] ? do_raw_spin_unlock+0x172/0x230 [ 960.945357][ C0] ath9k_hif_usb_reg_in_cb+0x500/0x720 [ 960.945393][ C0] __usb_hcd_giveback_urb+0x389/0x6e0 [ 960.945437][ C0] usb_hcd_giveback_urb+0x396/0x450 [ 960.945481][ C0] dummy_timer+0x17c3/0x38d0 [ 960.945523][ C0] ? debug_object_deactivate+0x1f0/0x370 [ 960.945555][ C0] ? __pfx___lock_acquire+0x10/0x10 [ 960.945601][ C0] ? __hrtimer_run_queues+0x5a7/0xcc0 [ 960.945630][ C0] ? __pfx_lock_release+0x10/0x10 [ 960.945670][ C0] ? __pfx_dummy_timer+0x10/0x10 [ 960.945709][ C0] ? timerqueue_del+0x83/0x150 [ 960.945748][ C0] ? __pfx_dummy_timer+0x10/0x10 [ 960.945786][ C0] __hrtimer_run_queues+0x20c/0xcc0 [ 960.945821][ C0] ? __pfx___hrtimer_run_queues+0x10/0x10 [ 960.945851][ C0] ? ktime_get_update_offsets_now+0x201/0x310 [ 960.945896][ C0] hrtimer_interrupt+0x31b/0x800 [ 960.945938][ C0] __sysvec_apic_timer_interrupt+0x10f/0x450 [ 960.945968][ C0] sysvec_apic_timer_interrupt+0x43/0xb0 [ 960.946008][ C0] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 960.946051][ C0] RIP: 0010:write_comp_data+0x11/0x90 [ 960.946093][ C0] Code: cc cc cc cc 0f 1f 44 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 49 89 d2 49 89 f8 49 89 f1 65 48 8b 15 4f ff 77 7e <65> 8b 05 50 ff 77 7e a9 00 01 ff 00 74 1d f6 c4 01 74 67 a9 00 00 [ 960.946119][ C0] RSP: 0018:ffffc90000006f88 EFLAGS: 00000246 [ 960.946138][ C0] RAX: 0000000000000000 RBX: ffff888078c626a8 RCX: ffffffff897bfa4f [ 960.946155][ C0] RDX: ffff88807c2cda00 RSI: 0000000000000000 RDI: 0000000000000005 [ 960.946172][ C0] RBP: 0000000000000003 R08: 0000000000000005 R09: 0000000000000000 [ 960.946187][ C0] R10: 0000000000000003 R11: 0000000000000000 R12: ffff888078c626c0 [ 960.946204][ C0] R13: 000000009e88907d R14: ffff888078c62670 R15: dffffc0000000000 [ 960.946227][ C0] ? __inet_lookup_established+0x43f/0x800 [ 960.946266][ C0] __inet_lookup_established+0x43f/0x800 [ 960.946307][ C0] ? __pfx___inet_lookup_established+0x10/0x10 [ 960.946349][ C0] tcp_v4_rcv+0x1d68/0x4390 [ 960.946395][ C0] ? __pfx_tcp_v4_rcv+0x10/0x10 [ 960.946431][ C0] ? __pfx_raw_local_deliver+0x10/0x10 [ 960.946464][ C0] ? nf_hook.constprop.0+0x467/0x750 [ 960.946502][ C0] ? __pfx_tcp_v4_rcv+0x10/0x10 [ 960.946535][ C0] ip_protocol_deliver_rcu+0xba/0x4c0 [ 960.946576][ C0] ip_local_deliver_finish+0x316/0x570 [ 960.946616][ C0] ip_local_deliver+0x18e/0x1f0 [ 960.946655][ C0] ip_sublist_rcv_finish+0x2c1/0x620 [ 960.946692][ C0] ? __pfx_ip_local_deliver+0x10/0x10 [ 960.946732][ C0] ip_list_rcv_finish.constprop.0+0x559/0x720 [ 960.946776][ C0] ? __pfx_ip_list_rcv_finish.constprop.0+0x10/0x10 [ 960.946823][ C0] ip_list_rcv+0x339/0x450 [ 960.946863][ C0] ? __pfx_ip_list_rcv+0x10/0x10 [ 960.946899][ C0] ? find_held_lock+0x2d/0x110 [ 960.946932][ C0] ? __pfx___lock_acquire+0x10/0x10 [ 960.946972][ C0] ? __pfx_ip_list_rcv+0x10/0x10 [ 960.947009][ C0] __netif_receive_skb_list_core+0x755/0x950 [ 960.947048][ C0] ? __pfx___netif_receive_skb_list_core+0x10/0x10 [ 960.947080][ C0] ? timekeeping_debug_get_ns+0x334/0x5b0 [ 960.947126][ C0] netif_receive_skb_list_internal+0x753/0xdb0 [ 960.947160][ C0] ? __rcu_read_unlock+0x251/0x580 [ 960.947193][ C0] ? __pfx_netif_receive_skb_list_internal+0x10/0x10 [ 960.947227][ C0] ? dev_gro_receive+0x292/0x2ce0 [ 960.947258][ C0] ? eth_type_trans+0x2f7/0x740 [ 960.947294][ C0] napi_gro_receive+0xa16/0xc60 [ 960.947326][ C0] virtnet_receive_done+0xa6c/0x1a00 [ 960.947371][ C0] ? __pfx_virtnet_receive_done+0x10/0x10 [ 960.947415][ C0] receive_buf+0x4d9/0x31f0 [ 960.947462][ C0] ? __free_old_xmit+0x3db/0x5e0 [ 960.947491][ C0] ? find_held_lock+0x2d/0x110 [ 960.947521][ C0] ? __pfx_receive_buf+0x10/0x10 [ 960.947561][ C0] ? __pfx___free_old_xmit+0x10/0x10 [ 960.947591][ C0] ? detach_buf_split+0x5a0/0x770 [ 960.947632][ C0] ? virtqueue_get_buf_ctx_split+0x428/0x750 [ 960.947675][ C0] virtnet_poll+0x107c/0x3ba0 [ 960.947720][ C0] ? hlock_class+0x4e/0x130 [ 960.947748][ C0] ? __lock_acquire+0x1620/0x3cb0 [ 960.947792][ C0] ? hlock_class+0x4e/0x130 [ 960.947822][ C0] ? __pfx_virtnet_poll+0x10/0x10 [ 960.947862][ C0] ? __pfx___lock_acquire+0x10/0x10 [ 960.947907][ C0] ? lock_acquire+0x1b1/0x560 [ 960.947957][ C0] ? __pfx_call_timer_fn+0x10/0x10 [ 960.948000][ C0] __napi_poll.constprop.0+0xb7/0x550 [ 960.948035][ C0] net_rx_action+0xa92/0x1010 [ 960.948068][ C0] ? tmigr_handle_remote+0x153/0xdd0 [ 960.948101][ C0] ? __pfx_net_rx_action+0x10/0x10 [ 960.948131][ C0] ? __pfx_tmigr_handle_remote+0x10/0x10 [ 960.948160][ C0] ? run_timer_base+0x119/0x190 [ 960.948209][ C0] ? run_timer_base+0x11e/0x190 [ 960.948246][ C0] ? __pfx_run_timer_base+0x10/0x10 [ 960.948289][ C0] handle_softirqs+0x216/0x8f0 [ 960.948322][ C0] ? __pfx_handle_softirqs+0x10/0x10 [ 960.948355][ C0] irq_exit_rcu+0xbb/0x120 [ 960.948384][ C0] sysvec_apic_timer_interrupt+0x95/0xb0 [ 960.948424][ C0] [ 960.948433][ C0] [ 960.948441][ C0] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 960.948484][ C0] RIP: 0010:console_flush_all+0xa19/0xd70 [ 960.948532][ C0] Code: e8 8c 6c 26 00 9c 5b 81 e3 00 02 00 00 31 ff 48 89 de e8 6a 24 1f 00 48 85 db 0f 85 8b 01 00 00 e8 ec 21 1f 00 fb 48 8b 04 24 <4c> 89 fa 83 e2 07 0f b6 00 38 d0 7f 08 84 c0 0f 85 a9 02 00 00 41 [ 960.948556][ C0] RSP: 0018:ffffc90009e875d8 EFLAGS: 00000293 [ 960.948575][ C0] RAX: fffff520013d0ee2 RBX: 0000000000000000 RCX: ffffffff816cb6e6 [ 960.948592][ C0] RDX: ffff88807c2cda00 RSI: ffffffff816cb6f4 RDI: 0000000000000007 [ 960.948609][ C0] RBP: dffffc0000000000 R08: 0000000000000007 R09: 0000000000000000 [ 960.948627][ C0] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000200 [ 960.948643][ C0] R13: ffffffff8ea78d78 R14: ffffffff8ea78d20 R15: ffffc90009e87710 [ 960.948666][ C0] ? console_flush_all+0xa06/0xd70 [ 960.948694][ C0] ? console_flush_all+0xa14/0xd70 [ 960.948726][ C0] ? console_flush_all+0xa14/0xd70 [ 960.948759][ C0] ? __pfx_console_flush_all+0x10/0x10 [ 960.948792][ C0] ? __pfx_lock_acquire+0x10/0x10 [ 960.948833][ C0] console_unlock+0xae/0x290 [ 960.948861][ C0] ? __pfx_console_unlock+0x10/0x10 [ 960.948889][ C0] ? mark_held_locks+0x9f/0xe0 [ 960.948932][ C0] ? dev_printk_emit+0xfb/0x140 [ 960.948970][ C0] vprintk_emit+0x409/0x600 [ 960.949001][ C0] dev_printk_emit+0xfb/0x140 [ 960.949035][ C0] ? __pfx_dev_printk_emit+0x10/0x10 [ 960.949072][ C0] ? lock_acquire+0x1b1/0x560 [ 960.949114][ C0] ? __wait_for_common+0x2cf/0x5f0 [ 960.949139][ C0] ? __pfx_lock_release+0x10/0x10 [ 960.949183][ C0] __dev_printk+0xf5/0x270 [ 960.949223][ C0] _dev_err+0xe5/0x120 [ 960.949260][ C0] ? __pfx__dev_err+0x10/0x10 [ 960.949303][ C0] ? do_init_timer+0xc9/0x110 [ 960.949337][ C0] ? ath9k_htc_wait_for_target+0xc9/0x1c0 [ 960.949371][ C0] ath9k_htc_wait_for_target+0x185/0x1c0 [ 960.949403][ C0] ath9k_htc_probe_device+0x185/0x2660 [ 960.949437][ C0] ? ath9k_hif_usb_alloc_urbs+0xae4/0x1020 [ 960.949472][ C0] ? __pfx_ath9k_htc_probe_device+0x10/0x10 [ 960.949505][ C0] ? usb_submit_urb+0x883/0x1730 [ 960.949537][ C0] ? usb_free_urb.part.0+0x3e/0x100 [ 960.949565][ C0] ? usb_free_urb+0x1f/0x30 [ 960.949591][ C0] ? ath9k_hif_usb_alloc_urbs+0xbc5/0x1020 [ 960.949627][ C0] ath9k_htc_hw_init+0x33/0x70 [ 960.949659][ C0] ath9k_hif_usb_firmware_cb+0x272/0x620 [ 960.949697][ C0] ? __pfx_ath9k_hif_usb_firmware_cb+0x10/0x10 [ 960.949731][ C0] request_firmware_work_func+0x13a/0x250 [ 960.949765][ C0] ? __pfx_request_firmware_work_func+0x10/0x10 [ 960.949805][ C0] process_one_work+0x9c5/0x1b40 [ 960.949837][ C0] ? __pfx_kernfs_notify_workfn+0x10/0x10 [ 960.949869][ C0] ? __pfx_process_one_work+0x10/0x10 [ 960.949917][ C0] ? assign_work+0x1a0/0x250 [ 960.949961][ C0] worker_thread+0x6c8/0xf00 [ 960.949994][ C0] ? __pfx_worker_thread+0x10/0x10 [ 960.950019][ C0] kthread+0x2c1/0x3a0 [ 960.950049][ C0] ? _raw_spin_unlock_irq+0x23/0x50 [ 960.950088][ C0] ? __pfx_kthread+0x10/0x10 [ 960.950119][ C0] ret_from_fork+0x45/0x80 [ 960.950158][ C0] ? __pfx_kthread+0x10/0x10 [ 960.950188][ C0] ret_from_fork_asm+0x1a/0x30 [ 960.950236][ C0] [ 963.743260][ T29] kauditd_printk_skb: 42 callbacks suppressed [ 963.743281][ T29] audit: type=1400 audit(2000000616.772:24988): avc: denied { recv } for pid=18261 comm="kworker/0:0" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 963.761236][ T29] audit: type=1400 audit(2000000616.852:24989): avc: denied { read } for pid=4659 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 963.807732][ T29] audit: type=1400 audit(2000000616.882:24990): avc: denied { search } for pid=4659 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 963.809804][ T29] audit: type=1400 audit(2000000616.902:24991): avc: denied { append } for pid=4659 comm="syslogd" name="messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 963.819499][ T29] audit: type=1400 audit(2000000616.912:24992): avc: denied { append open } for pid=4659 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 963.821642][ T29] audit: type=1400 audit(2000000616.912:24993): avc: denied { getattr } for pid=4659 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 964.032182][ T29] audit: type=1400 audit(2000000617.122:24994): avc: denied { mounton } for pid=18358 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 964.035377][ T29] audit: type=1400 audit(2000000617.122:24995): avc: denied { mount } for pid=18358 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 964.047572][ T29] audit: type=1400 audit(2000000617.132:24996): avc: denied { create } for pid=18358 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 964.047638][ T29] audit: type=1400 audit(2000000617.132:24997): avc: denied { read write } for pid=18358 comm="syz-executor" name="vhci" dev="devtmpfs" ino=1078 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 964.106963][T14048] Bluetooth: hci9: unexpected cc 0x0c03 length: 249 > 1 [ 964.124934][T14048] Bluetooth: hci9: unexpected cc 0x1003 length: 249 > 9 [ 964.126171][T14048] Bluetooth: hci9: unexpected cc 0x1001 length: 249 > 9 [ 964.128699][T14048] Bluetooth: hci9: unexpected cc 0x0c23 length: 249 > 4 [ 964.129645][T14048] Bluetooth: hci9: unexpected cc 0x0c25 length: 249 > 3 [ 964.130765][T14048] Bluetooth: hci9: unexpected cc 0x0c38 length: 249 > 2 [ 966.224645][T18360] Bluetooth: hci9: command tx timeout [ 968.292449][T18360] Bluetooth: hci9: command tx timeout [ 969.044024][ T29] kauditd_printk_skb: 41 callbacks suppressed [ 969.044043][ T29] audit: type=1400 audit(2000000622.112:25039): avc: denied { recv } for pid=18261 comm="kworker/0:0" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 969.110637][ T29] audit: type=1400 audit(2000000622.202:25040): avc: denied { read } for pid=4659 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 969.134739][ T29] audit: type=1400 audit(2000000622.222:25041): avc: denied { search } for pid=4659 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 969.134809][ T29] audit: type=1400 audit(2000000622.222:25042): avc: denied { append } for pid=4659 comm="syslogd" name="messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 969.134868][ T29] audit: type=1400 audit(2000000622.222:25043): avc: denied { append open } for pid=4659 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 969.134927][ T29] audit: type=1400 audit(2000000622.222:25044): avc: denied { getattr } for pid=4659 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 969.326450][ T29] audit: type=1400 audit(2000000622.402:25045): avc: denied { recv } for pid=18261 comm="kworker/0:0" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 969.531834][ T29] audit: type=1400 audit(2000000622.612:25046): avc: denied { recv } for pid=18261 comm="kworker/0:0" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 969.738889][ T29] audit: type=1400 audit(2000000622.802:25047): avc: denied { recv } for pid=18261 comm="kworker/0:0" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 970.039969][ T29] audit: type=1400 audit(2000000623.122:25048): avc: denied { recv } for pid=18261 comm="kworker/0:0" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 970.370055][T18360] Bluetooth: hci9: command tx timeout [ 972.447464][T18360] Bluetooth: hci9: command tx timeout [ 974.172692][ T29] kauditd_printk_skb: 26 callbacks suppressed [ 974.172712][ T29] audit: type=1400 audit(2000000627.252:25075): avc: denied { recv } for pid=18261 comm="kworker/0:0" saddr=10.128.0.169 src=33806 daddr=10.128.1.61 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 974.296842][ T29] audit: type=1400 audit(2000000627.362:25076): avc: denied { read } for pid=4659 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 974.296921][ T29] audit: type=1400 audit(2000000627.372:25077): avc: denied { search } for pid=4659 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 974.296980][ T29] audit: type=1400 audit(2000000627.372:25078): avc: denied { append } for pid=4659 comm="syslogd" name="messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 974.297040][ T29] audit: type=1400 audit(2000000627.372:25079): avc: denied { append open } for pid=4659 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 974.297099][ T29] audit: type=1400 audit(2000000627.372:25080): avc: denied { getattr } for pid=4659 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 974.474111][ T29] audit: type=1400 audit(2000000627.552:25081): avc: denied { recv } for pid=18261 comm="kworker/0:0" saddr=10.128.0.169 src=33806 daddr=10.128.1.61 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 974.786418][ T29] audit: type=1400 audit(2000000627.862:25082): avc: denied { recv } for pid=18261 comm="kworker/0:0" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 975.063576][ T29] audit: type=1400 audit(2000000628.142:25083): avc: denied { recv } for pid=18261 comm="kworker/0:0" saddr=10.128.0.169 src=33806 daddr=10.128.1.61 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 975.084433][ T29] audit: type=1400 audit(2000000628.162:25084): avc: denied { read } for pid=4659 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 979.344758][ T29] kauditd_printk_skb: 22 callbacks suppressed [ 979.344778][ T29] audit: type=1400 audit(2000000632.423:25107): avc: denied { recv } for pid=18261 comm="kworker/0:0" saddr=10.128.0.169 src=33806 daddr=10.128.1.61 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 979.413822][ T29] audit: type=1400 audit(2000000632.493:25108): avc: denied { read } for pid=4659 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 979.428053][ T29] audit: type=1400 audit(2000000632.513:25109): avc: denied { search } for pid=4659 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 979.428122][ T29] audit: type=1400 audit(2000000632.513:25110): avc: denied { append } for pid=4659 comm="syslogd" name="messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 979.457132][ T29] audit: type=1400 audit(2000000632.533:25111): avc: denied { append open } for pid=4659 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 979.486741][ T29] audit: type=1400 audit(2000000632.573:25112): avc: denied { getattr } for pid=4659 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 979.656355][ T29] audit: type=1400 audit(2000000632.733:25113): avc: denied { recv } for pid=18261 comm="kworker/0:0" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 979.866257][ T29] audit: type=1400 audit(2000000632.943:25114): avc: denied { recv } for pid=18261 comm="kworker/0:0" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 980.065173][ T29] audit: type=1400 audit(2000000633.133:25115): avc: denied { recv } for pid=18261 comm="kworker/0:0" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 980.098655][ T29] audit: type=1400 audit(2000000633.183:25116): avc: denied { read } for pid=4659 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 984.395899][ T29] kauditd_printk_skb: 19 callbacks suppressed [ 984.395919][ T29] audit: type=1400 audit(2000000637.473:25136): avc: denied { recv } for pid=18261 comm="kworker/0:0" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 984.489823][ T29] audit: type=1400 audit(2000000637.563:25137): avc: denied { read } for pid=4659 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 984.489897][ T29] audit: type=1400 audit(2000000637.563:25138): avc: denied { search } for pid=4659 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 984.489956][ T29] audit: type=1400 audit(2000000637.563:25139): avc: denied { append } for pid=4659 comm="syslogd" name="messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 984.490015][ T29] audit: type=1400 audit(2000000637.563:25140): avc: denied { append open } for pid=4659 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 984.512587][ T29] audit: type=1400 audit(2000000637.603:25141): avc: denied { getattr } for pid=4659 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 984.848434][ T29] audit: type=1400 audit(2000000637.923:25142): avc: denied { recv } for pid=18261 comm="kworker/0:0" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 985.024375][ T29] audit: type=1400 audit(2000000638.113:25143): avc: denied { execmem } for pid=18361 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 985.134668][ T1169] usb 1-1: USB disconnect, device number 102 [ 985.526507][ T29] audit: type=1400 audit(2000000638.283:25144): avc: denied { recv } for pid=1169 comm="kworker/0:2" saddr=10.128.0.169 src=30006 daddr=10.128.1.61 dest=43772 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 985.565530][T18261] ath9k_htc: Failed to initialize the device [ 985.727677][ T29] audit: type=1400 audit(2000000638.773:25145): avc: denied { read } for pid=4659 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 988.839039][ T1169] usb 1-1: ath9k_htc: USB layer deinitialized [ 988.893134][T18343] netlink: 'syz.2.5970': attribute type 10 has an invalid length. [ 988.908810][T18343] batman_adv: batadv0: Adding interface: wlan0 [ 988.915167][T18343] batman_adv: batadv0: The MTU of interface wlan0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 988.988023][T18343] batman_adv: batadv0: Interface activated: wlan0 [ 989.288502][ T1169] usb 1-1: new high-speed USB device number 103 using dummy_hcd [ 990.914235][ T133] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 990.936555][ T29] kauditd_printk_skb: 36 callbacks suppressed [ 990.936573][ T29] audit: type=1400 audit(2000000644.023:25182): avc: denied { read } for pid=4659 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 990.964963][ T29] audit: type=1400 audit(2000000644.033:25183): avc: denied { read } for pid=4659 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 990.989731][ T29] audit: type=1400 audit(2000000644.033:25184): avc: denied { search } for pid=4659 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 991.015398][ T29] audit: type=1400 audit(2000000644.033:25185): avc: denied { append } for pid=4659 comm="syslogd" name="messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 991.040646][ T29] audit: type=1400 audit(2000000644.033:25186): avc: denied { append open } for pid=4659 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 991.076828][ T29] audit: type=1400 audit(2000000644.033:25187): avc: denied { getattr } for pid=4659 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 991.133877][ T133] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 991.224997][ T133] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 991.300664][ T133] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 991.423678][ T133] erspan0: left allmulticast mode [ 991.430836][ T133] erspan0: left promiscuous mode [ 991.436108][ T133] bridge0: port 2(erspan0) entered disabled state [ 991.449527][ T133] bridge_slave_0: left allmulticast mode [ 991.455180][ T133] bridge_slave_0: left promiscuous mode [ 991.468100][ T133] bridge0: port 1(bridge_slave_0) entered disabled state [ 992.151673][ T133] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 992.163508][ T133] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 992.177587][ T29] audit: type=1400 audit(2000000645.273:25188): avc: denied { read } for pid=4659 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 992.200662][ T29] audit: type=1400 audit(2000000645.283:25189): avc: denied { search } for pid=4659 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 992.239492][ T133] bond0 (unregistering): Released all slaves [ 992.245935][ T29] audit: type=1400 audit(2000000645.283:25190): avc: denied { append } for pid=4659 comm="syslogd" name="messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 992.268690][ T29] audit: type=1400 audit(2000000645.283:25191): avc: denied { append open } for pid=4659 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 992.560581][ T133] hsr_slave_0: left promiscuous mode [ 992.571685][ T133] hsr_slave_1: left promiscuous mode [ 992.581778][ T133] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 992.589470][ T133] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 992.598086][ T133] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 992.605511][ T133] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 992.631082][ T133] veth0_macvtap: left promiscuous mode [ 992.636966][ T133] veth1_vlan: left promiscuous mode [ 992.642248][ T133] : left promiscuous mode [ 992.773148][ T133] pim6reg (unregistering): left allmulticast mode [ 993.344149][ T133] team_slave_1 (unregistering): left allmulticast mode [ 993.369560][ T133] team0 (unregistering): Port device team_slave_1 removed [ 993.432069][ T133] C (unregistering): left allmulticast mode [ 993.441453][ T133] team0 (unregistering): Port device C removed [ 994.462110][ T133] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 994.561608][ T133] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 994.639442][ T133] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 994.699746][ T133] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 994.854027][ T133] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 994.950946][ T133] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 995.015056][ T133] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 995.094432][ T133] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 995.263983][ T133] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 995.341391][ T133] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 995.403396][ T133] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 995.483531][ T133] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 995.604109][ T133] bridge_slave_1: left allmulticast mode [ 995.609823][ T133] bridge_slave_1: left promiscuous mode [ 995.615621][ T133] bridge0: port 2(bridge_slave_1) entered disabled state [ 995.629302][ T133] bridge_slave_0: left allmulticast mode [ 995.634946][ T133] bridge_slave_0: left promiscuous mode [ 995.641106][ T133] bridge0: port 1(bridge_slave_0) entered disabled state [ 995.655079][ T133] bridge_slave_1: left allmulticast mode [ 995.661105][ T133] bridge_slave_1: left promiscuous mode [ 995.668234][ T133] bridge0: port 2(bridge_slave_1) entered disabled state [ 995.679082][ T133] bridge0: port 1(bridge_slave_0) entered disabled state [ 995.691220][ T133] bridge_slave_1: left allmulticast mode [ 995.698598][ T133] bridge_slave_1: left promiscuous mode [ 995.705484][ T133] bridge0: port 2(bridge_slave_1) entered disabled state [ 995.714737][ T133] bridge_slave_0: left allmulticast mode [ 995.720698][ T133] bridge_slave_0: left promiscuous mode [ 995.730292][ T133] bridge0: port 1(bridge_slave_0) entered disabled state [ 995.739686][ T133] bridge_slave_1: left allmulticast mode [ 995.745323][ T133] bridge_slave_1: left promiscuous mode [ 995.751398][ T133] bridge0: port 2(bridge_slave_1) entered disabled state [ 995.765204][ T133] bridge_slave_0: left allmulticast mode [ 995.770939][ T133] bridge_slave_0: left promiscuous mode [ 995.778254][ T133] bridge0: port 1(bridge_slave_0) entered disabled state