last executing test programs: 1m43.884111524s ago: executing program 0 (id=5689): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000080)=0x9, 0x4) recvmmsg(r0, &(0x7f0000001a80)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000300)=""/180, 0xb4}], 0x1}, 0x5}], 0x1, 0x0, 0x0) 1m42.817851343s ago: executing program 0 (id=5707): r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x2c, &(0x7f0000000140)=0x1, 0x4) setsockopt$sock_int(r0, 0x1, 0x1b, &(0x7f0000000000)=0x4, 0x1c) 1m42.303911386s ago: executing program 0 (id=5711): r0 = open(&(0x7f00009e1000)='./file0\x00', 0x60840, 0x2) fcntl$setlease(r0, 0x400, 0x0) chown(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 1m40.301587045s ago: executing program 2 (id=5713): r0 = socket$inet_udp(0x2, 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) getsockopt$inet_buf(r0, 0x0, 0x30, 0x0, &(0x7f0000000180)) 1m30.844619005s ago: executing program 2 (id=5715): syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = epoll_create1(0x80000) epoll_pwait(r0, &(0x7f0000000540)=[{}], 0x1, 0x200, 0x0, 0x0) 1m28.952155203s ago: executing program 0 (id=5716): r0 = socket(0x1e, 0x5, 0x0) connect$tipc(r0, &(0x7f0000000040)=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f0000000200), r0) 1m23.723228843s ago: executing program 1 (id=5718): unshare(0x60000600) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000540)="900000001c001f4d154a817393278bff0a80a57802000000e503740014000100ac1414bb0542d6401051a2d708f37ac8da1a297e00a2c5fed0759cb068d0bf46d323456536016466fcb78dcaaf6c3efed495a46215be0000760700c0c80cef7cff81d158ba86c9d2896c6d3bca2d0000000b0015009e49a6560641263da4de1df32c1739d7fbee9aa241731ae9e0b390", 0x90, 0x0, 0x0, 0x0) 1m18.692066697s ago: executing program 0 (id=5719): r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000280)={@mcast2, 0x800, 0x0, 0x103, 0x1}, 0x20) getsockopt$inet6_buf(r0, 0x29, 0x20, &(0x7f0000000480)=""/66, &(0x7f0000000500)=0x42) 1m16.999146009s ago: executing program 2 (id=5720): unshare(0x28000600) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x80000, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x3c) 1m16.315545942s ago: executing program 3 (id=5721): pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = dup(r0) fcntl$getflags(r1, 0x40a) 1m9.481727169s ago: executing program 1 (id=5722): r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'xfrm0\x00', 0x0}) sendmmsg(r0, &(0x7f0000000300)=[{{&(0x7f0000000240)=@xdp={0x2c, 0xc, r1, 0xb}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000040)='\f\x00', 0x2}], 0x1}}], 0x1, 0x240400c5) 1m7.619934486s ago: executing program 0 (id=5723): r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000080)={0x1f, 0xffff, 0x3}, 0x6) write(r0, &(0x7f0000000040)="0a1cbfc7fd14", 0x6) 1m7.288650025s ago: executing program 2 (id=5724): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000005c0), 0xffffffffffffffff) sendmsg$TIPC_NL_LINK_SET(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="ac000000", @ANYRES16=r1, @ANYBLOB="01060000000000000000090000002c0004801300010062726f6164636173742d6c696e6b000014000780080006"], 0xac}}, 0x0) 1m6.371598864s ago: executing program 3 (id=5725): r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000000000086a04270000000000000109022400010000000009040000010300000009210000000122450009058103"], 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, &(0x7f0000000a80)={0x2c, &(0x7f00000006c0)={0x20, 0x1, 0x45, {0x45, 0x1, "33ed4286ce10a804a83f83f226e6b33fafff0689fce2f335c61a248712cd81107f40e849bee5d5c2294fd5d33741c9894b95a902a639c7bff0afd4d11d0ee46b42df32"}}, 0x0, 0x0, 0x0, 0x0}, 0x0) 59.844222084s ago: executing program 1 (id=5726): r0 = syz_usb_connect$hid(0x2, 0x36, &(0x7f00000000c0)=ANY=[@ANYBLOB="12010000000000406a051702fc000000000109022400010000000009040000010300000009210100080122070009058103"], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, &(0x7f0000000ec0)={0x2c, &(0x7f0000000d00)={0x20, 0x23, 0x55, {0x55, 0x4, "812c6af3ba1ad7659004d33ae214721004305241adac861be19f60dfcc443b000000006490a189baed9a5aa9b1dfb89f96595d514fedbba959798f44ffeb32a3f87cba1322c3b69a5db6993f7abd06e4c28881"}}, 0x0, 0x0, 0x0, 0x0}, 0x0) 58.868067461s ago: executing program 2 (id=5727): r0 = socket$inet6(0xa, 0x80002, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) tee(r0, r1, 0xfffffffffffffc01, 0x0) 55.103854913s ago: executing program 3 (id=5728): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000001, 0x12, r0, 0x0) madvise(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x4) 50.013276931s ago: executing program 32 (id=5723): r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000080)={0x1f, 0xffff, 0x3}, 0x6) write(r0, &(0x7f0000000040)="0a1cbfc7fd14", 0x6) 49.060760859s ago: executing program 1 (id=5730): mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./bus\x00', 0x180) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000b80), 0x2004000, &(0x7f0000000200)={[{@workdir={'workdir', 0x3d, './bus'}}, {@lowerdir={'lowerdir', 0x3d, '.'}}, {@upperdir={'upperdir', 0x3d, './file0'}}, {@uuid_on}]}) 48.21304289s ago: executing program 2 (id=5731): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'rose0\x00', 0x112}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000040)={0x2, &(0x7f0000000080)=[{0x20, 0x0, 0x0, 0xfffff02c}, {0x6, 0x0, 0x0, 0x3}]}) 44.586230688s ago: executing program 3 (id=5732): unshare(0x2040400) r0 = open(&(0x7f0000000a40)='.\x00', 0x0, 0x0) utimensat(r0, 0x0, 0x0, 0x0) 36.119834991s ago: executing program 1 (id=5733): r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r0, &(0x7f0000000000)={0x1f, @none}, 0x8) setsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000140)=0x2000000, 0x4) 33.335893407s ago: executing program 3 (id=5734): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CHECK_EXTENSION_VM(r1, 0xae03, 0x21) 31.045283269s ago: executing program 33 (id=5731): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'rose0\x00', 0x112}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000040)={0x2, &(0x7f0000000080)=[{0x20, 0x0, 0x0, 0xfffff02c}, {0x6, 0x0, 0x0, 0x3}]}) 27.090080726s ago: executing program 1 (id=5736): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0xa2f01, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) write$tun(r0, 0x0, 0x2) 21.159685405s ago: executing program 3 (id=5737): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002500)={&(0x7f00000000c0)={0x3c, r1, 0x1, 0x70bd25, 0x2000, {}, [@ETHTOOL_A_FEATURES_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @ETHTOOL_A_FEATURES_WANTED={0x8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4}]}]}, 0x3c}}, 0x4000400) 7.69938065s ago: executing program 34 (id=5736): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0xa2f01, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) write$tun(r0, 0x0, 0x2) 0s ago: executing program 35 (id=5737): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002500)={&(0x7f00000000c0)={0x3c, r1, 0x1, 0x70bd25, 0x2000, {}, [@ETHTOOL_A_FEATURES_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @ETHTOOL_A_FEATURES_WANTED={0x8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4}]}]}, 0x3c}}, 0x4000400) kernel console output (not intermixed with test programs): own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 214.419139][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 214.428931][ T647] usb 4-1: Using ep0 maxpacket: 16 [ 214.431333][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 214.448326][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 214.460581][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 214.472756][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 214.484748][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 214.495276][ T647] usb 4-1: config 0 has an invalid interface number: 128 but max is 0 [ 214.516140][ T647] usb 4-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 214.546130][ T647] usb 4-1: config 0 has no interface number 0 [ 214.571449][ T647] usb 4-1: config 0 interface 128 altsetting 0 has an endpoint descriptor with address 0x4E, changing to 0xE [ 214.591643][T11287] netlink: 'syz.0.5416': attribute type 29 has an invalid length. [ 214.617728][ T647] usb 4-1: config 0 interface 128 altsetting 0 endpoint 0xE has an invalid bInterval 0, changing to 7 [ 214.656502][ T647] usb 4-1: config 0 interface 128 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 214.695045][ T647] usb 4-1: New USB device found, idVendor=1b3d, idProduct=01d3, bcdDevice= 1.16 [ 214.720863][ T647] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 214.739711][ T647] usb 4-1: Product: syz [ 214.743943][ T647] usb 4-1: Manufacturer: syz [ 214.748558][ T647] usb 4-1: SerialNumber: syz [ 214.786551][ T647] usb 4-1: config 0 descriptor?? [ 214.824004][ T647] ftdi_sio 4-1:0.128: FTDI USB Serial Device converter detected [ 214.832084][ T647] usb 4-1: Detected SIO [ 214.862597][ T647] usb 4-1: FTDI USB Serial Device converter now attached to ttyUSB0 [ 215.076639][ T647] usb 4-1: USB disconnect, device number 76 [ 215.101133][ T647] ftdi_sio ttyUSB0: FTDI USB Serial Device converter now disconnected from ttyUSB0 [ 215.110626][ T647] ftdi_sio 4-1:0.128: device disconnected [ 215.206949][T11303] support for the xor transformation has been removed. [ 215.292755][T11307] kvm_intel: L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 215.904034][T11324] tipc: Enabling of bearer rejected, failed to enable media [ 216.800639][ T488] kernel write not supported for file /uhid (pid: 488 comm: kworker/1:3) [ 216.856523][T11374] overlayfs: conflicting lowerdir path [ 217.106766][T11385] netlink: 8 bytes leftover after parsing attributes in process `syz.0.5461'. [ 217.639904][ T36] kauditd_printk_skb: 463 callbacks suppressed [ 217.639923][ T36] audit: type=1400 audit(211.316:24395): avc: denied { read write } for pid=498 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 217.707039][ T36] audit: type=1400 audit(211.344:24396): avc: denied { read write open } for pid=496 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 217.761935][ T36] audit: type=1400 audit(211.344:24397): avc: denied { ioctl } for pid=496 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 217.856718][ T36] audit: type=1400 audit(211.354:24398): avc: denied { read write open } for pid=498 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 217.882093][ T36] audit: type=1400 audit(211.354:24399): avc: denied { ioctl } for pid=498 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 217.907773][ T36] audit: type=1400 audit(211.420:24400): avc: denied { read write } for pid=496 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 217.932271][ T36] audit: type=1400 audit(211.420:24401): avc: denied { read write open } for pid=496 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 217.993257][ T36] audit: type=1400 audit(211.420:24402): avc: denied { ioctl } for pid=496 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 218.018907][ T36] audit: type=1400 audit(211.420:24403): avc: denied { read write } for pid=495 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 218.070460][ T36] audit: type=1400 audit(211.420:24404): avc: denied { read write open } for pid=495 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 219.206546][T11478] can0: slcan on ttyS3. [ 219.325654][T11477] can0 (unregistered): slcan off ttyS3. [ 219.704908][ C1] net_ratelimit: 90293 callbacks suppressed [ 219.704927][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 219.723094][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 219.735121][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 219.747190][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 219.759357][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 219.771489][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 219.783514][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 219.795622][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 219.807669][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 219.819777][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 219.953884][ T647] usb 1-1: new high-speed USB device number 77 using dummy_hcd [ 220.131284][ T647] usb 1-1: Using ep0 maxpacket: 32 [ 220.144662][ T647] usb 1-1: config 0 has an invalid interface number: 4 but max is 0 [ 220.172569][ T647] usb 1-1: config 0 has no interface number 0 [ 220.194058][ T647] usb 1-1: config 0 interface 4 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 220.226580][ T647] usb 1-1: config 0 interface 4 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 220.247133][ T647] usb 1-1: config 0 interface 4 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 3 [ 220.280399][ T647] usb 1-1: New USB device found, idVendor=046d, idProduct=c537, bcdDevice= 0.00 [ 220.290193][ T647] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 220.317965][ T647] usb 1-1: config 0 descriptor?? [ 220.797708][ T647] logitech-djreceiver 0003:046D:C537.0001: hidraw0: USB HID v10.00 Device [HID 046d:c537] on usb-dummy_hcd.0-1/input4 [ 221.017743][ T647] usb 1-1: USB disconnect, device number 77 [ 221.631693][T11564] rust_binder: Write failure EFAULT in pid:2212 [ 221.719461][ T647] usb 2-1: new high-speed USB device number 78 using dummy_hcd [ 221.915950][ T647] usb 2-1: config 220 has an invalid interface number: 76 but max is 2 [ 221.939000][ T647] usb 2-1: config 220 has an invalid descriptor of length 0, skipping remainder of the config [ 221.981753][ T647] usb 2-1: config 220 has no interface number 2 [ 222.004297][ T647] usb 2-1: config 220 interface 1 altsetting 5 has 0 endpoint descriptors, different from the interface descriptor's value: 12 [ 222.017558][ T9] usb 3-1: new full-speed USB device number 85 using dummy_hcd [ 222.045979][ T647] usb 2-1: config 220 interface 0 has no altsetting 0 [ 222.055039][ T647] usb 2-1: config 220 interface 76 has no altsetting 0 [ 222.074302][ T647] usb 2-1: config 220 interface 1 has no altsetting 0 [ 222.097472][ T647] usb 2-1: New USB device found, idVendor=8086, idProduct=0b07, bcdDevice=6c.b9 [ 222.112867][ T647] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 222.136452][ T647] usb 2-1: Product: syz [ 222.140651][ T647] usb 2-1: Manufacturer: syz [ 222.152210][ T647] usb 2-1: SerialNumber: syz [ 222.216196][ T9] usb 3-1: config 0 has an invalid interface number: 32 but max is 0 [ 222.231076][ T9] usb 3-1: config 0 has no interface number 0 [ 222.245119][ T9] usb 3-1: config 0 interface 32 altsetting 128 endpoint 0x81 has an invalid bInterval 0, changing to 10 [ 222.270206][ T9] usb 3-1: config 0 interface 32 altsetting 128 endpoint 0x81 has invalid wMaxPacketSize 0 [ 222.294977][ T9] usb 3-1: config 0 interface 32 altsetting 128 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 222.326957][ T9] usb 3-1: config 0 interface 32 has no altsetting 0 [ 222.337087][ T9] usb 3-1: New USB device found, idVendor=145f, idProduct=0212, bcdDevice= 0.00 [ 222.358081][ T9] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 222.392189][ T647] usb 2-1: selecting invalid altsetting 0 [ 222.404974][ T9] usb 3-1: config 0 descriptor?? [ 222.433689][ T647] usb 2-1: selecting invalid altsetting 0 [ 222.454457][ T647] usb 2-1: Found UVC 7.01 device syz (8086:0b07) [ 222.487028][ T647] usb 2-1: No valid video chain found. [ 222.520090][ T647] usb 2-1: USB disconnect, device number 78 [ 222.579456][T11267] udevd[11267]: setting mode of /dev/bus/usb/002/078 to 020664 failed: No such file or directory [ 222.615517][T11267] udevd[11267]: setting owner of /dev/bus/usb/002/078 to uid=0, gid=0 failed: No such file or directory [ 222.870788][ T9] uclogic 0003:145F:0212.0002: interface is invalid, ignoring [ 222.973001][T11594] netlink: 2 bytes leftover after parsing attributes in process `syz.3.5562'. [ 222.999676][ T36] kauditd_printk_skb: 466 callbacks suppressed [ 222.999692][ T36] audit: type=1400 audit(216.345:24871): avc: denied { read } for pid=11593 comm="syz.3.5562" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 223.062423][ T36] audit: type=1400 audit(216.364:24872): avc: denied { read write } for pid=495 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 223.114233][ T9] usb 3-1: USB disconnect, device number 85 [ 223.179677][ T36] audit: type=1400 audit(216.364:24873): avc: denied { read write open } for pid=495 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 223.282787][ T36] audit: type=1400 audit(216.364:24874): avc: denied { ioctl } for pid=495 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 223.382197][ T36] audit: type=1400 audit(216.392:24875): avc: denied { read write } for pid=498 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 223.450383][ T36] audit: type=1400 audit(216.392:24876): avc: denied { read write open } for pid=498 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 223.500486][ T36] audit: type=1400 audit(216.392:24877): avc: denied { ioctl } for pid=498 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 223.552711][ T36] audit: type=1400 audit(216.495:24878): avc: denied { create } for pid=11597 comm="syz.3.5564" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 223.595131][ T36] audit: type=1400 audit(216.505:24879): avc: denied { create } for pid=11597 comm="syz.3.5564" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 223.621138][T11608] tmpfs: Cannot retroactively limit inodes [ 223.636400][ T36] audit: type=1400 audit(216.505:24880): avc: denied { write } for pid=11597 comm="syz.3.5564" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 224.301579][T11637] netlink: 104 bytes leftover after parsing attributes in process `syz.0.5583'. [ 225.045000][ C1] net_ratelimit: 92047 callbacks suppressed [ 225.045023][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 225.063023][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 225.075148][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 225.087144][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 225.099265][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 225.111360][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 225.123515][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 225.135717][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 225.147833][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 225.159840][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 226.558481][ T647] usb 3-1: new high-speed USB device number 86 using dummy_hcd [ 226.754403][ T647] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 226.792948][ T647] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 226.817293][ T647] usb 3-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 9 [ 226.841066][ T647] usb 3-1: New USB device found, idVendor=05ac, idProduct=0244, bcdDevice= 0.00 [ 226.850831][ T647] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 226.865282][ T647] usb 3-1: config 0 descriptor?? [ 226.902937][ T488] usb 2-1: new high-speed USB device number 79 using dummy_hcd [ 227.147457][ T488] usb 2-1: Using ep0 maxpacket: 16 [ 227.188347][ T488] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 227.273369][ T488] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 227.295186][ T488] usb 2-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 9 [ 227.327095][ T488] usb 2-1: New USB device found, idVendor=045e, idProduct=07da, bcdDevice= 0.00 [ 227.348559][ T488] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 227.353960][ T647] apple 0003:05AC:0244.0003: unknown main item tag 0x0 [ 227.370252][ T488] usb 2-1: config 0 descriptor?? [ 227.387496][ T647] apple 0003:05AC:0244.0003: unknown main item tag 0x0 [ 227.411180][ T647] apple 0003:05AC:0244.0003: unknown main item tag 0x0 [ 227.418091][ T647] apple 0003:05AC:0244.0003: unknown main item tag 0x0 [ 227.448229][ T647] apple 0003:05AC:0244.0003: unknown main item tag 0x0 [ 227.462842][ T647] apple 0003:05AC:0244.0003: unknown main item tag 0x0 [ 227.477145][ T647] apple 0003:05AC:0244.0003: unknown main item tag 0x0 [ 227.512719][ T647] apple 0003:05AC:0244.0003: unknown main item tag 0x0 [ 227.530665][ T647] apple 0003:05AC:0244.0003: unknown main item tag 0x0 [ 227.540515][ T647] apple 0003:05AC:0244.0003: unknown main item tag 0x0 [ 227.581725][ T647] apple 0003:05AC:0244.0003: unknown main item tag 0x0 [ 227.588636][ T647] apple 0003:05AC:0244.0003: unknown main item tag 0x0 [ 227.642443][ T647] apple 0003:05AC:0244.0003: unknown main item tag 0x0 [ 227.666398][ T647] apple 0003:05AC:0244.0003: unknown main item tag 0x0 [ 227.697738][ T647] apple 0003:05AC:0244.0003: unknown main item tag 0x0 [ 227.716973][ T647] apple 0003:05AC:0244.0003: unknown main item tag 0x0 [ 227.737799][ T647] apple 0003:05AC:0244.0003: unknown main item tag 0x0 [ 227.756932][ T647] apple 0003:05AC:0244.0003: unknown main item tag 0x0 [ 227.773575][ T647] apple 0003:05AC:0244.0003: unknown main item tag 0x0 [ 227.784233][ T647] apple 0003:05AC:0244.0003: unknown main item tag 0x0 [ 227.791133][ T647] apple 0003:05AC:0244.0003: unknown main item tag 0x0 [ 227.810769][T11789] netlink: 68 bytes leftover after parsing attributes in process `syz.0.5657'. [ 227.826865][ T647] apple 0003:05AC:0244.0003: unknown main item tag 0x0 [ 227.839088][ T647] apple 0003:05AC:0244.0003: unknown main item tag 0x0 [ 227.845999][ T647] apple 0003:05AC:0244.0003: unknown main item tag 0x0 [ 227.868798][ T647] apple 0003:05AC:0244.0003: unknown main item tag 0x0 [ 227.886568][ T647] apple 0003:05AC:0244.0003: unknown main item tag 0x0 [ 227.900273][ T647] apple 0003:05AC:0244.0003: unknown main item tag 0x0 [ 227.914256][ T488] microsoft 0003:045E:07DA.0004: No inputs registered, leaving [ 227.919438][ T647] apple 0003:05AC:0244.0003: unknown main item tag 0x0 [ 227.938195][ T488] microsoft 0003:045E:07DA.0004: hidraw0: USB HID v0.00 Device [HID 045e:07da] on usb-dummy_hcd.1-1/input0 [ 227.952881][ T647] apple 0003:05AC:0244.0003: unknown main item tag 0x0 [ 227.966996][ T488] microsoft 0003:045E:07DA.0004: no inputs found [ 227.973452][ T488] microsoft 0003:045E:07DA.0004: could not initialize ff, continuing anyway [ 227.986045][ T647] apple 0003:05AC:0244.0003: unknown main item tag 0x0 [ 228.004236][ T647] apple 0003:05AC:0244.0003: unknown main item tag 0x0 [ 228.018725][ T647] apple 0003:05AC:0244.0003: unknown main item tag 0x0 [ 228.036470][ T647] apple 0003:05AC:0244.0003: unknown main item tag 0x0 [ 228.050299][ T647] apple 0003:05AC:0244.0003: unknown main item tag 0x0 [ 228.074978][ T647] apple 0003:05AC:0244.0003: unknown main item tag 0x0 [ 228.093343][ T647] apple 0003:05AC:0244.0003: unknown main item tag 0x0 [ 228.108282][ T9] usb 2-1: USB disconnect, device number 79 [ 228.115341][ T31] usb 4-1: new high-speed USB device number 77 using dummy_hcd [ 228.160016][ T647] apple 0003:05AC:0244.0003: unknown main item tag 0x0 [ 228.192914][ T647] apple 0003:05AC:0244.0003: unknown main item tag 0x0 [ 228.227883][ T647] apple 0003:05AC:0244.0003: hidraw0: USB HID v0.00 Device [HID 05ac:0244] on usb-dummy_hcd.2-1/input0 [ 228.268529][ T647] usb 3-1: USB disconnect, device number 86 [ 228.289878][T11794] fido_id[11794]: Failed to open report descriptor at '/sys/devices/platform/dummy_hcd.1/usb2/report_descriptor': No such file or directory [ 228.354779][ T36] kauditd_printk_skb: 545 callbacks suppressed [ 228.354795][ T36] audit: type=1400 audit(221.364:25426): avc: denied { read write } for pid=497 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 228.423954][ T36] audit: type=1400 audit(221.402:25427): avc: denied { read write open } for pid=497 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 228.474229][ T36] audit: type=1400 audit(221.402:25428): avc: denied { ioctl } for pid=497 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 228.503735][ T31] usb 4-1: config 220 has an invalid interface number: 76 but max is 2 [ 228.520517][ T31] usb 4-1: config 220 contains an unexpected descriptor of type 0x2, skipping [ 228.529405][ T31] usb 4-1: config 220 has an invalid descriptor of length 0, skipping remainder of the config [ 228.530405][ T36] audit: type=1400 audit(221.421:25429): avc: denied { read write } for pid=496 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 228.590410][ T31] usb 4-1: config 220 has no interface number 2 [ 228.648187][ T36] audit: type=1400 audit(221.421:25430): avc: denied { read write open } for pid=496 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 228.747927][ T36] audit: type=1400 audit(221.421:25431): avc: denied { ioctl } for pid=496 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 228.767240][ T31] usb 4-1: config 220 interface 1 altsetting 5 has 0 endpoint descriptors, different from the interface descriptor's value: 12 [ 228.796864][ T31] usb 4-1: config 220 interface 0 has no altsetting 0 [ 228.803723][ T31] usb 4-1: config 220 interface 76 has no altsetting 0 [ 228.829216][ T31] usb 4-1: config 220 interface 1 has no altsetting 0 [ 228.880809][ T36] audit: type=1400 audit(221.458:25432): avc: denied { ioctl } for pid=11786 comm="syz.3.5656" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 228.918160][ T31] usb 4-1: New USB device found, idVendor=8086, idProduct=0b07, bcdDevice=6c.b9 [ 228.935034][T11808] fido_id[11808]: Failed to open report descriptor at '/sys/devices/platform/dummy_hcd.2/usb3/report_descriptor': No such file or directory [ 228.935758][ T31] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 228.975750][ T36] audit: type=1400 audit(221.468:25433): avc: denied { ioctl } for pid=11786 comm="syz.3.5656" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 229.084584][ T36] audit: type=1400 audit(221.468:25434): avc: denied { ioctl } for pid=11786 comm="syz.3.5656" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 229.192296][ T36] audit: type=1400 audit(221.505:25435): avc: denied { ioctl } for pid=11786 comm="syz.3.5656" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 229.223891][ T31] usb 4-1: Product: syz [ 229.228192][ T31] usb 4-1: Manufacturer: syz [ 229.232810][ T31] usb 4-1: SerialNumber: syz [ 229.549227][ T31] usb 4-1: Found UVC 7.01 device syz (8086:0b07) [ 229.564355][ T31] usb 4-1: No valid video chain found. [ 229.569873][ T31] usb 4-1: selecting invalid altsetting 0 [ 229.603277][ T31] usb 4-1: USB disconnect, device number 77 [ 229.953186][ T488] usb 3-1: new high-speed USB device number 87 using dummy_hcd [ 230.289384][ T488] usb 3-1: Using ep0 maxpacket: 16 [ 230.335244][ T488] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 230.349480][ T488] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 230.363907][ T488] usb 3-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 9 [ 230.384946][ C1] net_ratelimit: 80376 callbacks suppressed [ 230.384965][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 230.402891][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 230.415011][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 230.427047][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 230.439127][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 230.451225][ T488] usb 3-1: New USB device found, idVendor=045e, idProduct=07da, bcdDevice= 0.00 [ 230.460357][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 230.460467][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 230.460549][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 230.460637][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 230.460717][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 230.481300][ T488] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 230.557422][ T488] usb 3-1: config 0 descriptor?? [ 231.091775][ T488] microsoft 0003:045E:07DA.0005: unknown main item tag 0x0 [ 231.150847][ T488] microsoft 0003:045E:07DA.0005: unknown main item tag 0x0 [ 231.164476][ T488] microsoft 0003:045E:07DA.0005: unknown main item tag 0x0 [ 231.171738][ T488] microsoft 0003:045E:07DA.0005: unknown main item tag 0x0 [ 231.182658][T11891] netlink: 'syz.1.5706': attribute type 4 has an invalid length. [ 231.205693][T11891] netlink: 3649 bytes leftover after parsing attributes in process `syz.1.5706'. [ 231.249060][ T488] microsoft 0003:045E:07DA.0005: unknown main item tag 0x0 [ 231.260958][ T488] microsoft 0003:045E:07DA.0005: unknown main item tag 0x0 [ 231.281139][ T488] microsoft 0003:045E:07DA.0005: unknown main item tag 0x0 [ 231.288410][ T488] microsoft 0003:045E:07DA.0005: unknown main item tag 0x0 [ 231.326220][ T488] microsoft 0003:045E:07DA.0005: unknown main item tag 0x0 [ 231.344237][ T488] microsoft 0003:045E:07DA.0005: unknown main item tag 0x0 [ 231.432710][ T488] input: HID 045e:07da as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/0003:045E:07DA.0005/input/input27 [ 231.904529][ T488] microsoft 0003:045E:07DA.0005: input,hidraw0: USB HID v0.00 Device [HID 045e:07da] on usb-dummy_hcd.2-1/input0 [ 235.724966][ C1] net_ratelimit: 123394 callbacks suppressed [ 235.724990][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 235.725035][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 235.731217][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 235.743375][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 235.755195][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 235.767281][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 235.778940][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 235.791299][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 235.803015][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 235.815091][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 237.218033][ T488] usb 3-1: USB disconnect, device number 87 [ 237.430327][ C0] sched: DL replenish lagged too much [ 239.606445][ T36] kauditd_printk_skb: 293 callbacks suppressed [ 239.606468][ T36] audit: type=1400 audit(231.900:25729): avc: denied { read write } for pid=495 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 241.064956][ C0] net_ratelimit: 134891 callbacks suppressed [ 241.064981][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 241.065041][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 241.071521][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 241.083237][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 241.095474][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 241.107148][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 241.119347][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 241.131067][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 241.143418][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 241.155001][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 241.301094][ T36] audit: type=1400 audit(232.548:25730): avc: denied { read write open } for pid=495 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 243.642268][T11898] fido_id[11898]: Failed to open report descriptor at '/sys/devices/platform/dummy_hcd.2/usb3/report_descriptor': No such file or directory [ 244.023456][ T36] audit: type=1400 audit(232.548:25731): avc: denied { ioctl } for pid=495 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 245.052824][ T36] audit: type=1400 audit(233.570:25732): avc: denied { read write } for pid=497 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 246.405014][ C0] net_ratelimit: 136605 callbacks suppressed [ 246.405036][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 246.405059][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 246.411454][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 246.423139][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 246.435288][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 246.447114][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 246.459332][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 246.470959][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 246.483095][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 246.494924][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 246.608825][ T36] audit: type=1400 audit(233.570:25733): avc: denied { read write open } for pid=497 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 249.797268][ T36] audit: type=1400 audit(233.570:25734): avc: denied { ioctl } for pid=497 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 251.744984][ C1] net_ratelimit: 143452 callbacks suppressed [ 251.745008][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 251.745460][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 251.751270][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 251.763520][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 251.775260][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 251.787374][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 251.799113][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 251.811475][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 251.823147][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 251.835259][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 252.654131][ T36] audit: type=1400 audit(233.655:25735): avc: denied { read write } for pid=496 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 255.199568][ T36] audit: type=1400 audit(233.655:25736): avc: denied { read write open } for pid=496 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 255.881387][ T36] audit: type=1400 audit(233.655:25737): avc: denied { ioctl } for pid=496 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 256.823270][ T36] audit: type=1400 audit(238.111:25738): avc: denied { read write } for pid=11905 comm="syz.3.5710" name="ptp0" dev="devtmpfs" ino=196 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 257.084992][ C1] net_ratelimit: 132694 callbacks suppressed [ 257.085012][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 257.085155][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 257.091289][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 257.103545][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 257.115155][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 257.127382][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 257.139021][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 257.151308][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 257.162931][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 257.175097][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 258.087935][T11917] netlink: 96 bytes leftover after parsing attributes in process `syz.1.5718'. [ 258.659451][ T36] audit: type=1400 audit(238.111:25739): avc: denied { read write open } for pid=11905 comm="syz.3.5710" path="/dev/ptp0" dev="devtmpfs" ino=196 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 260.712110][ T36] audit: type=1400 audit(238.271:25740): avc: denied { ioctl } for pid=11905 comm="syz.3.5710" path="/dev/ptp0" dev="devtmpfs" ino=196 ioctlcmd=0x3d14 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 262.425000][ C1] net_ratelimit: 135292 callbacks suppressed [ 262.425024][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 262.425466][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 262.431314][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 262.443597][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 262.455269][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 262.467371][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 262.479097][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 262.491651][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 262.503235][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 262.515370][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 262.798644][ T36] audit: type=1400 audit(238.787:25741): avc: denied { read write } for pid=498 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 265.563261][ T36] audit: type=1400 audit(238.787:25742): avc: denied { read write open } for pid=498 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 266.383543][ T36] audit: type=1400 audit(239.716:25743): avc: denied { ioctl } for pid=498 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 267.765033][ C1] net_ratelimit: 137033 callbacks suppressed [ 267.765057][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 267.765159][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 267.771302][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 267.783506][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 267.795340][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 267.807441][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 267.819281][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 267.831604][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 267.843168][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 267.855364][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 268.058807][ T36] audit: type=1400 audit(242.052:25744): avc: denied { create } for pid=11909 comm="syz.0.5716" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 270.616733][ T36] audit: type=1400 audit(244.238:25745): avc: denied { read write } for pid=495 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 272.055712][ T36] audit: type=1400 audit(244.238:25746): avc: denied { read write open } for pid=495 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 273.105020][ C1] net_ratelimit: 125427 callbacks suppressed [ 273.105042][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 273.105058][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 273.105460][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 273.111268][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 273.124014][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 273.135243][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 273.147677][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 273.159278][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 273.171799][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 273.183001][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 273.320788][T11929] netlink: 108 bytes leftover after parsing attributes in process `syz.2.5724'. [ 273.887081][ T36] audit: type=1400 audit(244.238:25747): avc: denied { ioctl } for pid=495 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 274.144893][T11929] netlink: 8 bytes leftover after parsing attributes in process `syz.2.5724'. [ 274.280182][ T647] usb 4-1: new high-speed USB device number 78 using dummy_hcd [ 275.166178][ T36] audit: type=1400 audit(246.593:25748): avc: denied { read write } for pid=496 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 278.445065][ C1] net_ratelimit: 120841 callbacks suppressed [ 278.445087][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 278.445467][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 278.451371][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 278.463501][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 278.475154][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 278.487758][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 278.499022][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 278.511312][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 278.522865][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 278.535350][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 278.566221][ T36] audit: type=1400 audit(246.593:25749): avc: denied { read write open } for pid=496 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 278.885039][ T647] usb 4-1: device not accepting address 78, error -71 [ 281.186426][ T36] audit: type=1400 audit(246.593:25750): avc: denied { ioctl } for pid=496 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 281.944565][ T9] usb 2-1: new full-speed USB device number 80 using dummy_hcd [ 282.125155][T11939] audit: audit_backlog=65 > audit_backlog_limit=64 [ 282.222150][T11939] audit: audit_lost=12 audit_rate_limit=0 audit_backlog_limit=64 [ 282.300069][T11938] audit: audit_backlog=65 > audit_backlog_limit=64 [ 282.405584][ T36] audit: type=1400 audit(248.750:25751): avc: denied { read write } for pid=497 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 282.873184][T11939] audit: backlog limit exceeded [ 283.008973][T11939] audit: audit_backlog=65 > audit_backlog_limit=64 [ 283.015531][T11939] audit: audit_lost=13 audit_rate_limit=0 audit_backlog_limit=64 [ 283.222230][T11939] audit: backlog limit exceeded [ 283.785076][ C1] net_ratelimit: 119805 callbacks suppressed [ 283.785098][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 283.785571][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 283.791388][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 283.803917][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 283.815379][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 283.828014][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 283.839371][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 283.851697][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 283.863275][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 283.875688][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 283.967167][ T36] kauditd_printk_skb: 70 callbacks suppressed [ 283.967186][ T36] audit: type=1400 audit(273.547:25817): avc: denied { ioctl } for pid=11937 comm="syz.1.5726" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 284.140602][ T9] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 10 [ 284.286785][ T36] audit: type=1400 audit(273.547:25818): avc: denied { ioctl } for pid=11937 comm="syz.1.5726" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 284.874837][ T9] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 286.657106][ T36] audit: type=1400 audit(273.575:25819): avc: denied { ioctl } for pid=11937 comm="syz.1.5726" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 288.529317][ T9] usb 2-1: New USB device found, idVendor=056a, idProduct=0217, bcdDevice= 0.fc [ 288.911108][ T9] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 288.936185][ T36] audit: type=1400 audit(273.697:25820): avc: denied { ioctl } for pid=11937 comm="syz.1.5726" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 289.125090][ C1] net_ratelimit: 110844 callbacks suppressed [ 289.125114][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 289.125660][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 289.131341][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 289.143597][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 289.155339][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 289.167979][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 289.179307][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 289.191723][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 289.203186][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 289.216207][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 289.619077][ T9] usb 2-1: config 0 descriptor?? [ 289.629981][ T9] usb 2-1: can't set config #0, error -71 [ 289.836538][ T9] usb 2-1: USB disconnect, device number 80 [ 290.949233][ T36] audit: type=1400 audit(273.707:25821): avc: denied { ioctl } for pid=11937 comm="syz.1.5726" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 292.974930][ T36] audit: type=1400 audit(273.960:25822): avc: denied { execmem } for pid=11940 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 293.517403][ T36] audit: type=1400 audit(274.354:25823): avc: denied { read write } for pid=495 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 294.465092][ C1] net_ratelimit: 117653 callbacks suppressed [ 294.465114][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 294.465139][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 294.471372][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 294.483958][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 294.495363][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 294.507571][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 294.519226][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 294.531933][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 294.543218][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 294.555393][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 295.010142][ T36] audit: type=1400 audit(274.354:25824): avc: denied { read write open } for pid=495 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 297.431122][ T36] audit: type=1400 audit(274.354:25825): avc: denied { ioctl } for pid=495 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 299.243129][ T36] audit: type=1400 audit(274.870:25826): avc: denied { read write } for pid=497 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 299.805077][ C1] net_ratelimit: 120250 callbacks suppressed [ 299.805100][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 299.805665][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 299.811375][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 299.823727][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 299.835227][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 299.847734][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 299.859139][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 299.871481][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 299.883276][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 299.895839][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 300.976404][ T36] audit: type=1400 audit(274.870:25827): avc: denied { read write open } for pid=497 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 303.269590][ T36] audit: type=1400 audit(274.870:25828): avc: denied { ioctl } for pid=497 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 304.420619][ T36] audit: type=1400 audit(278.257:25829): avc: denied { read write } for pid=498 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 305.145116][ C1] net_ratelimit: 121895 callbacks suppressed [ 305.145139][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 305.145293][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 305.151431][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 305.163568][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 305.175260][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 305.187757][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 305.199221][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 305.211435][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 305.223047][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 305.235615][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 306.200365][ T36] audit: type=1400 audit(278.257:25830): avc: denied { read write open } for pid=498 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 310.485106][ C1] net_ratelimit: 123172 callbacks suppressed [ 310.485129][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 310.485325][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 310.491396][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 310.503881][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 310.515347][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 310.527551][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 310.539179][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 310.551815][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 310.563214][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 310.575391][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 310.656593][ T36] audit: type=1400 audit(278.257:25831): avc: denied { ioctl } for pid=498 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 312.149535][ T36] audit: type=1400 audit(281.700:25832): avc: denied { mounton } for pid=11946 comm="syz.1.5730" path="/1344/file0" dev="tmpfs" ino=6797 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 312.234451][ T36] audit: type=1400 audit(281.738:25833): avc: denied { unlink } for pid=11946 comm="syz.1.5730" name="#3" dev="tmpfs" ino=6801 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 314.418412][ T36] audit: type=1400 audit(281.747:25834): avc: denied { mount } for pid=11946 comm="syz.1.5730" name="/" dev="overlay" ino=6797 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 315.825122][ C1] net_ratelimit: 119081 callbacks suppressed [ 315.825144][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 315.825380][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 315.831356][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:d2:33:e2:66:68:77, vlan:0) [ 315.843619][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 315.855242][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 315.867942][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 315.879141][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 315.891441][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 315.903037][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:d2:33:e2:66:68:77, vlan:0) [ 315.915756][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 316.898426][ T36] audit: type=1400 audit(282.272:25835): avc: denied { read } for pid=11948 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 319.249692][ T36] audit: type=1400 audit(282.272:25836): avc: denied { read open } for pid=11948 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 321.165120][ C1] net_ratelimit: 123238 callbacks suppressed [ 321.165158][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:d2:33:e2:66:68:77, vlan:0) [ 321.165265][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 321.171444][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 321.184071][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 321.195418][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 321.207657][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 321.219357][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:d2:33:e2:66:68:77, vlan:0) [ 321.231984][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 321.243295][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 321.255643][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 325.931448][ T36] audit: type=1400 audit(282.272:25837): avc: denied { mounton } for pid=11948 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 326.186436][ T36] audit: type=1400 audit(283.333:25838): avc: denied { sys_module } for pid=11948 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 326.505123][ C1] net_ratelimit: 121851 callbacks suppressed [ 326.505146][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:d2:33:e2:66:68:77, vlan:0) [ 326.505146][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 326.505977][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 326.511363][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 326.523718][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 326.535349][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 326.547899][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 326.559193][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:d2:33:e2:66:68:77, vlan:0) [ 326.571681][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 326.583238][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 329.704155][ T36] audit: type=1400 audit(284.177:25839): avc: denied { unmount } for pid=495 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 331.078317][ T36] audit: type=1400 audit(287.864:25840): avc: denied { read write } for pid=495 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 331.845159][ C1] net_ratelimit: 128033 callbacks suppressed [ 331.845181][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 331.845294][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 331.851502][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 331.864109][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 331.875580][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:d2:33:e2:66:68:77, vlan:0) [ 331.887840][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 331.899402][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 331.912190][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 331.923764][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 331.936164][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 332.927498][ T36] audit: type=1400 audit(287.864:25841): avc: denied { read write open } for pid=495 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 333.415522][ T36] audit: type=1400 audit(287.864:25842): avc: denied { ioctl } for pid=495 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 334.394901][ T36] audit: type=1400 audit(291.364:25843): avc: denied { read write } for pid=498 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 335.832923][ T36] audit: type=1400 audit(291.364:25844): avc: denied { read write open } for pid=498 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 336.571925][ T36] audit: type=1400 audit(291.364:25845): avc: denied { ioctl } for pid=498 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 336.910082][ T36] audit: type=1400 audit(292.480:25846): avc: denied { execmem } for pid=11955 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 337.185165][ C1] net_ratelimit: 122821 callbacks suppressed [ 337.185189][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 337.185463][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 337.191501][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 337.203754][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 337.215416][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:d2:33:e2:66:68:77, vlan:0) [ 337.227947][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 337.239436][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 337.251569][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 337.263240][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 337.275607][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 338.699759][ T36] audit: type=1400 audit(294.385:25847): avc: denied { read } for pid=11956 comm="syz.1.5733" dev="nsfs" ino=4026532302 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 340.512265][ T36] audit: type=1400 audit(294.385:25848): avc: denied { read open } for pid=11956 comm="syz.1.5733" path="net:[4026532302]" dev="nsfs" ino=4026532302 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 342.525183][ C1] net_ratelimit: 127544 callbacks suppressed [ 342.525204][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 342.525494][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 342.531430][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 342.543720][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 342.555330][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:d2:33:e2:66:68:77, vlan:0) [ 342.567415][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 342.579190][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 342.591501][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 342.603066][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 342.615370][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 342.696871][ T36] audit: type=1400 audit(294.385:25849): avc: denied { create } for pid=11956 comm="syz.1.5733" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 345.193530][ T36] audit: type=1400 audit(294.431:25850): avc: denied { bind } for pid=11956 comm="syz.1.5733" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 346.387980][ T36] audit: type=1400 audit(294.488:25851): avc: denied { setopt } for pid=11956 comm="syz.1.5733" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 346.960124][ T36] audit: type=1400 audit(294.825:25852): avc: denied { read write } for pid=495 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 347.114383][ T36] audit: type=1400 audit(294.825:25853): avc: denied { read write open } for pid=495 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 347.743203][ T36] audit: type=1400 audit(294.825:25854): avc: denied { ioctl } for pid=495 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 347.865183][ C1] net_ratelimit: 128634 callbacks suppressed [ 347.865206][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 347.865242][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 347.871416][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 347.883616][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 347.895364][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:d2:33:e2:66:68:77, vlan:0) [ 347.907599][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 347.919217][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 347.931687][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 347.943164][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 347.955263][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 348.080359][ T36] audit: type=1400 audit(303.054:25855): avc: denied { read write } for pid=498 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 348.217716][ T36] audit: type=1400 audit(303.054:25856): avc: denied { read write open } for pid=498 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 352.503205][ T36] audit: type=1400 audit(303.054:25857): avc: denied { ioctl } for pid=498 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 353.205178][ C1] net_ratelimit: 127915 callbacks suppressed [ 353.205201][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 353.205303][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 353.211445][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 353.223775][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 353.235356][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 353.247728][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 353.259248][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:d2:33:e2:66:68:77, vlan:0) [ 353.271411][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 353.283136][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 353.295462][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 354.486829][ T36] audit: type=1400 audit(319.960:25858): avc: denied { read } for pid=11960 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 354.804922][ T36] audit: type=1400 audit(319.960:25859): avc: denied { read open } for pid=11960 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 355.327327][ T36] audit: type=1400 audit(321.058:25860): avc: denied { sys_module } for pid=11948 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 356.818901][ T36] audit: type=1400 audit(321.780:25861): avc: denied { execmem } for pid=11959 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 358.545216][ C0] net_ratelimit: 121994 callbacks suppressed [ 358.545234][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 358.545345][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 358.551857][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 358.563440][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:d2:33:e2:66:68:77, vlan:0) [ 358.575578][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 358.587301][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 358.599645][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 358.611299][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 358.623533][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 358.635173][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 358.684156][ T36] audit: type=1400 audit(322.230:25862): avc: denied { mounton } for pid=11960 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 359.089340][ T36] audit: type=1400 audit(322.296:25863): avc: denied { execmem } for pid=11961 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 359.153083][ T36] audit: type=1400 audit(322.821:25864): avc: denied { sys_module } for pid=11960 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 359.233392][ T36] audit: type=1400 audit(330.956:25865): avc: denied { read } for pid=11963 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 359.483406][ T36] audit: type=1400 audit(330.956:25866): avc: denied { read open } for pid=11963 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 359.591151][ T36] audit: type=1400 audit(331.659:25867): avc: denied { read } for pid=11964 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 363.885229][ C1] net_ratelimit: 122857 callbacks suppressed [ 363.885252][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 363.885527][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 363.891506][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 363.903633][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 363.917191][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 363.927748][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 363.939354][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:d2:33:e2:66:68:77, vlan:0) [ 363.951872][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 363.963366][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 363.975494][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 364.209300][ T36] audit: type=1400 audit(331.659:25868): avc: denied { read open } for pid=11964 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 366.465688][ T36] audit: type=1400 audit(333.310:25869): avc: denied { mounton } for pid=11963 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 367.446640][ T36] audit: type=1400 audit(333.320:25870): avc: denied { sys_module } for pid=11963 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 368.544139][ T36] audit: type=1400 audit(333.348:25871): avc: denied { mounton } for pid=11964 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 369.225237][ C0] net_ratelimit: 127793 callbacks suppressed [ 369.225258][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 369.225284][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 369.231860][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 369.243463][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 369.255858][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 369.267406][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:d2:33:e2:66:68:77, vlan:0) [ 369.279541][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 369.291401][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 369.303586][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 369.315328][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 369.388372][ T36] audit: type=1400 audit(333.357:25872): avc: denied { sys_module } for pid=11964 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 371.128381][ T36] audit: type=1400 audit(340.563:25873): avc: denied { execmem } for pid=11965 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 371.533652][ T36] audit: type=1400 audit(344.128:25874): avc: denied { sys_module } for pid=11960 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 371.784922][ T36] audit: type=1400 audit(355.368:25875): avc: denied { read } for pid=11967 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 371.934219][ T36] audit: type=1400 audit(355.368:25876): avc: denied { read open } for pid=11967 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 372.072414][ T36] audit: type=1400 audit(355.724:25877): avc: denied { mounton } for pid=11967 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 372.145962][ T36] audit: type=1400 audit(355.724:25878): avc: denied { sys_module } for pid=11967 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 372.221890][ T36] audit: type=1400 audit(355.959:25879): avc: denied { execmem } for pid=11966 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 372.285426][ T36] audit: type=1400 audit(356.362:25880): avc: denied { read } for pid=11968 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 372.349221][ T36] audit: type=1400 audit(356.362:25881): avc: denied { read open } for pid=11968 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 372.465817][ T36] audit: type=1400 audit(356.362:25882): avc: denied { mounton } for pid=11968 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 374.565238][ C1] net_ratelimit: 121252 callbacks suppressed [ 374.565257][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 374.565344][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 374.571491][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 374.583959][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 374.595447][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 374.607605][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 374.619266][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:d2:33:e2:66:68:77, vlan:0) [ 374.631852][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 374.643152][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 374.655571][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 379.905246][ C1] net_ratelimit: 130802 callbacks suppressed [ 379.905269][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 379.905624][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 379.911534][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 379.923810][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 379.935504][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:d2:33:e2:66:68:77, vlan:0) [ 379.947553][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 379.959773][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 379.972117][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 379.983810][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 379.996176][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 385.245253][ C1] net_ratelimit: 131615 callbacks suppressed [ 385.245276][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 385.245606][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 385.251553][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:d2:33:e2:66:68:77, vlan:0) [ 385.264050][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 385.275405][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 385.287749][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 385.299272][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 385.311756][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 385.323304][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 385.335587][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 388.855276][T11964] bridge0: port 1(bridge_slave_0) entered blocking state [ 388.880420][T11964] bridge0: port 1(bridge_slave_0) entered disabled state [ 388.895878][T11964] bridge_slave_0: entered allmulticast mode [ 388.987012][T11964] bridge_slave_0: entered promiscuous mode [ 389.202135][T11964] bridge0: port 2(bridge_slave_1) entered blocking state [ 389.209255][T11964] bridge0: port 2(bridge_slave_1) entered disabled state [ 389.243780][T11964] bridge_slave_1: entered allmulticast mode [ 389.275066][T11964] bridge_slave_1: entered promiscuous mode [ 389.797575][ T36] kauditd_printk_skb: 13 callbacks suppressed [ 389.797596][ T36] audit: type=1400 audit(372.837:25896): avc: denied { sys_module } for pid=11964 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 390.013969][T11968] bridge0: port 1(bridge_slave_0) entered blocking state [ 390.027512][T11968] bridge0: port 1(bridge_slave_0) entered disabled state [ 390.045220][T11968] bridge_slave_0: entered allmulticast mode [ 390.067937][T11968] bridge_slave_0: entered promiscuous mode [ 390.160987][ T36] audit: type=1400 audit(373.165:25897): avc: denied { sys_module } for pid=11964 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 390.298942][T11963] bridge0: port 1(bridge_slave_0) entered blocking state [ 390.306055][T11963] bridge0: port 1(bridge_slave_0) entered disabled state [ 390.340732][T11963] bridge_slave_0: entered allmulticast mode [ 390.365394][T11963] bridge_slave_0: entered promiscuous mode [ 390.585280][ C1] net_ratelimit: 120747 callbacks suppressed [ 390.585303][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:d2:33:e2:66:68:77, vlan:0) [ 390.585334][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 390.591592][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 390.603954][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 390.615589][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 390.627633][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 390.639358][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 390.651694][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 390.663297][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 390.675651][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 390.709463][T11968] bridge0: port 2(bridge_slave_1) entered blocking state [ 390.724789][T11968] bridge0: port 2(bridge_slave_1) entered disabled state [ 390.731918][T11968] bridge_slave_1: entered allmulticast mode [ 390.788156][T11968] bridge_slave_1: entered promiscuous mode [ 391.001316][T11963] bridge0: port 2(bridge_slave_1) entered blocking state [ 391.008409][T11963] bridge0: port 2(bridge_slave_1) entered disabled state [ 391.133980][T11963] bridge_slave_1: entered allmulticast mode [ 391.172902][T11963] bridge_slave_1: entered promiscuous mode [ 391.388418][ T36] audit: type=1400 audit(374.329:25898): avc: denied { sys_module } for pid=11964 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 391.652768][T11967] bridge0: port 1(bridge_slave_0) entered blocking state [ 391.659860][T11967] bridge0: port 1(bridge_slave_0) entered disabled state [ 391.693879][ T36] audit: type=1400 audit(374.591:25899): avc: denied { sys_module } for pid=11968 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 391.726848][T11967] bridge_slave_0: entered allmulticast mode [ 391.912113][T11967] bridge_slave_0: entered promiscuous mode [ 392.132383][ T36] audit: type=1400 audit(375.023:25900): avc: denied { sys_module } for pid=11964 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 392.249551][T11967] bridge0: port 2(bridge_slave_1) entered blocking state [ 392.256638][T11967] bridge0: port 2(bridge_slave_1) entered disabled state [ 392.266056][ T36] audit: type=1400 audit(375.042:25901): avc: denied { sys_module } for pid=11968 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 392.266106][ T36] audit: type=1400 audit(375.051:25902): avc: denied { sys_module } for pid=11963 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 392.377131][T11967] bridge_slave_1: entered allmulticast mode [ 392.611971][T11967] bridge_slave_1: entered promiscuous mode [ 392.813114][ T36] audit: type=1400 audit(375.605:25903): avc: denied { sys_module } for pid=11963 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 393.048261][ T36] audit: type=1400 audit(375.877:25904): avc: denied { sys_module } for pid=11964 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 393.229015][ T36] audit: type=1400 audit(376.045:25905): avc: denied { sys_module } for pid=11967 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 395.373141][ T36] kauditd_printk_skb: 12 callbacks suppressed [ 395.373164][ T36] audit: type=1400 audit(378.034:25918): avc: denied { sys_module } for pid=11967 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 395.925348][ C0] net_ratelimit: 123777 callbacks suppressed [ 395.925371][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 395.925390][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 395.931898][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 395.943501][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 395.955797][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 395.967464][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 395.979722][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 395.991390][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:d2:33:e2:66:68:77, vlan:0) [ 396.003664][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 396.015321][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 396.120044][ T36] audit: type=1400 audit(378.766:25919): avc: denied { sys_module } for pid=11967 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 400.800411][ T36] audit: type=1400 audit(383.157:25920): avc: denied { execmem } for pid=11981 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 401.265257][ C1] net_ratelimit: 130314 callbacks suppressed [ 401.265281][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 401.265304][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 401.271493][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:d2:33:e2:66:68:77, vlan:0) [ 401.283592][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 401.295349][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 401.307624][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 401.319278][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 401.331607][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 401.343121][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 401.355381][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 401.842210][ T36] audit: type=1400 audit(384.086:25921): avc: denied { execmem } for pid=11982 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 402.683987][ T36] audit: type=1400 audit(384.911:25922): avc: denied { read } for pid=11983 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 403.326963][ T36] audit: type=1400 audit(384.911:25923): avc: denied { read open } for pid=11983 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 405.295198][ T36] audit: type=1400 audit(384.911:25924): avc: denied { mounton } for pid=11983 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 405.488418][ T36] audit: type=1400 audit(384.968:25925): avc: denied { sys_module } for pid=11983 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 406.605272][ C1] net_ratelimit: 121928 callbacks suppressed [ 406.605294][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 406.605567][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 406.611501][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 406.623635][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 406.635367][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 406.647648][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 406.659129][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:d2:33:e2:66:68:77, vlan:0) [ 406.671674][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 406.690121][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 406.695572][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 408.456736][ T36] audit: type=1400 audit(390.297:25926): avc: denied { read } for pid=11984 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 410.101629][ T36] audit: type=1400 audit(390.306:25927): avc: denied { read open } for pid=11984 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 410.155611][ T36] audit: type=1400 audit(390.916:25928): avc: denied { mounton } for pid=11984 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 411.349761][ T36] audit: type=1400 audit(390.925:25929): avc: denied { sys_module } for pid=11984 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 411.945337][ C1] net_ratelimit: 123703 callbacks suppressed [ 411.945363][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 411.945365][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 411.945815][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 411.951611][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 411.963879][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 411.975410][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 411.987740][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 411.999526][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 412.011877][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 412.023339][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:d2:33:e2:66:68:77, vlan:0) [ 417.285318][ C1] net_ratelimit: 127225 callbacks suppressed [ 417.285339][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 417.285620][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 417.291562][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 417.303789][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 417.315346][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 417.327998][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 417.339397][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 417.359800][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 417.363245][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:d2:33:e2:66:68:77, vlan:0) [ 417.375663][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 420.824742][ T36] audit: type=1400 audit(401.921:25930): avc: denied { execmem } for pid=11985 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 422.625318][ C1] net_ratelimit: 128661 callbacks suppressed [ 422.625340][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 422.625707][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 422.631534][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 422.643601][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 422.655368][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 422.668036][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 422.679307][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 422.691886][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 422.703267][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:d2:33:e2:66:68:77, vlan:0) [ 422.715466][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 424.321396][ T36] audit: type=1400 audit(405.205:25931): avc: denied { sys_module } for pid=11983 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 424.597825][ T36] audit: type=1400 audit(405.205:25932): avc: denied { sys_module } for pid=11984 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 425.018247][ T36] audit: type=1400 audit(405.205:25933): avc: denied { sys_module } for pid=11984 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 425.273951][ T36] audit: type=1400 audit(405.214:25934): avc: denied { sys_module } for pid=11984 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 425.440513][ T36] audit: type=1400 audit(405.636:25935): avc: denied { sys_module } for pid=11983 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 425.579436][ T36] audit: type=1400 audit(405.664:25936): avc: denied { sys_module } for pid=11983 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 425.722810][ T36] audit: type=1400 audit(405.805:25937): avc: denied { read } for pid=11986 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 425.772027][ T36] audit: type=1400 audit(405.805:25938): avc: denied { read open } for pid=11986 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 426.028653][ T36] audit: type=1400 audit(405.805:25939): avc: denied { mounton } for pid=11986 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 427.965317][ C0] net_ratelimit: 126536 callbacks suppressed [ 427.965341][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 427.965405][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:d2:33:e2:66:68:77, vlan:0) [ 427.971888][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 427.983535][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 427.995846][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 428.007402][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 428.019715][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 428.031284][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 428.043440][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 428.055138][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 428.511174][ T36] audit: type=1400 audit(405.937:25940): avc: denied { sys_module } for pid=11986 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 429.576718][ T36] audit: type=1400 audit(406.218:25941): avc: denied { sys_module } for pid=11986 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 433.305361][ C0] net_ratelimit: 125246 callbacks suppressed [ 433.305385][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 433.305412][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 433.311934][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 433.323520][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:d2:33:e2:66:68:77, vlan:0) [ 433.335876][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 433.347513][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 433.359627][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 433.371397][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 433.383495][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 433.395154][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 433.999445][ T36] audit: type=1400 audit(414.296:25942): avc: denied { sys_module } for pid=11986 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 434.499502][ T36] audit: type=1400 audit(414.521:25943): avc: denied { sys_module } for pid=11986 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 436.233317][ T36] audit: type=1400 audit(416.397:25944): avc: denied { execmem } for pid=11987 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 438.551537][ T36] audit: type=1400 audit(418.565:25945): avc: denied { read } for pid=11988 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 438.645336][ C1] net_ratelimit: 132822 callbacks suppressed [ 438.645356][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:d2:33:e2:66:68:77, vlan:0) [ 438.648243][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 438.651606][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 438.663952][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 438.675656][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 438.687714][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 438.699441][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 438.711806][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 438.723258][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 438.735583][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 439.233318][ T36] audit: type=1400 audit(418.565:25946): avc: denied { read open } for pid=11988 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 439.968363][ T36] audit: type=1400 audit(418.565:25947): avc: denied { mounton } for pid=11988 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 440.414881][ T36] audit: type=1400 audit(418.884:25948): avc: denied { sys_module } for pid=11988 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 440.715100][ T36] audit: type=1400 audit(419.634:25949): avc: denied { sys_module } for pid=11988 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 440.907208][ T36] audit: type=1400 audit(419.644:25950): avc: denied { sys_module } for pid=11988 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 441.140089][ T36] audit: type=1400 audit(420.028:25951): avc: denied { sys_module } for pid=11988 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 443.040041][T11983] bridge0: port 1(bridge_slave_0) entered blocking state [ 443.059480][T11983] bridge0: port 1(bridge_slave_0) entered disabled state [ 443.066584][T11983] bridge_slave_0: entered allmulticast mode [ 443.177247][T11983] bridge_slave_0: entered promiscuous mode [ 443.858063][T11984] bridge0: port 1(bridge_slave_0) entered blocking state [ 443.865124][T11984] bridge0: port 1(bridge_slave_0) entered disabled state [ 443.890119][T11984] bridge_slave_0: entered allmulticast mode [ 443.923158][T11984] bridge_slave_0: entered promiscuous mode [ 443.985407][ C1] net_ratelimit: 133732 callbacks suppressed [ 443.985432][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:d2:33:e2:66:68:77, vlan:0) [ 443.985787][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 443.991705][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 444.003954][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 444.015603][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 444.027953][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 444.039518][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 444.058008][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 444.063466][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 444.075585][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 444.158394][T11983] bridge0: port 2(bridge_slave_1) entered blocking state [ 444.189559][T11983] bridge0: port 2(bridge_slave_1) entered disabled state [ 444.196680][T11983] bridge_slave_1: entered allmulticast mode [ 444.242120][T11983] bridge_slave_1: entered promiscuous mode [ 444.690370][T11984] bridge0: port 2(bridge_slave_1) entered blocking state [ 444.697449][T11984] bridge0: port 2(bridge_slave_1) entered disabled state [ 444.745152][T11984] bridge_slave_1: entered allmulticast mode [ 444.775957][T11984] bridge_slave_1: entered promiscuous mode [ 445.224361][ T36] audit: type=1400 audit(424.822:25952): avc: denied { sys_module } for pid=11983 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 445.681224][ T36] audit: type=1400 audit(425.254:25953): avc: denied { sys_module } for pid=11983 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 446.033536][ T36] audit: type=1400 audit(425.292:25954): avc: denied { sys_module } for pid=11984 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 446.223729][ T36] audit: type=1400 audit(425.667:25955): avc: denied { sys_module } for pid=11984 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 447.206912][ T36] audit: type=1400 audit(426.680:25956): avc: denied { sys_module } for pid=11983 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 447.365300][T11986] bridge0: port 1(bridge_slave_0) entered blocking state [ 447.372388][T11986] bridge0: port 1(bridge_slave_0) entered disabled state [ 447.397069][T11986] bridge_slave_0: entered allmulticast mode [ 447.431471][T11986] bridge_slave_0: entered promiscuous mode [ 447.961752][ T36] audit: type=1400 audit(427.393:25957): avc: denied { sys_module } for pid=11983 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 448.156063][T11986] bridge0: port 2(bridge_slave_1) entered blocking state [ 448.175686][T11986] bridge0: port 2(bridge_slave_1) entered disabled state [ 448.182889][T11986] bridge_slave_1: entered allmulticast mode [ 448.191851][ T36] audit: type=1400 audit(427.431:25958): avc: denied { sys_module } for pid=11984 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 448.260650][T11986] bridge_slave_1: entered promiscuous mode [ 448.453796][ T36] audit: type=1400 audit(427.843:25959): avc: denied { sys_module } for pid=11984 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 448.813923][ T36] audit: type=1400 audit(428.181:25960): avc: denied { sys_module } for pid=11986 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 448.998272][ T36] audit: type=1400 audit(428.359:25961): avc: denied { sys_module } for pid=11983 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 449.325394][ C1] net_ratelimit: 127411 callbacks suppressed [ 449.325418][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 449.325568][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 449.331635][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 449.343930][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 449.355487][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 449.368025][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 449.379408][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:d2:33:e2:66:68:77, vlan:0) [ 449.391621][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 449.403283][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 449.415621][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 449.460009][ T36] audit: type=1400 audit(428.641:25962): avc: denied { sys_module } for pid=11984 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 451.496051][ T36] kauditd_printk_skb: 4 callbacks suppressed [ 451.496072][ T36] audit: type=1400 audit(430.677:25967): avc: denied { sys_module } for pid=11986 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 451.738637][T11988] bridge0: port 1(bridge_slave_0) entered blocking state [ 451.761144][T11988] bridge0: port 1(bridge_slave_0) entered disabled state [ 451.788123][T11988] bridge_slave_0: entered allmulticast mode [ 451.806930][T11988] bridge_slave_0: entered promiscuous mode [ 451.950223][T11988] bridge0: port 2(bridge_slave_1) entered blocking state [ 452.044913][T11988] bridge0: port 2(bridge_slave_1) entered disabled state [ 452.052057][T11988] bridge_slave_1: entered allmulticast mode [ 452.086714][T11988] bridge_slave_1: entered promiscuous mode [ 454.665366][ C0] net_ratelimit: 128019 callbacks suppressed [ 454.665390][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 454.665490][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 454.671753][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 454.683500][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 454.695685][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 454.707360][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 454.719689][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 454.731339][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 454.743406][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 454.755139][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:d2:33:e2:66:68:77, vlan:0) [ 456.556132][ T37] INFO: task kworker/u8:3:53 blocked for more than 122 seconds. [ 456.567902][ T37] Not tainted syzkaller #0 [ 456.575481][ T37] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 456.595825][ T37] task:kworker/u8:3 state:D stack:0 pid:53 tgid:53 ppid:2 flags:0x00004000 [ 456.632001][ T37] Workqueue: netns cleanup_net SYZFAIL: failed to recv rpc [ 456.675897][ T37] Call Trace: [ 456.679288][ T37] [ 456.682320][ T37] __schedule+0x134f/0x1ea0 [ 456.686871][ T37] ? __sched_text_start+0x10/0x10 [ 456.691966][ T37] ? wake_nocb_gp+0x10a/0x1b0 [ 456.696769][ T37] ? kthread_data+0x54/0xc0 [ 456.701327][ T37] ? wq_worker_sleeping+0x69/0x260 [ 456.706577][ T37] schedule+0xc5/0x240 [ 456.710681][ T37] schedule_timeout+0xc7/0x3b0 [ 456.715525][ T37] ? __cfi_schedule_timeout+0x10/0x10 [ 456.720949][ T37] ? __cfi__raw_spin_lock_irq+0x10/0x10 [ 456.726533][ T37] ? rcu_barrier_handler+0x9b/0xe0 [ 456.731677][ T37] ? generic_exec_single+0x206/0x500 [ 456.737017][ T37] wait_for_common+0x369/0x650 [ 456.741814][ T37] ? wait_for_completion+0x40/0x40 [ 456.746984][ T37] ? _raw_spin_lock_irqsave+0xc1/0x160 [ 456.752467][ T37] wait_for_completion+0x1c/0x40 [ 456.757794][ T37] rcu_barrier+0x415/0x540 [ 456.758400][ T36] audit: type=1400 audit(435.574:25968): avc: denied { write } for pid=284 comm="syz-executor" path="pipe:[1541]" dev="pipefs" ino=1541 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 456.762317][ T37] netdev_run_todo+0x118/0xce0 [ 456.789645][ T37] ? __cfi_netdev_run_todo+0x10/0x10 [ 456.794956][ T37] ? mutex_is_locked+0x1b/0x50 [ 456.799786][ T37] ? nexthop_net_exit_batch_rtnl+0x22d/0x290 [ 456.805797][ T37] ? br_net_exit_batch_rtnl+0x157/0x1a0 [ 456.811434][ T37] rtnl_unlock+0x12/0x20 [ 456.815716][ T37] cleanup_net+0x648/0xc90 [ 456.820229][ T37] ? __cfi_cleanup_net+0x10/0x10 [ 456.825195][ T37] ? __schedule+0x1357/0x1ea0 [ 456.829923][ T37] ? kick_pool+0xb9/0x550 [ 456.834274][ T37] process_scheduled_works+0x7d4/0x1020 [ 456.839967][ T37] worker_thread+0xc70/0x10b0 [ 456.844705][ T37] kthread+0x2c9/0x370 [ 456.848811][ T37] ? __cfi_worker_thread+0x10/0x10 [ 456.853972][ T37] ? __cfi_kthread+0x10/0x10 [ 456.858590][ T37] ret_from_fork+0x64/0xa0 [ 456.863054][ T37] ? __cfi_kthread+0x10/0x10 [ 456.867663][ T37] ret_from_fork_asm+0x1a/0x30 [ 456.872480][ T37] [ 456.875717][ T37] NMI backtrace for cpu 0 [ 456.875748][ T37] CPU: 0 UID: 0 PID: 37 Comm: khungtaskd Not tainted syzkaller #0 e0984ef4b19b7a0d2e0df0f24afaf737f1320d97 [ 456.875776][ T37] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 456.875790][ T37] Call Trace: [ 456.875798][ T37] [ 456.875806][ T37] __dump_stack+0x21/0x30 [ 456.875835][ T37] dump_stack_lvl+0x140/0x1c0 [ 456.875862][ T37] ? __cfi_dump_stack_lvl+0x10/0x10 [ 456.875890][ T37] dump_stack+0x19/0x20 [ 456.875915][ T37] nmi_cpu_backtrace+0x2ba/0x2d0 [ 456.875949][ T37] ? rcu_read_unlock_special+0xb7/0x420 [ 456.875977][ T37] ? __cfi_nmi_cpu_backtrace+0x10/0x10 [ 456.876008][ T37] ? sched_show_task+0x371/0x530 [ 456.876034][ T37] ? __rcu_read_unlock+0xc0/0xc0 [ 456.876059][ T37] ? __cfi_nmi_raise_cpu_backtrace+0x10/0x10 [ 456.876085][ T37] ? __cfi_nmi_raise_cpu_backtrace+0x10/0x10 [ 456.876112][ T37] nmi_trigger_cpumask_backtrace+0x142/0x2c0 [ 456.876146][ T37] arch_trigger_cpumask_backtrace+0x14/0x20 [ 456.876173][ T37] watchdog+0xdad/0xf00 [ 456.876203][ T37] ? __kasan_check_write+0x18/0x20 [ 456.876232][ T37] ? __cfi_watchdog+0x10/0x10 [ 456.876263][ T37] ? __kasan_check_read+0x15/0x20 [ 456.876288][ T37] ? __kthread_parkme+0x137/0x180 [ 456.876318][ T37] ? schedule+0xc5/0x240 [ 456.876341][ T37] kthread+0x2c9/0x370 [ 456.876361][ T37] ? __cfi_watchdog+0x10/0x10 [ 456.876392][ T37] ? __cfi_kthread+0x10/0x10 [ 456.876413][ T37] ret_from_fork+0x64/0xa0 [ 456.876440][ T37] ? __cfi_kthread+0x10/0x10 [ 456.876461][ T37] ret_from_fork_asm+0x1a/0x30 [ 456.876492][ T37] [ 456.876500][ T37] Sending NMI from CPU 0 to CPUs 1: [ 457.098301][ C1] NMI backtrace for cpu 1 [ 457.098319][ C1] CPU: 1 UID: 0 PID: 20 Comm: rcuop/0 Not tainted syzkaller #0 e0984ef4b19b7a0d2e0df0f24afaf737f1320d97 [ 457.098339][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 457.098348][ C1] RIP: 0010:rhashtable_lookup+0x1e5/0x620 [ 457.098377][ C1] Code: 42 0f b6 04 38 84 c0 0f 85 f1 02 00 00 48 8b 44 24 30 8b 30 48 8b 7c 24 38 44 89 f2 41 ba 59 d7 d6 22 45 03 53 f1 74 02 0f 0b <2e> e8 91 a7 ef 1a 48 8b 74 24 18 48 89 f1 48 c1 e9 03 42 0f b6 0c [ 457.098389][ C1] RSP: 0018:ffffc900002304c0 EFLAGS: 00000257 [ 457.098402][ C1] RAX: ffff888132fc4e20 RBX: ffff888115f6a188 RCX: ffff888103663900 [ 457.098414][ C1] RDX: 000000009d1d79ff RSI: 0000000000000009 RDI: ffffc900002306a0 [ 457.098425][ C1] RBP: ffffc90000230628 R08: 0001000000000000 R09: 0000001800240000 [ 457.098435][ C1] R10: 0000000000000000 R11: ffffffff82aecc30 R12: ffff8881596ee978 [ 457.098445][ C1] R13: ffff888132fc4e2e R14: 000000009d1d79ff R15: dffffc0000000000 [ 457.098456][ C1] FS: 0000000000000000(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 457.098468][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 457.098478][ C1] CR2: 00007f89a1d47e20 CR3: 0000000109288000 CR4: 00000000003526b0 [ 457.098493][ C1] Call Trace: [ 457.098498][ C1] [ 457.098505][ C1] ? __kasan_check_write+0x18/0x20 [ 457.098525][ C1] ? br_mdb_ip_get+0x80/0x80 [ 457.098545][ C1] ? _raw_spin_unlock_irqrestore+0x4a/0x70 [ 457.098561][ C1] ? __cfi____ratelimit+0x10/0x10 [ 457.098577][ C1] br_mdb_entry_skb_get+0x614/0x850 [ 457.098599][ C1] ? __cfi_br_mdb_entry_skb_get+0x10/0x10 [ 457.098620][ C1] ? __cfi_br_fdb_update+0x10/0x10 [ 457.098640][ C1] ? ip6_rcv_finish+0x363/0x3e0 [ 457.098657][ C1] ? process_backlog+0x44b/0xad0 [ 457.098676][ C1] ? __napi_poll+0xd3/0x610 [ 457.098692][ C1] ? net_rx_action+0x5ea/0xd80 [ 457.098711][ C1] ? __do_softirq+0xf/0x16 [ 457.098725][ C1] ? do_softirq+0xb8/0x110 [ 457.098751][ C1] br_handle_frame_finish+0x956/0x1760 [ 457.098768][ C1] ? __cfi_br_handle_frame_finish+0x10/0x10 [ 457.098784][ C1] br_handle_frame+0x5a6/0xba0 [ 457.098798][ C1] ? __cfi_br_handle_frame+0x10/0x10 [ 457.098812][ C1] __netif_receive_skb_core+0xfb1/0x3ab0 [ 457.098831][ C1] ? ip6_mc_input+0x516/0x6c0 [ 457.098848][ C1] ? sk_skb_reason_drop+0xd8/0x310 [ 457.098868][ C1] ? __cfi_ip6_mc_input+0x10/0x10 [ 457.098886][ C1] ? qdisc_run_end+0x120/0x120 [ 457.098903][ C1] ? ip6_rcv_finish+0x363/0x3e0 [ 457.098921][ C1] ? ipv6_rcv+0xf1/0x240 [ 457.098937][ C1] ? __cfi_ipv6_rcv+0x10/0x10 [ 457.098953][ C1] ? __cfi_ip6_rcv_finish+0x10/0x10 [ 457.098970][ C1] ? __cfi__raw_spin_lock_irq+0x10/0x10 [ 457.098984][ C1] process_backlog+0x3e5/0xad0 [ 457.099005][ C1] __napi_poll+0xd3/0x610 [ 457.099023][ C1] net_rx_action+0x5ea/0xd80 [ 457.099043][ C1] ? __cfi_net_rx_action+0x10/0x10 [ 457.099061][ C1] ? sched_balance_domains+0x835/0x9c0 [ 457.099085][ C1] ? sched_balance_softirq+0xbd/0x170 [ 457.099105][ C1] handle_softirqs+0x1aa/0x630 [ 457.099126][ C1] __do_softirq+0xf/0x16 [ 457.099140][ C1] do_softirq+0xb8/0x110 [ 457.099158][ C1] [ 457.099163][ C1] [ 457.099168][ C1] ? __cfi_do_softirq+0x10/0x10 [ 457.099187][ C1] ? dst_destroy+0x37d/0x460 [ 457.099200][ C1] ? __cfi_dst_destroy_rcu+0x10/0x10 [ 457.099214][ C1] __local_bh_enable_ip+0x74/0x80 fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 457.099233][ C1] rcu_do_batch+0x5d9/0xd40 [ 457.099254][ C1] ? rcu_core+0xd30/0xd30 [ 457.099272][ C1] ? _raw_spin_lock+0x115/0x120 [ 457.099284][ C1] ? rcu_nocb_cb_kthread+0x50f/0xb30 [ 457.099305][ C1] ? __kasan_check_read+0x15/0x20 [ 457.099321][ C1] ? rcu_nocb_cb_kthread+0x50f/0xb30 [ 457.099346][ C1] rcu_nocb_cb_kthread+0x524/0xb30 [ 457.099368][ C1] ? __cfi_rcu_nocb_cb_kthread+0x10/0x10 [ 457.099388][ C1] ? __kasan_check_write+0x18/0x20 [ 457.099404][ C1] ? _raw_spin_lock_irqsave+0xc1/0x160 [ 457.099417][ C1] ? __cfi__raw_spin_lock_irqsave+0x10/0x10 [ 457.099431][ C1] ? _raw_spin_lock_irqsave+0xc1/0x160 [ 457.099444][ C1] ? set_cpus_allowed_ptr+0xa1/0xf0 [ 457.099465][ C1] ? __cfi_set_cpus_allowed_ptr+0x10/0x10 [ 457.099488][ C1] ? __kasan_check_read+0x15/0x20 [ 457.099504][ C1] ? __kthread_parkme+0x137/0x180 [ 457.099524][ C1] ? schedule+0xc5/0x240 [ 457.099539][ C1] kthread+0x2c9/0x370 [ 457.099552][ C1] ? __cfi_rcu_nocb_cb_kthread+0x10/0x10 [ 457.099572][ C1] ? __cfi_kthread+0x10/0x10 [ 457.099585][ C1] ret_from_fork+0x64/0xa0 [ 457.099603][ C1] ? __cfi_kthread+0x10/0x10 [ 457.099616][ C1] ret_from_fork_asm+0x1a/0x30 [ 457.099638][ C1] [ 457.644118][ T36] audit: type=1400 audit(435.574:25969): avc: denied { write } for pid=284 comm="syz-executor" path="pipe:[1541]" dev="pipefs" ino=1541 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 458.274386][ T36] audit: type=1400 audit(435.631:25970): avc: denied { write } for pid=284 comm="syz-executor" path="pipe:[1541]" dev="pipefs" ino=1541 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 460.005400][ C1] net_ratelimit: 108182 callbacks suppressed [ 460.005425][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 460.005444][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 460.005943][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 460.011754][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 460.024213][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 460.035579][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 460.047731][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 460.059456][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:d2:33:e2:66:68:77, vlan:0) [ 460.071718][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 460.083332][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 465.345400][ C0] net_ratelimit: 132857 callbacks suppressed [ 465.345421][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 465.345454][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 465.351842][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 465.363618][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 465.375704][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 465.387402][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:d2:33:e2:66:68:77, vlan:0) [ 465.399805][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 465.411382][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 465.423453][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 465.435210][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)