last executing test programs: 2m19.891948552s ago: executing program 2 (id=5689): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x3, &(0x7f0000000000)=0x9, 0x4) 2m19.628241554s ago: executing program 2 (id=5694): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x38, 0x9, 0x6, 0x201, 0x0, 0x0, {0x2, 0x0, 0xffff}, [@IPSET_ATTR_DATA={0x10, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @multicast2}}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x40c0080) 2m19.568937809s ago: executing program 3 (id=5696): r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f00000001c0)={0x400, 0x280, 0x7eebaadd414f0bd, 0x0, 0x0, 0x0, 0x32, 0x0, {}, {}, {0x0, 0x0, 0xfffffffc}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}) 2m19.523529813s ago: executing program 0 (id=5697): mmap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x0, 0x3032, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0xd}]}]}}, &(0x7f0000001f40)=""/4093, 0x32, 0xffd, 0xa, 0x0, 0x0, @void, @value}, 0x28) 2m19.393580481s ago: executing program 2 (id=5699): r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000001a40)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x12}}, @in={0x2, 0x0, @dev}, @in={0x2, 0x0, @local}, @in={0x2, 0x0, @multicast1}], 0x40) 2m19.321643161s ago: executing program 3 (id=5700): r0 = syz_open_dev$dri(&(0x7f0000000040), 0xd21, 0x0) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000100)={0x4}) 2m19.275363629s ago: executing program 0 (id=5702): r0 = syz_usb_connect(0x0, 0x38, &(0x7f0000000500)=ANY=[@ANYBLOB="12010000c166a0108304341276ff010203010902260001000000000904"], 0x0) syz_usb_control_io$cdc_ncm(r0, &(0x7f00000002c0)={0x14, 0x0, &(0x7f0000000280)={0x0, 0x3, 0x1a, {0x1a}}}, 0x0) 2m19.14349418s ago: executing program 2 (id=5704): r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x2a800, 0x0) preadv(r0, &(0x7f0000000240)=[{&(0x7f0000033a80)=""/102386, 0xfffffd6e}], 0x1, 0x0, 0x0) 2m19.090094662s ago: executing program 3 (id=5705): r0 = syz_open_procfs(0x0, &(0x7f0000000080)='timerslack_ns\x00') write$cgroup_devices(r0, 0x0, 0x9) 2m18.87320181s ago: executing program 3 (id=5708): r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, 0x0, 0x0) 2m18.864561069s ago: executing program 1 (id=5709): capset(&(0x7f0000000280)={0x20071026}, &(0x7f0000000340)) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 2m18.845379449s ago: executing program 4 (id=5710): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfe80, &(0x7f00000005c0)=[{&(0x7f0000000940)="2e00000010008188e6b62aa73772cc9f1ba1f8482e0000005e140602000000000e000a001000000002800000128c", 0x2e}], 0x1}, 0x0) 2m18.665672689s ago: executing program 3 (id=5711): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000004c0)=@ipv6_delrule={0x1c, 0x21, 0x129, 0x40000, 0x0, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xd}}, 0x1c}}, 0x44) 2m18.665133613s ago: executing program 1 (id=5712): keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='u`date '], 0x7a, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180), &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 2m18.620229132s ago: executing program 4 (id=5713): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000003c0)="a3", 0x1}], 0x1, &(0x7f00000000c0)=[@rights={{0x14, 0x1, 0x1, [r0]}}], 0x18}, 0x20040001) 2m18.485612466s ago: executing program 0 (id=5714): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x4, &(0x7f00000005c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x29}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x0, 0x10, 0x10, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) 2m18.325604023s ago: executing program 3 (id=5715): r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$UHID_INPUT(r0, &(0x7f0000002080)={0xfc, {"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", 0x1000}}, 0x1006) 2m18.318913403s ago: executing program 4 (id=5716): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01040000000000000000010000020900010073797a30000000002c000000030a010200000000000000000100fffe0900010073797a30000000000900030073797a30130000007c000000060a010400000000000000000100000008000b400000000054000480400001800e000100696d6d6564696174650000002c0002800800014002000000040002801c0002801800028008000180fffffffc0900020073797a3000000000100001800a0001006c696d69740000000900010073797a30"], 0xf0}}, 0x0) 2m18.312317763s ago: executing program 1 (id=5717): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x58, 0x2, 0x6, 0x301, 0x0, 0x0, {0x7}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x0, 0x0, 0x93}]}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}]}, 0x58}}, 0x8080) 2m18.189021493s ago: executing program 0 (id=5718): r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_mreqsrc(r0, 0x0, 0x53, &(0x7f0000000080)={@dev, @local, @broadcast}, &(0x7f00000000c0)=0x6) 2m18.051973192s ago: executing program 4 (id=5719): r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/power/wakeup_count', 0x101a02, 0x0) sendfile(r0, r0, 0x0, 0x6) 2m18.042710878s ago: executing program 1 (id=5720): r0 = socket$inet6(0xa, 0x2, 0x3a) sendmmsg$inet6(r0, &(0x7f0000000780)=[{{&(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @private=0xa010100}}, 0x1c, &(0x7f0000000180)=[{&(0x7f0000000000)="8000102e7577d401", 0x8}], 0x1}}], 0x1, 0x0) 2m17.903362512s ago: executing program 0 (id=5721): r0 = syz_open_dev$video4linux(&(0x7f00000000c0), 0x6, 0x101400) ioctl$VIDIOC_G_CTRL(r0, 0xc008561b, &(0x7f0000000100)={0x4, 0x80000000}) 2m17.899086204s ago: executing program 2 (id=5722): r0 = syz_open_procfs(0x0, &(0x7f0000000000)='oom_score_adj\x00') preadv(r0, &(0x7f0000000300)=[{&(0x7f0000000040)=""/3, 0x3}, {0x0, 0x3}], 0x2, 0x0, 0x0) 2m17.79308788s ago: executing program 1 (id=5723): r0 = fsopen(&(0x7f0000000040)='devpts\x00', 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f00000000c0)='\x00', &(0x7f0000000100)='./file0\x00', 0xffffffffffffff9c) 2m17.786115403s ago: executing program 4 (id=5724): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000440)={{}, {0x10}}, 0x24, 0x0) 2m17.717384424s ago: executing program 0 (id=5725): r0 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000080)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x9, 0x0, 0x300}}) 2m17.631243148s ago: executing program 2 (id=5726): r0 = syz_open_dev$I2C(&(0x7f0000000000), 0x0, 0x0) ioctl$I2C_SMBUS(r0, 0x720, &(0x7f0000000500)={0x1, 0x0, 0x2, &(0x7f0000000540)={0x0, "0500e7d85c8bbfe6931aa54bce5d926e7908d527733a7700000000000000000100"}}) 2m17.591610496s ago: executing program 1 (id=5727): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newtaction={0x54, 0x30, 0x1, 0x0, 0x0, {}, [{0x40, 0x1, [@m_gact={0x3c, 0x1, 0x0, 0x0, {{0xd}, {0x10, 0x2, 0x0, 0x1, [@TCA_GACT_PROB={0xc, 0x3, {0x1, 0xd3b, 0x10000000}}]}, {0x4}, {0xc}, {0xc, 0x8, {0x0, 0x2}}}}]}]}, 0x54}}, 0x0) 2m17.589824064s ago: executing program 4 (id=5728): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000040)={0x50, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x50}, 0x1, 0x0, 0x0, 0x40001}, 0x800) 0s ago: executing program 32 (id=5725): r0 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000080)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x9, 0x0, 0x300}}) kernel console output (not intermixed with test programs): 3132] [ 239.617501][T13144] ieee802154 phy0 wpan0: encryption failed: -22 [ 239.667528][T13148] netlink: 48 bytes leftover after parsing attributes in process `syz.4.3432'. [ 239.844270][T13158] netlink: 8 bytes leftover after parsing attributes in process `syz.0.3437'. [ 239.869511][T13158] netlink: 4 bytes leftover after parsing attributes in process `syz.0.3437'. [ 239.880628][T13162] netdevsim netdevsim2 netdevsim1: Unsupported IPsec algorithm [ 240.014581][ T29] kauditd_printk_skb: 698 callbacks suppressed [ 240.014598][ T29] audit: type=1400 audit(2000000001.150:2740): avc: denied { open } for pid=13170 comm="syz.0.3443" path="net:[4026532807]" dev="nsfs" ino=4026532807 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 240.067123][ T29] audit: type=1400 audit(2000000001.150:2741): avc: denied { create } for pid=13170 comm="syz.0.3443" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 240.067161][ T29] audit: type=1400 audit(2000000001.159:2742): avc: denied { ioctl } for pid=13170 comm="syz.0.3443" path="socket:[29648]" dev="sockfs" ino=29648 ioctlcmd=0x890b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 240.067191][ T29] audit: type=1400 audit(2000000001.187:2743): avc: denied { read write } for pid=5826 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 240.067220][ T29] audit: type=1400 audit(2000000001.187:2744): avc: denied { open } for pid=5826 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 240.067248][ T29] audit: type=1400 audit(2000000001.187:2745): avc: denied { ioctl } for pid=5826 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=647 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 240.067278][ T29] audit: type=1400 audit(2000000001.197:2746): avc: denied { create } for pid=13169 comm="syz.1.3444" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 240.072420][ T29] audit: type=1400 audit(2000000001.206:2747): avc: denied { read } for pid=13175 comm="syz.4.3446" name="v4l-subdev0" dev="devtmpfs" ino=940 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 240.072459][ T29] audit: type=1400 audit(2000000001.206:2748): avc: denied { open } for pid=13175 comm="syz.4.3446" path="/dev/v4l-subdev0" dev="devtmpfs" ino=940 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 240.073399][ T29] audit: type=1400 audit(2000000001.206:2749): avc: denied { ioctl } for pid=13175 comm="syz.4.3446" path="/dev/v4l-subdev0" dev="devtmpfs" ino=940 ioctlcmd=0x561c scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 240.140719][T13178] netlink: 'syz.0.3447': attribute type 21 has an invalid length. [ 240.199592][ C1] vkms_vblank_simulate: vblank timer overrun [ 240.305072][ C1] vkms_vblank_simulate: vblank timer overrun [ 240.505284][T13203] netlink: 'syz.3.3460': attribute type 21 has an invalid length. [ 240.513292][T13203] netlink: 'syz.3.3460': attribute type 1 has an invalid length. [ 240.871921][T13229] binder: 13227:13229 ioctl c0306201 20000580 returned -22 [ 241.094490][T13246] netlink: 8 bytes leftover after parsing attributes in process `syz.1.3480'. [ 241.308237][ T964] usb 3-1: new full-speed USB device number 86 using dummy_hcd [ 241.502781][ T964] usb 3-1: unable to get BOS descriptor or descriptor too short [ 241.523188][ T964] usb 3-1: not running at top speed; connect to a high speed hub [ 241.543918][ T964] usb 3-1: config 17 has an invalid interface number: 8 but max is 1 [ 241.563667][ T964] usb 3-1: config 17 has an invalid descriptor of length 0, skipping remainder of the config [ 241.588473][ T964] usb 3-1: config 17 has 1 interface, different from the descriptor's value: 2 [ 241.612344][ T964] usb 3-1: config 17 has no interface number 0 [ 241.629387][ T964] usb 3-1: config 17 interface 8 altsetting 6 endpoint 0x9 has an invalid bInterval 0, changing to 10 [ 241.650044][ T964] usb 3-1: config 17 interface 8 altsetting 6 endpoint 0x9 has invalid maxpacket 1024, setting to 64 [ 241.668929][ T964] usb 3-1: config 17 interface 8 has no altsetting 0 [ 241.686378][ T964] usb 3-1: New USB device found, idVendor=0763, idProduct=2001, bcdDevice=2c.ff [ 241.707681][ T964] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 241.725352][ T964] usb 3-1: Product: syz [ 241.733718][ T964] usb 3-1: Manufacturer: syz [ 241.743289][ T964] usb 3-1: SerialNumber: syz [ 241.747523][T13297] usb usb8: usbfs: process 13297 (syz.1.3505) did not claim interface 0 before use [ 241.760818][T13245] raw-gadget.0 gadget.2: fail, usb_ep_enable returned -22 [ 241.822154][T13300] netlink: 180 bytes leftover after parsing attributes in process `syz.4.3507'. [ 241.868056][T13305] xt_CT: You must specify a L4 protocol and not use inversions on it [ 242.022716][T13316] openvswitch: netlink: Flow actions attr not present in new flow. [ 242.069113][ T964] usb 3-1: selecting invalid altsetting 0 [ 242.102755][ T964] usb 3-1: USB disconnect, device number 86 [ 242.284095][ T5839] udevd[5839]: error opening ATTR{/sys/devices/platform/dummy_hcd.2/usb3/3-1/3-1:17.8/sound/card3/controlC3/../uevent} for writing: No such file or directory [ 242.597857][T13359] REISERFS warning (device nbd3): super-6502 reiserfs_getopt: unknown mount option "Yrba" [ 243.034854][T13390] netlink: 28 bytes leftover after parsing attributes in process `syz.0.3550'. [ 243.043969][T13390] netlink: 8 bytes leftover after parsing attributes in process `syz.0.3550'. [ 243.321368][T13416] netlink: 'syz.4.3562': attribute type 6 has an invalid length. [ 243.476797][T13427] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 243.671721][T13442] tmpfs: Bad value for 'grpquota_inode_hardlimit' [ 244.297846][T13491] dvmrp0: entered allmulticast mode [ 244.355155][T13494] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable [ 244.365964][ T5876] usb 4-1: new high-speed USB device number 85 using dummy_hcd [ 244.654539][ T5876] usb 4-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 244.664058][ T5876] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 244.695242][ T5876] usb 4-1: Product: syz [ 244.716167][ T5876] usb 4-1: Manufacturer: syz [ 244.726927][ T5876] usb 4-1: SerialNumber: syz [ 244.753790][ T5876] usb 4-1: ath9k_htc: Firmware ath9k_htc/htc_9271-1.4.0.fw requested [ 244.790725][ T5915] usb 4-1: ath9k_htc: Transferred FW: ath9k_htc/htc_9271-1.4.0.fw, size: 51008 [ 245.290241][ T6012] usb 4-1: USB disconnect, device number 85 [ 245.400306][ T29] kauditd_printk_skb: 744 callbacks suppressed [ 245.400322][ T29] audit: type=1400 audit(2000000006.192:3494): avc: denied { read write } for pid=5826 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 245.483515][ T29] audit: type=1400 audit(2000000006.192:3495): avc: denied { open } for pid=5826 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 245.507737][ C1] vkms_vblank_simulate: vblank timer overrun [ 245.573686][ T29] audit: type=1400 audit(2000000006.192:3496): avc: denied { ioctl } for pid=5826 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=647 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 245.599258][ C1] vkms_vblank_simulate: vblank timer overrun [ 245.650531][ T29] audit: type=1400 audit(2000000006.220:3497): avc: denied { read write } for pid=5826 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 245.685675][ T29] audit: type=1400 audit(2000000006.220:3498): avc: denied { open } for pid=5826 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 245.712857][T13577] tmpfs: Unknown parameter '"' [ 245.744791][ T29] audit: type=1400 audit(2000000006.220:3499): avc: denied { ioctl } for pid=5826 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=647 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 245.809390][T13585] netlink: 'syz.0.3647': attribute type 11 has an invalid length. [ 245.813705][ T29] audit: type=1400 audit(2000000006.239:3500): avc: denied { read write } for pid=5834 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 245.891663][ T29] audit: type=1400 audit(2000000006.239:3501): avc: denied { open } for pid=5834 comm="syz-executor" path="/dev/loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 245.915787][ C1] vkms_vblank_simulate: vblank timer overrun [ 245.927436][ T5915] ath9k_htc 4-1:1.0: ath9k_htc: Target is unresponsive [ 245.939950][ T964] usb 3-1: new high-speed USB device number 87 using dummy_hcd [ 245.949784][ T5915] ath9k_htc: Failed to initialize the device [ 245.957100][ T6012] usb 4-1: ath9k_htc: USB layer deinitialized [ 245.976041][ T29] audit: type=1400 audit(2000000006.239:3502): avc: denied { ioctl } for pid=5834 comm="syz-executor" path="/dev/loop4" dev="devtmpfs" ino=651 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 246.013653][ T29] audit: type=1400 audit(2000000006.248:3503): avc: denied { create } for pid=13562 comm="syz.0.3636" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 246.103670][T13604] xt_l2tp: v2 tid > 0xffff: 262144 [ 246.129907][ T964] usb 3-1: Using ep0 maxpacket: 16 [ 246.136915][ T964] usb 3-1: config 4 has an invalid interface number: 51 but max is 0 [ 246.146605][ T964] usb 3-1: config 4 has no interface number 0 [ 246.152272][T13606] 8021q: adding VLAN 0 to HW filter on device team0 [ 246.162281][T13606] bond0: (slave team0): Enslaving as an active interface with an up link [ 246.180209][ T964] usb 3-1: config 4 interface 51 altsetting 2 bulk endpoint 0x1 has invalid maxpacket 16 [ 246.199840][ T964] usb 3-1: config 4 interface 51 altsetting 2 bulk endpoint 0x82 has invalid maxpacket 64 [ 246.210882][ T964] usb 3-1: config 4 interface 51 has no altsetting 0 [ 246.220993][ T964] usb 3-1: New USB device found, idVendor=954f, idProduct=4199, bcdDevice= f.76 [ 246.240706][ T964] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 246.252265][ T964] usb 3-1: Product: syz [ 246.256485][ T964] usb 3-1: Manufacturer: syz [ 246.288975][ T964] usb 3-1: SerialNumber: syz [ 246.327054][T13574] raw-gadget.0 gadget.2: fail, usb_ep_enable returned -22 [ 246.350008][T13574] raw-gadget.0 gadget.2: fail, usb_ep_enable returned -22 [ 246.627398][T13574] raw-gadget.0 gadget.2: fail, usb_ep_enable returned -22 [ 246.646857][T13574] raw-gadget.0 gadget.2: fail, usb_ep_enable returned -22 [ 246.708488][ T964] cdc_eem 3-1:4.51 usb0: register 'cdc_eem' at usb-dummy_hcd.2-1, CDC EEM Device, 42:22:0e:a4:d6:d8 [ 246.998048][ T5876] usb 3-1: USB disconnect, device number 87 [ 247.007619][ T5876] cdc_eem 3-1:4.51 usb0: unregister 'cdc_eem' usb-dummy_hcd.2-1, CDC EEM Device [ 247.447403][T13702] openvswitch: netlink: Flow set message rejected, Key attribute missing. [ 247.643169][T13718] bridge2: trying to set multicast query interval below minimum, setting to 100 (1000ms) [ 247.654122][T13719] netlink: 'syz.0.3706': attribute type 33 has an invalid length. [ 247.701189][T13719] netlink: 199836 bytes leftover after parsing attributes in process `syz.0.3706'. [ 247.725117][T13724] netlink: 48 bytes leftover after parsing attributes in process `syz.3.3708'. [ 248.489091][T13778] IPv6: NLM_F_CREATE should be specified when creating new route [ 248.695547][T13796] netlink: 168 bytes leftover after parsing attributes in process `syz.1.3735'. [ 249.197190][T13831] netlink: 8 bytes leftover after parsing attributes in process `syz.2.3751'. [ 249.218763][T13824] xt_CT: No such helper "netbios-ns" [ 249.361739][T13842] x_tables: ip_tables: REDIRECT target: used from hooks POSTROUTING, but only usable from PREROUTING/OUTPUT [ 249.648069][T13861] netlink: 4 bytes leftover after parsing attributes in process `syz.0.3767'. [ 249.718782][T13870] netlink: 8 bytes leftover after parsing attributes in process `syz.3.3772'. [ 249.774960][T13873] (unnamed net_device) (uninitialized): option all_slaves_active: invalid value (14) [ 250.179201][T13903] netlink: 'syz.4.3788': attribute type 1 has an invalid length. [ 250.221225][T13903] netlink: 8 bytes leftover after parsing attributes in process `syz.4.3788'. [ 250.458767][T13928] netlink: 20 bytes leftover after parsing attributes in process `syz.4.3799'. [ 250.756890][ T29] kauditd_printk_skb: 787 callbacks suppressed [ 250.756906][ T29] audit: type=1400 audit(2000000011.196:4291): avc: denied { read write } for pid=5827 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 250.787488][ C1] vkms_vblank_simulate: vblank timer overrun [ 250.883095][ T29] audit: type=1400 audit(2000000011.196:4292): avc: denied { read write open } for pid=5827 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 250.920347][ T29] audit: type=1400 audit(2000000011.196:4293): avc: denied { ioctl } for pid=5827 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=649 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 250.945889][ C1] vkms_vblank_simulate: vblank timer overrun [ 250.952362][ T29] audit: type=1400 audit(2000000011.215:4294): avc: denied { read write } for pid=5837 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 250.976703][ T29] audit: type=1400 audit(2000000011.215:4295): avc: denied { open } for pid=5837 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 251.000752][ C1] vkms_vblank_simulate: vblank timer overrun [ 251.006990][ T29] audit: type=1400 audit(2000000011.215:4296): avc: denied { ioctl } for pid=5837 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=650 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 251.032718][ T29] audit: type=1400 audit(2000000011.234:4297): avc: denied { map_create } for pid=13951 comm="syz.0.3808" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 251.052270][ T29] audit: type=1400 audit(2000000011.234:4298): avc: denied { perfmon } for pid=13951 comm="syz.0.3808" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 251.079302][ T29] audit: type=1400 audit(2000000011.234:4299): avc: denied { map_read map_write } for pid=13951 comm="syz.0.3808" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 251.099785][ T29] audit: type=1400 audit(2000000011.262:4300): avc: denied { read write } for pid=5826 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 251.123949][ C1] vkms_vblank_simulate: vblank timer overrun [ 251.146290][T13976] netlink: 12 bytes leftover after parsing attributes in process `syz.0.3819'. [ 251.171879][T13976] netlink: 12 bytes leftover after parsing attributes in process `syz.0.3819'. [ 251.994060][T14032] netlink: 'syz.2.3846': attribute type 10 has an invalid length. [ 252.022646][T14032] hsr0: entered promiscuous mode [ 252.047374][T14032] bond0: (slave hsr0): enslaved VLAN challenged slave. Adding VLANs will be blocked as long as it is part of bond. [ 252.081280][T14032] bond0: (slave hsr0): The slave device specified does not support setting the MAC address [ 252.095209][T14032] hsr0: A HSR master's MTU cannot be greater than the smallest MTU of its slaves minus the HSR Tag length (6 octets). [ 252.125544][T14032] bond0: (slave hsr0): Error -22 calling dev_set_mtu [ 252.410159][T14046] xt_ipvs: protocol family 7 not supported [ 252.940628][T14085] binder: 14084:14085 ioctl c0046209 0 returned -22 [ 253.029407][T14094] xt_hashlimit: max too large, truncated to 1048576 [ 253.066569][T14091] SELinux: policydb string does not match my string SE Linux [ 253.074681][T14091] SELinux: failed to load policy [ 253.202821][T14105] __nla_validate_parse: 1 callbacks suppressed [ 253.202837][T14105] netlink: 256 bytes leftover after parsing attributes in process `syz.4.3882'. [ 253.269319][T14110] netlink: 8 bytes leftover after parsing attributes in process `syz.1.3886'. [ 253.309320][T14115] netlink: 'syz.2.3887': attribute type 9 has an invalid length. [ 253.318167][T14115] netlink: 'syz.2.3887': attribute type 7 has an invalid length. [ 253.356458][T14115] netlink: 'syz.2.3887': attribute type 8 has an invalid length. [ 253.735388][T14145] bond0: Error: Cannot enslave bond to itself. [ 254.137453][T14175] netlink: 36 bytes leftover after parsing attributes in process `syz.1.3918'. [ 254.414878][T14197] netlink: ct family unspecified [ 254.419896][T14197] openvswitch: netlink: Actions may not be safe on all matching packets [ 254.500413][T14203] netlink: 'syz.2.3932': attribute type 6 has an invalid length. [ 254.510037][T14203] IPv6: NLM_F_CREATE should be specified when creating new route [ 254.635751][T14212] netlink: 16 bytes leftover after parsing attributes in process `syz.3.3938'. [ 255.166451][T14251] netlink: 20 bytes leftover after parsing attributes in process `syz.0.3956'. [ 255.177001][T14251] netlink: 68 bytes leftover after parsing attributes in process `syz.0.3956'. [ 255.193880][T14258] netlink: 24 bytes leftover after parsing attributes in process `syz.4.3957'. [ 255.274071][T14261] usb usb4: usbfs: process 14261 (syz.4.3961) did not claim interface 0 before use [ 255.939149][T14313] xt_CT: You must specify a L4 protocol and not use inversions on it [ 256.042094][T14319] ax25_connect(): syz.2.3989 uses autobind, please contact jreuter@yaina.de [ 256.092863][ T68] usb 2-1: new high-speed USB device number 74 using dummy_hcd [ 256.111822][ T29] kauditd_printk_skb: 669 callbacks suppressed [ 256.111838][ T29] audit: type=1400 audit(2000000016.210:4970): avc: denied { ioctl } for pid=14316 comm="syz.3.3988" path="/dev/raw-gadget" dev="devtmpfs" ino=820 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 256.183208][ T29] audit: type=1400 audit(2000000016.210:4971): avc: denied { ioctl } for pid=14297 comm="syz.1.3979" path="/dev/raw-gadget" dev="devtmpfs" ino=820 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 256.214413][ T29] audit: type=1400 audit(2000000016.219:4972): avc: denied { read write } for pid=5834 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 256.241808][ T29] audit: type=1400 audit(2000000016.219:4973): avc: denied { read write open } for pid=5834 comm="syz-executor" path="/dev/loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 256.266940][ T964] usb 4-1: new full-speed USB device number 86 using dummy_hcd [ 256.296595][ T68] usb 2-1: Using ep0 maxpacket: 16 [ 256.302525][ T29] audit: type=1400 audit(2000000016.219:4974): avc: denied { ioctl } for pid=5834 comm="syz-executor" path="/dev/loop4" dev="devtmpfs" ino=651 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 256.303578][ T68] usb 2-1: config 0 has an invalid interface number: 214 but max is 0 [ 256.330589][ T29] audit: type=1400 audit(2000000016.238:4975): avc: denied { read write } for pid=5827 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 256.376752][ T68] usb 2-1: config 0 has no interface number 0 [ 256.406632][ T29] audit: type=1400 audit(2000000016.247:4976): avc: denied { read write open } for pid=5827 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 256.417321][ T68] usb 2-1: config 0 interface 214 altsetting 0 endpoint 0x83 has invalid maxpacket 1023, setting to 64 [ 256.453451][ T29] audit: type=1400 audit(2000000016.247:4977): avc: denied { ioctl } for pid=5827 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=649 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 256.465379][ T964] usb 4-1: unable to get BOS descriptor or descriptor too short [ 256.479248][ T29] audit: type=1400 audit(2000000016.247:4978): avc: denied { mounton } for pid=14328 comm="syz.4.3995" path="/828/bus" dev="tmpfs" ino=4172 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 256.501737][ T964] usb 4-1: not running at top speed; connect to a high speed hub [ 256.509283][ T29] audit: type=1400 audit(2000000016.275:4979): avc: denied { ioctl } for pid=14316 comm="syz.3.3988" path="/dev/raw-gadget" dev="devtmpfs" ino=820 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 256.533383][ T68] usb 2-1: New USB device found, idVendor=0596, idProduct=0001, bcdDevice= 5.f5 [ 256.573578][ T964] usb 4-1: config 2 has an invalid interface number: 212 but max is 1 [ 256.592297][ T68] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 256.600906][ T964] usb 4-1: config 2 has an invalid interface number: 226 but max is 1 [ 256.610220][ T68] usb 2-1: Product: syz [ 256.614511][ T964] usb 4-1: config 2 has an invalid descriptor of length 0, skipping remainder of the config [ 256.632564][ T68] usb 2-1: Manufacturer: syz [ 256.637529][ T68] usb 2-1: SerialNumber: syz [ 256.642639][ T964] usb 4-1: config 2 has no interface number 0 [ 256.648747][ T964] usb 4-1: config 2 has no interface number 1 [ 256.658645][ T68] usb 2-1: config 0 descriptor?? [ 256.665638][ T964] usb 4-1: config 2 interface 212 altsetting 9 has 0 endpoint descriptors, different from the interface descriptor's value: 1 [ 256.682923][ T964] usb 4-1: config 2 interface 226 altsetting 0 endpoint 0x1 has invalid maxpacket 512, setting to 64 [ 256.694191][ T964] usb 4-1: config 2 interface 226 altsetting 0 endpoint 0x85 has an invalid bInterval 0, changing to 10 [ 256.706199][T14349] xt_limit: Overflow, try lower: 1207959552/384 [ 256.719739][ T964] usb 4-1: config 2 interface 226 altsetting 0 endpoint 0x85 has invalid wMaxPacketSize 0 [ 256.740933][ T964] usb 4-1: config 2 interface 212 has no altsetting 0 [ 256.754343][ T964] usb 4-1: New USB device found, idVendor=0738, idProduct=4540, bcdDevice=c6.ce [ 256.767382][ T964] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 256.775763][ T964] usb 4-1: Product: syz [ 256.787539][ T964] usb 4-1: Manufacturer: syz [ 256.797124][ T964] usb 4-1: SerialNumber: syz [ 256.850813][T14358] snd_dummy snd_dummy.0: control 0:0:0:syz0:0 is already present [ 256.916272][ T68] usbtouchscreen 2-1:0.214: Failed to read FW rev: 0 [ 256.926905][ T68] usbtouchscreen 2-1:0.214: probe with driver usbtouchscreen failed with error -5 [ 257.075135][ T964] usb 4-1: USB disconnect, device number 86 [ 257.169477][ T68] usb 2-1: USB disconnect, device number 74 [ 257.815272][T14430] xt_hashlimit: overflow, try lower: 67/0 [ 258.070994][T14455] kAFS: unable to lookup cell '/' May 18 03:33:38 syzkaller kern.err kernel: [ 258.070994][T14455] kAFS: unable to lookup cell '/' [ 259.380265][T14572] xt_time: invalid argument - start or stop time greater than 23:59:59 May 18 03:33:39 syzkaller kern.info kernel: [ 259.380265][T14572] xt_time: invalid argument - start or stop time greater than 23:59:59 [ 259.701736][T14601] xt_l2tp: missing protocol rule (udp|l2tpip) May 18 03:33:39 syzkaller kern.info kernel: [ 259.701736][T14601] xt_l2tp: missing protocol rule (udp|l2tpip) [ 260.702013][T14690] xt_ecn: cannot match TCP bits for non-tcp packets May 18 03:33:40 syzkaller kern.info kernel: [ 260.702013][T14690] xt_ecn: cannot match TCP bits for non-tcp packets [ 261.466344][ T29] kauditd_printk_skb: 362 callbacks suppressed [ 261.466362][ T29] audit: type=1400 audit(2000000021.214:5342): avc: denied { read } for pid=14754 comm="syz.0.4206" name="fb0" dev="devtmpfs" ino=629 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=0 May 18 03:33:41 syzkaller kern.warn kernel: [ 261.466344][ T29] kauditd_printk_skb: 362 callbacks suppressed May 18 03:33:41 syzkaller kern.notice kernel: [ 261.466362][ T29] audit: typ[ 261.512836][ T29] audit: type=1400 audit(2000000021.224:5343): avc: denied { read write } for pid=5837 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 e=1400 audit(2000000021.214:5342): avc: denied { read } for pid=14754 comm="syz.0.4206" name="fb0" dev="devtmpfs" ino=629 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_de May 18 03:33:41 syzkaller kern.notice kernel: [ 261.512836][ T29] audit: type=1400 audit(2000000021.224:5343): avc: denied { read write } for pid=5837 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 261.607706][ T29] audit: type=1400 audit(2000000021.242:5344): avc: denied { read } for pid=5180 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 18 03:33:41 syzkaller kern.notice kernel: [ 261.607706][ T29] audit: type=1400 audit(2000000021.242:5344): avc: denied { read } for pid=5180 comm="syslogd" name="log" dev="sda1" ino=[ 261.647090][ T29] audit: type=1400 audit(2000000021.252:5345): avc: denied { read write } for pid=5834 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= May 18 03:33:41 syzkaller kern.notice kernel: [ 261.647090][ T29] audit: type=1400 audit(2000000021.252:5345): avc: denied { read write } for pid=5834 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 261.711927][ T29] audit: type=1400 audit(2000000021.252:5346): avc: denied { read } for pid=5180 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 18 03:33:41 syzkaller kern.notice kernel: [ 261.711927][ T29] audit: type=1400 audit(2000000021.252:5346): avc: denied { read } for pid=5180 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:obje[ 261.757405][ T29] audit: type=1400 audit(2000000021.289:5347): avc: denied { read } for pid=5180 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ct_r:var_t tclass= [ 261.791123][T14780] xt_policy: input policy not valid in POSTROUTING and OUTPUT May 18 03:33:41 syzkaller kern.notice kernel: [ 261.757405][ T29] audit: type=1400 audit(2000000021.289:5347): avc: denied { read } for pid=5180 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= May 18 03:33:41 syzkaller kern.info kernel: [ 261.791123][T14780] xt_policy: input policy not valid in POSTROUTING and OUTPUT [ 261.845309][ T29] audit: type=1400 audit(2000000021.299:5348): avc: denied { read write } for pid=5826 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 18 03:33:41 syzkaller kern.notice kernel: [ 261.845309][ T29] audit: type=1400 audit(2000000021.299:5348)[ 261.886472][ T29] audit: type=1400 audit(2000000021.308:5349): avc: denied { read write } for pid=5827 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 : avc: denied { read write } for pid=5826 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi May 18 03:33:41 syzkaller kern.notice kernel: [ 261.886472][ T29] audit: type=1400 audit(2000000021.308:5349): avc: denied { read write } for pid=5827 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 261.968030][ T29] audit: type=1400 audit(2000000021.317:5350): avc: denied { read write } for pid=5831 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 18 03:33:41 syzkaller kern.notice kernel: [ 261.968030][ T29] audit: type=1400 audit(2000000021.317:5350): avc: denied { read write } for pid=5831 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 262.055289][ T29] audit: type=1400 audit(2000000021.364:5351): avc: denied { read write } for pid=5837 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 18 03:33:41 syzkaller kern.notice kernel: [ 262.055289][ T29] audit: type=1400 audit(2000000021.364:5351): avc: denied { read write } for pid=5837 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 262.620900][T14848] ebt_limit: overflow, try lower: 570423552/2483027968 May 18 03:33:42 syzkaller kern.info kernel: [ 262.620900][T14848] ebt_limit: overflow, try lower: 570423552/2483027968 [ 263.715687][ T5139] Bluetooth: hci4: command 0x0c1a tx timeout May 18 03:33:43 syzkaller kern.err kernel: [ 263.715687][ T5139] Bluetooth: hci4: command 0x0c1a tx timeout [ 264.022530][T14976] ipt_rpfilter: unknown options [ 264.028352][T14977] netlink: 'syz.2.4316': attribute type 2 has an invalid length. May 18 03:33:43 syzkaller kern.info kernel: [ 264.022530][T14976] ipt_rpfilter: unknown options May 18 03:33:43 syzkaller kern.warn kernel: [ 264.028352][T14977] netlink: 'syz.2.4316': attribute type 2 has an invalid length. [ 265.389509][T15101] SET target dimension over the limit! May 18 03:33:44 syzkaller kern.info kernel: [ 265.389509][T15101] SET target dimension over the limit! [ 265.599439][ T1297] ieee802154 phy0 wpan0: encryption failed: -22 [ 265.605822][ T1297] ieee802154 phy1 wpan1: encryption failed: -22 May 18 03:33:45 syzkaller kern.warn kernel: [ 265.599439][ T1297] ieee802154 phy0 wpan0: encryption failed: -22 May 18 03:33:45 syzkaller kern.warn kernel: [ 265.605822][ T1297] ieee802154 phy1 wpan1: encryption failed: -22 [ 265.962923][T15142] net veth1_virt_wifi : renamed from virt_wifi0 May 18 03:33:45 syzkaller kern.info kernel: [ 265.962923][T15142] net veth1_virt_wifi : renamed from virt_wifi0 [ 266.830201][ T29] kauditd_printk_skb: 323 callbacks suppressed [ 266.830220][ T29] audit: type=1400 audit(2000000026.237:5675): avc: denied { read write } for pid=5826 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 18 03:33:46 syzkaller kern.warn kernel: [ 266.830201][ T29] kauditd_printk_skb: 323 callbacks suppressed May 18 03:33:46 syzkaller kern.notice kernel: [ 266.830220][ T29] audit: type=1400 audit(2000000026.237:5675): avc: denied { read write } for pid=5826 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 266.925752][ T29] audit: type=1400 audit(2000000026.256:5676): avc: denied { create } for pid=15216 comm="syz.0.4438" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 May 18 03:33:46 syzkaller kern.notice kernel: [ 266.925752][ T29] audit: type=1400 audit(2000000026.256:5676): avc: denied { create } for pid=15216 comm="syz.0.4438" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permis [ 267.003585][ T29] audit: type=1400 audit(2000000026.266:5677): avc: denied { read write } for pid=5827 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 18 03:33:46 syzkaller kern.notice kernel: [ 267.003585][ T29] audit: type=1400 audit(2000000026.266:5677): avc: denied { read write } for pid=5827 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 267.085230][ T29] audit: type=1400 audit(2000000026.266:5678): avc: denied { read } for pid=5180 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 18 03:33:46 syzkaller kern.notice kernel: [ 267.085230][ T29] audit: type=1400 audit(2000000026.266:5678): avc: denied { read } for pid=5180 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 267.150712][ T29] audit: type=1400 audit(2000000026.266:5679): avc: denied { read } for pid=5180 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 18 03:33:46 syzkaller kern.n[ 267.207614][ T29] audit: type=1400 audit(2000000026.266:5680): avc: denied { read write } for pid=5837 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 otice kernel: [ 267.150712][ T29] audit: type=1400 audit(2000000026.266:5679): avc: denied { read } for pid=5180 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= May 18 03:33:46 syzkaller kern.notice kernel: [ 267.207614][ T29] audit: type=1400 audit(2000000026.266:5680): avc: denied { read write } for pid=5837 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 267.289464][ T29] audit: type=1400 audit(2000000026.275:5681): avc: denied { read write } for pid=5834 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 18 03:33:46 syzkaller kern.notice kernel: [ [ 267.319936][T15249] : renamed from bond_slave_0 (while UP) 267.289464][ T29] audit: type=1400 audit(2000000026.275:5681): avc: denied { read write } for pid=5834 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi May 18 03:33:46 syzkaller kern.info kernel: [ 267.319936][T15249] : renamed from bond_slave_0 (while UP) [ 267.358026][ T29] audit: type=1400 audit(2000000026.275:5682): avc: denied { read write } for pid=5826 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 18 03:33:46 syzkaller kern.notice kernel: [ 267.358026][ T29] audit: type=1400 audit(2000000026.275:5682): avc: denied { read write } for pid=5826 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 267.425706][ T29] audit: type=1326 audit(2000000026.322:5683): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15219 comm="syz.0.4440" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f558cd7e719 code=0x7ffc0000 May 18 03:33:46 syzkaller kern.notice kernel: [ 267.425706][ T29] audit: type=1326 audit(2000000026.322:5683): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=152[ 267.478190][ T29] audit: type=1326 audit(2000000026.322:5684): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15219 comm="syz.0.4440" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f558cd7e719 code=0x7ffc0000 19 comm="syz.0.4440" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 comp May 18 03:33:46 syzkaller kern.notice kernel: [ 267.478190][ T29] audit: type=1326 audit(2000000026.322:5684): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15219 comm="syz.0.4440" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 comp [ 267.760355][T15287] SET target dimension over the limit! May 18 03:33:47 syzkaller kern.info kernel: [ 267.760355][T15287] SET target dimension over the limit! [ 268.460807][T15353] netlink: 'syz.4.4503': attribute type 29 has an invalid length. [ 268.478872][T15353] netlink: 4 bytes leftover after parsing attributes in process `syz.4.4503'. May 18 03:33:47 syzkaller kern.warn kernel: [ 268.460807][T15353] netlink: 'syz.4.4503': attribute type 29 has an invalid length. May 18 03:33:47 syzkaller kern.warn kernel: [ 268.478872][T15353] netlink: 4 bytes leftover after parsing attributes in process `syz.4.4503'. [ 269.642019][T15462] Cannot find del_set index 2 as target May 18 03:33:48 syzkaller kern.info kernel: [ 269.642019][T15462] Cannot find del_set index 2 as target [ 270.314102][T15523] netlink: 'syz.1.4587': attribute type 5 has an invalid length. May 18 03:33:49 syzkaller kern.warn kernel: [ 270.314102][T15523] netlink: 'syz.1.4587': attribute type 5 has an invalid length. [ 272.205279][ T29] kauditd_printk_skb: 386 callbacks suppressed [ 272.205294][ T29] audit: type=1400 audit(2000000031.270:6071): avc: denied { read write } for pid=5827 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 18 03:33:51 [ 272.251157][ T29] audit: type=1400 audit(2000000031.279:6072): avc: denied { read write } for pid=5834 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 syzkaller kern.warn kernel: [ 272.205279][ T29] kauditd_printk_skb: 386 callbacks suppressed May 18 03:33:51[ 272.284579][ T29] audit: type=1400 audit(2000000031.289:6073): avc: denied { create } for pid=15703 comm="syz.2.4679" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 syzkaller kern.notice kernel: [ 272.205294][ T29] audit: type=1400 audit(2000000031.270:6071): avc: denied { read write } for pid=5827 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi May 18 03:33:51 syzkaller kern.notice kernel: [ 272.251157][ T29] audit: type=1400 audit(2000000031.279:6072): avc: denied { read write } for pid=5834 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi May 18 03:33:51 syzkaller kern.notice kernel: [ 272.28[ 272.355186][ T29] audit: type=1400 audit(2000000031.298:6074): avc: denied { read write } for pid=5827 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 4579][ T29] audit: type=1400 audit(2000000031.289:6073): avc: denied { create } for pid=15703 comm="syz.2.4679" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 May 18 03:33:51 syzkaller kern.notice kernel: [ 272.355186][ T29] audit: type=1400 audit(2000000031.298:6074): avc: denied { read write } for pid=5827 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scont[ 272.416684][ T29] audit: type=1400 audit(2000000031.298:6075): avc: denied { read write } for pid=5831 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 ext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi May 18 03:33:51 syzkaller kern.notice kernel: [ 272.416684][ T29] audit: type=1400 audit(2000000031.298:6075): avc: denied { read write } for pid=5831 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 272.507180][ T29] audit: type=1400 audit(2000000031.307:6076): avc: denied { read write } for pid=5826 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 18 03:33:51 syzkaller kern.notice kernel: [ 272.507180][ T29] audit: type=1400 audit(2000000031.307:6076): avc: denied { read write } for pid=5826 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 272.573124][ T29] audit: type=1400 audit(2000000031.307:6077): avc: denied { read } for pid=5180 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 18 03:33:51 syzkaller kern.notice kernel: [ 272.573124][ T29] audit: type=1400 audit(2000000031.307:6077): avc: denied { read } for pid=5180 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=sy[ 272.619908][ T29] audit: type=1400 audit(2000000031.307:6078): avc: denied { read } for pid=5180 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 stem_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= May 18 03:33:51 syzkaller kern.notice kernel: [ 272.619908][ T29] audit: type=1400 audit(2000000031.307:6078): avc: denied { read } for pid=5180 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 272.706444][ T29] audit: type=1400 audit(2000000031.326:6079): avc: denied { read } for pid=15705 comm="syz.3.4678" name="binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=0 May 18 03:33:51 syzkaller kern.notice kernel: [ 272.706444][ T29] audit: type=1400 audit(2000000031.326:6079): avc: denied { read } for pid=15705 comm="syz.3.4678" name="[ 272.747685][ T29] audit: type=1400 audit(2000000031.335:6080): avc: denied { read } for pid=5180 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t May 18 03:33:51 syzkaller kern.notice kernel: [ 272.747685][ T29] audit: type=1400 audit(2000000031.335:6080): avc: denied { read } for pid=5180 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 274.484213][T15903] netlink: 16 bytes leftover after parsing attributes in process `syz.2.4778'. May 18 03:33:53 syzkaller kern.warn kernel: [ 274.484213][T15903] netlink: 16 bytes leftover after parsing attributes in process `syz.2.4778'. [ 275.746211][T16021] x_tables: eb_tables: snat.0 target: invalid size 16 (kernel) != (user) 0 May 18 03:33:54 syzkaller kern.err kernel: [ 275.746211][T16021] x_tables: eb_tables: snat.0 target: invalid size 16 (kernel) != (user) 0 [ 275.921005][T16036] xt_addrtype: ipv6 BLACKHOLE matching not supported May 18 03:33:54 syzkaller kern.info kernel: [ 275.921005][T16036] xt_addrtype: ipv6 BLACKHOLE matching not supported [ 276.142777][T16057] ebt_among: wrong size: 1048 against expected 710676, rounded to 710680 May 18 03:33:55 syzkaller kern.err kernel: [ 276.142777][T16057] ebt_among: wrong size: 1048 against expected 710676, rounded to 710680 [ 277.054921][T16139] xt_addrtype: ipv6 PROHIBIT (THROW, NAT ..) matching not supported May 18 03:33:55 syzkaller kern.info kernel: [ 277.054921][T16139] xt_addrtype: ipv6 PROHIBIT (THROW, NAT ..) matching not supported [ 277.568694][ T29] kauditd_printk_skb: 368 callbacks suppressed [ 277.568711][ T29] audit: type=1400 audit(2000000036.274:6449): avc: denied { read write } for pid=5834 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 18 03:33:56 syzkaller kern.warn kernel: [ 277.568694][ T2[ 277.606895][ T29] audit: type=1400 audit(2000000036.284:6450): avc: denied { create } for pid=16185 comm="syz.0.4917" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 9] kauditd_printk_skb: 368 callbacks suppressed [ 277.628193][ T29] audit: type=1400 audit(2000000036.302:6451): avc: denied { read write } for pid=5837 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 277.628228][ T29] audit: type=1400 audit(2000000036.312:6452): avc: denied { read write } for pid=5826 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 277.628258][ T29] audit: type=1400 audit(2000000036.312:6453): avc: denied { read } for pid=5180 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 277.628288][ T29] audit: type=1400 audit(2000000036.321:6454): avc: denied { create } for pid=16186 comm="syz.1.4918" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 277.628319][ T29] audit: type=1400 audit(2000000036.321:6455): avc: denied { read } for pid=5180 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 277.649428][ T29] audit: type=1400 audit(2000000036.349:6456): avc: denied { read } for pid=16191 comm="syz.0.4921" name="video9" dev="devtmpfs" ino=957 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l_device_t tclass=chr_file permissive=0 May 18 03:33:56 [ 277.711202][ C0] vkms_vblank_simulate: vblank timer overrun syzkaller kern.n[ 277.784911][ T29] audit: type=1400 audit(2000000036.405:6457): avc: denied { read write } for pid=5827 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 otice kernel: [ [ 277.810008][ T29] audit: type=1400 audit(2000000036.489:6458): avc: denied { read write } for pid=5831 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 277.568711][ [ 277.835341][ C0] vkms_vblank_simulate: vblank timer overrun T29] audit: type=1400 audit(2000000036.274:6449): avc: denied { read write } for pid=5834 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi May 18 03:33:56 syzkaller kern.notice kernel: [ 277.606895][ T29] audit: type=1400 audit(2000000036.284:6450): avc: denied { create } for pid=16185 comm="syz.0.4917" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive= May 18 03:33:56 syzkaller kern.notice kernel: [ 277.628193][ T29] audit: type=1400 audit(2000000036.302:6451): avc: denied { read write } for pid=5837 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi May 18 03:33:56 syzkaller kern.notice kernel: [ 277.628228][ T29] audit: type=1400 audit(2000000036.312:6452): avc: denied { read write } for pid=5826 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi May 18 03:33:56 syzkaller kern.notice kernel: [ 277.628258][ T29] audit: type=1400 audit(2000000036.312:6453): avc: denied { read } for pid=5180 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= May 18 03:33:56 syzkaller kern.notice kernel: [ 277.628288][ T29] audit: type=1400 audit(2000000036.321:6454): avc: denied { create } for pid=16186 comm="syz.1.4918" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permis May 18 03:33:56 syzkaller kern.notice kernel: [ 277.628319][ T29] audit: type=1400 audit(2000000036.321:6455): avc: denied { read } for pid=5180 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= May 18 03:33:56 syzkaller kern.notice kernel: [ 277.649428][ T29] audit: type=1400 audit(2000000036.349:6456): avc: denied { read } for pid=16191 comm="syz.0.4921" name="video9" dev="devtmpfs" ino=957 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l_devi May 18 03:33:56 syzkaller kern.warn kernel: [ 277.711202][ C0] vkms_vblank_simulate: vblank timer overrun May 18 03:33:56 syzkaller kern.notice kernel: [ 277.784911][ T29] audit: type=1400 audit(2000000036.405:6457): avc: denied { read write } for pid=5827 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi May 18 03:33:56 syzkaller kern.notice kernel: [ 277.810008][ T29] audit: type=1400 audit(2000000036.489:6458): avc: denied { read write } for pid=5831 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi May 18 03:33:56 syzkaller kern.warn kernel: [ 277.835341][ C0] vkms_vblank_simulate: vblank timer overrun [ 280.207278][T16417] xt_recent: hitcount (262144) is larger than allowed maximum (65535) May 18 03:33:58 syzkaller kern.info kernel: [ 280.207278][T16417] xt_recent: hitcount (262144) is larger than allowed maximum (65535) [ 280.554453][T16448] sock: sock_timestamping_bind_phc: sock not bind to device May 18 03:33:59 syzkaller kern.err kernel: [ 280.554453][T16448] sock: sock_timestamping_bind_phc: sock not bind to device [ 281.555379][T16544] xt_CT: You must specify a L4 protocol and not use inversions on it May 18 03:34:00 syzkaller kern.info kernel: [ 281.555379][T16544] xt_CT: You must specify a L4 protocol and not use inversions on it [ 281.794807][T16562] block device autoloading is deprecated and will be removed. [ 281.803163][T16562] syz.1.5103: attempt to access beyond end of device [ 281.803163][T16562] md0: rw=2048, sector=0, nr_sectors = 8 limit=0 May 18 03:34:00 syzkaller kern.warn kernel: [ 281.794807][T16562] block device autoloading is deprecated and will be removed. May 18 03:34:00 syzkaller kern.info kernel: [ 281.803163][T16562] syz.1.5103: attempt to access beyond end of device May 18 03:34:00 syzkaller kern.info kernel: [ 281.803163][T16562] md0: rw=2048, sector=0, nr_sectors = 8 limit=0 May 18 03:34:00 syzkaller kern.debug kernel: [ 281.865330][T16562] PM: Image not found (code -5) [ 282.574276][T16633] veth0_macvtap: left promiscuous mode May 18 03:34:00 syzkaller kern.info kernel: [ 2[ 282.593472][T16633] macvtap0: entered allmulticast mode 82.574276][T16633] veth0_macvtap: left promiscuous mode May 18 03:34:00 syzkaller kern.info kernel: [ 282.593472][T16633] macvtap0: entered allmulticast mode [ 282.713689][T16646] __vm_enough_memory: pid: 16646, comm: syz.0.5143, bytes: 4503599627366400 not enough memory for the allocation May 18 03:34:01 syzkaller kern.warn kernel: [ 282.713689][T16646] __vm_enough_memory: pid: 16646, comm: syz.0.5143, bytes: 4503599627366400 not enough memory for the allocation [ 282.930163][ T29] kauditd_printk_skb: 380 callbacks suppressed [ 282.930180][ T29] audit: type=1400 audit(2000000041.297:6840): avc: denied { create } for pid=16665 comm="syz.3.5154" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 May 18 03:34:01 syzkaller kern.warn kernel: [ 282.930163][ T29] kauditd_printk_skb: 380 callbacks suppressed May 18 03:34:01 syzkaller kern.notice kernel: [ 282.930180][ T29] audit: type=1400 audit(2000000041.297:6840): avc: denied { create } for pid=16665 comm="syz.3.5154" sco[ 282.985604][ T29] audit: type=1400 audit(2000000041.325:6841): avc: denied { read } for pid=5180 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ntext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permis May 18 03:34:01 syzkaller kern.notice kernel: [ 282.985604][ T29] audit: type=1400 audit(2000000041.325:6841): avc: denied { read } for pid=5180 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclas[ 283.058767][ T29] audit: type=1400 audit(2000000041.325:6842): avc: denied { read } for pid=5180 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 s= May 18 03:34:01 syzkaller kern.notice kernel: [ 283.058767][ T29] audit: type=1400 audit(2000000041.325:6842): avc: denied { read } for pid=5180 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:obje[ 283.105162][ T29] audit: type=1400 audit(2000000041.288:6839): avc: denied { read write } for pid=5826 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 ct_r:var_t tclass= May 18 03:34:01 syzkaller kern.notice kernel: [ 283.105162][ T29] audit: type=1400 audit(2000000041.288:6839): avc: denied { read write } for pid=5826 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 283.182455][ T29] audit: type=1400 audit(2000000041.344:6843): avc: denied { lock } for pid=16667 comm="syz.1.5156" path="socket:[42365]" dev="sockfs" ino=42365 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_route_socket permissive=0 May 18 03:34:01 syzkaller kern.notice kernel: [ 283.182455][ T29] audit: type=1400 audit(2000000041.344:6843): avc: denied { lock } for pid=16667 comm="syz.1.5156" path="socket:[42365]" dev="sockfs" ino=42365 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysa [ 283.246147][ T29] audit: type=1400 audit(2000000041.382:6844): avc: denied { read write } for pid=5827 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 18 03:34:01 syzkaller kern.notice kernel: [ 283.246147][ T29] audit: type=1400 audit(2000000041.382:6844): avc: denied { read write } for pid=5827 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 283.315446][ T29] audit: type=1400 audit(2000000041.382:6845): avc: denied { read write } for pid=5837 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 18 03:34:01 syzkaller kern.notice kernel: [ 283.315446][ T29] audit: type=1400 audit(2000000041.382:6845): avc: denied { read write } for pid=5837 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 283.378428][ T29] audit: type=1400 audit(2000000041.400:6846): avc: denied { read } for pid=5180 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 18 03:34:01 syzkaller kern.notice kernel: [ 283.378428][ T29] audit: type=1400 audit(2000000041.400:6846): avc: denied { read } for pid=5180 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:[ 283.421553][ T29] audit: type=1326 audit(2000000041.400:6847): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16673 comm="syz.0.5158" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f558cd7e719 code=0x7ffc0000 syslogd_t tcontext=system_u:object_r:var_t tclass= May 18 03:34:01 syzkaller kern.notice kernel: [ 283.421553][ T29] audit: type=1326 audit(2000000041.400:6847): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16673 comm="syz.0.5158" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 comp [ 283.485523][ T29] audit: type=1326 audit(2000000041.400:6848): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16673 comm="syz.0.5158" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f558cd7e719 code=0x7ffc0000 May 18 03:34:01 syzkaller kern.notice kernel: [ 283.485523][ T29] audit: type=1326 audit(2000000041.400:6848): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16673 comm="syz.0.5158" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 comp [ 283.592546][T16715] ptrace attach of "./syz-executor exec"[5827] was attempted by "./syz-executor exec"[16715] May 18 03:34:01 syzkaller kern.notice kernel: [ 283.592546][T16715] ptrace attach of "./syz-executor exec"[5827] was attempted by "./syz-executor exec"[16715] [ 283.833122][T16736] xt_CT: You must specify a L4 protocol and not use inversions on it May 18 03:34:02 syzkaller kern.info kernel: [ 283.833122][T16736] xt_CT: You must specify a L4 protocol and not use inversions on it [ 285.052245][T16843] netlink: 4 bytes leftover after parsing attributes in process `syz.1.5243'. May 18 03:34:03 [ 285.094470][T16847] PKCS8: Unsupported PKCS#8 version syzkaller kern.warn kernel: [ 285.052245][T16843] netlink: 4 bytes leftover after parsing attributes in process `syz.1.5243'. May 18 03:34:03 syzkaller kern.warn kernel: [ 285.094470][T16847] PKCS8: Unsupported PKCS#8 version [ 287.250511][T17049] [U] ]pO>%&: May 18 03:34:05 syzkaller kern.info kernel: [ 287.250511][T1704[ 287.263099][T17048] [U] Vr7' 9] [U] ^F]^\pO^V>^\^T%&:^] May 18 03:34:05 syzkaller kern.info kernel: [ 287.263099][T17048] [U] Vr7' [ 287.337728][T17055] Unknown options in mask 6000 May 18 03:34:05 syzkaller kern.info kernel: [ 287.337728][T17055] Unknown options in mask 6000 [ 287.928556][T17108] netlink: 8 bytes leftover after parsing attributes in process `syz.1.5372'. May 18 03:34:06 syzkaller kern.warn kernel: [ 287.928556][T17108] netlink: 8 bytes leftover after parsing attributes in process `syz.1.5372'. [ 288.140452][T17128] netlink: 10 bytes leftover after parsing attributes in process `syz.1.5383'. May 18 03:34:06 syzkaller kern.warn kernel: [ 288.140452][T17128] netlink: 10 bytes leftover after parsing attributes in process `syz.1.5383'. [ 288.283939][ T29] kauditd_printk_skb: 343 callbacks suppressed [ 288.283955][ T29] audit: type=1400 audit(2000000046.311:7192): avc: denied { read write } for pid=5831 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 18 03:34:06 [ 288.320470][ T29] audit: type=1400 audit(2000000046.311:7193): avc: denied { read write } for pid=5826 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 syzkaller kern.warn kernel: [ 288.283939][ T29] kauditd_printk_skb: 343 callbacks suppressed May 18 03:34:06 syzkaller kern.notice kernel: [ 288.283955][ T29] audit: typ[ 288.360676][ T29] audit: type=1400 audit(2000000046.311:7194): avc: denied { prog_load } for pid=17139 comm="syz.3.5389" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 e=1400 audit(2000000046.311:7192): avc: denied { read write } for pid=5831 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi May 18 03:34:06 syzkaller kern.notice kernel: [ 288.320470[ 288.401962][ T29] audit: type=1400 audit(2000000046.339:7195): avc: denied { read } for pid=5180 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ][ T29] audit: type=1400 audit(2000000046.311:7193): avc: denied { read write } for pid=5826 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi May 18 03:34:06 syzkaller kern.notice kernel: [ 288.360676][ T29] audit: type=1400 audit(2000000046.311:7194): avc: denied { prog_load } for pid=17139 comm="syz.3.5389" scontext[ 288.458160][ T29] audit: type=1400 audit(2000000046.339:7196): avc: denied { read } for pid=5180 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 =root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 May 18 03:34:06 syzkaller kern.notice kernel: [ 288.401962][ T29] audit: type=1400 audit(2000000046.339:7195): avc: denied { read } for pid=5180 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= May 18 03:34:06 syzkaller kern.notice kernel: [ 288.458160][ T29] audit: type=1400 audit(2000000046.339:7196): avc: denied { read } for pid=5180 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 288.541691][ T29] audit: type=1400 audit(2000000046.339:7197): avc: denied { read } for pid=17140 comm="syz.2.5390" dev="nsfs" ino=4026532944 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 May 18 03:34:06 syzkaller kern.notice kernel: [ 288.541691][ T29] audit: type=1400 audit(2000000046.339:7197): avc: denied { read } for pid=17140 comm="syz.2.5390" dev="nsfs" ino=4026532944 scontext=root:sysadm_r:sysad[ 288.601093][ T29] audit: type=1400 audit(2000000046.367:7198): avc: denied { read } for pid=5180 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 m_t tcontext=system_u:object_r:nsfs_t tclass=file May 18 03:34:06 syzkaller kern.notice kernel: [ 288.601093][ T29] audit: type=1400 audit(2000000046.367:7198): avc: denied { read } for pid=5180 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 288.664496][ T29] audit: type=1400 audit(2000000046.377:7199): avc: denied { read write } for pid=5827 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 18 03:34:06 syzkaller kern.notice kernel: [ 288.664496][ T29] audit: type=1400 audit(2000000046.377:7199): avc: denied { read write } for pid=5827 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 288.751048][ T29] audit: type=1400 audit(2000000046.377:7200): avc: denied { read write } for pid=5837 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 18 03:34:06 syzkaller kern.notice kernel: [ 288.751048][ T29] audit: type=1400 audit(2000000046.377:7200): avc: denied { read write } for pid=5837 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 288.817604][ T29] audit: type=1400 audit(2000000046.395:7201): avc: denied { create } for pid=17143 comm="syz.0.5391" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=0 May 18 03:34:06 syzkaller kern.notice kernel: [ 288.817604][ T29] audit: type=1400 audit(2000000046.395:7201): avc: denied { create } for pid=17143 comm="syz.0.5391" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=0 [ 289.657775][T17250] xt_HMARK: proto mask must be zero with L3 mode May 18 03:34:07 syzkaller kern.info kernel: [ 289.657775][T17250] xt_HMARK: proto mask must be zero with L3 mode [ 289.844387][T17262] netlink: 'syz.3.5450': attribute type 29 has an invalid length. [ 289.869537][T17262] netlink: 8 bytes leftover after parsing attributes in process `syz.3.5450'. May 18 03:34:07 syzkaller kern.warn kernel: [ 289.844387][T1726[ 289.884667][T17268] ebt_among: src integrity fail: 30a 2] netlink: 'syz.3.5450': attribute type 29 has an invalid length. May 18 03:34:07 syzkaller kern.warn kernel: [ 289.869537][T17262] netlink: 8 bytes leftover after parsing attributes in process `syz.3.5450'. May 18 03:34:07 syzkaller kern.err kernel: [ 289.884667][T17268] ebt_among: src integrity fail: 30a [ 290.035332][T17279] xt_l2tp: invalid flags combination: c May 18 03:34:07 syzkaller kern.info kernel: [ 290.035332][T17279] xt_l2tp: invalid flags combination: c May 18 03:34:08 syzkaller daemon.err dhcpcd[5492]: ps_sendpsmmsg: Connection refused May 18 03:34:08 syzkaller daemon.err dhcpcd[5492]: ps_root_recvmsgcb: failed to send message to pid 11996: Connection refused [ 290.617736][T17333] CIFS: VFS: Malformed UNC in devname May 18 03:34:08 syzkaller kern.err kernel: [ 290.617736][T17333] CIFS: VFS: Malformed UNC in devname May 18 03:34:08 syzkaller daemon.err dhcpcd[5492]: ps_sendpsmmsg: Connection refused May 18 03:34:08 syzkaller daemon.err dhcpcd[5492]: ps_root_recvmsgcb: failed to send message to pid 11988: Connection refused May 18 03:34:09 syzkaller daemon.err dhcpcd[5492]: ps_sendpsmmsg: Connection refused May 18 03:34:09 syzkaller daemon.err dhcpcd[5492]: ps_root_recvmsgcb: failed to send message to pid 11989: Connection refused [ 291.564505][T17422] xt_nat: multiple ranges no longer supported May 18 03:34:09 syzkaller kern.info kernel: [ 291.564505][T17422] xt_nat: multiple ranges no longer supported May 18 03:34:10 syzkaller daemon.err dhcpcd[5492]: ps_sendpsmmsg: Connection refused May 18 03:34:10 syzkaller daemon.err dhcpcd[5492]: ps_root_recvmsgcb: failed to send message to pid 12090: Connection refused [ 293.669603][ T29] kauditd_printk_skb: 351 callbacks suppressed [ 293.669619][ T29] audit: type=1400 audit(2000000051.334:7553): avc: denied { read write } for pid=5837 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 18 03:34:11 syzkaller kern.warn kernel: [ 293.669603][ T29] kauditd_printk_skb: 351 callbacks suppressed May 18 03:34:11 syzkaller kern.notice kernel: [ 293.669619][ T29] audit: type=1400 audit(2000000051.334:7553): avc: denied { read write } for pid=5837 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 293.778703][ T29] audit: type=1400 audit(2000000051.381:7554): avc: denied { read write } for pid=5834 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 18 03:34:11 syzkaller kern.notice kernel: [ 293.778703][ T29] audit: type=1400 audit(2000000051.381:7554): avc: denied { read write } for pid=5834 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 293.952959][ T29] audit: type=1400 audit(2000000051.409:7555): avc: denied { read write } for pid=5826 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 18 03:34:11 syzkaller kern.notice kernel: [ 293.952959][ T29] audit: type=1400 audit(2000000051.409:7555): avc: denied { read write } for pid=5826 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 294.106983][ T29] audit: type=1400 audit(2000000051.409:7556): avc: denied { read } for pid=5180 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 18 03:34:11 syzkaller kern.notice kernel: [ 294.106983][ T29] audit: type=1400 audit(2000000051.409:7556): avc: denied { read } for pid=5180 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= May 18 03:34:11 syzkaller daemon.err dhcpcd[5492]: ps_sendpsmmsg: Connection refused May 18 03:34:11 syzkaller daemon.err dhcpcd[5492]: ps_root_recvmsgcb: failed to send message to pid 12181: Connection refused [ 294.258719][ T29] audit: type=1400 audit(2000000051.409:7557): avc: denied { read } for pid=5180 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 18 03:34:11 syzkaller kern.notice kernel: [ 294.258719][ T29] audit: type=1400 audit(2000000051.409:7557): avc: denied { read } for pid=5180 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 294.397668][ T29] audit: type=1400 audit(2000000051.437:7558): avc: denied { mounton } for pid=17585 comm="syz.1.5611" path="/1079/file0" dev="tmpfs" ino=5434 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 May 18 03:34:12 syzkaller kern.notice kernel: [ 294.397668][ T29] audit: type=1400 audit(2000000051.437:7558): avc: denied { mounton } for pid=17585 comm="syz.1.5611" path="/1079/file0" dev="tmpfs" ino=5434 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_t [ 294.554687][ T29] audit: type=1400 audit(2000000051.503:7559): avc: denied { read write } for pid=17588 comm="syz.4.5614" name="video37" dev="devtmpfs" ino=1050 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l_device_t tclass=chr_file permissive=0 May 18 03:34:12 syzkaller kern.notice kernel: [ 294.554687][ T29] audit: type=1400 audit(2000000051.503:7559): avc: denied { read write } for pid=17588 comm="syz.4.5614" name="video37" dev="devtmpfs" ino=1050 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r: [ 294.725380][ T29] audit: type=1400 audit(2000000051.503:7560): avc: denied { read } for pid=5180 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 18 03:34:12 syzkaller kern.notice kernel: [ 294.725380][ T29] audit: type=1400 audit(2000000051.503:7560): avc: denied { read } for pid=5180 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 294.793839][T17630] xt_SECMARK: invalid security context 'unconfined' May 18 03:34:12 syzkaller kern.info kernel: [ 294.793839][T17630] xt_SECMARK: invalid security context 'unconfined' [ 294.867418][ T29] audit: type=1400 audit(2000000051.540:7561): avc: denied { read write } for pid=5827 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 18 03:34:12 syzkaller kern.notice kernel: [ 294.867418][ T29] audit: type=1400 audit(2000000051.540:7561): avc: denied { read write } for pid=5827 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 295.036575][ T29] audit: type=1400 audit(2000000051.549:7562): avc: denied { create } for pid=17591 comm="syz.0.5613" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 May 18 03:34:12 syzkaller kern.notice kernel: [ 295.036575][ T29] audit: type=1400 audit(2000000051.549:7562): avc: denied { create } for pid=17591 comm="syz.0.5613" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 295.442738][T17657] Cannot find add_set index 3 as target May 18 03:34:13 syzkaller kern.info kernel: [ 295.442738][T17657] Cannot find add_set index 3 as target May 18 03:34:13 syzkaller daemon.err dhcpcd[5492]: ps_sendpsmmsg: Connection refused May 18 03:34:13 syzkaller daemon.err dhcpcd[5492]: ps_root_recvmsgcb: failed to send message to pid 12239: Connection refused [ 298.988347][T17791] trusted_key: encrypted_key: master key parameter '' is invalid May 18 03:34:16 [ 299.064659][ T29] kauditd_printk_skb: 151 callbacks suppressed syzkaller kern.i[ 299.064675][ T29] audit: type=1400 audit(2000000056.385:7714): avc: denied { read } for pid=5180 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 nfo kernel: [ 2[ 299.095293][ C1] vkms_vblank_simulate: vblank timer overrun 98.988347][T17791] trusted_key: encrypted_key: master key parameter '' is invalid May 18 03:34:16 syzkaller kern.warn kernel: [ 299.064659][ T29] kauditd_printk_skb: 151 callbacks suppressed May 18 03:34:16 syzkaller kern.notice kernel: [ 299.064675][ T29] audit: type=1400 audit(2000000056.385:7714): avc: denied { read } for pid=5180 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= May 18 03:34:16 syzkaller kern.warn kernel: [ 299.095293][ C1] vkms_vblank_simulate: vblank timer overrun [ 299.354467][ T29] audit: type=1400 audit(2000000056.470:7715): avc: denied { read } for pid=5180 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 299.354508][ T29] audit: type=1400 audit(2000000056.470:7716): avc: denied { read } for pid=5180 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 299.354540][ T29] audit: type=1400 audit(2000000056.470:7717): avc: denied { read } for pid=5180 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 299.354582][ T29] audit: type=1400 audit(2000000056.479:7718): avc: denied { read write } for pid=5837 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 299.354615][ T29] audit: type=1400 audit(2000000056.488:7719): avc: denied { read write } for pid=5834 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 299.354647][ T29] audit: type=1400 audit(2000000056.498:7720): avc: denied { read write } for pid=5831 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 299.354679][ T29] audit: type=1400 audit(2000000056.507:7721): avc: denied { prog_load } for pid=17793 comm="syz.0.5714" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 299.354709][ T29] audit: type=1400 audit(2000000056.610:7722): avc: denied { read write } for pid=5826 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 299.354741][ T29] audit: type=1400 audit(2000000056.629:7723): avc: denied { create } for pid=17797 comm="syz.4.5716" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 299.823155][ C1] vkms_vblank_simulate: vblank timer overrun [ 299.984400][ C1] vkms_vblank_simulate: vblank timer overrun [ 299.985166][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 299.985659][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 299.986075][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 299.986347][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 299.986536][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 299.986800][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 299.986992][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 299.987268][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 299.987453][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 299.987717][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 305.334205][ C1] net_ratelimit: 27700 callbacks suppressed [ 305.334224][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 305.334438][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 305.334683][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 305.334889][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 305.335057][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 305.335265][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 305.335511][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 305.335711][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 305.335890][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 305.336091][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 310.690168][ C1] net_ratelimit: 28030 callbacks suppressed [ 310.690189][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 310.690406][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 310.690642][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 310.690845][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 310.691021][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 310.691232][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 310.691468][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 310.691679][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 310.691849][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 310.692056][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 316.046186][ C1] net_ratelimit: 27953 callbacks suppressed [ 316.046207][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 316.046396][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 316.046613][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 316.046864][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 316.047084][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 316.047275][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 316.047498][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 316.047746][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 316.047965][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 316.048203][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 321.402176][ C1] net_ratelimit: 24987 callbacks suppressed [ 321.402197][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 321.402459][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 321.402735][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 321.402987][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 321.403207][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 321.403456][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 321.403744][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 321.403992][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 321.404204][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 321.404451][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 323.101905][ C0] sched: DL replenish lagged too much [ 326.758359][ C1] net_ratelimit: 25768 callbacks suppressed [ 326.758381][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 326.758622][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 326.758828][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 326.759053][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 326.759313][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 326.759536][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 326.759726][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 326.759973][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 326.760236][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 326.760461][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 332.114113][ C1] net_ratelimit: 25921 callbacks suppressed [ 332.114135][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 332.114376][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 332.114549][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 332.114774][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 332.114969][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:44:fa:5d:fa:bb, vlan:0) [ 332.115155][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 332.115330][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 332.115533][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 332.115776][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 332.115952][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 337.470135][ C1] net_ratelimit: 29197 callbacks suppressed [ 337.470156][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 337.470333][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 337.470554][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 337.470758][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:44:fa:5d:fa:bb, vlan:0) [ 337.470914][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 337.471146][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 337.471319][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 337.471520][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 337.471760][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 337.471936][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 342.826258][ C1] net_ratelimit: 28638 callbacks suppressed [ 342.826278][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 342.826460][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 342.826687][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 342.826875][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:44:fa:5d:fa:bb, vlan:0) [ 342.827040][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 342.827264][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 342.827433][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 342.827650][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 342.827883][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 342.828061][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 348.182187][ C1] net_ratelimit: 28893 callbacks suppressed [ 348.182206][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 348.182474][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 348.182685][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 348.182939][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 348.183148][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:44:fa:5d:fa:bb, vlan:0) [ 348.183322][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 348.183569][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 348.183775][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 348.184009][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 348.184271][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 353.538237][ C1] net_ratelimit: 26166 callbacks suppressed [ 353.538257][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 353.538531][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 353.538724][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 353.538971][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 353.539182][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:44:fa:5d:fa:bb, vlan:0) [ 353.539362][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 353.539605][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 353.539806][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 353.540025][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 353.540280][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 355.564407][ T29] kauditd_printk_skb: 15 callbacks suppressed [ 355.564427][ T29] audit: type=1400 audit(2000000085.373:7739): avc: denied { read write } for pid=5831 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 358.894251][ C1] net_ratelimit: 26663 callbacks suppressed [ 358.894271][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 358.894443][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 358.894673][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 358.894862][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:44:fa:5d:fa:bb, vlan:0) [ 358.895017][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 358.895253][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 358.895429][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 358.895638][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 358.895872][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 358.896041][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 364.250295][ C1] net_ratelimit: 27728 callbacks suppressed [ 364.250316][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 364.250520][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:44:fa:5d:fa:bb, vlan:0) [ 364.250696][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 364.250933][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 364.251116][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 364.251338][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 364.251598][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 364.251773][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 364.252017][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 364.252212][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:44:fa:5d:fa:bb, vlan:0) [ 369.606186][ C1] net_ratelimit: 27127 callbacks suppressed [ 369.606207][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:44:fa:5d:fa:bb, vlan:0) [ 369.606375][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 369.606612][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 369.606793][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 369.607000][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 369.607277][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 369.607455][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 369.607690][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 369.607925][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:44:fa:5d:fa:bb, vlan:0) [ 369.608089][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 374.962234][ C1] net_ratelimit: 27448 callbacks suppressed [ 374.962256][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 374.962451][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 374.962669][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 374.962934][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 374.963115][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 374.963351][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 374.963552][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:44:fa:5d:fa:bb, vlan:0) [ 374.963725][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 374.963966][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 374.964162][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 380.318106][ C1] net_ratelimit: 27399 callbacks suppressed [ 380.318128][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 380.318351][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 380.318612][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 380.318793][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 380.319039][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 380.319240][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:44:fa:5d:fa:bb, vlan:0) [ 380.319407][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 380.319643][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 380.319835][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 380.320048][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 385.068267][ T1297] ieee802154 phy0 wpan0: encryption failed: -22 [ 385.081914][ T1297] ieee802154 phy1 wpan1: encryption failed: -22 [ 385.674228][ C1] net_ratelimit: 27143 callbacks suppressed [ 385.674249][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 385.674514][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 385.674713][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 385.674964][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 385.675182][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:44:fa:5d:fa:bb, vlan:0) [ 385.675349][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 385.675596][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 385.675792][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 385.676018][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 385.676273][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 391.030238][ C1] net_ratelimit: 25783 callbacks suppressed [ 391.030259][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 391.030462][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 391.030714][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 391.030930][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:44:fa:5d:fa:bb, vlan:0) [ 391.031109][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 391.031368][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 391.031555][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 391.031791][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 391.032050][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 391.032252][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 396.386198][ C1] net_ratelimit: 28040 callbacks suppressed [ 396.386218][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 396.386411][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:44:fa:5d:fa:bb, vlan:0) [ 396.386576][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 396.386799][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 396.386972][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 396.387191][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 396.387425][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 396.387592][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 396.387819][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 396.388006][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:44:fa:5d:fa:bb, vlan:0) [ 401.742254][ C1] net_ratelimit: 28948 callbacks suppressed [ 401.742276][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 401.742469][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 401.742705][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 401.742912][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:44:fa:5d:fa:bb, vlan:0) [ 401.743082][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 401.743318][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 401.743497][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 401.743721][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 401.743969][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 401.744158][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 407.098138][ C1] net_ratelimit: 27406 callbacks suppressed [ 407.098158][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 407.098354][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 407.098591][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 407.098798][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:44:fa:5d:fa:bb, vlan:0) [ 407.098994][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 407.099243][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 407.099432][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 407.099652][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 407.099906][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 407.100084][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 412.454162][ C1] net_ratelimit: 27337 callbacks suppressed [ 412.454184][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:44:fa:5d:fa:bb, vlan:0) [ 412.454363][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 412.454601][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 412.454797][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 412.455019][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 412.455273][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 412.455451][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 412.455697][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 412.455911][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:44:fa:5d:fa:bb, vlan:0) [ 412.456078][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 417.810052][ C1] net_ratelimit: 27386 callbacks suppressed [ 417.810074][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 417.810332][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 417.810523][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 417.810757][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 417.810964][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:44:fa:5d:fa:bb, vlan:0) [ 417.811128][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 417.811377][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 417.811554][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 417.811777][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 417.812079][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 423.166039][ C1] net_ratelimit: 27411 callbacks suppressed [ 423.166061][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 423.166311][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 423.166493][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 423.166712][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 423.166968][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 423.167159][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 423.167394][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 423.167603][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:44:fa:5d:fa:bb, vlan:0) [ 423.167773][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 423.168026][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 428.522190][ C1] net_ratelimit: 27293 callbacks suppressed [ 428.522214][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:44:fa:5d:fa:bb, vlan:0) [ 428.522384][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 428.522629][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 428.522822][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 428.523041][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 428.523300][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 428.523484][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 428.523718][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 428.523929][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:44:fa:5d:fa:bb, vlan:0) [ 428.524091][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 433.878044][ C1] net_ratelimit: 26614 callbacks suppressed [ 433.878066][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:44:fa:5d:fa:bb, vlan:0) [ 433.878246][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 433.878488][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 433.878671][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 433.878898][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 433.879148][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 433.879341][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 433.879577][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 433.879776][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:44:fa:5d:fa:bb, vlan:0) [ 433.879941][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 439.234035][ C1] net_ratelimit: 26195 callbacks suppressed [ 439.234059][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 439.234244][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 439.234487][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 439.234687][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:44:fa:5d:fa:bb, vlan:0) [ 439.234874][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 439.235073][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 439.235245][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 439.235452][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 439.235682][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 439.235854][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 439.493515][ T1297] ieee802154 phy0 wpan0: encryption failed: -22 [ 439.508306][ T1297] ieee802154 phy1 wpan1: encryption failed: -22 [ 444.590136][ C1] net_ratelimit: 25948 callbacks suppressed [ 444.590158][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 444.590379][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 444.590634][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 444.590826][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 444.591072][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 444.591273][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:44:fa:5d:fa:bb, vlan:0) [ 444.591443][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 444.591653][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 444.591844][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 444.592058][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 449.946202][ C1] net_ratelimit: 25835 callbacks suppressed [ 449.946230][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:44:fa:5d:fa:bb, vlan:0) [ 449.946454][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 449.946741][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 449.946977][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 449.947241][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 449.947544][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 449.947748][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 449.948050][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 449.948281][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:44:fa:5d:fa:bb, vlan:0) [ 449.948488][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 455.302194][ C1] net_ratelimit: 25970 callbacks suppressed [ 455.302217][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 455.302495][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 455.302718][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 455.302975][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 455.303201][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:44:fa:5d:fa:bb, vlan:0) [ 455.303457][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 455.303706][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 455.303907][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 455.304156][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 455.304416][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 460.658030][ C1] net_ratelimit: 25778 callbacks suppressed [ 460.658053][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:44:fa:5d:fa:bb, vlan:0) [ 460.658263][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 460.658510][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 460.658694][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 460.658915][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 460.659169][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 460.659358][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 460.659592][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 460.659803][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:44:fa:5d:fa:bb, vlan:0) [ 460.659955][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 466.014232][ C1] net_ratelimit: 25669 callbacks suppressed [ 466.014259][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 466.014528][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:44:fa:5d:fa:bb, vlan:0) [ 466.014758][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 466.015052][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 466.015261][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 466.015507][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 466.015798][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 466.016019][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 466.016287][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 466.016497][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:44:fa:5d:fa:bb, vlan:0) [ 471.370024][ C1] net_ratelimit: 25858 callbacks suppressed [ 471.370048][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 471.370419][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 471.370691][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 471.370896][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 471.371163][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 471.371381][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:44:fa:5d:fa:bb, vlan:0) [ 471.371565][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 471.371825][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 471.372044][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 471.372287][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 473.895205][ T1297] ieee802154 phy0 wpan0: encryption failed: -22 [ 473.909600][ T1297] ieee802154 phy1 wpan1: encryption failed: -22 [ 476.726069][ C1] net_ratelimit: 25719 callbacks suppressed [ 476.726091][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 476.726348][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 476.726536][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 476.726780][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 476.726981][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:44:fa:5d:fa:bb, vlan:0) [ 476.727150][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 476.727385][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 476.727575][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 476.727806][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 476.728068][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 482.082005][ C1] net_ratelimit: 25983 callbacks suppressed [ 482.082031][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 482.082235][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 482.082470][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 482.082683][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:44:fa:5d:fa:bb, vlan:0) [ 482.082859][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 482.083103][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 482.083283][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 482.083498][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 482.083757][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 482.083934][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 487.438003][ C1] net_ratelimit: 26149 callbacks suppressed [ 487.438028][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 487.438327][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 487.438542][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 487.438799][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 487.439031][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:44:fa:5d:fa:bb, vlan:0) [ 487.439224][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 487.439500][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 487.439731][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 487.439995][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 487.440290][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 490.470822][ T30] INFO: task syslogd:5180 blocked for more than 158 seconds. [ 490.470856][ T30] Not tainted 6.12.0-rc7-syzkaller-00187-gf868cd251776 #0 [ 490.470869][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 490.470879][ T30] task:syslogd state:D stack:24224 pid:5180 tgid:5180 ppid:1 flags:0x00000002 [ 490.470936][ T30] Call Trace: [ 490.470946][ T30] [ 490.470958][ T30] __schedule+0xe55/0x5740 [ 490.470994][ T30] ? __pfx___lock_acquire+0x10/0x10 [ 490.471014][ T30] ? mark_lock+0xb5/0xc60 [ 490.471030][ T30] ? bpf_ksym_find+0x127/0x1c0 [ 490.471063][ T30] ? __pfx___schedule+0x10/0x10 [ 490.471092][ T30] ? schedule+0x298/0x350 [ 490.471118][ T30] ? __pfx_lock_release+0x10/0x10 [ 490.471135][ T30] ? trace_lock_acquire+0x14a/0x1d0 [ 490.471163][ T30] ? lock_acquire+0x2f/0xb0 [ 490.471180][ T30] ? schedule+0x1fd/0x350 [ 490.471210][ T30] schedule+0xe7/0x350 [ 490.471237][ T30] schedule_timeout+0x258/0x2a0 [ 490.471263][ T30] ? __pfx_schedule_timeout+0x10/0x10 [ 490.471293][ T30] ? mark_held_locks+0x9f/0xe0 [ 490.471313][ T30] ? _raw_spin_unlock_irq+0x23/0x50 [ 490.471342][ T30] ___down_common+0x2d7/0x460 [ 490.471367][ T30] ? __pfx____down_common+0x10/0x10 [ 490.471391][ T30] ? lock_acquire+0x2f/0xb0 [ 490.471414][ T30] __down+0x20/0x30 [ 490.471433][ T30] down+0x74/0xa0 [ 490.471451][ T30] console_lock+0x5b/0xa0 [ 490.471472][ T30] console_device+0x19/0x180 [ 490.471498][ T30] tty_lookup_driver+0x2fb/0x510 [ 490.471525][ T30] tty_open+0x54e/0xf80 [ 490.471546][ T30] ? chrdev_open+0x10e/0x6a0 [ 490.471571][ T30] ? __pfx_tty_open+0x10/0x10 [ 490.471592][ T30] ? __pfx_do_raw_spin_lock+0x10/0x10 [ 490.471614][ T30] ? lock_acquire+0x2f/0xb0 [ 490.471630][ T30] ? chrdev_open+0x80/0x6a0 [ 490.471653][ T30] ? __pfx_tty_open+0x10/0x10 [ 490.471675][ T30] chrdev_open+0x237/0x6a0 [ 490.471696][ T30] ? __pfx_chrdev_open+0x10/0x10 [ 490.471719][ T30] ? security_file_open+0x62a/0x9d0 [ 490.471747][ T30] do_dentry_open+0x6ca/0x1530 [ 490.471767][ T30] ? __pfx_chrdev_open+0x10/0x10 [ 490.471789][ T30] ? inode_permission+0xdd/0x5f0 [ 490.471816][ T30] vfs_open+0x82/0x3f0 [ 490.471839][ T30] ? may_open+0x1f2/0x400 [ 490.471870][ T30] path_openat+0x1e6a/0x2d60 [ 490.471900][ T30] ? __pfx_path_openat+0x10/0x10 [ 490.471920][ T30] ? __pfx___lock_acquire+0x10/0x10 [ 490.471943][ T30] do_filp_open+0x1dc/0x430 [ 490.471963][ T30] ? __pfx_do_filp_open+0x10/0x10 [ 490.471982][ T30] ? find_held_lock+0x2d/0x110 [ 490.472023][ T30] ? _raw_spin_unlock+0x28/0x50 [ 490.472049][ T30] ? alloc_fd+0x2d7/0x6c0 [ 490.472084][ T30] do_sys_openat2+0x17a/0x1e0 [ 490.472108][ T30] ? __pfx_do_sys_openat2+0x10/0x10 [ 490.472132][ T30] ? __rseq_handle_notify_resume+0x67c/0x10b0 [ 490.472165][ T30] __x64_sys_openat+0x175/0x210 [ 490.472187][ T30] ? __pfx___x64_sys_openat+0x10/0x10 [ 490.472221][ T30] do_syscall_64+0xcd/0x250 [ 490.472243][ T30] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 490.472272][ T30] RIP: 0033:0x7f3900ac29a4 [ 490.472289][ T30] RSP: 002b:00007ffc2fee6a80 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 490.472310][ T30] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007f3900ac29a4 [ 490.472325][ T30] RDX: 0000000000000901 RSI: 00007f3900c613b3 RDI: 00000000ffffff9c [ 490.472338][ T30] RBP: 00007f3900c613b3 R08: 0000000000000001 R09: 0000000000000000 [ 490.472352][ T30] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000901 [ 490.472365][ T30] R13: 0000000000000901 R14: 0000000000000901 R15: 0000565440731410 [ 490.472391][ T30] [ 490.472427][ T30] [ 490.472427][ T30] Showing all locks held in the system: [ 490.472437][ T30] 3 locks held by kworker/u8:0/11: [ 490.472450][ T30] 3 locks held by kworker/u8:1/12: [ 490.472463][ T30] 1 lock held by khungtaskd/30: [ 490.472475][ T30] #0: ffffffff8e1b8340 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x7f/0x390 [ 490.472526][ T30] 3 locks held by kworker/u8:2/35: [ 490.472540][ T30] 3 locks held by kworker/u8:3/51: [ 490.472553][ T30] 3 locks held by kworker/u8:4/72: [ 490.472574][ T30] 3 locks held by kworker/u8:5/1146: [ 490.472602][ T30] 6 locks held by kworker/R-bat_e/3384: [ 490.472614][ T30] 3 locks held by kworker/u8:6/3490: [ 490.472628][ T30] 1 lock held by syslogd/5180: [ 490.472639][ T30] #0: ffffffff8ee6a708 (tty_mutex){+.+.}-{3:3}, at: tty_open+0x53d/0xf80 [ 490.472690][ T30] 2 locks held by dhcpcd/5491: [ 490.472701][ T30] 1 lock held by dhcpcd/5492: [ 490.472714][ T30] 2 locks held by getty/5576: [ 490.472725][ T30] #0: ffff888031f2c0a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x24/0x80 [ 490.472783][ T30] #1: ffffc90002f062f0 (&ldata->atomic_read_lock){+.+.}-{3:3}, at: n_tty_read+0xfba/0x1480 [ 490.472839][ T30] 2 locks held by syz-executor/5816: [ 490.472858][ T30] 1 lock held by syz-executor/5826: [ 490.472870][ T30] 2 locks held by syz-executor/5827: [ 490.472883][ T30] 3 locks held by syz-executor/5831: [ 490.472896][ T30] 2 locks held by syz-executor/5834: [ 490.472912][ T30] 3 locks held by kworker/0:5/5879: [ 490.472925][ T30] 3 locks held by kworker/u8:7/5888: [ 490.472939][ T30] 6 locks held by syz.3.5715/17796: [ 490.472952][ T30] 1 lock held by kworker/u8:8/17820: [ 490.472965][ T30] [ 490.472971][ T30] ============================================= [ 490.472971][ T30] [ 490.472980][ T30] NMI backtrace for cpu 0 [ 490.472990][ T30] CPU: 0 UID: 0 PID: 30 Comm: khungtaskd Not tainted 6.12.0-rc7-syzkaller-00187-gf868cd251776 #0 [ 490.473012][ T30] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 490.473024][ T30] Call Trace: [ 490.473031][ T30] [ 490.473039][ T30] dump_stack_lvl+0x116/0x1f0 [ 490.473062][ T30] nmi_cpu_backtrace+0x27b/0x390 [ 490.473091][ T30] ? __pfx_nmi_raise_cpu_backtrace+0x10/0x10 [ 490.473122][ T30] nmi_trigger_cpumask_backtrace+0x29c/0x300 [ 490.473151][ T30] watchdog+0xf0c/0x1240 [ 490.473175][ T30] ? __pfx_watchdog+0x10/0x10 [ 490.473193][ T30] ? lockdep_hardirqs_on+0x7c/0x110 [ 490.473224][ T30] ? __kthread_parkme+0x148/0x220 [ 490.473250][ T30] ? __pfx_watchdog+0x10/0x10 [ 490.473268][ T30] kthread+0x2c1/0x3a0 [ 490.473290][ T30] ? _raw_spin_unlock_irq+0x23/0x50 [ 490.473316][ T30] ? __pfx_kthread+0x10/0x10 [ 490.473341][ T30] ret_from_fork+0x45/0x80 [ 490.473358][ T30] ? __pfx_kthread+0x10/0x10 [ 490.473381][ T30] ret_from_fork_asm+0x1a/0x30 [ 490.473419][ T30] [ 490.473427][ T30] Sending NMI from CPU 0 to CPUs 1: [ 490.473453][ C1] NMI backtrace for cpu 1 [ 490.473464][ C1] CPU: 1 UID: 0 PID: 3384 Comm: kworker/R-bat_e Not tainted 6.12.0-rc7-syzkaller-00187-gf868cd251776 #0 [ 490.473482][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 490.473491][ C1] Workqueue: bat_events batadv_tt_purge [ 490.473514][ C1] RIP: 0010:lock_is_held_type+0x54/0x150 [ 490.473530][ C1] Code: e5 de 74 85 c0 0f 85 ce 00 00 00 65 4c 8b 25 33 36 e0 74 41 8b 94 24 dc 0a 00 00 85 d2 0f 85 b6 00 00 00 48 89 fd 41 89 f6 9c <8f> 04 24 fa 48 c7 c7 80 d2 6c 8b 45 31 ff e8 09 17 00 00 4d 8d ac [ 490.473544][ C1] RSP: 0018:ffffc90000a18498 EFLAGS: 00000246 [ 490.473556][ C1] RAX: 0000000000000000 RBX: ffff888034a46800 RCX: 0000000000000001 [ 490.473566][ C1] RDX: 0000000000000000 RSI: 00000000ffffffff RDI: ffffffff8e1b8340 [ 490.473580][ C1] RBP: ffffffff8e1b8340 R08: 0000000000000005 R09: 0000000000000000 [ 490.473590][ C1] R10: 0000000000000001 R11: 0000000000000000 R12: ffff888032044880 [ 490.473607][ C1] R13: 00000000ffffffff R14: 00000000ffffffff R15: ffff888034a45cb8 [ 490.473621][ C1] FS: 0000000000000000(0000) GS:ffff8880b8700000(0000) knlGS:0000000000000000 [ 490.473640][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 490.473653][ C1] CR2: 000055556e1e65c8 CR3: 0000000075ce2000 CR4: 00000000003526f0 [ 490.473665][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 490.473677][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 490.473688][ C1] Call Trace: [ 490.473695][ C1] [ 490.473702][ C1] ? nmi_cpu_backtrace+0x1d8/0x390 [ 490.473726][ C1] ? nmi_cpu_backtrace_handler+0xc/0x20 [ 490.473751][ C1] ? nmi_handle+0x1a9/0x5c0 [ 490.473770][ C1] ? lock_is_held_type+0x54/0x150 [ 490.473789][ C1] ? default_do_nmi+0x6a/0x160 [ 490.473811][ C1] ? exc_nmi+0x170/0x1e0 [ 490.473832][ C1] ? end_repeat_nmi+0xf/0x53 [ 490.473853][ C1] ? lock_is_held_type+0x54/0x150 [ 490.473872][ C1] ? lock_is_held_type+0x54/0x150 [ 490.473889][ C1] ? lock_is_held_type+0x54/0x150 [ 490.473906][ C1] [ 490.473913][ C1] [ 490.473921][ C1] __find_rr_leaf+0x36d/0xe00 [ 490.473948][ C1] ? __pfx___find_rr_leaf+0x10/0x10 [ 490.473970][ C1] ? fib6_node_lookup+0x125/0x180 [ 490.473991][ C1] ? __pfx_fib6_node_lookup+0x10/0x10 [ 490.474016][ C1] fib6_table_lookup+0x57e/0xa30 [ 490.474045][ C1] ? __pfx_fib6_table_lookup+0x10/0x10 [ 490.474066][ C1] ? trace_lock_acquire+0x14a/0x1d0 [ 490.474087][ C1] ? lock_acquire+0x2f/0xb0 [ 490.474102][ C1] ? ip6_pol_route+0x186/0x1120 [ 490.474126][ C1] ip6_pol_route+0x1cd/0x1120 [ 490.474150][ C1] ? __local_bh_enable_ip+0xa4/0x120 [ 490.474171][ C1] ? __pfx_ip6_pol_route+0x10/0x10 [ 490.474199][ C1] ? ip6t_do_table+0xd20/0x1d40 [ 490.474223][ C1] ? __pfx_ip6_pol_route_input+0x10/0x10 [ 490.474247][ C1] fib6_rule_lookup+0x536/0x720 [ 490.474268][ C1] ? ip6t_do_table+0xd50/0x1d40 [ 490.474291][ C1] ? __pfx_fib6_rule_lookup+0x10/0x10 [ 490.474312][ C1] ? nf_nat_ipv6_fn+0x103/0x2e0 [ 490.474332][ C1] ? __pfx_nf_nat_ipv6_fn+0x10/0x10 [ 490.474353][ C1] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 490.474383][ C1] ip6_route_input+0x663/0xc10 [ 490.474408][ C1] ? __pfx_ip6_route_input+0x10/0x10 [ 490.474431][ C1] ? __pfx_lock_release+0x10/0x10 [ 490.474457][ C1] ? __pfx_ip6_rcv_finish+0x10/0x10 [ 490.474484][ C1] ip6_rcv_finish_core.constprop.0+0x1a0/0x5d0 [ 490.474511][ C1] ipv6_rcv+0x1e4/0x680 [ 490.474534][ C1] ? __pfx_ipv6_rcv+0x10/0x10 [ 490.474557][ C1] __netif_receive_skb_one_core+0x12e/0x1e0 [ 490.474577][ C1] ? __pfx___netif_receive_skb_one_core+0x10/0x10 [ 490.474596][ C1] ? trace_lock_acquire+0x14a/0x1d0 [ 490.474624][ C1] ? process_backlog+0x3f1/0x15f0 [ 490.474644][ C1] ? process_backlog+0x3f1/0x15f0 [ 490.474660][ C1] __netif_receive_skb+0x1d/0x160 [ 490.474678][ C1] process_backlog+0x443/0x15f0 [ 490.474698][ C1] __napi_poll.constprop.0+0xb7/0x550 [ 490.474718][ C1] net_rx_action+0xa92/0x1010 [ 490.474740][ C1] ? __pfx_net_rx_action+0x10/0x10 [ 490.474757][ C1] ? __pfx_mark_lock+0x10/0x10 [ 490.474774][ C1] ? __pfx_tmigr_handle_remote+0x10/0x10 [ 490.474793][ C1] ? run_timer_base+0x119/0x190 [ 490.474823][ C1] ? mark_held_locks+0x9f/0xe0 [ 490.474842][ C1] handle_softirqs+0x213/0x8f0 [ 490.474864][ C1] ? __pfx_handle_softirqs+0x10/0x10 [ 490.474885][ C1] ? batadv_tt_local_purge+0x21c/0x3c0 [ 490.474912][ C1] do_softirq+0xb2/0xf0 [ 490.474931][ C1] [ 490.474937][ C1] [ 490.474943][ C1] __local_bh_enable_ip+0x100/0x120 [ 490.474964][ C1] batadv_tt_local_purge+0x21c/0x3c0 [ 490.474992][ C1] ? __pfx_batadv_tt_local_purge+0x10/0x10 [ 490.475020][ C1] batadv_tt_purge+0x86/0xb90 [ 490.475048][ C1] ? __pfx_batadv_tt_purge+0x10/0x10 [ 490.475074][ C1] ? rcu_is_watching+0x12/0xc0 [ 490.475096][ C1] ? trace_lock_acquire+0x14a/0x1d0 [ 490.475118][ C1] ? process_one_work+0x921/0x1ba0 [ 490.475138][ C1] ? lock_acquire+0x2f/0xb0 [ 490.475154][ C1] ? process_one_work+0x921/0x1ba0 [ 490.475173][ C1] process_one_work+0x9c5/0x1ba0 [ 490.475194][ C1] ? __pfx_lock_acquire.part.0+0x10/0x10 [ 490.475213][ C1] ? __pfx_process_one_work+0x10/0x10 [ 490.475240][ C1] ? assign_work+0x1a0/0x250 [ 490.475269][ C1] rescuer_thread+0x628/0xe20 [ 490.475293][ C1] ? __pfx_rescuer_thread+0x10/0x10 [ 490.475311][ C1] ? lockdep_hardirqs_on+0x7c/0x110 [ 490.475340][ C1] ? __kthread_parkme+0x148/0x220 [ 490.475364][ C1] ? __pfx_rescuer_thread+0x10/0x10 [ 490.475383][ C1] kthread+0x2c1/0x3a0 [ 490.475404][ C1] ? _raw_spin_unlock_irq+0x23/0x50 [ 490.475430][ C1] ? __pfx_kthread+0x10/0x10 [ 490.475453][ C1] ret_from_fork+0x45/0x80 [ 490.475470][ C1] ? __pfx_kthread+0x10/0x10 [ 490.475493][ C1] ret_from_fork_asm+0x1a/0x30 [ 490.475525][ C1] [ 490.481531][ T30] Kernel panic - not syncing: hung_task: blocked tasks [ 490.481545][ T30] CPU: 0 UID: 0 PID: 30 Comm: khungtaskd Not tainted 6.12.0-rc7-syzkaller-00187-gf868cd251776 #0 [ 490.481567][ T30] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 490.481578][ T30] Call Trace: [ 490.481584][ T30] [ 490.481592][ T30] dump_stack_lvl+0x3d/0x1f0 [ 490.481615][ T30] panic+0x71d/0x800 [ 490.481642][ T30] ? __pfx_panic+0x10/0x10 [ 490.481671][ T30] ? __irq_work_queue_local+0x136/0x440 [ 490.481700][ T30] ? __pfx_nmi_raise_cpu_backtrace+0x10/0x10 [ 490.481728][ T30] ? irq_work_queue+0x2a/0x80 [ 490.481753][ T30] ? watchdog+0xd76/0x1240 [ 490.481770][ T30] ? watchdog+0xd69/0x1240 [ 490.481790][ T30] watchdog+0xd87/0x1240 [ 490.481810][ T30] ? __pfx_watchdog+0x10/0x10 [ 490.481826][ T30] ? lockdep_hardirqs_on+0x7c/0x110 [ 490.481861][ T30] ? __kthread_parkme+0x148/0x220 [ 490.481884][ T30] ? __pfx_watchdog+0x10/0x10 [ 490.481901][ T30] kthread+0x2c1/0x3a0 [ 490.481921][ T30] ? _raw_spin_unlock_irq+0x23/0x50 [ 490.481946][ T30] ? __pfx_kthread+0x10/0x10 [ 490.481969][ T30] ret_from_fork+0x45/0x80 [ 490.481986][ T30] ? __pfx_kthread+0x10/0x10 [ 490.482007][ T30] ret_from_fork_asm+0x1a/0x30 [ 490.482042][ T30] [ 490.482273][ T30] Kernel Offset: disabled