last executing test programs: 2m23.497560804s ago: executing program 2 (id=9744): mknodat$loop(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x6004, 0x1) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x4c01, 0x0) 2m23.45299693s ago: executing program 1 (id=9745): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440), 0x40, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CAP_SPLIT_IRQCHIP(r1, 0x4068aea3, &(0x7f0000000100)={0xcc, 0x0, 0x800000}) 2m23.15677088s ago: executing program 4 (id=9748): r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000980)={0x6}, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)={0x1c, 0x52, 0x1, 0x70b930, 0x25dfdbff, {0x1c}, [@typed={0x8, 0x2, 0x0, 0x0, @u32=0xfffffffe}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x20044884) 2m23.02644001s ago: executing program 2 (id=9749): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000001000000ff"], 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x4, 0x4, 0x9, 0x0, r0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018100000", @ANYRES32=r1, @ANYBLOB="0000000000000000b708000000000e007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000020850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 2m22.844418207s ago: executing program 1 (id=9751): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/unix\x00') preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000040)=""/136, 0x88}], 0x1, 0x8, 0xfffffffe) 2m22.829482174s ago: executing program 4 (id=9752): r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000000000105509147200ed0000000109022400010000000009040000030300000009210000000122050009058103"], 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, &(0x7f0000000100)={0x2c, &(0x7f0000000280)=ANY=[@ANYBLOB=' mO'], 0x0, 0x0, 0x0, 0x0}, 0x0) 2m22.585272168s ago: executing program 0 (id=9753): r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000001c0), 0x4) sendto$inet6(r0, &(0x7f00000000c0)='\x00', 0x1, 0x2004c051, &(0x7f0000000040)={0xa, 0x4e24, 0x5, @loopback, 0xa}, 0x1c) 2m22.347875413s ago: executing program 2 (id=9755): r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000380)='./binderfs/binder0\x00', 0x0, 0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f0000000200)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_FREEZE(r0, 0x400c620e, &(0x7f0000000140)={0x0, 0x1, 0x8}) 2m22.195929984s ago: executing program 1 (id=9757): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x2, 0x4, 0x1, 0xbf27, 0x500}, 0x48) mmap(&(0x7f0000fa2000/0x3000)=nil, 0x3000, 0x1, 0x13, r0, 0x0) mremap(&(0x7f0000fa4000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000fa2000/0x1000)=nil) 2m22.001827834s ago: executing program 0 (id=9758): socket$kcm(0x2, 0xa, 0x73) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], &(0x7f00000002c0)='syzkaller\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x5, 0xb68, 0x560b0000, &(0x7f0000000000)="259a53f271a76d2673004c6588a8", 0x0, 0xd01, 0x2a0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 2m21.851768777s ago: executing program 4 (id=9759): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f00000011c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000010c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010300000020000000ee15660000080006000200000018000180140002007665746830"], 0x34}}, 0x44800) 2m21.646442166s ago: executing program 0 (id=9761): r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000400)={[0xfffffffffffffff5]}, 0x8, 0x80000) ppoll(&(0x7f0000000200)=[{r0, 0x2020}], 0x1, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) 2m21.519039494s ago: executing program 2 (id=9762): r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f00000000c0)={0x8, 0x22, 0x205, 0x831a, 0x1, "03000000cb0b0e000800feffffbcd6ff0100", 0x808, 0x7fff}) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000000)=0x1) 2m21.438691468s ago: executing program 1 (id=9763): r0 = semget$private(0x0, 0x2, 0x0) semop(r0, &(0x7f0000000100)=[{0x1, 0x8, 0x1800}], 0x1) semctl$GETPID(r0, 0x1, 0xb, 0x0) 2m21.438044755s ago: executing program 3 (id=9764): r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, 0x0) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @broadcast}, {0x2, 0x0, @empty}, 0xab852ebbeefbd6b1, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x7}) 2m21.43322267s ago: executing program 4 (id=9765): r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000180)={0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f0000003c80)=[{{&(0x7f00000010c0)=@file={0x1, './file0\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x20000000}}, {{&(0x7f00000028c0)=@file={0x1, './file0\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x20004840}}], 0x2, 0x4040000) 2m21.180034202s ago: executing program 3 (id=9766): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="1400000015000103000000001c0000000a"], 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080), r0) 2m20.979944625s ago: executing program 4 (id=9767): r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000080)={0x11, @loopback, 0x15, 0x0, 'ovf\x00', 0x9, 0x4, 0x1c}, 0x2c) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000180)={0x2, 0x14, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) 2m20.858495911s ago: executing program 1 (id=9768): r0 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x3, @ipv4={'\x00', '\xff\xff', @local}, 0x2}, 0x1c) sendmmsg$inet6(r0, &(0x7f00000033c0)=[{{&(0x7f00000002c0)={0xa, 0x4e22, 0x1, @private2}, 0x1c, 0x0}}], 0x1, 0x4000000) 2m20.819283592s ago: executing program 2 (id=9769): r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000440)=ANY=[@ANYBLOB="120100002eab5a40401c3405cc6d010203010902120001000000000904"], 0x0) syz_usb_control_io$printer(r0, 0x0, 0x0) syz_usb_control_io$uac2(r0, 0x0, &(0x7f00000000c0)={0x44, &(0x7f0000000080)={0x40, 0x18, 0x4, "53582b13"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 2m20.791499596s ago: executing program 3 (id=9770): r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000080), 0x6) write(r0, &(0x7f0000000040)="05000000010003", 0x7) 2m19.127300087s ago: executing program 0 (id=9771): r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000140)={0x1f, 0xffff, 0x3}, 0x6) write(r0, &(0x7f00000000c0)="510003000000", 0x6) 2m17.405300068s ago: executing program 3 (id=9772): socket$kcm(0xa, 0x922000000003, 0x11) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000380)="48000000140081fb7059ae08060c04000aff0f03000004000011000000006fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8f", 0x48}], 0x1}, 0x0) 2m15.677807213s ago: executing program 4 (id=9773): r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x140, 0x82) r1 = fanotify_init(0x81, 0x40000) fanotify_mark(r1, 0x505, 0x40001032, r0, 0x0) 2m13.224797906s ago: executing program 2 (id=9774): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380), r0) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000200)={0x54, r1, 0x111, 0x70bd27, 0x25dfdbfd, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}, {0xffffffffffffffc1, 0xb, 0x9}, {0x6, 0x16, 0xfffa}, {0x5, 0x12, 0x1}}]}, 0x54}, 0x1, 0x0, 0x0, 0x804}, 0x0) 2m7.08726647s ago: executing program 0 (id=9775): capset(&(0x7f0000000080)={0x20080522}, &(0x7f0000000040)={0x0, 0x10ffff, 0xfffffffd}) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x189040, 0x2) truncate(&(0x7f0000000340)='./file1\x00', 0x20fffbfffc) 2m6.4986939s ago: executing program 1 (id=9776): r0 = syz_usb_connect$hid(0x2, 0x36, &(0x7f0000000500)=ANY=[@ANYBLOB="1201000000000040411215500000000000010902240001000000c609040007020300010009210000050122050009058103"], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, &(0x7f0000000440)={0x2c, &(0x7f0000000240)={0x40, 0x9, 0x17, {0x17, 0x30, "56e9f0fb940421473c7bab9d1fba00fc745db2b98d"}}, 0x0, 0x0, 0x0, 0x0}, 0x0) 2m6.365992098s ago: executing program 3 (id=9777): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x7, 0x0, 0x1, 0x10000}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x3}}, @call={0x85, 0x0, 0x0, 0x2a}]}, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000003c0)={r1, r0}, 0xc) 1m59.576525294s ago: executing program 32 (id=9773): r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x140, 0x82) r1 = fanotify_init(0x81, 0x40000) fanotify_mark(r1, 0x505, 0x40001032, r0, 0x0) 1m56.061785626s ago: executing program 33 (id=9774): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380), r0) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000200)={0x54, r1, 0x111, 0x70bd27, 0x25dfdbfd, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}, {0xffffffffffffffc1, 0xb, 0x9}, {0x6, 0x16, 0xfffa}, {0x5, 0x12, 0x1}}]}, 0x54}, 0x1, 0x0, 0x0, 0x804}, 0x0) 1m54.985120461s ago: executing program 0 (id=9780): r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000c80)={'veth1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000001200)={0x0, 0xfffffffffffffde6, &(0x7f0000000000)={&(0x7f00000002c0)=@newqdisc={0x40, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq={{0x7}, {0x14, 0x2, [@TCA_FQ_FLOW_DEFAULT_RATE={0x10, 0x11, 0xe}, @TCA_FQ_QUANTUM={0xfffffffffffffcf5, 0x3, 0x4002}]}}]}, 0x40}}, 0x0) 1m52.24206144s ago: executing program 3 (id=9781): syz_usb_connect(0x0, 0x24, &(0x7f0000000080)=ANY=[@ANYBLOB="120100008e88052086800095d89301020301090212000100000000090401"], 0x0) r0 = syz_open_dev$I2C(&(0x7f0000000040), 0x1, 0x2603) ioctl$I2C_RDWR(r0, 0x707, &(0x7f00000000c0)={&(0x7f00000003c0)=[{0x1e, 0x0, 0x0, 0x0}, {0x6, 0x0, 0x0, 0x0}], 0x2}) 1m47.021602565s ago: executing program 34 (id=9776): r0 = syz_usb_connect$hid(0x2, 0x36, &(0x7f0000000500)=ANY=[@ANYBLOB="1201000000000040411215500000000000010902240001000000c609040007020300010009210000050122050009058103"], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, &(0x7f0000000440)={0x2c, &(0x7f0000000240)={0x40, 0x9, 0x17, {0x17, 0x30, "56e9f0fb940421473c7bab9d1fba00fc745db2b98d"}}, 0x0, 0x0, 0x0, 0x0}, 0x0) 1m35.457842478s ago: executing program 35 (id=9780): r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000c80)={'veth1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000001200)={0x0, 0xfffffffffffffde6, &(0x7f0000000000)={&(0x7f00000002c0)=@newqdisc={0x40, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq={{0x7}, {0x14, 0x2, [@TCA_FQ_FLOW_DEFAULT_RATE={0x10, 0x11, 0xe}, @TCA_FQ_QUANTUM={0xfffffffffffffcf5, 0x3, 0x4002}]}}]}, 0x40}}, 0x0) 0s ago: executing program 36 (id=9781): syz_usb_connect(0x0, 0x24, &(0x7f0000000080)=ANY=[@ANYBLOB="120100008e88052086800095d89301020301090212000100000000090401"], 0x0) r0 = syz_open_dev$I2C(&(0x7f0000000040), 0x1, 0x2603) ioctl$I2C_RDWR(r0, 0x707, &(0x7f00000000c0)={&(0x7f00000003c0)=[{0x1e, 0x0, 0x0, 0x0}, {0x6, 0x0, 0x0, 0x0}], 0x2}) kernel console output (not intermixed with test programs): ti0: entered promiscuous mode [ 380.802267][T20417] netlink: 'syz.1.6328': attribute type 4 has an invalid length. [ 381.333327][T20454] vti0: entered promiscuous mode [ 382.034343][T20497] netlink: 'syz.3.6357': attribute type 4 has an invalid length. [ 382.055161][T20497] netlink: 152 bytes leftover after parsing attributes in process `syz.3.6357'. [ 382.088980][T20497] A link change request failed with some changes committed already. Interface bond0 may have been left with an inconsistent configuration, please check. [ 382.097121][T20501] ieee802154 phy0 wpan0: encryption failed: -90 [ 382.225975][T20508] netdevsim netdevsim2 netdevsim0: entered allmulticast mode [ 382.406690][ T30] kauditd_printk_skb: 702 callbacks suppressed [ 382.406708][ T30] audit: type=1400 audit(638.361:2330): avc: denied { getopt } for pid=20517 comm="syz.2.6367" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 382.468023][ T30] audit: type=1400 audit(638.371:2332): avc: denied { open } for pid=6425 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 382.491835][ T30] audit: type=1400 audit(638.371:2333): avc: denied { ioctl } for pid=6425 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=648 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 382.582497][ T30] audit: type=1400 audit(638.371:2331): avc: denied { read write } for pid=6429 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 382.659499][ T30] audit: type=1400 audit(638.411:2334): avc: denied { search } for pid=20518 comm="sed" name="resolv.conf" dev="tmpfs" ino=1842 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 382.733658][ T30] audit: type=1400 audit(638.421:2335): avc: denied { read } for pid=20518 comm="sed" name="eth0.dhcp" dev="tmpfs" ino=1883 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 382.823662][ T30] audit: type=1400 audit(638.421:2336): avc: denied { read open } for pid=20518 comm="sed" path="/run/dhcpcd/hook-state/resolv.conf/eth0.dhcp" dev="tmpfs" ino=1883 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 382.926302][ T30] audit: type=1400 audit(638.421:2337): avc: denied { getattr } for pid=20518 comm="sed" path="/run/dhcpcd/hook-state/resolv.conf/eth0.dhcp" dev="tmpfs" ino=1883 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 383.002215][ T30] audit: type=1400 audit(638.481:2338): avc: denied { prog_load } for pid=20521 comm="syz.0.6369" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 383.044475][T20543] audit: audit_backlog=65 > audit_backlog_limit=64 [ 383.075912][T20548] bond0: option active_slave: mode dependency failed, not supported in mode balance-rr(0) [ 383.307446][T20565] x_tables: ip_tables: DNAT target: used from hooks POSTROUTING, but only usable from PREROUTING/OUTPUT [ 383.318706][ T6378] usb 3-1: new high-speed USB device number 107 using dummy_hcd [ 383.429525][ T10] usb 5-1: new high-speed USB device number 114 using dummy_hcd [ 383.484369][ T6378] usb 3-1: New USB device found, idVendor=0582, idProduct=0582, bcdDevice= 0.40 [ 383.510506][ T6378] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 383.538265][ T6378] usb 3-1: Product: syz [ 383.567376][ T6378] usb 3-1: Manufacturer: syz [ 383.573049][ T6378] usb 3-1: SerialNumber: syz [ 383.601543][ T10] usb 5-1: Using ep0 maxpacket: 16 [ 383.629623][ T10] usb 5-1: config 0 has an invalid interface number: 105 but max is 0 [ 383.656349][ T10] usb 5-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 383.686936][ T10] usb 5-1: config 0 has no interface number 0 [ 383.717955][ T10] usb 5-1: New USB device found, idVendor=046d, idProduct=08d3, bcdDevice= b.28 [ 383.742645][ T10] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 383.771954][ T10] usb 5-1: Product: syz [ 383.785379][ T10] usb 5-1: Manufacturer: syz [ 383.802728][ T10] usb 5-1: SerialNumber: syz [ 383.824021][ T10] usb 5-1: config 0 descriptor?? [ 383.847830][ T10] uvcvideo 5-1:0.105: probe with driver uvcvideo failed with error -22 [ 383.867758][ T6378] usb 3-1: BAAD HEADSET ADAPTER c_chmask mismatch [ 383.984559][T20603] netlink: 'syz.0.6391': attribute type 3 has an invalid length. [ 384.021209][T20603] netlink: 'syz.0.6391': attribute type 3 has an invalid length. [ 384.035802][T20603] netlink: 'syz.0.6391': attribute type 3 has an invalid length. [ 384.051236][T20603] netlink: 'syz.0.6391': attribute type 3 has an invalid length. [ 384.062158][ T6378] snd-usb-audio 3-1:1.0: probe with driver snd-usb-audio failed with error -22 [ 384.074352][T20603] netlink: 'syz.0.6391': attribute type 3 has an invalid length. [ 384.084138][T20603] netlink: 'syz.0.6391': attribute type 3 has an invalid length. [ 384.113245][ T6378] usb 3-1: USB disconnect, device number 107 [ 384.133705][T20603] netlink: 'syz.0.6391': attribute type 3 has an invalid length. [ 384.177624][T20603] netlink: 'syz.0.6391': attribute type 3 has an invalid length. [ 384.202224][ T6403] usb 5-1: USB disconnect, device number 114 [ 384.205221][T20603] netlink: 'syz.0.6391': attribute type 3 has an invalid length. [ 384.254956][T20603] netlink: 'syz.0.6391': attribute type 3 has an invalid length. [ 384.283965][T20603] netlink: 'syz.0.6391': attribute type 3 has an invalid length. [ 384.322391][T20599] udevd[20599]: error opening ATTR{/sys/devices/platform/dummy_hcd.2/usb3/3-1/3-1:1.0/sound/card3/controlC3/../uevent} for writing: No such file or directory [ 384.612681][T20634] 8021q: adding VLAN 0 to HW filter on device bond5 [ 385.086099][T20701] netlink: 20 bytes leftover after parsing attributes in process `syz.4.6408'. [ 385.606044][T20739] libceph: resolve '0' (ret=-3): failed [ 385.658075][ T6403] usb 5-1: new high-speed USB device number 115 using dummy_hcd [ 385.772098][T20749] IPv6: NLM_F_REPLACE set, but no existing node found! [ 385.829907][ T6403] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 385.862903][ T6403] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 385.874378][T20753] netlink: 12 bytes leftover after parsing attributes in process `syz.3.6429'. [ 385.886537][ T6403] usb 5-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 385.908454][ T6403] usb 5-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 385.917755][ T6403] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 385.931939][ T6403] usb 5-1: config 0 descriptor?? [ 385.949394][ T6403] hub 5-1:0.0: USB hub found [ 386.161662][ T6403] hub 5-1:0.0: 9 ports detected [ 386.176771][ T6403] hub 5-1:0.0: insufficient power available to use all downstream ports [ 386.234460][T20773] Cannot find map_set index 135 as target [ 386.367831][ T6403] hub 5-1:0.0: hub_hub_status failed (err = -71) [ 386.398915][ T6403] hub 5-1:0.0: config failed, can't get hub status (err -71) [ 386.463631][ T6403] usb 5-1: USB disconnect, device number 115 [ 386.945153][T20823] netlink: 32 bytes leftover after parsing attributes in process `syz.3.6458'. [ 386.958538][T20823] netlink: 32 bytes leftover after parsing attributes in process `syz.3.6458'. [ 387.417564][ T30] kauditd_printk_skb: 706 callbacks suppressed [ 387.417580][ T30] audit: type=1400 audit(643.384:3043): avc: denied { read write } for pid=6429 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 387.484142][ T30] audit: type=1400 audit(643.414:3044): avc: denied { open } for pid=6429 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 387.543804][ T30] audit: type=1400 audit(643.414:3045): avc: denied { ioctl } for pid=6429 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=650 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 387.599387][T20853] netlink: 20 bytes leftover after parsing attributes in process `syz.4.6473'. [ 387.602485][ T30] audit: type=1400 audit(643.434:3046): avc: denied { read write } for pid=6425 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 387.618173][T20853] netlink: 20 bytes leftover after parsing attributes in process `syz.4.6473'. [ 387.634963][ T30] audit: type=1400 audit(643.434:3047): avc: denied { open } for pid=6425 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 387.708598][ T30] audit: type=1400 audit(643.434:3048): avc: denied { ioctl } for pid=6425 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=648 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 387.794434][ T30] audit: type=1400 audit(643.444:3049): avc: denied { read write } for pid=6424 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 387.867184][ T30] audit: type=1400 audit(643.444:3050): avc: denied { open } for pid=6424 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 387.936910][ T30] audit: type=1400 audit(643.444:3051): avc: denied { ioctl } for pid=6424 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=647 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 388.004087][ T30] audit: type=1400 audit(643.484:3052): avc: denied { read write } for pid=6430 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 388.726207][T20931] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 388.896608][ T6491] usb 5-1: new full-speed USB device number 116 using dummy_hcd [ 389.059143][ T6491] usb 5-1: too many endpoints for config 1 interface 0 altsetting 0: 255, using maximum allowed: 30 [ 389.095710][ T6491] usb 5-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 10 [ 389.118208][ T6491] usb 5-1: config 1 interface 0 altsetting 0 has 3 endpoint descriptors, different from the interface descriptor's value: 255 [ 389.136638][ T6491] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 389.145908][ T6491] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=1 [ 389.154904][ T6491] usb 5-1: SerialNumber: syz [ 389.474193][ T6491] cdc_acm 5-1:1.0: ttyACM0: USB ACM device [ 389.538980][ T6491] usb 5-1: USB disconnect, device number 116 [ 389.578056][T21027] validate_nla: 6 callbacks suppressed [ 389.578074][T21027] netlink: 'syz.0.6533': attribute type 10 has an invalid length. [ 389.659010][T21027] bridge0: port 1(netdevsim0) entered blocking state [ 389.686447][T21027] bridge0: port 1(netdevsim0) entered disabled state [ 389.706185][T21027] netdevsim netdevsim0 netdevsim0: entered allmulticast mode [ 389.728040][T21027] netdevsim netdevsim0 netdevsim0: entered promiscuous mode [ 389.782686][T21042] netlink: 8 bytes leftover after parsing attributes in process `syz.1.6538'. [ 389.797280][T21042] netlink: 8 bytes leftover after parsing attributes in process `syz.1.6538'. [ 390.185028][T21097] netlink: 8 bytes leftover after parsing attributes in process `syz.4.6550'. [ 390.544710][T21122] netlink: 'syz.3.6563': attribute type 3 has an invalid length. [ 390.574384][T21126] xt_TPROXY: Can be used only with -p tcp or -p udp [ 391.087788][T21157] netlink: 'syz.2.6578': attribute type 21 has an invalid length. [ 391.108132][T21159] tipc: Trying to set illegal importance in message [ 391.123861][T21157] netlink: 100 bytes leftover after parsing attributes in process `syz.2.6578'. [ 391.347192][T21176] netlink: 'syz.2.6587': attribute type 1 has an invalid length. [ 391.590358][T21193] Option ' ' to dns_resolver key: bad/missing value [ 391.650242][T21196] netlink: 4 bytes leftover after parsing attributes in process `syz.2.6598'. [ 391.922951][T21216] netlink: 64 bytes leftover after parsing attributes in process `syz.4.6607'. [ 391.943264][T21216] netlink: 64 bytes leftover after parsing attributes in process `syz.4.6607'. [ 392.133016][T21229] netlink: 'syz.4.6613': attribute type 3 has an invalid length. [ 392.288683][T21244] netlink: 'syz.0.6619': attribute type 58 has an invalid length. [ 392.428424][ T30] kauditd_printk_skb: 528 callbacks suppressed [ 392.428441][ T30] audit: type=1400 audit(648.396:3581): avc: denied { read write } for pid=6424 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 392.434748][ T6403] usb 2-1: new full-speed USB device number 84 using dummy_hcd [ 392.496198][ T30] audit: type=1400 audit(648.426:3582): avc: denied { open } for pid=6424 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 392.552017][ T30] audit: type=1400 audit(648.426:3583): avc: denied { ioctl } for pid=6424 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=647 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 392.597454][ T30] audit: type=1400 audit(648.456:3584): avc: denied { create } for pid=21254 comm="syz.2.6625" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 392.656911][ T30] audit: type=1400 audit(648.466:3585): avc: denied { write } for pid=21254 comm="syz.2.6625" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 392.688469][ T6403] usb 2-1: unable to get BOS descriptor or descriptor too short [ 392.701348][ T30] audit: type=1400 audit(648.466:3586): avc: denied { read write } for pid=6430 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 392.717224][ T6403] usb 2-1: not running at top speed; connect to a high speed hub [ 392.734147][ T30] audit: type=1400 audit(648.466:3587): avc: denied { read write open } for pid=6430 comm="syz-executor" path="/dev/loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 392.759313][ T6403] usb 2-1: New USB device found, idVendor=04b4, idProduct=0384, bcdDevice= 0.40 [ 392.778037][ T6403] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 392.801452][ T6403] usb 2-1: Product: syz [ 392.812164][ T6403] usb 2-1: Manufacturer: syz [ 392.816075][ T30] audit: type=1400 audit(648.466:3588): avc: denied { ioctl } for pid=6430 comm="syz-executor" path="/dev/loop4" dev="devtmpfs" ino=651 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 392.823219][ T6403] usb 2-1: SerialNumber: syz [ 392.865064][ T10] usb 5-1: new high-speed USB device number 117 using dummy_hcd [ 392.877378][ T30] audit: type=1400 audit(648.486:3589): avc: denied { ioctl } for pid=21235 comm="syz.1.6617" path="/dev/raw-gadget" dev="devtmpfs" ino=815 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 392.919884][ T6403] usb 2-1: Audio class v2/v3 interfaces need an interface association [ 392.920049][ T30] audit: type=1400 audit(648.486:3590): avc: denied { ioctl } for pid=21235 comm="syz.1.6617" path="/dev/raw-gadget" dev="devtmpfs" ino=815 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 393.026300][ T10] usb 5-1: config index 0 descriptor too short (expected 37, got 31) [ 393.044874][ T10] usb 5-1: config 1 has an invalid descriptor of length 9, skipping remainder of the config [ 393.088312][ T10] usb 5-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 3 [ 393.112089][ T6403] snd-usb-audio 2-1:1.0: probe with driver snd-usb-audio failed with error -22 [ 393.127575][ T10] usb 5-1: New USB device found, idVendor=0bda, idProduct=8150, bcdDevice= 0.00 [ 393.142566][ T6403] snd-usb-hiface 2-1:1.0: probe with driver snd-usb-hiface failed with error -22 [ 393.152527][ T10] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 393.162491][T21285] netlink: 176 bytes leftover after parsing attributes in process `syz.2.6634'. [ 393.174378][ T10] usb 5-1: Product: syz [ 393.182596][ T10] usb 5-1: Manufacturer: syz [ 393.189446][ T10] usb 5-1: SerialNumber: syz [ 393.206709][ T10] rtl8150 5-1:1.0: couldn't find required endpoints [ 393.236306][ T10] rtl8150 5-1:1.0: probe with driver rtl8150 failed with error -5 [ 393.342819][ T6403] usb 2-1: can't set first interface for hiFace device. [ 393.372483][ T6403] snd-usb-hiface 2-1:1.1: probe with driver snd-usb-hiface failed with error -5 [ 393.401596][ T6403] usb 2-1: can't set first interface for hiFace device. [ 393.419971][ T6403] snd-usb-hiface 2-1:1.2: probe with driver snd-usb-hiface failed with error -5 [ 393.443277][ T6403] usb 2-1: USB disconnect, device number 84 [ 393.534843][T20599] udevd[20599]: error opening ATTR{/sys/devices/platform/dummy_hcd.1/usb2/2-1/2-1:1.0/sound/card3/controlC3/../uevent} for writing: No such file or directory [ 393.739170][T21325] netlink: 44 bytes leftover after parsing attributes in process `syz.0.6647'. [ 393.805971][T21329] netlink: 'syz.3.6649': attribute type 1 has an invalid length. [ 393.830091][T21329] openvswitch: netlink: Flow actions may not be safe on all matching packets. [ 393.961698][ T6403] usb 5-1: USB disconnect, device number 117 [ 394.254956][T21363] netlink: 36 bytes leftover after parsing attributes in process `syz.1.6662'. [ 394.594799][T21386] netlink: 12 bytes leftover after parsing attributes in process `syz.4.6674'. [ 394.602255][T21389] netlink: 'syz.0.6675': attribute type 25 has an invalid length. [ 394.884679][ T10] usb 3-1: new high-speed USB device number 108 using dummy_hcd [ 395.053405][ T10] usb 3-1: Using ep0 maxpacket: 8 [ 395.066749][ T10] usb 3-1: config 179 has an invalid interface number: 65 but max is 0 [ 395.087817][ T10] usb 3-1: config 179 has no interface number 0 [ 395.108412][ T10] usb 3-1: config 179 interface 65 altsetting 12 endpoint 0xF has an invalid bInterval 63, changing to 9 [ 395.141206][ T10] usb 3-1: config 179 interface 65 altsetting 12 endpoint 0xF has invalid maxpacket 57605, setting to 1024 [ 395.168319][ T10] usb 3-1: config 179 interface 65 altsetting 12 endpoint 0x83 has an invalid bInterval 0, changing to 7 [ 395.193298][ T10] usb 3-1: config 179 interface 65 altsetting 12 endpoint 0x83 has invalid wMaxPacketSize 0 [ 395.212434][ T10] usb 3-1: config 179 interface 65 altsetting 12 has 2 endpoint descriptors, different from the interface descriptor's value: 23 [ 395.252233][ T10] usb 3-1: config 179 interface 65 has no altsetting 0 [ 395.273400][ T10] usb 3-1: New USB device found, idVendor=12ab, idProduct=0004, bcdDevice= 0.00 [ 395.303267][ T10] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 395.364948][ T10] input: Honey Bee Xbox360 dancepad as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:179.65/input/input51 [ 395.454668][T21447] netlink: 3752 bytes leftover after parsing attributes in process `syz.4.6695'. [ 395.566792][ T7589] usb 3-1: USB disconnect, device number 108 [ 395.566854][ C0] xpad 3-1:179.65: xpad_irq_out - usb_submit_urb failed with result -19 [ 395.641418][T21464] netlink: 56 bytes leftover after parsing attributes in process `syz.4.6700'. [ 395.683870][T21464] netlink: 12 bytes leftover after parsing attributes in process `syz.4.6700'. [ 395.697536][T21468] No such timeout policy "syz1" [ 395.700864][T21464] netlink: 31 bytes leftover after parsing attributes in process `syz.4.6700'. [ 395.721638][T21464] netlink: 'syz.4.6700': attribute type 2 has an invalid length. [ 395.740144][T21464] netlink: 31 bytes leftover after parsing attributes in process `syz.4.6700'. [ 395.744819][T21470] CIFS: bad ip= option (%‹R¯HÖe'ì»Ë /Ïâµüë1ýC¸ £~—1W–쯑ë¨eþxEA®ÁþeSb{~Rð) [ 396.939023][T21553] ipt_REJECT: ECHOREPLY no longer supported. [ 397.441789][ T30] kauditd_printk_skb: 475 callbacks suppressed [ 397.441806][ T30] audit: type=1400 audit(653.409:4066): avc: denied { read write } for pid=6430 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 397.523593][ T30] audit: type=1400 audit(653.449:4067): avc: denied { open } for pid=6430 comm="syz-executor" path="/dev/loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 397.573912][ T30] audit: type=1400 audit(653.449:4068): avc: denied { ioctl } for pid=6430 comm="syz-executor" path="/dev/loop4" dev="devtmpfs" ino=651 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 397.631102][ T30] audit: type=1400 audit(653.539:4069): avc: denied { create } for pid=21587 comm="syz.4.6759" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 397.696006][T21590] netlink: 1040 bytes leftover after parsing attributes in process `syz.1.6760'. [ 397.706413][ T30] audit: type=1400 audit(653.549:4070): avc: denied { read write } for pid=6425 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 397.773745][ T30] audit: type=1400 audit(653.549:4071): avc: denied { open } for pid=6425 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 397.804292][T21594] xt_time: invalid argument - start or stop time greater than 23:59:59 [ 397.832270][ T30] audit: type=1400 audit(653.549:4072): avc: denied { ioctl } for pid=6425 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=648 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 397.878940][ T30] audit: type=1400 audit(653.579:4073): avc: denied { write } for pid=21587 comm="syz.4.6759" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 397.943379][ T30] audit: type=1400 audit(653.649:4074): avc: denied { read write } for pid=6429 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 398.001209][ T30] audit: type=1400 audit(653.659:4075): avc: denied { open } for pid=6429 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 398.229813][T21611] IPv6: NLM_F_CREATE should be specified when creating new route [ 398.268603][T21611] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 398.275906][T21611] IPv6: NLM_F_CREATE should be set when creating new route [ 398.283164][T21611] IPv6: NLM_F_CREATE should be set when creating new route [ 398.675747][T21644] netlink: 256 bytes leftover after parsing attributes in process `syz.0.6783'. [ 398.758123][T21641] bond4: entered allmulticast mode [ 398.804470][T21641] 8021q: adding VLAN 0 to HW filter on device bond4 [ 398.949388][T21684] xt_CT: No such helper "snmp_trap" [ 399.104374][T21698] veth1_macvtap: left promiscuous mode [ 399.155124][T21703] xt_CT: You must specify a L4 protocol and not use inversions on it [ 399.507040][T21807] trusted_key: encrypted_key: keyword 'new0default' not recognized [ 399.959124][T21837] sctp: [Deprecated]: syz.3.6818 (pid 21837) Use of int in maxseg socket option. [ 399.959124][T21837] Use struct sctp_assoc_value instead [ 400.275353][T21855] netlink: 148 bytes leftover after parsing attributes in process `syz.1.6824'. [ 400.952641][T21895] xt_socket: unknown flags 0x4 [ 401.000508][ T5490] veth1_macvtap: entered promiscuous mode [ 401.444960][T21931] netlink: 'syz.4.6854': attribute type 4 has an invalid length. [ 402.305125][T21974] netlink: 28 bytes leftover after parsing attributes in process `syz.1.6872'. [ 402.442063][ T30] kauditd_printk_skb: 2294 callbacks suppressed [ 402.442081][ T30] audit: type=1400 audit(658.411:6370): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 402.511869][ T5490] audit: audit_backlog=65 > audit_backlog_limit=64 [ 402.528875][ T5490] audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 [ 402.545651][ T30] audit: type=1400 audit(658.411:6371): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 402.566893][ T5490] audit: backlog limit exceeded [ 402.578089][T21990] ip6t_REJECT: TCP_RESET illegal for non-tcp [ 402.584508][ T5490] audit: audit_backlog=65 > audit_backlog_limit=64 [ 402.592263][ T5490] audit: audit_lost=3 audit_rate_limit=0 audit_backlog_limit=64 [ 402.593253][T21991] ip6erspan1: entered allmulticast mode [ 402.609570][ T5490] audit: backlog limit exceeded [ 402.614580][ T30] audit: type=1400 audit(658.411:6372): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 402.641214][ T6430] audit: audit_backlog=65 > audit_backlog_limit=64 [ 403.152872][T22018] trusted_key: encrypted_key: insufficient parameters specified [ 403.203499][T22022] Cannot find set identified by id 0 to match [ 403.828595][T22050] ALSA: mixer_oss: invalid OSS volume 'u' [ 404.521179][T22086] gretap2: entered promiscuous mode [ 405.366906][T22130] bond5 (unregistering): Released all slaves [ 405.419821][T22184] xt_CT: You must specify a L4 protocol and not use inversions on it [ 405.757366][T22217] xt_ecn: cannot match TCP bits for non-tcp packets [ 405.982578][T22226] netlink: 'syz.1.6961': attribute type 4 has an invalid length. [ 406.776740][T22262] bond3: Unable to set down delay as MII monitoring is disabled [ 406.856604][T22262] bond3 (unregistering): Released all slaves [ 407.450573][ T30] kauditd_printk_skb: 8828 callbacks suppressed [ 407.450590][ T30] audit: type=1400 audit(663.414:14527): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 407.513770][ T5490] audit: audit_backlog=65 > audit_backlog_limit=64 [ 407.524556][ T5490] audit: audit_lost=229 audit_rate_limit=0 audit_backlog_limit=64 [ 407.529949][ T6425] audit: audit_backlog=65 > audit_backlog_limit=64 [ 407.537100][ T6429] audit: audit_backlog=65 > audit_backlog_limit=64 [ 407.543642][T22366] audit: audit_backlog=65 > audit_backlog_limit=64 [ 407.545579][ T30] audit: type=1400 audit(663.424:14528): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 407.572960][ T6425] audit: audit_lost=230 audit_rate_limit=0 audit_backlog_limit=64 [ 407.572983][ T6425] audit: backlog limit exceeded [ 407.577161][T22366] audit: audit_lost=231 audit_rate_limit=0 audit_backlog_limit=64 [ 407.814373][T22379] x_tables: ip_tables: osf match: only valid for protocol 6 [ 408.674270][ T6586] IPVS: starting estimator thread 0... [ 408.796538][T22427] IPVS: using max 40 ests per chain, 96000 per kthread [ 409.348647][T22459] netlink: 48 bytes leftover after parsing attributes in process `syz.4.7040'. [ 409.371164][T22459] netlink: 21 bytes leftover after parsing attributes in process `syz.4.7040'. [ 409.392286][T22459] netlink: 21 bytes leftover after parsing attributes in process `syz.4.7040'. [ 410.160679][T22504] netlink: 'syz.4.7063': attribute type 5 has an invalid length. [ 410.412088][T22515] netlink: 'syz.3.7068': attribute type 4 has an invalid length. [ 410.430164][T22515] netlink: 17 bytes leftover after parsing attributes in process `syz.3.7068'. [ 411.106695][T22539] netlink: 68 bytes leftover after parsing attributes in process `syz.0.7079'. [ 411.159354][T22539] netlink: 68 bytes leftover after parsing attributes in process `syz.0.7079'. [ 411.618947][T22562] bond0: option ad_select: unable to set because the bond device is up [ 412.455793][ T30] kauditd_printk_skb: 8242 callbacks suppressed [ 412.455811][ T30] audit: type=1400 audit(668.436:21792): avc: denied { read write } for pid=22610 comm="syz.2.7113" name="raw-gadget" dev="devtmpfs" ino=815 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 412.523944][ T30] audit: type=1400 audit(668.436:21793): avc: denied { read write } for pid=6424 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 412.612223][ T30] audit: type=1400 audit(668.466:21794): avc: denied { read write } for pid=6425 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 412.616491][ T5490] audit: audit_backlog=65 > audit_backlog_limit=64 [ 412.642277][ T6425] audit: audit_backlog=65 > audit_backlog_limit=64 [ 412.650319][ T6429] audit: audit_backlog=65 > audit_backlog_limit=64 [ 412.657951][ T6425] audit: audit_lost=558 audit_rate_limit=0 audit_backlog_limit=64 [ 412.670645][ T6429] audit: audit_lost=559 audit_rate_limit=0 audit_backlog_limit=64 [ 412.682552][ T6425] audit: backlog limit exceeded [ 412.688343][ T5490] audit: audit_lost=560 audit_rate_limit=0 audit_backlog_limit=64 [ 413.459557][T22666] bond5: (slave bond_slave_1): Device is not our slave [ 413.469395][T22666] bond5: option active_slave: invalid value (bond_slave_1) [ 413.479787][T22666] bond5 (unregistering): Released all slaves [ 413.484381][T22705] netlink: 8 bytes leftover after parsing attributes in process `syz.0.7138'. [ 413.533698][T22705] netlink: 4 bytes leftover after parsing attributes in process `syz.0.7138'. [ 413.543800][T22705] netlink: 'syz.0.7138': attribute type 11 has an invalid length. [ 413.553363][T22705] netlink: 'syz.0.7138': attribute type 7 has an invalid length. [ 413.881227][T22755] bond3: Unable to set down delay as MII monitoring is disabled [ 413.909870][T22755] bond3 (unregistering): Released all slaves [ 416.655366][T22958] mkiss: ax0: crc mode is auto. [ 416.816350][T22973] netlink: 8 bytes leftover after parsing attributes in process `syz.3.7214'. [ 417.462700][T23006] netlink: 43 bytes leftover after parsing attributes in process `syz.1.7228'. [ 417.464370][ T30] kauditd_printk_skb: 6502 callbacks suppressed [ 417.464385][ T30] audit: type=1400 audit(673.449:28295): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 417.487423][T23006] netlink: 28 bytes leftover after parsing attributes in process `syz.1.7228'. [ 417.516071][ T30] audit: type=1400 audit(673.449:28296): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 417.544602][ T5490] audit: audit_backlog=65 > audit_backlog_limit=64 [ 417.562339][ T5490] audit: audit_lost=561 audit_rate_limit=0 audit_backlog_limit=64 [ 417.588935][ T5490] audit: backlog limit exceeded [ 417.610330][ T5490] audit: audit_backlog=65 > audit_backlog_limit=64 [ 417.617843][ T30] audit: type=1400 audit(673.449:28297): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 417.647603][ T5490] audit: audit_lost=562 audit_rate_limit=0 audit_backlog_limit=64 [ 417.659388][ T6430] audit: audit_backlog=65 > audit_backlog_limit=64 [ 417.679937][ T5490] audit: backlog limit exceeded [ 417.681802][T23012] vcan1: entered allmulticast mode [ 418.241603][T23040] netlink: 'syz.2.7242': attribute type 1 has an invalid length. [ 419.349599][T23095] sp0: Synchronizing with TNC [ 419.390908][T23095] sp0: Found TNC [ 420.875709][T23178] netlink: 'syz.1.7306': attribute type 2 has an invalid length. [ 422.085791][T23237] bridge_slave_1: invalid flags given to default FDB implementation [ 422.474163][ T30] kauditd_printk_skb: 9684 callbacks suppressed [ 422.474180][ T30] audit: type=1400 audit(678.451:37791): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 422.508413][ T5490] audit: audit_backlog=65 > audit_backlog_limit=64 [ 422.523722][ T6430] audit: audit_backlog=65 > audit_backlog_limit=64 [ 422.525895][ T6424] audit: audit_backlog=65 > audit_backlog_limit=64 [ 422.539195][T23253] audit: audit_backlog=65 > audit_backlog_limit=64 [ 422.545968][ T5490] audit: audit_lost=627 audit_rate_limit=0 audit_backlog_limit=64 [ 422.550945][ T6424] audit: audit_lost=628 audit_rate_limit=0 audit_backlog_limit=64 [ 422.554668][ T6430] audit: audit_lost=629 audit_rate_limit=0 audit_backlog_limit=64 [ 422.569543][ T30] audit: type=1400 audit(678.451:37792): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 422.569588][ T30] audit: type=1400 audit(678.451:37793): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 423.269515][T23294] bridge9: entered promiscuous mode [ 423.285838][T23294] bridge9: entered allmulticast mode [ 423.794523][T23319] netlink: 16 bytes leftover after parsing attributes in process `syz.2.7365'. [ 424.935923][T23354] sp0: Synchronizing with TNC [ 425.351997][T23387] [U] ø [ 425.592755][T23403] Zero length message leads to an empty skb [ 427.214433][T23464] netlink: 4 bytes leftover after parsing attributes in process `syz.4.7423'. [ 427.249752][T23464] netlink: 8 bytes leftover after parsing attributes in process `syz.4.7423'. [ 427.480299][ T30] kauditd_printk_skb: 10358 callbacks suppressed [ 427.480317][ T30] audit: type=1400 audit(683.464:48147): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 427.539764][ T5490] audit: audit_backlog=65 > audit_backlog_limit=64 [ 427.550868][T23484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 427.556572][ T5490] audit: audit_lost=631 audit_rate_limit=0 audit_backlog_limit=64 [ 427.560318][ T6425] audit: audit_backlog=65 > audit_backlog_limit=64 [ 427.573359][ T30] audit: type=1400 audit(683.464:48148): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 427.582500][T23484] audit: audit_lost=632 audit_rate_limit=0 audit_backlog_limit=64 [ 427.597797][ T5490] audit: backlog limit exceeded [ 427.612084][ T6429] audit: audit_backlog=65 > audit_backlog_limit=64 [ 427.612905][ T6425] audit: audit_lost=633 audit_rate_limit=0 audit_backlog_limit=64 [ 427.768657][T23492] netlink: 8 bytes leftover after parsing attributes in process `syz.1.7433'. [ 427.818241][T23492] netlink: 4 bytes leftover after parsing attributes in process `syz.1.7433'. [ 427.884685][ T13] netdevsim netdevsim1 netdevsim0: set [0, 0] type 1 family 0 port 8472 - 0 [ 427.907685][ T13] netdevsim netdevsim1 netdevsim1: set [0, 0] type 1 family 0 port 8472 - 0 [ 427.927893][ T13] netdevsim netdevsim1 netdevsim2: set [0, 0] type 1 family 0 port 8472 - 0 [ 428.004267][ T13] netdevsim netdevsim1 netdevsim3: set [0, 0] type 1 family 0 port 8472 - 0 [ 428.247196][T23510] [U] vÔ3¸Âfù¾"SçÁ/Éê4:ÃXTz“W¡t‘’lWµ«= [ 428.247269][T23510] [U] J"—e:ÀÆ" [ 429.831529][T23552] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=23552 comm=syz.1.7458 [ 431.110786][T23579] mkiss: ax0: crc mode is auto. [ 432.485082][ T30] kauditd_printk_skb: 5042 callbacks suppressed [ 432.485100][ T30] audit: type=1400 audit(688.466:52803): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 432.579348][ T5490] audit: audit_backlog=65 > audit_backlog_limit=64 [ 432.593878][ T6430] audit: audit_backlog=65 > audit_backlog_limit=64 [ 432.601114][ T5490] audit: audit_lost=763 audit_rate_limit=0 audit_backlog_limit=64 [ 432.610166][ T30] audit: type=1400 audit(688.466:52804): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 432.631349][ T6430] audit: audit_lost=764 audit_rate_limit=0 audit_backlog_limit=64 [ 432.639238][ T5490] audit: backlog limit exceeded [ 432.655732][ T5490] audit: audit_backlog=65 > audit_backlog_limit=64 [ 432.662402][ T6430] audit: backlog limit exceeded [ 432.695650][ T5490] audit: audit_lost=765 audit_rate_limit=0 audit_backlog_limit=64 [ 433.391048][T23642] mkiss: ax0: crc mode is auto. [ 434.481592][T23673] netlink: 4 bytes leftover after parsing attributes in process `syz.2.7504'. [ 435.267102][T23691] trusted_key: encrypted key: instantiation of keys using provided decrypted data is disabled since CONFIG_USER_DECRYPTED_DATA is set to false [ 435.381841][T23690] macsec1: entered promiscuous mode [ 436.389973][T23700] ptrace attach of "./syz-executor exec"[23704] was attempted by "./syz-executor exec"[23700] [ 437.496763][ T30] kauditd_printk_skb: 4069 callbacks suppressed [ 437.496780][ T30] audit: type=1400 audit(693.489:56870): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 437.617471][ T5490] audit: audit_backlog=65 > audit_backlog_limit=64 [ 437.657241][ T5490] audit: audit_lost=767 audit_rate_limit=0 audit_backlog_limit=64 [ 437.670830][ T6425] audit: audit_backlog=66 > audit_backlog_limit=64 [ 437.694611][ T30] audit: type=1400 audit(693.489:56871): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 437.730577][ T5490] audit: backlog limit exceeded [ 437.757905][ T5490] audit: audit_backlog=65 > audit_backlog_limit=64 [ 437.767308][T23746] audit: audit_backlog=65 > audit_backlog_limit=64 [ 437.793521][ T6429] audit: audit_backlog=65 > audit_backlog_limit=64 [ 437.804569][ T6425] audit: audit_lost=768 audit_rate_limit=0 audit_backlog_limit=64 [ 439.870469][ T1308] ieee802154 phy0 wpan0: encryption failed: -22 [ 439.876259][ T1308] ieee802154 phy1 wpan1: encryption failed: -22 [ 439.956558][T23779] ptrace attach of "./syz-executor exec"[23783] was attempted by "./syz-executor exec"[23779] [ 442.286465][T23833] netlink: 12 bytes leftover after parsing attributes in process `syz.3.7576'. [ 442.502609][ T30] kauditd_printk_skb: 4047 callbacks suppressed [ 442.502627][ T30] audit: type=1400 audit(698.491:60645): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 442.605172][ T5490] audit: audit_backlog=65 > audit_backlog_limit=64 [ 442.640927][ T6424] audit: audit_backlog=65 > audit_backlog_limit=64 [ 442.647696][ T5490] audit: audit_lost=861 audit_rate_limit=0 audit_backlog_limit=64 [ 442.686517][ T6424] audit: audit_lost=862 audit_rate_limit=0 audit_backlog_limit=64 [ 442.695679][ T30] audit: type=1400 audit(698.531:60646): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 442.716836][ T5490] audit: backlog limit exceeded [ 442.736557][ T5490] audit: audit_backlog=65 > audit_backlog_limit=64 [ 442.750424][T23838] audit: audit_backlog=65 > audit_backlog_limit=64 [ 442.762809][ T6424] audit: backlog limit exceeded [ 443.711700][T23860] [U]  [ 445.627114][T23901] mkiss: ax0: crc mode is auto. [ 446.528672][T23926] netlink: 1047 bytes leftover after parsing attributes in process `syz.1.7610'. [ 446.639999][T23926] bridge: RTM_NEWNEIGH with invalid state 0x1 [ 447.509823][ T30] kauditd_printk_skb: 4672 callbacks suppressed [ 447.509841][ T30] audit: type=1400 audit(703.504:64751): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 447.622155][ T30] audit: type=1400 audit(703.534:64752): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 447.710269][ T30] audit: type=1400 audit(703.534:64753): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 447.743608][ T5490] audit: audit_backlog=65 > audit_backlog_limit=64 [ 447.783546][ T5490] audit: audit_lost=1053 audit_rate_limit=0 audit_backlog_limit=64 [ 447.834399][ T5490] audit: backlog limit exceeded [ 447.845988][ T6426] audit: audit_backlog=65 > audit_backlog_limit=64 [ 447.857348][ T30] audit: type=1400 audit(703.534:64754): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 447.889838][ T5490] audit: audit_backlog=65 > audit_backlog_limit=64 [ 447.913013][ T6426] audit: audit_lost=1054 audit_rate_limit=0 audit_backlog_limit=64 [ 451.568652][T24008] 8021q: adding VLAN 0 to HW filter on device bond0 [ 451.627002][T24008] 8021q: adding VLAN 0 to HW filter on device team0 [ 451.737821][T24008] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 452.519772][ T30] kauditd_printk_skb: 4246 callbacks suppressed [ 452.519789][ T30] audit: type=1400 audit(708.506:68500): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 452.594636][ T5490] audit: audit_backlog=65 > audit_backlog_limit=64 [ 452.639481][ T6429] audit: audit_backlog=65 > audit_backlog_limit=64 [ 452.645974][ T30] audit: type=1400 audit(708.506:68501): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 452.647900][ T5490] audit: audit_lost=1222 audit_rate_limit=0 audit_backlog_limit=64 [ 452.706964][ T6429] audit: audit_lost=1223 audit_rate_limit=0 audit_backlog_limit=64 [ 452.732920][ T6429] audit: backlog limit exceeded [ 452.754026][ T6425] audit: audit_backlog=65 > audit_backlog_limit=64 [ 452.789693][ T6426] audit: audit_backlog=65 > audit_backlog_limit=64 [ 452.797272][ T6424] audit: audit_backlog=65 > audit_backlog_limit=64 [ 454.533703][T24062] sch_tbf: peakrate 9 is lower than or equals to rate 8022975959529529383 ! [ 457.522784][ T30] kauditd_printk_skb: 5235 callbacks suppressed [ 457.522800][ T30] audit: type=1400 audit(713.529:72998): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 457.634975][ T5490] audit: audit_backlog=65 > audit_backlog_limit=64 [ 457.672506][ T6424] audit: audit_backlog=65 > audit_backlog_limit=64 [ 457.700439][ T5490] audit: audit_lost=1471 audit_rate_limit=0 audit_backlog_limit=64 [ 457.725031][ T6424] audit: audit_lost=1472 audit_rate_limit=0 audit_backlog_limit=64 [ 457.742569][ T6425] audit: audit_backlog=65 > audit_backlog_limit=64 [ 457.760383][ T30] audit: type=1400 audit(713.549:72999): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 457.789290][ T5490] audit: backlog limit exceeded [ 457.801945][ T6424] audit: backlog limit exceeded [ 457.807169][ T6425] audit: audit_lost=1473 audit_rate_limit=0 audit_backlog_limit=64 [ 460.504197][T24163] ceph: No mds server is up or the cluster is laggy [ 462.011031][ T50] Bluetooth: hci5: Entering manufacturer mode failed (-110) [ 462.530198][ T30] kauditd_printk_skb: 6151 callbacks suppressed [ 462.530215][ T30] audit: type=1400 audit(718.531:77509): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 462.607986][ T5490] audit: audit_backlog=65 > audit_backlog_limit=64 [ 462.624933][T24229] audit: audit_backlog=66 > audit_backlog_limit=64 [ 462.642787][ T5490] audit: audit_lost=2021 audit_rate_limit=0 audit_backlog_limit=64 [ 462.669748][T24229] audit: audit_lost=2022 audit_rate_limit=0 audit_backlog_limit=64 [ 462.697316][ T5490] audit: backlog limit exceeded [ 462.703065][ T30] audit: type=1400 audit(718.551:77510): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 462.739748][T24229] audit: backlog limit exceeded [ 462.747924][ T5490] audit: audit_backlog=65 > audit_backlog_limit=64 [ 462.763277][ T6426] audit: audit_backlog=65 > audit_backlog_limit=64 [ 464.855633][T24284] netlink: 'syz.1.7758': attribute type 3 has an invalid length. [ 466.003799][T24315] netlink: 8 bytes leftover after parsing attributes in process `syz.2.7772'. [ 466.544784][T24324] macvtap1: entered promiscuous mode [ 467.543333][ T30] kauditd_printk_skb: 4052 callbacks suppressed [ 467.543350][ T30] audit: type=1400 audit(723.544:81064): avc: denied { read write } for pid=6424 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 467.676119][ T5490] audit: audit_backlog=65 > audit_backlog_limit=64 [ 467.711038][T24357] audit: audit_backlog=65 > audit_backlog_limit=64 [ 467.729484][ T5490] audit: audit_lost=2190 audit_rate_limit=0 audit_backlog_limit=64 [ 467.744321][ T6425] audit: audit_backlog=65 > audit_backlog_limit=64 [ 467.769342][T24357] audit: audit_lost=2191 audit_rate_limit=0 audit_backlog_limit=64 [ 467.779784][ T5490] audit: backlog limit exceeded [ 467.786227][ T30] audit: type=1400 audit(723.584:81065): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 467.815974][ T6425] audit: audit_lost=2192 audit_rate_limit=0 audit_backlog_limit=64 [ 467.841433][ T5490] audit: audit_backlog=65 > audit_backlog_limit=64 [ 468.075494][T24364] netlink: 68 bytes leftover after parsing attributes in process `syz.2.7795'. [ 468.339777][T24373] netlink: 20 bytes leftover after parsing attributes in process `syz.4.7798'. [ 469.372697][T24399] ALSA: mixer_oss: invalid OSS volume '' [ 471.157661][T24432] syz.0.7823 (24432): drop_caches: 2 [ 471.203474][T24447] macsec1: entered promiscuous mode [ 471.242815][T24447] macsec1: entered allmulticast mode [ 471.252580][ C0] sched: DL replenish lagged too much [ 471.283604][T24447] veth1_macvtap: entered allmulticast mode [ 471.344252][T24447] veth1_macvtap: left allmulticast mode [ 472.275250][T24476] [U] VÔ3¸ÂFÙ¾"SÇÁ/ÉÊ4:ÃXTZ“W¡T‘’LWµ«= [ 472.329433][T24473] [U] J"—E:ÀÆ" [ 472.546120][ T30] kauditd_printk_skb: 3927 callbacks suppressed [ 472.546142][ T30] audit: type=1400 audit(728.546:84455): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 472.677450][ T5490] audit: audit_backlog=65 > audit_backlog_limit=64 [ 472.692631][T24487] audit: audit_backlog=65 > audit_backlog_limit=64 [ 472.716952][ T5490] audit: audit_lost=2372 audit_rate_limit=0 audit_backlog_limit=64 [ 472.742179][ T30] audit: type=1400 audit(728.546:84456): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 472.778843][T24487] audit: audit_lost=2373 audit_rate_limit=0 audit_backlog_limit=64 [ 472.787650][T24489] audit: audit_backlog=65 > audit_backlog_limit=64 [ 472.794216][ T5490] audit: backlog limit exceeded [ 472.810540][ T5490] audit: audit_backlog=65 > audit_backlog_limit=64 [ 472.826979][ T6429] audit: audit_backlog=65 > audit_backlog_limit=64 [ 473.066458][T24493] sp0: Synchronizing with TNC [ 477.559976][ T30] kauditd_printk_skb: 4172 callbacks suppressed [ 477.559994][ T30] audit: type=1400 audit(733.569:88346): avc: denied { read write } for pid=6429 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 477.631084][ T5490] audit: audit_backlog=65 > audit_backlog_limit=64 [ 477.647136][ T5490] audit: audit_lost=2469 audit_rate_limit=0 audit_backlog_limit=64 [ 477.671277][ T6424] audit: audit_backlog=65 > audit_backlog_limit=64 [ 477.689694][ T30] audit: type=1400 audit(733.609:88347): avc: denied { map_create } for pid=24621 comm="syz.0.7894" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 477.723200][ T5490] audit: backlog limit exceeded [ 477.729712][ T6424] audit: audit_lost=2470 audit_rate_limit=0 audit_backlog_limit=64 [ 477.747516][ T5490] audit: audit_backlog=65 > audit_backlog_limit=64 [ 477.772954][ T6424] audit: backlog limit exceeded [ 477.786608][ T5490] audit: audit_lost=2471 audit_rate_limit=0 audit_backlog_limit=64 [ 479.292511][T24663] F2FS-fs: Conflicting test_dummy_encryption options [ 480.603378][T24697] sch_tbf: peakrate 6762417878432097402 is lower than or equals to rate 8022975959529529383 ! [ 482.559509][ T30] kauditd_printk_skb: 5115 callbacks suppressed [ 482.559532][ T30] audit: type=1400 audit(738.561:93090): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 482.635184][ T5490] audit: audit_backlog=65 > audit_backlog_limit=64 [ 482.666928][ T5490] audit: audit_lost=2596 audit_rate_limit=0 audit_backlog_limit=64 [ 482.691501][ T6429] audit: audit_backlog=65 > audit_backlog_limit=64 [ 482.700534][ T5490] audit: backlog limit exceeded [ 482.705464][ T30] audit: type=1400 audit(738.601:93091): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 482.739859][ T5490] audit: audit_backlog=65 > audit_backlog_limit=64 [ 482.746662][ T6429] audit: audit_lost=2597 audit_rate_limit=0 audit_backlog_limit=64 [ 482.760957][T24748] audit: audit_backlog=66 > audit_backlog_limit=64 [ 482.772161][ T5490] audit: audit_lost=2598 audit_rate_limit=0 audit_backlog_limit=64 [ 486.965739][T24858] trusted_key: encrypted_key: key user:syz not found [ 487.160400][T24866] netem: change failed [ 487.567241][ T30] kauditd_printk_skb: 5076 callbacks suppressed [ 487.567258][ T30] audit: type=1400 audit(743.584:98017): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 487.646685][ T5490] audit: audit_backlog=65 > audit_backlog_limit=64 [ 487.656559][ T6426] audit: audit_backlog=65 > audit_backlog_limit=64 [ 487.665792][ T5490] audit: audit_lost=2649 audit_rate_limit=0 audit_backlog_limit=64 [ 487.684626][ T6426] audit: audit_lost=2650 audit_rate_limit=0 audit_backlog_limit=64 [ 487.694059][T24876] audit: audit_backlog=65 > audit_backlog_limit=64 [ 487.701176][ T30] audit: type=1400 audit(743.604:98018): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 487.724591][ T5490] audit: backlog limit exceeded [ 487.740950][ T5490] audit: audit_backlog=65 > audit_backlog_limit=64 [ 487.751782][ T6426] audit: backlog limit exceeded [ 487.920219][T24881] netlink: 8 bytes leftover after parsing attributes in process `syz.1.8016'. [ 487.994554][T24881] netlink: 36 bytes leftover after parsing attributes in process `syz.1.8016'. [ 490.719207][T24955] netlink: 8 bytes leftover after parsing attributes in process `syz.2.8052'. [ 492.574959][ T30] kauditd_printk_skb: 4414 callbacks suppressed [ 492.574977][ T30] audit: type=1400 audit(748.586:102126): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 492.658097][ T5490] audit: audit_backlog=65 > audit_backlog_limit=64 [ 492.694083][ T5490] audit: audit_lost=2754 audit_rate_limit=0 audit_backlog_limit=64 [ 492.713282][ T6426] audit: audit_backlog=65 > audit_backlog_limit=64 [ 492.723558][ T30] audit: type=1400 audit(748.626:102127): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 492.764020][ T5490] audit: backlog limit exceeded [ 492.775013][ T6426] audit: audit_lost=2755 audit_rate_limit=0 audit_backlog_limit=64 [ 492.792935][ T6429] audit: audit_backlog=65 > audit_backlog_limit=64 [ 492.800647][ T5490] audit: audit_backlog=65 > audit_backlog_limit=64 [ 492.822060][ T6429] audit: audit_lost=2756 audit_rate_limit=0 audit_backlog_limit=64 [ 493.355916][T25019] netlink: 12 bytes leftover after parsing attributes in process `syz.2.8084'. [ 493.442178][T25019] vlan0: entered promiscuous mode [ 493.483707][T25019] gretap0: entered promiscuous mode [ 496.142362][T25084] netlink: 8 bytes leftover after parsing attributes in process `syz.0.8111'. [ 496.194186][T25084] netlink: 4 bytes leftover after parsing attributes in process `syz.0.8111'. [ 496.248724][T25084] netlink: 'syz.0.8111': attribute type 19 has an invalid length. [ 496.300210][T25084] netlink: 'syz.0.8111': attribute type 20 has an invalid length. [ 496.457630][T25092] netlink: 36 bytes leftover after parsing attributes in process `syz.2.8115'. [ 497.582150][ T30] kauditd_printk_skb: 5359 callbacks suppressed [ 497.582168][ T30] audit: type=1400 audit(753.599:106742): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 497.669026][ T5490] audit: audit_backlog=65 > audit_backlog_limit=64 [ 497.675306][ T6429] audit: audit_backlog=65 > audit_backlog_limit=64 [ 497.687738][ T6425] audit: audit_backlog=65 > audit_backlog_limit=64 [ 497.703067][ T6429] audit: audit_lost=3005 audit_rate_limit=0 audit_backlog_limit=64 [ 497.714564][T25117] audit: audit_backlog=65 > audit_backlog_limit=64 [ 497.722950][ T6424] audit: audit_backlog=65 > audit_backlog_limit=64 [ 497.729689][ T5490] audit: audit_lost=3006 audit_rate_limit=0 audit_backlog_limit=64 [ 497.743228][ T6429] audit: backlog limit exceeded [ 497.749654][T25117] audit: audit_lost=3007 audit_rate_limit=0 audit_backlog_limit=64 [ 501.207530][ T1308] ieee802154 phy0 wpan0: encryption failed: -22 [ 501.214020][ T1308] ieee802154 phy1 wpan1: encryption failed: -22 [ 502.593558][ T30] kauditd_printk_skb: 4761 callbacks suppressed [ 502.593575][ T30] audit: type=1400 audit(758.601:111498): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 502.688696][ T5490] audit: audit_backlog=65 > audit_backlog_limit=64 [ 502.730832][ T5490] audit: audit_lost=3010 audit_rate_limit=0 audit_backlog_limit=64 [ 502.744586][ T6424] audit: audit_backlog=65 > audit_backlog_limit=64 [ 502.751357][ T6430] audit: audit_backlog=65 > audit_backlog_limit=64 [ 502.774315][ T6424] audit: audit_lost=3011 audit_rate_limit=0 audit_backlog_limit=64 [ 502.782385][ T6430] audit: audit_lost=3012 audit_rate_limit=0 audit_backlog_limit=64 [ 502.796159][ T5490] audit: backlog limit exceeded [ 502.804064][ T30] audit: type=1400 audit(758.611:111499): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 502.839394][T25238] audit: audit_backlog=65 > audit_backlog_limit=64 [ 504.245631][T25297] ALSA: mixer_oss: invalid OSS volume 'SPEA9¦KŸsË â¢+ñI2KER' [ 506.755606][T25355] CIFS: Unable to determine destination address [ 507.601222][ T30] kauditd_printk_skb: 4360 callbacks suppressed [ 507.601240][ T30] audit: type=1400 audit(763.624:115133): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 507.696194][ T5490] audit: audit_backlog=65 > audit_backlog_limit=64 [ 507.715500][T25379] audit: audit_backlog=65 > audit_backlog_limit=64 [ 507.741706][T25380] audit: audit_backlog=65 > audit_backlog_limit=64 [ 507.753959][ T5490] audit: audit_lost=3255 audit_rate_limit=0 audit_backlog_limit=64 [ 507.764486][T25382] audit: audit_backlog=65 > audit_backlog_limit=64 [ 507.771732][ T6430] audit: audit_backlog=65 > audit_backlog_limit=64 [ 507.779161][T25381] audit: audit_backlog=65 > audit_backlog_limit=64 [ 507.788320][T25379] audit: audit_lost=3256 audit_rate_limit=0 audit_backlog_limit=64 [ 507.799546][ T5490] audit: backlog limit exceeded [ 508.143899][T25391] netlink: 4 bytes leftover after parsing attributes in process `syz.0.8227'. [ 508.487882][T25397] netlink: 48 bytes leftover after parsing attributes in process `syz.0.8231'. [ 512.126574][T25495] netlink: 4 bytes leftover after parsing attributes in process `syz.4.8277'. [ 512.608677][ T30] kauditd_printk_skb: 4030 callbacks suppressed [ 512.608695][ T30] audit: type=1400 audit(768.636:119152): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 512.697584][ T5490] audit: audit_backlog=65 > audit_backlog_limit=64 [ 512.719981][ T6430] audit: audit_backlog=65 > audit_backlog_limit=64 [ 512.740232][ T5490] audit: audit_lost=3262 audit_rate_limit=0 audit_backlog_limit=64 [ 512.758175][ T30] audit: type=1400 audit(768.666:119153): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 512.768776][ T6430] audit: audit_lost=3263 audit_rate_limit=0 audit_backlog_limit=64 [ 512.787045][T25517] netdevsim netdevsim0 netdevsim0: left allmulticast mode [ 512.802040][ T5490] audit: backlog limit exceeded [ 512.816742][T25516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 512.824033][ T5490] audit: audit_backlog=65 > audit_backlog_limit=64 [ 512.836620][ T5490] audit: audit_lost=3264 audit_rate_limit=0 audit_backlog_limit=64 [ 512.851774][T25517] netdevsim netdevsim0 netdevsim0: left promiscuous mode [ 512.888596][T25517] bridge0: port 1(netdevsim0) entered disabled state [ 517.612082][ T30] kauditd_printk_skb: 4431 callbacks suppressed [ 517.612100][ T30] audit: type=1400 audit(773.639:123581): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 517.658911][T25640] team0: Device gtp0 is up. Set it down before adding it as a team port [ 517.660331][T25643] netlink: 8 bytes leftover after parsing attributes in process `syz.3.8339'. [ 517.748392][ T30] audit: type=1400 audit(773.669:123582): avc: denied { allowed } for pid=25638 comm="syz.3.8339" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 517.878450][ T30] audit: type=1400 audit(773.679:123583): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 517.993870][ T5490] audit: audit_backlog=65 > audit_backlog_limit=64 [ 518.011169][ T6424] audit: audit_backlog=65 > audit_backlog_limit=64 [ 518.026628][ T30] audit: type=1400 audit(773.679:123584): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 518.050445][ T5490] audit: audit_lost=3266 audit_rate_limit=0 audit_backlog_limit=64 [ 518.067908][T25655] audit: audit_backlog=66 > audit_backlog_limit=64 [ 518.070588][ T6424] audit: audit_lost=3267 audit_rate_limit=0 audit_backlog_limit=64 [ 518.097040][ T5490] audit: backlog limit exceeded [ 519.933967][T25703] netlink: 28 bytes leftover after parsing attributes in process `syz.4.8368'. [ 522.622039][ T30] kauditd_printk_skb: 4452 callbacks suppressed [ 522.622057][ T30] audit: type=1400 audit(778.651:127857): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 522.727257][ T5490] audit: audit_backlog=65 > audit_backlog_limit=64 [ 522.741743][T25772] audit: audit_backlog=65 > audit_backlog_limit=64 [ 522.757555][ T5490] audit: audit_lost=3328 audit_rate_limit=0 audit_backlog_limit=64 [ 522.769534][T25772] audit: audit_lost=3329 audit_rate_limit=0 audit_backlog_limit=64 [ 522.791802][ T30] audit: type=1400 audit(778.651:127858): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 522.827782][ T5490] audit: backlog limit exceeded [ 522.841298][ T5490] audit: audit_backlog=65 > audit_backlog_limit=64 [ 522.848749][T25772] audit: backlog limit exceeded [ 522.858147][ T5490] audit: audit_lost=3330 audit_rate_limit=0 audit_backlog_limit=64 [ 523.960191][T25808] netlink: 'syz.3.8410': attribute type 3 has an invalid length. [ 527.629878][ T30] kauditd_printk_skb: 4446 callbacks suppressed [ 527.629896][ T30] audit: type=1400 audit(783.664:132286): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 527.712238][ T5490] audit: audit_backlog=65 > audit_backlog_limit=64 [ 527.746386][ T5490] audit: audit_lost=3337 audit_rate_limit=0 audit_backlog_limit=64 [ 527.770365][ T30] audit: type=1400 audit(783.664:132287): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 527.806500][ T5490] audit: backlog limit exceeded [ 527.831528][ T5490] audit: audit_backlog=65 > audit_backlog_limit=64 [ 527.839582][T25925] audit: audit_backlog=65 > audit_backlog_limit=64 [ 527.856412][ T5490] audit: audit_lost=3338 audit_rate_limit=0 audit_backlog_limit=64 [ 527.864987][T25925] audit: audit_lost=3339 audit_rate_limit=0 audit_backlog_limit=64 [ 527.874796][ T30] audit: type=1400 audit(783.664:132288): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 532.638364][ T30] kauditd_printk_skb: 5306 callbacks suppressed [ 532.638380][ T30] audit: type=1400 audit(788.666:136909): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 532.733880][ T5490] audit: audit_backlog=65 > audit_backlog_limit=64 [ 532.759479][ T5490] audit: audit_lost=3568 audit_rate_limit=0 audit_backlog_limit=64 [ 532.774637][T26040] netlink: 8 bytes leftover after parsing attributes in process `syz.0.8498'. [ 532.788942][ T6426] audit: audit_backlog=65 > audit_backlog_limit=64 [ 532.796536][ T5490] audit: backlog limit exceeded [ 532.801533][ T30] audit: type=1400 audit(788.676:136910): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 532.824517][ T6426] audit: audit_lost=3569 audit_rate_limit=0 audit_backlog_limit=64 [ 532.834760][T26040] netlink: 4 bytes leftover after parsing attributes in process `syz.0.8498'. [ 532.848902][ T5490] audit: audit_backlog=65 > audit_backlog_limit=64 [ 532.866574][ T6426] audit: backlog limit exceeded [ 532.873190][ T5490] audit: audit_lost=3570 audit_rate_limit=0 audit_backlog_limit=64 [ 532.882722][T26040] netlink: 'syz.0.8498': attribute type 14 has an invalid length. [ 532.908135][T26040] netlink: 'syz.0.8498': attribute type 13 has an invalid length. [ 534.330396][T26072] mkiss: ax0: crc mode is auto. [ 535.872515][T26116] netlink: 8 bytes leftover after parsing attributes in process `syz.3.8529'. [ 537.644049][ T30] kauditd_printk_skb: 4754 callbacks suppressed [ 537.644067][ T30] audit: type=1400 audit(793.684:141664): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 537.716581][ T5490] audit: audit_backlog=65 > audit_backlog_limit=64 [ 537.736874][ T5490] audit: audit_lost=3571 audit_rate_limit=0 audit_backlog_limit=64 [ 537.766062][ T30] audit: type=1400 audit(793.704:141665): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 537.819985][ T5490] audit: backlog limit exceeded [ 537.834790][ T6429] audit: audit_backlog=65 > audit_backlog_limit=64 [ 537.852826][ T6426] audit: audit_backlog=65 > audit_backlog_limit=64 [ 537.868366][ T5490] audit: audit_backlog=65 > audit_backlog_limit=64 [ 537.892865][ T6429] audit: audit_lost=3572 audit_rate_limit=0 audit_backlog_limit=64 [ 537.902713][ T6426] audit: audit_lost=3573 audit_rate_limit=0 audit_backlog_limit=64 [ 540.910363][T26260] netlink: 96 bytes leftover after parsing attributes in process `syz.2.8577'. [ 542.654071][ T30] kauditd_printk_skb: 4940 callbacks suppressed [ 542.654089][ T30] audit: type=1400 audit(798.684:146407): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 542.712570][ T5490] audit: audit_backlog=65 > audit_backlog_limit=64 [ 542.731089][ T5490] audit: audit_lost=3640 audit_rate_limit=0 audit_backlog_limit=64 [ 542.749589][ T30] audit: type=1400 audit(798.714:146408): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 542.784772][ T5490] audit: backlog limit exceeded [ 542.798317][ T5490] audit: audit_backlog=65 > audit_backlog_limit=64 [ 542.809635][ T5490] audit: audit_lost=3641 audit_rate_limit=0 audit_backlog_limit=64 [ 542.829140][ T30] audit: type=1400 audit(798.714:146409): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 542.853086][ T5490] audit: backlog limit exceeded [ 542.870021][ T5490] audit: audit_backlog=65 > audit_backlog_limit=64 [ 545.577940][T26386] netlink: 44 bytes leftover after parsing attributes in process `syz.2.8633'. [ 545.847792][T26392] netlink: 80 bytes leftover after parsing attributes in process `syz.3.8636'. [ 545.901361][T26392] netlink: 8 bytes leftover after parsing attributes in process `syz.3.8636'. [ 547.665336][ T30] kauditd_printk_skb: 5070 callbacks suppressed [ 547.665354][ T30] audit: type=1400 audit(803.704:150716): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 547.760255][ T5490] audit: audit_backlog=65 > audit_backlog_limit=64 [ 547.769870][ T6426] audit: audit_backlog=65 > audit_backlog_limit=64 [ 547.787749][T26436] audit: audit_backlog=65 > audit_backlog_limit=64 [ 547.797585][ T6426] audit: audit_lost=3897 audit_rate_limit=0 audit_backlog_limit=64 [ 547.805679][ T5490] audit: audit_lost=3898 audit_rate_limit=0 audit_backlog_limit=64 [ 547.826876][ T30] audit: type=1400 audit(803.704:150717): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 547.851927][ T6426] audit: backlog limit exceeded [ 547.857289][T26436] audit: audit_lost=3899 audit_rate_limit=0 audit_backlog_limit=64 [ 547.867555][ T5490] audit: backlog limit exceeded [ 550.212141][T26494] bridge0: port 2(bridge_slave_1) entered disabled state [ 550.717638][T26494] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 551.035878][T26494] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 551.102981][T26494] .70·: left allmulticast mode [ 551.116076][T26494] hsr_slave_0: left allmulticast mode [ 551.130953][T26494] hsr_slave_1: left allmulticast mode [ 551.158772][T26494] vlan0: left promiscuous mode [ 551.195276][T26494] veth0_macvtap: left allmulticast mode [ 551.203081][T26494] 0ªX¹¦D: left allmulticast mode [ 551.356317][T26494] ip6erspan0: left promiscuous mode [ 551.396478][T26494] bond3: left allmulticast mode [ 551.416337][T26494] vti0: left promiscuous mode [ 551.625451][ T1347] netdevsim netdevsim1 netdevsim0: unset [0, 0] type 1 family 0 port 8472 - 0 [ 551.686361][ T1347] netdevsim netdevsim1 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 551.752309][ T1347] netdevsim netdevsim1 netdevsim1: unset [0, 0] type 1 family 0 port 8472 - 0 [ 551.811069][ T1347] netdevsim netdevsim1 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 552.000664][ T1347] netdevsim netdevsim1 netdevsim2: unset [0, 0] type 1 family 0 port 8472 - 0 [ 552.067162][ T1347] netdevsim netdevsim1 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 552.120619][ T1347] netdevsim netdevsim1 netdevsim3: unset [0, 0] type 1 family 0 port 8472 - 0 [ 552.174963][ T1347] netdevsim netdevsim1 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 552.676216][ T30] kauditd_printk_skb: 4156 callbacks suppressed [ 552.676239][ T30] audit: type=1400 audit(808.704:154456): avc: denied { read write } for pid=6429 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 552.828756][ T30] audit: type=1400 audit(808.754:154457): avc: denied { read write } for pid=6425 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 552.951200][ T30] audit: type=1400 audit(808.764:154458): avc: denied { read write } for pid=6430 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 553.044024][ T30] audit: type=1400 audit(808.784:154459): avc: denied { read write } for pid=26556 comm="syz.2.8705" name="raw-gadget" dev="devtmpfs" ino=815 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 553.068518][ T30] audit: type=1400 audit(808.854:154460): avc: denied { read write } for pid=26560 comm="syz.3.8706" name="raw-gadget" dev="devtmpfs" ino=815 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 553.123213][T26571] bridge0: entered promiscuous mode [ 553.162341][T26571] bridge0: left promiscuous mode [ 553.208066][ T30] audit: type=1400 audit(808.924:154461): avc: denied { execute } for pid=26562 comm="syz.4.8708" dev="tmpfs" ino=1063 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 553.256146][ T30] audit: type=1400 audit(808.964:154462): avc: denied { read write } for pid=6425 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 553.357417][ T30] audit: type=1400 audit(808.974:154463): avc: denied { search } for pid=26558 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 553.509828][ T30] audit: type=1400 audit(809.014:154464): avc: denied { read write } for pid=6430 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 553.675064][ T30] audit: type=1400 audit(809.034:154465): avc: denied { search } for pid=26517 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 556.079644][T26683] sp0: Synchronizing with TNC [ 556.157688][T26680] [U] è [ 557.694763][ T30] kauditd_printk_skb: 1017 callbacks suppressed [ 557.694782][ T30] audit: type=1400 audit(813.724:155432): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 557.782492][ T5490] audit: audit_backlog=65 > audit_backlog_limit=64 [ 557.816704][T26734] audit: audit_backlog=65 > audit_backlog_limit=64 [ 557.829471][ T5490] audit: audit_lost=4056 audit_rate_limit=0 audit_backlog_limit=64 [ 557.862788][T26734] audit: audit_lost=4057 audit_rate_limit=0 audit_backlog_limit=64 [ 557.886384][ T5490] audit: backlog limit exceeded [ 557.904188][ T30] audit: type=1400 audit(813.724:155433): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 557.939845][ T5490] audit: audit_backlog=65 > audit_backlog_limit=64 [ 557.953177][T26734] audit: backlog limit exceeded [ 557.972683][ T5490] audit: audit_lost=4058 audit_rate_limit=0 audit_backlog_limit=64 [ 558.819916][T26756] netlink: 'syz.2.8760': attribute type 13 has an invalid length. [ 559.709952][T26756] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 559.858942][T26756] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 560.882558][ T1347] netdevsim netdevsim2 netdevsim0: unset [0, 0] type 1 family 0 port 8472 - 0 [ 560.917442][ T1347] netdevsim netdevsim2 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 560.973463][ T1347] netdevsim netdevsim2 netdevsim1: unset [0, 0] type 1 family 0 port 8472 - 0 [ 561.047913][ T1347] netdevsim netdevsim2 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 561.120575][ T1347] netdevsim netdevsim2 netdevsim2: unset [0, 0] type 1 family 0 port 8472 - 0 [ 561.194650][ T1347] netdevsim netdevsim2 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 561.253485][ T1347] netdevsim netdevsim2 netdevsim3: unset [0, 0] type 1 family 0 port 8472 - 0 [ 561.311750][ T1347] netdevsim netdevsim2 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 561.623341][T26811] sp0: Synchronizing with TNC [ 562.633790][ T1308] ieee802154 phy0 wpan0: encryption failed: -22 [ 562.640203][ T1308] ieee802154 phy1 wpan1: encryption failed: -22 [ 562.732182][ T30] kauditd_printk_skb: 3241 callbacks suppressed [ 562.732200][ T30] audit: type=1400 audit(818.764:158572): avc: denied { search } for pid=26845 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 562.848238][ T30] audit: type=1400 audit(818.814:158573): avc: denied { search } for pid=26853 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 562.958253][ T30] audit: type=1400 audit(818.814:158574): avc: denied { search } for pid=26853 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 563.075769][ T30] audit: type=1400 audit(818.814:158575): avc: denied { search } for pid=26853 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 563.222546][ T30] audit: type=1400 audit(818.814:158576): avc: denied { search } for pid=26853 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 563.351851][ T30] audit: type=1400 audit(818.824:158577): avc: denied { search } for pid=26853 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 563.471713][ T30] audit: type=1400 audit(818.824:158578): avc: denied { search } for pid=26853 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 563.576391][ T30] audit: type=1400 audit(818.824:158579): avc: denied { search } for pid=26853 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 563.653575][ T30] audit: type=1400 audit(818.824:158580): avc: denied { search } for pid=26853 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 563.784408][ T30] audit: type=1400 audit(818.824:158581): avc: denied { search } for pid=26853 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 566.875379][T27001] team0: entered allmulticast mode [ 566.900310][T27001] netlink: 32 bytes leftover after parsing attributes in process `syz.0.8843'. [ 566.956645][T27001] A link change request failed with some changes committed already. Interface team0 may have been left with an inconsistent configuration, please check. [ 567.726299][T27020] trusted_key: encrypted_key: key trusted:syz not found [ 567.738694][ T30] kauditd_printk_skb: 1967 callbacks suppressed [ 567.738712][ T30] audit: type=1400 audit(823.774:160537): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 567.819579][ T5490] audit: audit_backlog=65 > audit_backlog_limit=64 [ 567.830333][T27026] audit: audit_backlog=65 > audit_backlog_limit=64 [ 567.848259][ T5490] audit: audit_lost=4097 audit_rate_limit=0 audit_backlog_limit=64 [ 567.863866][T27026] audit: audit_lost=4098 audit_rate_limit=0 audit_backlog_limit=64 [ 567.895727][ T5490] audit: backlog limit exceeded [ 567.910185][T27027] audit: audit_backlog=65 > audit_backlog_limit=64 [ 567.940923][ T5490] audit: audit_backlog=65 > audit_backlog_limit=64 [ 567.949342][ T30] audit: type=1400 audit(823.774:160538): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 567.993983][T27026] audit: backlog limit exceeded [ 572.744859][ T30] kauditd_printk_skb: 4916 callbacks suppressed [ 572.744876][ T30] audit: type=1400 audit(828.784:164821): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 572.828591][ T5490] audit: audit_backlog=65 > audit_backlog_limit=64 [ 572.847823][ T6430] audit: audit_backlog=65 > audit_backlog_limit=64 [ 572.870724][ T5490] audit: audit_lost=4311 audit_rate_limit=0 audit_backlog_limit=64 [ 572.886624][ T6430] audit: audit_lost=4312 audit_rate_limit=0 audit_backlog_limit=64 [ 572.901279][ T6429] audit: audit_backlog=65 > audit_backlog_limit=64 [ 572.922529][ T30] audit: type=1400 audit(828.784:164822): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 572.943412][ T5490] audit: backlog limit exceeded [ 572.957304][ T6430] audit: backlog limit exceeded [ 572.962317][ T6429] audit: audit_lost=4313 audit_rate_limit=0 audit_backlog_limit=64 [ 574.152486][T27175] 9p: p9: multiple sources not supported [ 576.666546][T27241] netlink: 12 bytes leftover after parsing attributes in process `syz.2.8949'. [ 577.779500][ T30] kauditd_printk_skb: 5556 callbacks suppressed [ 577.779517][ T30] audit: type=1400 audit(833.764:169562): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 577.807109][ T5490] audit: audit_backlog=65 > audit_backlog_limit=64 [ 577.832370][ T30] audit: type=1400 audit(833.784:169563): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 577.865947][T27279] audit: audit_backlog=65 > audit_backlog_limit=64 [ 577.880028][ T6429] audit: audit_backlog=65 > audit_backlog_limit=64 [ 577.880049][ T6429] audit: audit_lost=4586 audit_rate_limit=0 audit_backlog_limit=64 [ 577.880064][ T6429] audit: backlog limit exceeded [ 577.889193][ T6426] audit: audit_backlog=65 > audit_backlog_limit=64 [ 577.889212][ T6426] audit: audit_lost=4587 audit_rate_limit=0 audit_backlog_limit=64 [ 577.889227][ T6426] audit: backlog limit exceeded [ 578.949531][T27306] CUSE: unknown device info "" [ 578.981842][T27306] CUSE: unknown device info "" [ 579.008742][T27306] CUSE: unknown device info "" [ 579.039671][T27306] CUSE: unknown device info "" [ 579.065902][T27306] CUSE: unknown device info "ÿ" [ 579.087760][T27306] CUSE: unknown device info "" [ 579.121040][T27306] CUSE: unknown device info "" [ 579.147789][T27306] CUSE: unknown device info "ÿ" [ 579.174679][T27306] CUSE: DEVNAME unspecified [ 582.784009][ T30] kauditd_printk_skb: 5428 callbacks suppressed [ 582.784027][ T30] audit: type=1400 audit(838.804:174052): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 582.870734][ T5490] audit: audit_backlog=65 > audit_backlog_limit=64 [ 582.878883][ T6425] audit: audit_backlog=65 > audit_backlog_limit=64 [ 582.902339][ T5490] audit: audit_lost=4902 audit_rate_limit=0 audit_backlog_limit=64 [ 582.913121][ T6425] audit: audit_lost=4903 audit_rate_limit=0 audit_backlog_limit=64 [ 582.933328][T27408] audit: audit_backlog=65 > audit_backlog_limit=64 [ 582.949617][ T30] audit: type=1400 audit(838.814:174053): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 582.979610][ T5490] audit: backlog limit exceeded [ 582.984759][ T6425] audit: backlog limit exceeded [ 583.007030][T27408] audit: audit_lost=4904 audit_rate_limit=0 audit_backlog_limit=64 [ 587.795024][ T30] kauditd_printk_skb: 4957 callbacks suppressed [ 587.795042][ T30] audit: type=1400 audit(843.824:179001): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 587.890161][ T5490] audit: audit_backlog=65 > audit_backlog_limit=64 [ 587.917694][ T5490] audit: audit_lost=4908 audit_rate_limit=0 audit_backlog_limit=64 [ 587.938173][ T6426] audit: audit_backlog=65 > audit_backlog_limit=64 [ 587.956350][ T30] audit: type=1400 audit(843.834:179002): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 587.981376][ T5490] audit: backlog limit exceeded [ 587.992916][T27533] audit: audit_backlog=65 > audit_backlog_limit=64 [ 587.999687][ T5490] audit: audit_backlog=65 > audit_backlog_limit=64 [ 588.008345][ T6426] audit: audit_lost=4909 audit_rate_limit=0 audit_backlog_limit=64 [ 588.032263][T27533] audit: audit_lost=4910 audit_rate_limit=0 audit_backlog_limit=64 [ 589.251942][T27564] netlink: 'syz.4.9095': attribute type 21 has an invalid length. [ 589.308291][T27564] IPv6: NLM_F_CREATE should be specified when creating new route [ 589.340570][T27564] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 589.347965][T27564] IPv6: NLM_F_CREATE should be set when creating new route [ 589.355445][T27564] IPv6: NLM_F_CREATE should be set when creating new route [ 589.362733][T27564] IPv6: NLM_F_CREATE should be set when creating new route [ 589.515241][T27571] netlink: 'syz.4.9095': attribute type 21 has an invalid length. [ 589.559754][T27571] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 592.804466][ T30] kauditd_printk_skb: 5520 callbacks suppressed [ 592.804484][ T30] audit: type=1400 audit(848.834:183673): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 592.894937][ T5490] audit: audit_backlog=65 > audit_backlog_limit=64 [ 592.932376][ T5490] audit: audit_lost=5194 audit_rate_limit=0 audit_backlog_limit=64 [ 592.969742][ T30] audit: type=1400 audit(848.834:183674): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 592.996374][ T5490] audit: backlog limit exceeded [ 593.017589][ T5490] audit: audit_backlog=65 > audit_backlog_limit=64 [ 593.025314][T27655] audit: audit_backlog=65 > audit_backlog_limit=64 [ 593.042432][T27654] audit: audit_backlog=65 > audit_backlog_limit=64 [ 593.050125][T27656] audit: audit_backlog=65 > audit_backlog_limit=64 [ 593.059910][ T5490] audit: audit_lost=5195 audit_rate_limit=0 audit_backlog_limit=64 [ 594.132230][T27682] netlink: 12 bytes leftover after parsing attributes in process `syz.1.9146'. [ 597.555077][T27759] netlink: 'syz.2.9183': attribute type 1 has an invalid length. [ 597.815852][ T30] kauditd_printk_skb: 4716 callbacks suppressed [ 597.815870][ T30] audit: type=1400 audit(853.844:188384): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 597.881388][ T5490] audit: audit_backlog=65 > audit_backlog_limit=64 [ 597.897905][T27767] audit: audit_backlog=65 > audit_backlog_limit=64 [ 597.904693][ T5490] audit: audit_lost=5199 audit_rate_limit=0 audit_backlog_limit=64 [ 597.919316][ T30] audit: type=1400 audit(853.854:188385): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 597.940250][T27767] audit: audit_lost=5200 audit_rate_limit=0 audit_backlog_limit=64 [ 597.948254][ T5490] audit: backlog limit exceeded [ 597.970115][ T5490] audit: audit_backlog=65 > audit_backlog_limit=64 [ 597.983194][T27767] audit: backlog limit exceeded [ 598.010704][ T5490] audit: audit_lost=5201 audit_rate_limit=0 audit_backlog_limit=64 [ 599.741699][T27804] netlink: 4 bytes leftover after parsing attributes in process `syz.0.9204'. [ 601.678039][T27851] netlink: 'syz.0.9225': attribute type 12 has an invalid length. [ 601.693776][T27851] netlink: 132 bytes leftover after parsing attributes in process `syz.0.9225'. [ 602.825112][ T30] kauditd_printk_skb: 4824 callbacks suppressed [ 602.825130][ T30] audit: type=1400 audit(858.854:193206): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 602.852158][ T30] audit: type=1400 audit(858.874:193207): avc: denied { read write } for pid=6425 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 602.877069][ T30] audit: type=1400 audit(858.904:193208): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 602.968766][ T30] audit: type=1400 audit(858.934:193209): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 603.109357][ T30] audit: type=1400 audit(858.944:193210): avc: denied { read write } for pid=6426 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 603.258095][ T30] audit: type=1400 audit(858.954:193211): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 603.372601][ T5490] audit: audit_backlog=65 > audit_backlog_limit=64 [ 603.407899][T27909] audit: audit_backlog=65 > audit_backlog_limit=64 [ 603.415046][ T5490] audit: audit_lost=5203 audit_rate_limit=0 audit_backlog_limit=64 [ 603.415067][ T5490] audit: backlog limit exceeded [ 605.408969][T27948] team0 (unregistering): Port device team_slave_0 removed [ 605.470419][T27948] team0 (unregistering): Port device team_slave_1 removed [ 606.667927][T27983] netlink: 4 bytes leftover after parsing attributes in process `syz.3.9274'. [ 606.709841][T27987] netlink: 96 bytes leftover after parsing attributes in process `syz.4.9277'. [ 607.835559][ T30] kauditd_printk_skb: 3696 callbacks suppressed [ 607.835577][ T30] audit: type=1400 audit(863.874:196882): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 607.943897][ T30] audit: type=1400 audit(863.874:196883): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 607.975404][T28026] netlink: 4 bytes leftover after parsing attributes in process `syz.0.9291'. [ 608.018910][ T30] audit: type=1400 audit(863.874:196884): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 608.118362][ T30] audit: type=1400 audit(863.904:196885): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 608.236946][ T30] audit: type=1400 audit(863.904:196886): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 608.357315][ T5490] audit: audit_backlog=65 > audit_backlog_limit=64 [ 608.371681][ T5490] audit: audit_lost=5213 audit_rate_limit=0 audit_backlog_limit=64 [ 608.373333][ T30] audit: type=1400 audit(863.904:196887): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 608.432198][ T6425] audit: audit_backlog=65 > audit_backlog_limit=64 [ 608.445927][T28038] audit: audit_backlog=65 > audit_backlog_limit=64 [ 608.653322][T28041] ALSA: seq fatal error: cannot create timer (-19) [ 609.153029][T28050] netlink: 8 bytes leftover after parsing attributes in process `syz.0.9302'. [ 609.339884][T28056] IPVS: ip_vs_add_dest(): server weight less than zero [ 609.356425][ T6403] IPVS: starting estimator thread 0... [ 609.463768][T28059] IPVS: using max 33 ests per chain, 79200 per kthread [ 610.586500][T28089] netlink: 20 bytes leftover after parsing attributes in process `syz.1.9320'. [ 612.845824][ T30] kauditd_printk_skb: 3963 callbacks suppressed [ 612.845842][ T30] audit: type=1400 audit(868.884:200474): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 612.917582][ T5490] audit: audit_backlog=65 > audit_backlog_limit=64 [ 612.939354][ T6430] audit: audit_backlog=65 > audit_backlog_limit=64 [ 612.949840][ T5490] audit: audit_lost=5340 audit_rate_limit=0 audit_backlog_limit=64 [ 612.962316][T28155] audit: audit_backlog=66 > audit_backlog_limit=64 [ 612.976799][ T6430] audit: audit_lost=5341 audit_rate_limit=0 audit_backlog_limit=64 [ 612.987992][T28155] audit: audit_lost=5342 audit_rate_limit=0 audit_backlog_limit=64 [ 612.996120][ T5490] audit: backlog limit exceeded [ 613.001389][ T30] audit: type=1400 audit(868.884:200475): avc: denied { read write } for pid=6426 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 613.034149][ T5490] audit: audit_backlog=65 > audit_backlog_limit=64 [ 613.539807][T28167] vhci_hcd vhci_hcd.0: pdev(1) rhport(0) sockfd(3) [ 613.546374][T28167] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 613.630337][T28167] vhci_hcd vhci_hcd.0: Device attached [ 613.728142][T28168] vhci_hcd: connection closed [ 613.729939][ T1347] vhci_hcd vhci_hcd.1: stop threads [ 613.798455][ T1347] vhci_hcd vhci_hcd.1: release socket [ 613.853526][ T1347] vhci_hcd vhci_hcd.1: disconnect device [ 613.874783][ T7589] usb 35-1: new low-speed USB device number 2 using vhci_hcd [ 613.905326][ T7589] usb 35-1: enqueue for inactive port 0 [ 614.013778][ T7589] vhci_hcd vhci_hcd.1: vhci_device speed not set [ 616.799942][T28255] syz.0.9394 (28255): drop_caches: 4 [ 617.217379][T28267] tc_dump_action: action bad kind [ 617.878143][ T30] kauditd_printk_skb: 5648 callbacks suppressed [ 617.878162][ T30] audit: type=1400 audit(873.874:205520): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 617.976771][T28288] audit: audit_backlog=65 > audit_backlog_limit=64 [ 617.983590][ T5490] audit: audit_backlog=65 > audit_backlog_limit=64 [ 618.007924][ T6426] audit: audit_backlog=65 > audit_backlog_limit=64 [ 618.013471][T28287] audit: audit_backlog=65 > audit_backlog_limit=64 [ 618.021514][T28288] audit: audit_lost=5544 audit_rate_limit=0 audit_backlog_limit=64 [ 618.021539][T28288] audit: backlog limit exceeded [ 618.023086][ T5490] audit: audit_lost=5545 audit_rate_limit=0 audit_backlog_limit=64 [ 618.023105][ T5490] audit: backlog limit exceeded [ 618.023318][ T5490] audit: audit_backlog=65 > audit_backlog_limit=64 [ 618.109176][T28292] CUSE: unknown device info "€" [ 618.140659][T28292] CUSE: unknown device info "" [ 618.174955][T28292] CUSE: unknown device info "" [ 618.200676][T28292] CUSE: unknown device info "" [ 618.225791][T28292] CUSE: unknown device info "+" [ 618.242468][T28292] CUSE: unknown device info "‚" [ 618.268808][T28292] CUSE: unknown device info "" [ 618.301743][T28292] CUSE: zero length info key specified [ 618.813562][T28308] netlink: 4 bytes leftover after parsing attributes in process `syz.3.9419'. [ 618.866043][T28308] ipvlan0: entered allmulticast mode [ 618.886096][T28308] batadv0: entered allmulticast mode [ 618.908831][T28308] 8021q: adding VLAN 0 to HW filter on device ipvlan0 [ 622.890285][ T30] kauditd_printk_skb: 5186 callbacks suppressed [ 622.890303][ T30] audit: type=1400 audit(878.914:209966): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 622.989175][ T5490] audit: audit_backlog=65 > audit_backlog_limit=64 [ 623.038530][ T5490] audit: audit_lost=5794 audit_rate_limit=0 audit_backlog_limit=64 [ 623.052455][ T6426] audit: audit_backlog=65 > audit_backlog_limit=64 [ 623.071036][T28431] audit: audit_backlog=65 > audit_backlog_limit=64 [ 623.081874][ T6430] audit: audit_backlog=65 > audit_backlog_limit=64 [ 623.090986][ T5490] audit: backlog limit exceeded [ 623.103146][ T30] audit: type=1400 audit(878.924:209967): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 623.128329][ T6426] audit: audit_lost=5795 audit_rate_limit=0 audit_backlog_limit=64 [ 623.141374][ T5490] audit: audit_backlog=65 > audit_backlog_limit=64 [ 623.352162][T28438] netlink: 'syz.2.9474': attribute type 10 has an invalid length. [ 623.390805][T28438] netdevsim netdevsim2 netdevsim0: left allmulticast mode [ 623.435465][T28438] 8021q: adding VLAN 0 to HW filter on device netdevsim0 [ 623.482348][T28440] netlink: 'syz.2.9474': attribute type 10 has an invalid length. [ 623.532347][T28438] netdevsim netdevsim2 netdevsim0: entered promiscuous mode [ 623.694631][T28438] team0: Port device netdevsim0 added [ 623.731282][T28440] netdevsim netdevsim2 netdevsim0: left promiscuous mode [ 623.846990][T28440] team0: Port device netdevsim0 removed [ 623.914785][T28440] 8021q: adding VLAN 0 to HW filter on device netdevsim0 [ 623.967478][T28440] .`: (slave netdevsim0): Enslaving as an active interface with an up link [ 624.070067][ T1308] ieee802154 phy0 wpan0: encryption failed: -22 [ 624.077721][ T1308] ieee802154 phy1 wpan1: encryption failed: -22 [ 626.399134][T28505] netlink: 4 bytes leftover after parsing attributes in process `syz.0.9506'. [ 626.558691][T28505] ipvlan3: entered allmulticast mode [ 626.576251][T28505] batadv0: entered allmulticast mode [ 626.605774][T28505] 8021q: adding VLAN 0 to HW filter on device ipvlan3 [ 627.893827][ T30] kauditd_printk_skb: 4875 callbacks suppressed [ 627.893844][ T30] audit: type=1400 audit(883.934:214338): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 627.981028][ T5490] audit: audit_backlog=65 > audit_backlog_limit=64 [ 628.008318][ T5490] audit: audit_lost=5965 audit_rate_limit=0 audit_backlog_limit=64 [ 628.038178][ T30] audit: type=1400 audit(883.954:214339): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 628.076598][ T5490] audit: backlog limit exceeded [ 628.096753][T28547] audit: audit_backlog=65 > audit_backlog_limit=64 [ 628.110746][ T5490] audit: audit_backlog=65 > audit_backlog_limit=64 [ 628.132703][ T6430] audit: audit_backlog=65 > audit_backlog_limit=64 [ 628.141022][T28547] audit: audit_lost=5966 audit_rate_limit=0 audit_backlog_limit=64 [ 628.154790][ T5490] audit: audit_lost=5967 audit_rate_limit=0 audit_backlog_limit=64 [ 629.998168][T28592] netlink: 4 bytes leftover after parsing attributes in process `syz.4.9542'. [ 632.688300][T28653] netlink: 8 bytes leftover after parsing attributes in process `syz.0.9572'. [ 632.903705][ T30] kauditd_printk_skb: 4946 callbacks suppressed [ 632.903722][ T30] audit: type=1400 audit(632.939:219282): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 632.981573][ T5490] audit: audit_backlog=65 > audit_backlog_limit=64 [ 632.991825][ T6425] audit: audit_backlog=65 > audit_backlog_limit=64 [ 633.010428][ T5490] audit: audit_lost=5969 audit_rate_limit=0 audit_backlog_limit=64 [ 633.025667][ T6425] audit: audit_lost=5970 audit_rate_limit=0 audit_backlog_limit=64 [ 633.037743][ T30] audit: type=1400 audit(632.969:219283): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 633.067207][ T5490] audit: backlog limit exceeded [ 633.074064][ T6425] audit: backlog limit exceeded [ 633.084481][ T5490] audit: audit_backlog=65 > audit_backlog_limit=64 [ 633.113674][ T5490] audit: audit_lost=5971 audit_rate_limit=0 audit_backlog_limit=64 [ 636.892742][T28731] netlink: 16 bytes leftover after parsing attributes in process `syz.3.9606'. [ 637.030723][T28731] netlink: 16 bytes leftover after parsing attributes in process `syz.3.9606'. [ 637.916322][ T30] kauditd_printk_skb: 4767 callbacks suppressed [ 637.916339][ T30] audit: type=1400 audit(637.959:223966): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 637.916381][ T30] audit: type=1400 audit(637.959:223967): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 637.916634][ T30] audit: type=1400 audit(637.959:223968): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 637.930666][ T30] audit: type=1400 audit(637.969:223969): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 637.930713][ T30] audit: type=1400 audit(637.969:223970): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 637.930753][ T30] audit: type=1400 audit(637.969:223971): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 637.930793][ T30] audit: type=1400 audit(637.969:223972): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 637.930830][ T30] audit: type=1400 audit(637.969:223973): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 637.930868][ T30] audit: type=1400 audit(637.969:223974): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 637.933314][ T30] audit: type=1400 audit(637.969:223975): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 638.040796][T28755] batman_adv: batadv0: Adding interface: gretap3 [ 638.040824][T28755] batman_adv: batadv0: The MTU of interface gretap3 is too small (1462) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 638.040857][T28755] batman_adv: batadv0: Interface activated: gretap3 [ 642.925592][ T30] kauditd_printk_skb: 4971 callbacks suppressed [ 642.925610][ T30] audit: type=1400 audit(642.969:228947): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 643.020236][ T5490] audit: audit_backlog=65 > audit_backlog_limit=64 [ 643.028527][ T6424] audit: audit_backlog=65 > audit_backlog_limit=64 [ 643.058219][ T5490] audit: audit_lost=6000 audit_rate_limit=0 audit_backlog_limit=64 [ 643.080398][ T30] audit: type=1400 audit(642.969:228948): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 643.106255][ T5490] audit: backlog limit exceeded [ 643.112656][ T6424] audit: audit_lost=6001 audit_rate_limit=0 audit_backlog_limit=64 [ 643.135858][ T5490] audit: audit_backlog=65 > audit_backlog_limit=64 [ 643.163701][ T5490] audit: audit_lost=6002 audit_rate_limit=0 audit_backlog_limit=64 [ 643.184959][ T6424] audit: backlog limit exceeded [ 647.934080][ T30] kauditd_printk_skb: 4847 callbacks suppressed [ 647.934113][ T30] audit: type=1400 audit(647.979:233795): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 648.028094][ T5490] audit: audit_backlog=65 > audit_backlog_limit=64 [ 648.065151][ T5490] audit: audit_lost=6003 audit_rate_limit=0 audit_backlog_limit=64 [ 648.067988][T28948] audit: audit_backlog=65 > audit_backlog_limit=64 [ 648.095109][ T30] audit: type=1400 audit(647.999:233796): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 648.095157][ T30] audit: type=1400 audit(647.999:233797): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 648.095197][ T30] audit: type=1400 audit(647.999:233798): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 648.095236][ T30] audit: type=1400 audit(647.999:233799): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 648.095282][ T30] audit: type=1400 audit(647.999:233800): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 648.095323][ T30] audit: type=1400 audit(647.999:233801): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 652.943893][ T30] kauditd_printk_skb: 4730 callbacks suppressed [ 652.943910][ T30] audit: type=1400 audit(652.989:238529): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 653.012395][ T5490] audit: audit_backlog=65 > audit_backlog_limit=64 [ 653.041764][T29047] audit: audit_backlog=65 > audit_backlog_limit=64 [ 653.051688][ T5490] audit: audit_lost=6005 audit_rate_limit=0 audit_backlog_limit=64 [ 653.066969][T29046] sctp: [Deprecated]: syz.0.9753 (pid 29046) Use of int in max_burst socket option deprecated. [ 653.066969][T29046] Use struct sctp_assoc_value instead [ 653.092737][ T30] audit: type=1400 audit(653.009:238530): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 653.119895][ T5490] audit: backlog limit exceeded [ 653.125994][T29047] audit: audit_lost=6006 audit_rate_limit=0 audit_backlog_limit=64 [ 653.138632][ T5490] audit: audit_backlog=65 > audit_backlog_limit=64 [ 653.157191][T29047] audit: backlog limit exceeded [ 653.162155][ T5490] audit: audit_lost=6007 audit_rate_limit=0 audit_backlog_limit=64 [ 659.041453][ T30] kauditd_printk_skb: 1265 callbacks suppressed [ 659.041473][ T30] audit: type=1400 audit(659.009:239795): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 660.126681][ T30] audit: type=1400 audit(659.489:239796): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 660.177714][ T30] audit: type=1400 audit(659.539:239797): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 661.282087][ T30] audit: type=1400 audit(659.849:239798): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 663.427401][ T30] audit: type=1400 audit(659.879:239799): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 665.753249][ T30] audit: type=1400 audit(660.959:239800): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 668.042073][ T30] audit: type=1400 audit(661.339:239801): avc: denied { create } for pid=29088 comm="syz.3.9772" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 670.218954][ T30] audit: type=1400 audit(661.389:239802): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 675.077503][ T30] audit: type=1400 audit(661.399:239803): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 676.091719][ T30] audit: type=1400 audit(661.409:239804): avc: denied { read write } for pid=6426 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 678.201700][ T30] audit: type=1400 audit(661.419:239805): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 679.637047][ T30] audit: type=1400 audit(661.719:239806): avc: denied { read } for pid=29089 comm="syz.0.9771" dev="nsfs" ino=4026532847 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 682.246362][ T30] audit: type=1400 audit(661.839:239807): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 685.501304][ T30] audit: type=1400 audit(661.849:239808): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 685.650700][ T1308] ieee802154 phy0 wpan0: encryption failed: -22 [ 685.881500][ T1308] ieee802154 phy1 wpan1: encryption failed: -22 [ 687.332890][ T30] audit: type=1400 audit(662.639:239809): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 690.895905][ T30] audit: type=1400 audit(662.679:239810): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 692.700548][ T30] audit: type=1400 audit(662.739:239811): avc: denied { read write } for pid=6424 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 693.240273][ T30] audit: type=1400 audit(662.839:239812): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 693.939327][ T30] audit: type=1400 audit(662.869:239813): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 694.680055][ T30] audit: type=1400 audit(663.609:239814): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 695.364646][ T30] audit: type=1400 audit(665.219:239815): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 697.180328][ T30] audit: type=1400 audit(665.239:239816): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 701.379984][ T30] audit: type=1400 audit(666.249:239817): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 704.148080][ T30] audit: type=1400 audit(666.269:239818): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 706.840821][ T30] audit: type=1400 audit(666.719:239819): avc: denied { read write } for pid=6429 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 711.819254][ T30] audit: type=1400 audit(667.189:239820): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 713.516795][ T30] audit: type=1400 audit(668.989:239821): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 714.551198][ T30] audit: type=1400 audit(670.159:239822): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 717.966071][ T30] audit: type=1400 audit(671.039:239823): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 719.375917][ T30] audit: type=1400 audit(674.059:239824): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 726.101458][ T5490] audit: audit_backlog=65 > audit_backlog_limit=64 [ 726.640260][ T30] audit: type=1400 audit(674.129:239825): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 729.877906][ T5490] audit: audit_lost=6008 audit_rate_limit=0 audit_backlog_limit=64 [ 732.691251][ T5490] audit: backlog limit exceeded [ 736.273318][ T30] audit: type=1400 audit(674.839:239826): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 737.289572][ T5490] audit: audit_backlog=65 > audit_backlog_limit=64 [ 739.670293][ T30] audit: type=1400 audit(675.529:239827): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 740.040295][ T5490] audit: audit_lost=6009 audit_rate_limit=0 audit_backlog_limit=64 [ 740.064109][ T5490] audit: backlog limit exceeded [ 742.919705][ T30] audit: type=1400 audit(675.549:239828): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 744.889365][ T5490] audit: audit_backlog=65 > audit_backlog_limit=64 [ 745.438777][T29118] audit: audit_backlog=65 > audit_backlog_limit=64 [ 745.672179][ T30] audit: type=1400 audit(675.739:239829): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 746.033448][ T5490] audit: audit_lost=6010 audit_rate_limit=0 audit_backlog_limit=64 [ 746.879820][ T5490] audit: backlog limit exceeded [ 747.114317][ T1308] ieee802154 phy0 wpan0: encryption failed: -22 [ 747.135901][ T1308] ieee802154 phy1 wpan1: encryption failed: -22 [ 747.297988][T29118] audit: audit_lost=6011 audit_rate_limit=0 audit_backlog_limit=64 [ 753.529675][ T5490] audit: audit_backlog=65 > audit_backlog_limit=64 [ 753.573461][T29118] audit: backlog limit exceeded [ 754.341764][ T30] audit: type=1400 audit(675.759:239830): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 755.857653][ T30] audit: type=1400 audit(675.779:239831): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 755.949547][ T5490] audit: audit_lost=6012 audit_rate_limit=0 audit_backlog_limit=64 [ 758.278824][ T5490] audit: backlog limit exceeded [ 759.554830][ T30] audit: type=1400 audit(676.419:239832): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 763.308276][ T30] audit: type=1400 audit(676.429:239833): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 766.122676][ T5490] audit: audit_backlog=65 > audit_backlog_limit=64 [ 767.824904][ T5490] audit: audit_lost=6013 audit_rate_limit=0 audit_backlog_limit=64 [ 768.488415][ T30] audit: type=1400 audit(676.449:239834): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 769.173389][ T5490] audit: backlog limit exceeded [ 770.590343][T29121] audit: audit_backlog=65 > audit_backlog_limit=64 [ 770.842612][ T30] audit: type=1400 audit(676.869:239835): avc: denied { map_create } for pid=29095 comm="syz.3.9777" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 771.229324][ T5490] audit: audit_backlog=65 > audit_backlog_limit=64 [ 771.747498][T29121] audit: audit_lost=6014 audit_rate_limit=0 audit_backlog_limit=64 [ 773.114864][T29121] audit: backlog limit exceeded [ 773.142342][ T5490] audit: audit_lost=6015 audit_rate_limit=0 audit_backlog_limit=64 [ 773.727914][ T30] audit: type=1400 audit(676.899:239836): avc: denied { prog_load } for pid=29095 comm="syz.3.9777" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 775.412705][ T5490] audit: backlog limit exceeded [ 778.317801][ T5490] audit: audit_backlog=65 > audit_backlog_limit=64 [ 778.430220][ T30] audit: type=1400 audit(677.169:239837): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 779.102416][ T5490] audit: audit_lost=6016 audit_rate_limit=0 audit_backlog_limit=64 [ 779.128751][ T5490] audit: backlog limit exceeded [ 780.092055][ T5490] audit: audit_backlog=65 > audit_backlog_limit=64 [ 780.677443][T29135] audit: audit_backlog=65 > audit_backlog_limit=64 [ 781.302025][ T5490] audit: audit_lost=6017 audit_rate_limit=0 audit_backlog_limit=64 [ 781.317874][ T5490] audit: backlog limit exceeded [ 781.451068][ T30] audit: type=1400 audit(677.189:239838): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 782.009237][ T5490] audit: audit_backlog=65 > audit_backlog_limit=64 [ 785.069245][ T5490] audit_log_lost: 67 callbacks suppressed [ 785.069265][ T5490] audit: audit_lost=6019 audit_rate_limit=0 audit_backlog_limit=64 [ 788.360521][ T5490] audit: backlog limit exceeded [ 793.271549][ T30] audit: type=1400 audit(793.169:239904): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 796.648779][ T30] audit: type=1400 audit(793.499:239905): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 804.802618][ T30] audit: type=1400 audit(793.539:239906): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 808.733787][ T1308] ieee802154 phy0 wpan0: encryption failed: -22 [ 808.752247][ T1308] ieee802154 phy1 wpan1: encryption failed: -22 [ 812.479657][ T30] audit: type=1400 audit(794.209:239907): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 814.701526][ T30] audit: type=1400 audit(795.029:239908): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 819.829728][ T30] audit: type=1400 audit(795.149:239909): avc: denied { execmem } for pid=29136 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 823.233375][ T30] audit: type=1400 audit(795.399:239910): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 825.127741][ T30] audit: type=1400 audit(796.599:239911): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 828.692257][ T30] audit: type=1400 audit(805.109:239912): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 830.696238][ T30] audit: type=1400 audit(805.159:239913): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 836.390859][ T30] audit: type=1400 audit(805.189:239914): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 839.332608][ T30] audit: type=1400 audit(807.659:239915): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 840.811195][ T30] audit: type=1400 audit(810.229:239916): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 849.421187][ T30] audit: type=1400 audit(818.659:239917): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 859.182266][ T30] audit: type=1400 audit(818.689:239918): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 863.515094][ T30] audit: type=1400 audit(818.729:239919): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 868.377618][ T30] audit: type=1400 audit(823.319:239920): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 871.132490][ T1308] ieee802154 phy0 wpan0: encryption failed: -22 [ 871.220037][ T1308] ieee802154 phy1 wpan1: encryption failed: -22 [ 876.812818][ T30] audit: type=1400 audit(824.369:239921): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 880.896459][ T30] audit: type=1400 audit(863.969:239922): avc: denied { execmem } for pid=29142 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 901.201598][ T30] audit: type=1400 audit(901.229:239923): avc: denied { execmem } for pid=29147 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 912.181264][ T30] audit: type=1400 audit(912.189:239924): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 916.168327][ T30] audit: type=1400 audit(916.139:239925): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 918.536934][ T30] audit: type=1400 audit(916.789:239926): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 922.003180][ T30] audit: type=1400 audit(918.389:239927): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 922.325874][ T31] INFO: task syz.2.9689:28923 blocked for more than 144 seconds. [ 922.343651][ T31] Tainted: G L syzkaller #0 [ 922.392183][ T31] Blocked by coredump. [ 922.429500][ T31] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 922.504464][ T31] task:syz.2.9689 state:D stack:22800 pid:28923 tgid:28923 ppid:6426 task_flags:0x40064c flags:0x00080003 [ 922.590948][ T31] Call Trace: [ 922.607959][ T31] [ 922.626058][ T31] __schedule+0x10e9/0x6820 [ 922.695116][ T31] ? __pfx___schedule+0x10/0x10 [ 922.739713][ T31] ? find_held_lock+0x2b/0x80 [ 922.766569][ T31] ? schedule+0x2bf/0x390 [ 922.805208][ T31] schedule+0xdd/0x390 [ 922.838565][ T31] schedule_preempt_disabled+0x13/0x30 [ 922.887108][ T31] __mutex_lock+0xced/0x1b10 [ 922.926210][ T31] ? tun_chr_close+0x38/0x220 [ 922.964299][ T31] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 923.012702][ T31] ? __pfx___mutex_lock+0x10/0x10 [ 923.033727][ T30] audit: type=1400 audit(921.919:239928): avc: denied { execmem } for pid=29150 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 923.085355][ T31] ? locks_remove_file+0xd1/0x610 [ 923.145224][ T31] ? __pfx_locks_remove_file+0x10/0x10 [ 923.185321][ T31] ? __pfx_tun_chr_close+0x10/0x10 [ 923.206757][ T31] ? tun_chr_close+0x38/0x220 [ 923.236483][ T31] ? rtnl_lock+0x9/0x20 [ 923.270747][ T31] tun_chr_close+0x38/0x220 [ 923.302056][ T31] ? __pfx_tun_chr_close+0x10/0x10 [ 923.342757][ T31] __fput+0x3ff/0xb50 [ 923.358360][ T30] audit: type=1400 audit(923.399:239929): avc: denied { execmem } for pid=29155 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 923.393768][ T31] task_work_run+0x150/0x240 [ 923.436631][ T31] ? __pfx_task_work_run+0x10/0x10 [ 923.465474][ T31] do_exit+0x8d2/0x2a60 [ 923.493692][ T31] ? __pfx_do_exit+0x10/0x10 [ 923.502274][ T30] audit: type=1400 audit(923.429:239930): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 923.551545][ T31] ? __pfx_proc_coredump_connector+0x10/0x10 [ 923.583328][ T31] do_group_exit+0xd5/0x2a0 [ 923.623176][ T31] get_signal+0x1ec7/0x21e0 [ 923.667293][ T31] ? __pfx_get_signal+0x10/0x10 [ 923.685434][ T30] audit: type=1400 audit(923.459:239931): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 923.709662][ T31] arch_do_signal_or_restart+0x91/0x7a0 [ 923.726740][ T5490] audit: audit_backlog=65 > audit_backlog_limit=64 [ 923.740825][T29163] audit: audit_backlog=65 > audit_backlog_limit=64 [ 923.752428][ T31] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 923.771728][ T5490] audit: audit_lost=6020 audit_rate_limit=0 audit_backlog_limit=64 [ 923.794222][T29165] audit: audit_backlog=65 > audit_backlog_limit=64 [ 923.801666][ T31] ? rcu_is_watching+0x12/0xc0 [ 923.809038][T29163] audit: audit_lost=6021 audit_rate_limit=0 audit_backlog_limit=64 [ 923.817137][ T31] irqentry_exit+0x403/0x790 [ 923.822067][ T5490] audit: backlog limit exceeded [ 923.827179][ T30] audit: type=1400 audit(923.459:239932): avc: denied { read } for pid=5490 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 923.847949][T29165] audit: audit_lost=6022 audit_rate_limit=0 audit_backlog_limit=64 [ 923.860176][ T31] asm_exc_page_fault+0x26/0x30 [ 923.867038][ T5490] audit: audit_backlog=65 > audit_backlog_limit=64 [ 923.885868][ T31] RIP: 0033:0x7fac37f9c821 [ 923.912493][ T31] RSP: 002b:0000000000000030 EFLAGS: 00010217 [ 923.934983][ T31] RAX: 0000000000000000 RBX: 00007fac38216090 RCX: 00007fac37f9c819 [ 923.968848][ T31] RDX: 0000000000000000 RSI: 0000000000000030 RDI: 0000000000000600 [ 923.992400][ T31] RBP: 00007fac38032c91 R08: 0000000000000000 R09: 0000000000000000 [ 924.026748][ T31] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000000 [ 924.052378][ T31] R13: 00007fac38216128 R14: 00007fac38216090 R15: 00007ffe4f3aeff8 [ 924.140032][ T31] [ 924.149259][ T31] [ 924.149259][ T31] Showing all locks held in the system: [ 924.176877][ T31] 1 lock held by khungtaskd/31: [ 924.193867][ T31] #0: ffffffff8e7e5460 (rcu_read_lock){....}-{1:3}, at: debug_show_all_locks+0x3d/0x184 [ 924.228746][ T31] 3 locks held by kworker/u8:8/1347: [ 924.248852][ T31] #0: ffff8880343dc140 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: process_one_work+0x12d6/0x1980 [ 924.289010][ T31] #1: ffffc90005e37d08 ((work_completion)(&(&net->ipv6.addr_chk_work)->work)){+.+.}-{0:0}, at: process_one_work+0x973/0x1980 [ 924.336197][ T31] #2: ffffffff9062f7a0 (rtnl_mutex){+.+.}-{4:4}, at: addrconf_verify_work+0x12/0x30 [ 924.361508][ T31] 2 locks held by getty/5585: [ 924.374059][ T31] #0: ffff888039c3f0a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x24/0x80 [ 924.396960][ T31] #1: ffffc900032332e8 (&ldata->atomic_read_lock){+.+.}-{4:4}, at: n_tty_read+0x419/0x14f0 [ 924.420463][ T31] 1 lock held by syz-executor/6425: [ 924.425744][ T31] #0: ffffffff9062f7a0 (rtnl_mutex){+.+.}-{4:4}, at: tun_chr_close+0x38/0x220 [ 924.434783][ T31] 1 lock held by syz.3.7237/23035: [ 924.439960][ T31] #0: ffffffff9062f7a0 (rtnl_mutex){+.+.}-{4:4}, at: tun_chr_close+0x38/0x220 [ 924.449019][ T31] 2 locks held by syz.0.8597/26304: [ 924.454326][ T31] #0: ffffffff9062f7a0 (rtnl_mutex){+.+.}-{4:4}, at: tun_chr_close+0x38/0x220 [ 924.463343][ T31] #1: ffffffff8e7f0fa8 (rcu_state.exp_mutex){+.+.}-{4:4}, at: exp_funnel_lock+0x19e/0x3c0 [ 924.473445][ T31] 1 lock held by syz.2.9689/28923: [ 924.478929][ T31] #0: ffffffff9062f7a0 (rtnl_mutex){+.+.}-{4:4}, at: tun_chr_close+0x38/0x220 [ 924.503584][ T31] 6 locks held by kworker/u8:7/29123: [ 924.509019][ T31] #0: ffff88801c6d8940 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x12d6/0x1980 [ 924.533603][ T31] #1: ffffc90008b57d08 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x973/0x1980 [ 924.552265][ T31] #2: ffffffff90616e48 (pernet_ops_rwsem){++++}-{4:4}, at: cleanup_net+0xb8/0x920 [ 924.570392][ T31] #3: ffff8880618a8128 (&dev->mutex){....}-{4:4}, at: devlink_pernet_pre_exit+0x19e/0x370 [ 924.592026][ T31] #4: ffff88806189f258 (&devlink->lock_key#5){+.+.}-{4:4}, at: devlink_pernet_pre_exit+0x1b4/0x370 [ 924.617331][ T31] #5: ffffffff9062f7a0 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_net_dev_lock+0x146/0x360 [ 924.638763][ T31] 3 locks held by kworker/u8:11/29145: [ 924.651964][ T31] #0: ffff88813fe2c140 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_one_work+0x12d6/0x1980 [ 924.676387][ T31] #1: ffffc9000428fd08 ((linkwatch_work).work){+.+.}-{0:0}, at: process_one_work+0x973/0x1980 [ 924.708079][ T31] #2: ffffffff9062f7a0 (rtnl_mutex){+.+.}-{4:4}, at: linkwatch_event+0x51/0xc0 [ 924.729243][ T31] 1 lock held by dhcpcd/29158: [ 924.740573][ T31] #0: ffff888053c46e40 (&sb->s_type->i_mutex_key#13){+.+.}-{4:4}, at: __sock_release+0x86/0x260 [ 924.764583][ T31] 1 lock held by dhcpcd/29160: [ 924.776371][ T31] #0: ffff888053d8b240 (&sb->s_type->i_mutex_key#13){+.+.}-{4:4}, at: __sock_release+0x86/0x260 [ 924.799634][ T31] 1 lock held by dhcpcd/29161: [ 924.811134][ T31] #0: ffff888053d8e840 (&sb->s_type->i_mutex_key#13){+.+.}-{4:4}, at: __sock_release+0x86/0x260 [ 924.835092][ T31] 1 lock held by dhcpcd/29162: [ 924.846827][ T31] #0: ffff888053d88240 (&sb->s_type->i_mutex_key#13){+.+.}-{4:4}, at: __sock_release+0x86/0x260 [ 924.874393][ T31] 1 lock held by dhcpcd/29164: [ 924.880674][ T31] #0: ffff888053d8ca40 (&sb->s_type->i_mutex_key#13){+.+.}-{4:4}, at: __sock_release+0x86/0x260 [ 924.910344][ T31] 1 lock held by syz-executor/29181: [ 924.923623][ T31] [ 924.925994][ T31] ============================================= [ 924.925994][ T31] [ 924.945759][ T31] NMI backtrace for cpu 1 [ 924.945786][ T31] CPU: 1 UID: 0 PID: 31 Comm: khungtaskd Tainted: G L syzkaller #0 PREEMPT(full) [ 924.945815][ T31] Tainted: [L]=SOFTLOCKUP [ 924.945823][ T31] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 924.945835][ T31] Call Trace: [ 924.945852][ T31] [ 924.945860][ T31] dump_stack_lvl+0x100/0x190 [ 924.945901][ T31] nmi_cpu_backtrace.cold+0x12d/0x151 [ 924.945933][ T31] ? __pfx_nmi_raise_cpu_backtrace+0x10/0x10 [ 924.945969][ T31] nmi_trigger_cpumask_backtrace+0x1d7/0x230 [ 924.945999][ T31] sys_info+0x141/0x190 [ 924.946018][ T31] watchdog+0xcb1/0x1030 [ 924.946048][ T31] ? _raw_spin_unlock_irqrestore+0x52/0x80 [ 924.946082][ T31] ? __pfx_watchdog+0x10/0x10 [ 924.946111][ T31] ? __kthread_parkme+0x18c/0x230 [ 924.946142][ T31] ? kthread+0x13a/0x450 [ 924.946163][ T31] ? __pfx_watchdog+0x10/0x10 [ 924.946185][ T31] kthread+0x370/0x450 [ 924.946207][ T31] ? __pfx_kthread+0x10/0x10 [ 924.946231][ T31] ret_from_fork+0x72b/0xd50 [ 924.946259][ T31] ? __pfx_ret_from_fork+0x10/0x10 [ 924.946285][ T31] ? __switch_to+0x800/0x1100 [ 924.946316][ T31] ? __pfx_kthread+0x10/0x10 [ 924.946346][ T31] ret_from_fork_asm+0x1a/0x30 [ 924.946387][ T31] [ 924.946395][ T31] Sending NMI from CPU 1 to CPUs 0: [ 925.084583][ C0] NMI backtrace for cpu 0 [ 925.084600][ C0] CPU: 0 UID: 0 PID: 5490 Comm: dhcpcd Tainted: G L syzkaller #0 PREEMPT(full) [ 925.084633][ C0] Tainted: [L]=SOFTLOCKUP [ 925.084640][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 925.084651][ C0] RIP: 0010:__sanitizer_cov_trace_pc+0xf/0x70 [ 925.084678][ C0] Code: 00 00 00 5b e9 82 59 f0 02 66 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 65 8b 05 45 d5 0a 12 48 8b 34 24 <65> 48 8b 15 21 d5 0a 12 a9 00 01 ff 00 74 1b f6 c4 01 74 07 a9 00 [ 925.084697][ C0] RSP: 0018:ffffc900030bf5c8 EFLAGS: 00000282 [ 925.084712][ C0] RAX: 0000000080000001 RBX: ffff8880515e7188 RCX: ffffc900030bf8b0 [ 925.084725][ C0] RDX: ffffc900030bf9e0 RSI: ffffffff84b63986 RDI: ffff8880515e7188 [ 925.084739][ C0] RBP: ffff88802fc45ea0 R08: 0000000000000002 R09: 0000000000000275 [ 925.084751][ C0] R10: 0000000000000384 R11: 0000000000000000 R12: ffffc900030bf9e0 [ 925.084763][ C0] R13: 0000000000000600 R14: ffffc900030bf9e0 R15: dffffc0000000000 [ 925.084775][ C0] FS: 00007f3b141f9780(0000) GS:ffff8881242db000(0000) knlGS:0000000000000000 [ 925.084793][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 925.084806][ C0] CR2: 00007f5d35f48700 CR3: 000000002b380000 CR4: 00000000003526f0 [ 925.084818][ C0] Call Trace: [ 925.084824][ C0] [ 925.084830][ C0] cond_compute_av+0x26/0x350 [ 925.084859][ C0] ? avtab_search_node+0x318/0x490 [ 925.084885][ C0] context_struct_compute_av+0x81f/0x1250 [ 925.084915][ C0] ? __pfx_context_struct_compute_av+0x10/0x10 [ 925.084942][ C0] security_compute_av+0x5ea/0x11e0 [ 925.084969][ C0] avc_compute_av+0x84/0x820 [ 925.084992][ C0] ? __lock_acquire+0x4a5/0x2630 [ 925.085017][ C0] avc_perm_nonode+0xb1/0x180 [ 925.085041][ C0] ? __pfx_avc_perm_nonode+0x10/0x10 [ 925.085067][ C0] ? find_held_lock+0x2b/0x80 [ 925.085084][ C0] ? avc_has_perm_noaudit+0x2b3/0x3b0 [ 925.085108][ C0] ? avc_has_perm_noaudit+0x2b3/0x3b0 [ 925.085136][ C0] avc_has_perm_noaudit+0x2d4/0x3b0 [ 925.085163][ C0] avc_has_perm+0xbd/0x1e0 [ 925.085187][ C0] ? __pfx_avc_has_perm+0x10/0x10 [ 925.085217][ C0] selinux_socket_unix_may_send+0x1e6/0x2b0 [ 925.085247][ C0] ? __pfx_selinux_socket_unix_may_send+0x10/0x10 [ 925.085276][ C0] ? __pfx_hook_unix_may_send+0x10/0x10 [ 925.085304][ C0] ? __pfx_do_raw_spin_lock+0x10/0x10 [ 925.085333][ C0] security_unix_may_send+0xc4/0x210 [ 925.085355][ C0] unix_dgram_sendmsg+0xb38/0x1810 [ 925.085384][ C0] ? __pfx_unix_dgram_sendmsg+0x10/0x10 [ 925.085409][ C0] ? __pfx____sys_recvmsg+0x10/0x10 [ 925.085436][ C0] __sys_sendto+0x468/0x4b0 [ 925.085459][ C0] ? __pfx_unix_dgram_sendmsg+0x10/0x10 [ 925.085483][ C0] ? __pfx___sys_sendto+0x10/0x10 [ 925.085519][ C0] ? find_held_lock+0x2b/0x80 [ 925.085536][ C0] ? __task_pid_nr_ns+0x1ca/0x510 [ 925.085556][ C0] ? __task_pid_nr_ns+0x1ca/0x510 [ 925.085578][ C0] __x64_sys_sendto+0xe0/0x1c0 [ 925.085602][ C0] ? do_syscall_64+0x90/0xf80 [ 925.085632][ C0] ? lockdep_hardirqs_on+0x78/0x100 [ 925.085657][ C0] do_syscall_64+0x10b/0xf80 [ 925.085681][ C0] ? clear_bhb_loop+0x40/0x90 [ 925.085702][ C0] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 925.085721][ C0] RIP: 0033:0x7f3b14283407 [ 925.085735][ C0] Code: 48 89 fa 4c 89 df e8 38 aa 00 00 8b 93 08 03 00 00 59 5e 48 83 f8 fc 74 1a 5b c3 0f 1f 84 00 00 00 00 00 48 8b 44 24 10 0f 05 <5b> c3 0f 1f 80 00 00 00 00 83 e2 39 83 fa 08 75 de e8 23 ff ff ff [ 925.085752][ C0] RSP: 002b:00007ffeddf6ce70 EFLAGS: 00000202 ORIG_RAX: 000000000000002c [ 925.085772][ C0] RAX: ffffffffffffffda RBX: 00007f3b141f9780 RCX: 00007f3b14283407 [ 925.085784][ C0] RDX: 000000000000003f RSI: 00007ffeddf6cfb0 RDI: 0000000000000003 [ 925.085795][ C0] RBP: 00007ffeddf6d3e0 R08: 0000000000000000 R09: 0000000000000000 [ 925.085807][ C0] R10: 0000000000004000 R11: 0000000000000202 R12: 00007ffeddf6d830 [ 925.085819][ C0] R13: 00007ffeddf6cfb0 R14: 000000000000001d R15: 00007ffeddf6cfb0 [ 925.085839][ C0] [ 925.484607][ T31] Kernel panic - not syncing: hung_task: blocked tasks [ 925.491484][ T31] CPU: 1 UID: 0 PID: 31 Comm: khungtaskd Tainted: G L syzkaller #0 PREEMPT(full) [ 925.502169][ T31] Tainted: [L]=SOFTLOCKUP [ 925.506489][ T31] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 925.516638][ T31] Call Trace: [ 925.519918][ T31] [ 925.522848][ T31] dump_stack_lvl+0x100/0x190 [ 925.527540][ T31] vpanic+0x552/0x970 [ 925.531534][ T31] ? __pfx_vpanic+0x10/0x10 [ 925.536063][ T31] ? nmi_trigger_cpumask_backtrace+0x182/0x230 [ 925.542227][ T31] ? nmi_trigger_cpumask_backtrace+0x182/0x230 [ 925.548397][ T31] panic+0xd1/0xe0 [ 925.552126][ T31] ? __pfx_panic+0x10/0x10 [ 925.556548][ T31] ? nmi_trigger_cpumask_backtrace+0x1b5/0x230 [ 925.562720][ T31] ? nmi_trigger_cpumask_backtrace+0x1f6/0x230 [ 925.568886][ T31] ? nmi_trigger_cpumask_backtrace+0x200/0x230 [ 925.575045][ T31] ? watchdog.cold+0x1ec/0x234 [ 925.579827][ T31] ? watchdog+0xcc1/0x1030 [ 925.584257][ T31] watchdog.cold+0x1fd/0x234 [ 925.588858][ T31] ? _raw_spin_unlock_irqrestore+0x52/0x80 [ 925.594675][ T31] ? __pfx_watchdog+0x10/0x10 [ 925.599345][ T31] ? __kthread_parkme+0x18c/0x230 [ 925.604359][ T31] ? kthread+0x13a/0x450 [ 925.608590][ T31] ? __pfx_watchdog+0x10/0x10 [ 925.613254][ T31] kthread+0x370/0x450 [ 925.617315][ T31] ? __pfx_kthread+0x10/0x10 [ 925.621908][ T31] ret_from_fork+0x72b/0xd50 [ 925.626492][ T31] ? __pfx_ret_from_fork+0x10/0x10 [ 925.631595][ T31] ? __switch_to+0x800/0x1100 [ 925.636266][ T31] ? __pfx_kthread+0x10/0x10 [ 925.640844][ T31] ret_from_fork_asm+0x1a/0x30 [ 925.645612][ T31] [ 925.649133][ T31] Kernel Offset: disabled [ 925.653476][ T31] Rebooting in 86400 seconds..