last executing test programs: 44.365243537s ago: executing program 2 (id=3044): r0 = syz_usb_connect(0x0, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0xd0, 0xff, 0xec, 0x20, 0x789, 0x160, 0x2cd1, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x10, 0x0, [{{0x9, 0x4, 0xbf, 0x0, 0x2, 0xe6, 0xfb, 0x6a, 0x0, [], [{{0x9, 0x5, 0x4, 0x2, 0x200}}, {{0x9, 0x5, 0x82, 0x2, 0x18}}]}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) 40.872865307s ago: executing program 2 (id=3110): r0 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000380)={'team_slave_0\x00', &(0x7f0000000200)=@ethtool_sset_info={0x16, 0x0, 0x101}}) 40.015237097s ago: executing program 2 (id=3131): r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000052c0)={0x368, 0x19, 0x1, 0x0, 0x0, {0x1d, 0xd601, 0x9}, [@nested={0x4d, 0x12, 0x0, 0x1, [@typed={0x8, 0x121, 0x0, 0x0, @uid}, @generic="428184a477201ac90f24d8c531680464a01e08554baff2279134e2a452c739471e1c7bd4aef903f973120a8762bddc1900f269ce3068ee8401e0199c9cf16ed3db"]}, @nested={0x304, 0x5, 0x0, 0x1, [@nested={0x300, 0x124, 0x0, 0x1, [@generic="e52cfdc68ae361504fb4c62b8d9ac5e3dbef730cb2cf00eac243342b13b4b2783e39f91b", @nested={0xc1, 0x95, 0x0, 0x1, [@nested={0x4, 0x151}, @generic="9f04e2e04c5e100d9e58807b0096f337701f7abd7496b5b3ca4cc3c940ca62110404496d613fb09e1b288a498db87682d4352c7b0bdf2c65590cd71a73eb0e7784562bf1f677c65ddb15175cb931cab7a37a62f6e4c9c52327f48dd9952d429bb2a199dc6ddee341de7a400bdd0e6928657e2de5a6d05869fb6773ae19db71894e2711b8864a9b1d9178a18d0e0329ae717bc4892619efe6e32e57f3b248aab32dbf6abddece7fa450210297ee", @typed={0x8, 0xac, 0x0, 0x0, @uid}, @nested={0x4, 0xd7}]}, @typed={0x4, 0x138}, @nested={0x20d, 0x110, 0x0, 0x1, [@typed={0x14, 0x67, 0x0, 0x0, @ipv6=@mcast1}, @generic="11277c096e5b2d7552ca4f113df5e2b9cb2c8a2aedb1ac80f4027491f90f75b0286a2340c5a0f49430ed6ffe7c03ece4148486d5976f0ae19577fbfc7a8d2ca4f725832d", @generic="037e1ee9f7b0a4220dd524d682cc8cbbbdea4835ea4084f3a42b8263beaacbb438155fb626b5605be64b919ff93802c1e5e24c6193c4198fee8b119e011113f8920122e3b4fffc8efce6031d349a3848fc3126e8aeb1d282b47c74f6e6648e6179a4be3bd11a2c4b84623e4129c26e0c4a7b9293fb5b2598cd45c43ab1910968bb4aff9c74ad264076f3134d86dc36948a4daa60062b27cb2fefcf86572d37bcd40a7ed907bb11a98cea45381165f55a6fe6bd1897874865ab2987ae36390edcc29f987d98c534e2", @generic="081b173ca8c2c3138757b83f4768f5a0e07d1416eb8cc8d0fac2af900348d0587fd3d18489f4d44c5fd6f5a340322156f395402e880b7def364e3d08298d018b6e2a2eacfb0fe275314f07c051c112b70523e0dd9a59166bc4358134bb63c4a540d8545f7f7f85d829", @nested={0x4, 0x53}, @generic="95ee4c3a9c6424b78ca9e13d79519fd93d569f0e73125311f414ab609624114982a1df7b89262ede6bdab02ab1886d3197d0ff5dc7fd26fc1baf07a6b0eac5bb9d7109c54efe4c72aae082e9726422bdaeb64f1eb08e9d04ccd4d078542502ee386e0955d63dabb459ad711c1d", @nested={0x4, 0x1e}, @generic="e0e599aa90e954075c89b6"]}]}]}]}, 0x368}, 0x1, 0x0, 0x0, 0x4}, 0x804) 39.114761869s ago: executing program 2 (id=3152): r0 = socket(0x8000000010, 0x2, 0x0) write(r0, &(0x7f00000002c0)="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", 0xfc) 38.23074386s ago: executing program 2 (id=3173): r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f6400947e570028925a01000000000000008000f0fffeffe809000000fff5dd000000100001000d081000418e00000004fcff", 0x58}], 0x1) 37.830660303s ago: executing program 0 (id=3182): r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x20, 0x52, 0x1, 0x0, 0x0, {0xa}, [@typed={0xc, 0x1, 0x0, 0x0, @u64=0xfe}]}, 0x20}}, 0x0) 37.775935896s ago: executing program 1 (id=3183): mkdirat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0) move_mount(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x220) 37.761552457s ago: executing program 3 (id=3184): r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, 0x0, 0x0) 37.724329949s ago: executing program 0 (id=3185): r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="300000001e0021002dbd70000000000007"], 0x30}, 0x1, 0x0, 0x0, 0x4014}, 0x0) 37.658692523s ago: executing program 3 (id=3186): r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000a00), 0x2, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x48) 37.648199893s ago: executing program 1 (id=3187): r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0xcf, 0x0, 0x0) 37.579777487s ago: executing program 0 (id=3188): r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f0000000640)={0x1, 0x380, 0x8, 0x2, 0x4, 0x5, 0xffff}, 0xc) 37.53925899s ago: executing program 1 (id=3189): mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) mprotect(&(0x7f00003e4000/0x2000)=nil, 0x2000, 0x2) 37.52779083s ago: executing program 3 (id=3190): r0 = open_tree(0xffffffffffffff9c, &(0x7f00000000c0)='\x00', 0x89901) mount_setattr(r0, &(0x7f0000000100)='.\x00', 0x9000, &(0x7f0000001dc0)={0x9, 0xd, 0x80000}, 0x20) 37.447468115s ago: executing program 0 (id=3191): r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000540)=ANY=[@ANYBLOB=' \x00\x00\x00_\x00]'], 0x20}], 0x1}, 0x40) 37.413616847s ago: executing program 1 (id=3192): r0 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000001600)='ip6gre0\x00') 37.383938369s ago: executing program 0 (id=3193): r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000040)={0x14, 0x14, 0x1, 0x70bd2c, 0x25dfdbfe, {0x28, 0x1}}, 0x14}, 0x1, 0x0, 0x0, 0x10}, 0x20040000) 37.374704379s ago: executing program 1 (id=3194): r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0xc9, 0x0, 0x0) 37.36264295s ago: executing program 3 (id=3195): r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000400)='./binderfs/binder1\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000100)={0x68, 0x0, &(0x7f0000000140)=[@increfs_done={0x40106308, 0x1}, @request_death={0x400c630e, 0x3}, @reply={0x40406301, {0x2, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x48, 0x18, &(0x7f0000000000)={@flat=@binder={0x73622a85, 0x0, 0x1}, @flat=@handle={0x73682a85, 0xa, 0x1}, @flat=@weak_binder={0x77622a85, 0xa, 0x2}}, &(0x7f0000000080)={0x0, 0x18, 0x30}}}], 0x0, 0x0, 0x0}) 36.857547849s ago: executing program 0 (id=3196): r0 = socket$can_raw(0x1d, 0x3, 0x1) sendmsg$can_raw(r0, &(0x7f0000000240)={&(0x7f0000000780), 0x2, &(0x7f0000000200)={&(0x7f0000000280)=@canfd={{0x4, 0x1, 0x1, 0x1}, 0x14, 0x1, 0x0, 0x0, "6b2d51aa069bcf0c6685eae14415accfd9188107f201482d523b7cd8ee2d08357ba85cc784b9d54ceed4e145b0bb73ddffffff7fc81e211e55b4edba7ebc6c88"}, 0x10}}, 0x0) 35.995904638s ago: executing program 2 (id=3197): mmap(&(0x7f0000ff4000/0xc000)=nil, 0xc000, 0x1000003, 0x20031, 0xffffffffffffffff, 0xffffe000) madvise(&(0x7f0000ff3000/0xd000)=nil, 0xd000, 0x17) 35.535350625s ago: executing program 1 (id=3198): r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/locks\x00', 0x0, 0x0) pread64(r0, &(0x7f00000024c0)=""/209, 0xd1, 0x8) 35.152482947s ago: executing program 3 (id=3199): r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=ANY=[@ANYBLOB="640100004a0005181b01ccae12fb00000a"], 0x164}}, 0x40014) 22.978836228s ago: executing program 3 (id=3200): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000001c0)=@newsa={0x114, 0x10, 0x7, 0x0, 0x0, {{@in6=@mcast2, @in=@multicast2, 0x4e20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11, 0x0, 0xee00}, {@in6=@remote, 0x0, 0x2b}, @in6=@local, {0x0, 0x0, 0x2, 0x0, 0x8}, {0x0, 0x200000, 0x7}, {0x40000, 0xfffffffd, 0xae8}, 0x0, 0x0, 0xa, 0x2, 0x0, 0x70}, [@coaddr={0x14, 0xe, @in6=@remote}, @replay_val={0x10, 0xa, {0x70bd2a, 0x70bd2c, 0x3}}]}, 0x114}}, 0x0) 19.908015295s ago: executing program 32 (id=3196): r0 = socket$can_raw(0x1d, 0x3, 0x1) sendmsg$can_raw(r0, &(0x7f0000000240)={&(0x7f0000000780), 0x2, &(0x7f0000000200)={&(0x7f0000000280)=@canfd={{0x4, 0x1, 0x1, 0x1}, 0x14, 0x1, 0x0, 0x0, "6b2d51aa069bcf0c6685eae14415accfd9188107f201482d523b7cd8ee2d08357ba85cc784b9d54ceed4e145b0bb73ddffffff7fc81e211e55b4edba7ebc6c88"}, 0x10}}, 0x0) 4.987577213s ago: executing program 33 (id=3198): r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/locks\x00', 0x0, 0x0) pread64(r0, &(0x7f00000024c0)=""/209, 0xd1, 0x8) 3.286677591s ago: executing program 34 (id=3197): mmap(&(0x7f0000ff4000/0xc000)=nil, 0xc000, 0x1000003, 0x20031, 0xffffffffffffffff, 0xffffe000) madvise(&(0x7f0000ff3000/0xd000)=nil, 0xd000, 0x17) 0s ago: executing program 35 (id=3200): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000001c0)=@newsa={0x114, 0x10, 0x7, 0x0, 0x0, {{@in6=@mcast2, @in=@multicast2, 0x4e20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11, 0x0, 0xee00}, {@in6=@remote, 0x0, 0x2b}, @in6=@local, {0x0, 0x0, 0x2, 0x0, 0x8}, {0x0, 0x200000, 0x7}, {0x40000, 0xfffffffd, 0xae8}, 0x0, 0x0, 0xa, 0x2, 0x0, 0x70}, [@coaddr={0x14, 0xe, @in6=@remote}, @replay_val={0x10, 0xa, {0x70bd2a, 0x70bd2c, 0x3}}]}, 0x114}}, 0x0) kernel console output (not intermixed with test programs): ermissive=1 [ 142.595775][ T36] audit: type=1400 audit(2000000027.285:460): avc: denied { read write open } for pid=525 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 142.655793][ T4506] SELinux: Context system_u:object_r:apt_var_lib_t:s0 is not valid (left unmapped). [ 142.674060][ T36] audit: type=1400 audit(2000000027.285:461): avc: denied { ioctl } for pid=525 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 142.711996][ T36] audit: type=1400 audit(2000000027.323:462): avc: denied { read write } for pid=524 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 142.737203][ T36] audit: type=1400 audit(2000000027.323:463): avc: denied { read write open } for pid=524 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 142.807824][ T526] audit: audit_backlog=65 > audit_backlog_limit=64 [ 142.913886][ T4522] netlink: 9 bytes leftover after parsing attributes in process `syz.0.2124'. [ 142.973191][ T4522] gretap0: entered promiscuous mode [ 143.906155][ T4608] netlink: 393 bytes leftover after parsing attributes in process `syz.3.2167'. [ 143.963765][ T65] usb 1-1: new high-speed USB device number 79 using dummy_hcd [ 144.113681][ T4622] random: crng reseeded on system resumption [ 144.144999][ T65] usb 1-1: Using ep0 maxpacket: 16 [ 144.168680][ T65] usb 1-1: config 0 has an invalid interface number: 105 but max is 0 [ 144.188795][ T65] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 144.205983][ T65] usb 1-1: config 0 has no interface number 0 [ 144.228754][ T65] usb 1-1: New USB device found, idVendor=046c, idProduct=14e8, bcdDevice= b.28 [ 144.243483][ T65] usb 1-1: New USB device strings: Mfr=5, Product=2, SerialNumber=3 [ 144.262213][ T65] usb 1-1: Product: syz [ 144.266548][ T65] usb 1-1: Manufacturer: syz [ 144.277268][ T65] usb 1-1: SerialNumber: syz [ 144.303594][ T65] usb 1-1: config 0 descriptor?? [ 144.551999][ T65] usb 1-1: Found UVC 0.00 device syz (046c:14e8) [ 144.561948][ T65] usb 1-1: No valid video chain found. [ 144.591997][ T65] usb 1-1: USB disconnect, device number 79 [ 145.362309][ T4700] x_tables: unsorted entry at hook 1 [ 145.613266][ T4721] netlink: 'syz.3.2223': attribute type 5 has an invalid length. [ 145.638563][ T4721] netlink: 3657 bytes leftover after parsing attributes in process `syz.3.2223'. [ 146.414163][ T4765] netlink: 24 bytes leftover after parsing attributes in process `syz.0.2242'. [ 146.605151][ T4776] netlink: 20 bytes leftover after parsing attributes in process `syz.0.2249'. [ 146.786582][ T4790] netlink: 'syz.0.2256': attribute type 19 has an invalid length. [ 147.115214][ T4817] SELinux: Context system_u:object_r:inetd_exec_t:s0 is not valid (left unmapped). [ 147.579235][ T4860] netlink: 'syz.3.2290': attribute type 16 has an invalid length. [ 147.663695][ T36] kauditd_printk_skb: 779 callbacks suppressed [ 147.663713][ T36] audit: type=1400 audit(2000000032.276:1241): avc: denied { read write } for pid=525 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 147.726305][ T36] audit: type=1400 audit(2000000032.276:1242): avc: denied { read write } for pid=526 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 147.790278][ T36] audit: type=1400 audit(2000000032.276:1243): avc: denied { read write open } for pid=526 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 147.850278][ T36] audit: type=1400 audit(2000000032.276:1244): avc: denied { ioctl } for pid=526 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 147.886941][ T4883] netlink: 5 bytes leftover after parsing attributes in process `syz.1.2301'. [ 147.900819][ T36] audit: type=1400 audit(2000000032.305:1245): avc: denied { read write open } for pid=525 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 147.955712][ T36] audit: type=1400 audit(2000000032.305:1246): avc: denied { ioctl } for pid=525 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 148.016947][ T36] audit: type=1400 audit(2000000032.314:1247): avc: denied { mounton } for pid=4866 comm="syz.3.2294" path="/456/file0" dev="tmpfs" ino=2305 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 148.105046][ T36] audit: type=1400 audit(2000000032.323:1248): avc: denied { mount } for pid=4866 comm="syz.3.2294" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 148.147200][ T524] audit: audit_backlog=65 > audit_backlog_limit=64 [ 148.163663][ T36] audit: type=1400 audit(2000000032.333:1249): avc: denied { read write } for pid=524 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 148.259730][ T805] usb 4-1: new high-speed USB device number 81 using dummy_hcd [ 148.430139][ T805] usb 4-1: config 1 interface 0 altsetting 3 endpoint 0x81 has an invalid bInterval 159, changing to 11 [ 148.442219][ T805] usb 4-1: config 1 interface 0 altsetting 3 has 2 endpoint descriptors, different from the interface descriptor's value: 1 [ 148.456644][ T805] usb 4-1: config 1 interface 0 has no altsetting 0 [ 148.477901][ T805] usb 4-1: New USB device found, idVendor=0458, idProduct=0138, bcdDevice= 0.40 [ 148.481801][ T4922] EXT4-fs: Value of option "test_dummy_encryption" is unrecognized [ 148.493790][ T805] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 148.505468][ T805] usb 4-1: Product: syz [ 148.509835][ T805] usb 4-1: SerialNumber: syz [ 148.610981][ T45] usb 2-1: new high-speed USB device number 78 using dummy_hcd [ 148.770834][ T45] usb 2-1: Using ep0 maxpacket: 16 [ 148.776496][ T805] usbhid 4-1:1.0: can't add hid device: -71 [ 148.793397][ T805] usbhid 4-1:1.0: probe with driver usbhid failed with error -71 [ 148.796003][ T45] usb 2-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 148.811698][ T805] usb 4-1: USB disconnect, device number 81 [ 148.822365][ T45] usb 2-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 148.867050][ T45] usb 2-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 148.877060][ T45] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 148.897991][ T45] usb 2-1: Product: syz [ 148.902439][ T45] usb 2-1: Manufacturer: syz [ 148.907411][ T45] usb 2-1: SerialNumber: syz [ 148.946425][ T4936] netlink: 'syz.2.2327': attribute type 4 has an invalid length. [ 149.046045][ T4940] incfs: Options parsing error. -22 [ 149.051582][ T4940] incfs: mount failed -22 [ 149.146681][ T4944] TCP: TCP_TX_DELAY enabled [ 149.366602][ T45] usb 2-1: cannot find UAC_HEADER [ 149.382015][ T45] snd-usb-audio 2-1:1.0: probe with driver snd-usb-audio failed with error -22 [ 149.406313][ T45] usb 2-1: USB disconnect, device number 78 [ 149.515193][ T694] udevd[694]: error opening ATTR{/sys/devices/platform/dummy_hcd.1/usb2/2-1/2-1:1.0/sound/card0/controlC0/../uevent} for writing: No such file or directory [ 149.550088][ T4968] netlink: 12 bytes leftover after parsing attributes in process `syz.0.2343'. [ 149.589967][ T4971] rust_binder: Transaction failed: BR_FAILED_REPLY { source: ENOENT } my_pid:927 [ 150.145815][ T65] usb 4-1: new high-speed USB device number 82 using dummy_hcd [ 150.327038][ T65] usb 4-1: Using ep0 maxpacket: 8 [ 150.358199][ T65] usb 4-1: config 0 has an invalid interface number: 31 but max is 0 [ 150.371888][ T65] usb 4-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 150.396775][ T65] usb 4-1: config 0 has no interface number 0 [ 150.415962][ T65] usb 4-1: New USB device found, idVendor=046d, idProduct=08c3, bcdDevice=6b.16 [ 150.438955][ T65] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 150.456231][ T65] usb 4-1: Product: syz [ 150.461125][ T65] usb 4-1: Manufacturer: syz [ 150.470510][ T65] usb 4-1: SerialNumber: syz [ 150.488686][ T65] usb 4-1: config 0 descriptor?? [ 150.605609][ T5048] netlink: 200 bytes leftover after parsing attributes in process `syz.1.2383'. [ 150.615019][ T5048] tc_dump_action: action bad kind [ 150.743891][ T65] usb 4-1: Found UVC 0.04 device syz (046d:08c3) [ 150.750600][ T65] usb 4-1: No valid video chain found. [ 150.983225][ T1138] usb 4-1: USB disconnect, device number 82 [ 151.086317][ T5078] netlink: 4 bytes leftover after parsing attributes in process `syz.1.2398'. [ 152.011455][ T5148] netlink: 4 bytes leftover after parsing attributes in process `syz.3.2432'. [ 152.168353][ T5163] netlink: 4 bytes leftover after parsing attributes in process `syz.1.2441'. [ 152.373481][ T65] usb 4-1: new high-speed USB device number 83 using dummy_hcd [ 152.547005][ T65] usb 4-1: config 220 has an invalid interface number: 76 but max is 2 [ 152.565361][ T65] usb 4-1: config 220 has an invalid descriptor of length 0, skipping remainder of the config [ 152.577159][ T65] usb 4-1: config 220 has no interface number 2 [ 152.583557][ T65] usb 4-1: config 220 interface 1 altsetting 5 has an endpoint descriptor with address 0x6F, changing to 0xF [ 152.625720][ T65] usb 4-1: config 220 interface 1 altsetting 5 endpoint 0xF has invalid wMaxPacketSize 0 [ 152.643594][ T5197] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2458'. [ 152.649770][ T65] usb 4-1: config 220 interface 1 altsetting 5 has 1 endpoint descriptor, different from the interface descriptor's value: 12 [ 152.683153][ T65] usb 4-1: config 220 interface 0 has no altsetting 0 [ 152.703888][ T65] usb 4-1: config 220 interface 76 has no altsetting 0 [ 152.710802][ T65] usb 4-1: config 220 interface 1 has no altsetting 0 [ 152.730937][ T65] usb 4-1: New USB device found, idVendor=8086, idProduct=0b07, bcdDevice=6c.b9 [ 152.746533][ T65] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 152.762911][ T65] usb 4-1: Product: syz [ 152.775790][ T65] usb 4-1: Manufacturer: syz [ 152.782347][ T65] usb 4-1: SerialNumber: syz [ 153.013887][ T36] kauditd_printk_skb: 852 callbacks suppressed [ 153.013907][ T36] audit: type=1400 audit(2000000037.296:2073): avc: denied { ioctl } for pid=5210 comm="syz.1.2465" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 153.048825][ T36] audit: type=1400 audit(2000000037.296:2074): avc: denied { read write } for pid=525 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 153.075211][ T36] audit: type=1400 audit(2000000037.296:2075): avc: denied { read write open } for pid=525 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 153.103442][ T36] audit: type=1400 audit(2000000037.296:2076): avc: denied { ioctl } for pid=525 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 153.109473][ T65] usb 4-1: selecting invalid altsetting 0 [ 153.131373][ T36] audit: type=1400 audit(2000000037.352:2077): avc: denied { ioctl } for pid=5209 comm="syz.0.2466" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 153.136215][ T676] usb 1-1: new high-speed USB device number 80 using dummy_hcd [ 153.162972][ T36] audit: type=1400 audit(2000000037.380:2078): avc: denied { ioctl } for pid=5210 comm="syz.1.2465" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 153.171785][ T45] usb 2-1: new high-speed USB device number 79 using dummy_hcd [ 153.204854][ T65] usb 4-1: Found UVC 7.01 device syz (8086:0b07) [ 153.213891][ T65] usb 4-1: No valid video chain found. [ 153.222054][ T36] audit: type=1400 audit(2000000037.465:2079): avc: denied { create } for pid=5219 comm="syz.2.2469" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 153.243615][ T36] audit: type=1400 audit(2000000037.465:2080): avc: denied { write } for pid=5219 comm="syz.2.2469" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 153.267908][ T65] usb 4-1: USB disconnect, device number 83 [ 153.276772][ T36] audit: type=1400 audit(2000000037.465:2081): avc: denied { nlmsg_write } for pid=5219 comm="syz.2.2469" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 153.299995][ T36] audit: type=1400 audit(2000000037.474:2082): avc: denied { ioctl } for pid=5209 comm="syz.0.2466" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 153.365314][ T5224] netlink: 12 bytes leftover after parsing attributes in process `syz.2.2471'. [ 153.375525][ T45] usb 2-1: Using ep0 maxpacket: 16 [ 153.386557][ T676] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 153.403588][ T45] usb 2-1: New USB device found, idVendor=17ef, idProduct=721e, bcdDevice=de.06 [ 153.414074][ T45] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 153.423379][ T676] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 153.434463][ T45] usb 2-1: Product: syz [ 153.439035][ T45] usb 2-1: Manufacturer: syz [ 153.445932][ T45] usb 2-1: SerialNumber: syz [ 153.455696][ T676] usb 1-1: New USB device found, idVendor=18ec, idProduct=3288, bcdDevice=69.cf [ 153.470737][ T676] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 153.494072][ T676] usb 1-1: Product: syz [ 153.498768][ T45] r8152-cfgselector 2-1: Unknown version 0x0000 [ 153.514945][ T676] usb 1-1: Manufacturer: syz [ 153.519642][ T676] usb 1-1: SerialNumber: syz [ 153.524422][ T45] r8152-cfgselector 2-1: config 0 descriptor?? [ 153.540192][ T676] usb 1-1: config 0 descriptor?? [ 153.557352][ T676] usb 1-1: Found UVC 0.00 device syz (18ec:3288) [ 153.564394][ T676] usb 1-1: No valid video chain found. [ 153.908803][ T5244] rust_binder: BC_REQUEST_FREEZE_NOTIFICATION invalid ref 0 [ 153.935821][ T5244] rust_binder: Write failure EINVAL in pid:1161 [ 153.942108][ T45] usb 1-1: USB disconnect, device number 80 [ 154.115749][ T564] r8152-cfgselector 2-1: USB disconnect, device number 79 [ 154.582437][ T5287] netlink: 32 bytes leftover after parsing attributes in process `syz.0.2501'. [ 154.681473][ T5294] kernel profiling enabled (shift: 17) [ 155.507458][ T5367] netlink: 240 bytes leftover after parsing attributes in process `syz.2.2543'. [ 155.519535][ T5365] netlink: 'syz.3.2542': attribute type 4 has an invalid length. [ 155.527437][ T5365] netlink: 3657 bytes leftover after parsing attributes in process `syz.3.2542'. [ 156.393907][ T5432] netlink: 80 bytes leftover after parsing attributes in process `syz.0.2574'. [ 156.825229][ T5471] netlink: 8 bytes leftover after parsing attributes in process `syz.0.2591'. [ 157.036302][ T5488] IPv6: NLM_F_CREATE should be specified when creating new route [ 157.479330][ T5526] rust_binder: Write failure EFAULT in pid:1334 [ 157.553615][ T65] usb 3-1: new high-speed USB device number 79 using dummy_hcd [ 157.586862][ T5536] rust_binder: Failure when writing BR_NOOP at beginning of buffer. [ 157.586887][ T5536] rust_binder: Read failure Err(EFAULT) in pid:1260 [ 157.761356][ T65] usb 3-1: config 220 has an invalid interface number: 76 but max is 2 [ 157.780542][ T65] usb 3-1: config 220 contains an unexpected descriptor of type 0x2, skipping [ 157.792208][ T65] usb 3-1: config 220 has an invalid descriptor of length 0, skipping remainder of the config [ 157.807629][ T65] usb 3-1: config 220 has no interface number 2 [ 157.821156][ T65] usb 3-1: config 220 interface 1 altsetting 5 has 0 endpoint descriptors, different from the interface descriptor's value: 12 [ 157.836688][ T65] usb 3-1: config 220 interface 0 has no altsetting 0 [ 157.844570][ T65] usb 3-1: config 220 interface 76 has no altsetting 0 [ 157.852644][ T65] usb 3-1: config 220 interface 1 has no altsetting 0 [ 157.870428][ T65] usb 3-1: New USB device found, idVendor=8086, idProduct=0b07, bcdDevice=6c.b9 [ 157.879693][ T65] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 157.889480][ T65] usb 3-1: Product: syz [ 157.893896][ T65] usb 3-1: Manufacturer: syz [ 157.898602][ T65] usb 3-1: SerialNumber: syz [ 158.043950][ T805] usb 4-1: new high-speed USB device number 84 using dummy_hcd [ 158.150251][ T65] usb 3-1: selecting invalid altsetting 0 [ 158.157029][ T65] usb 3-1: Found UVC 7.01 device syz (8086:0b07) [ 158.163829][ T65] usb 3-1: No valid video chain found. [ 158.174683][ T65] usb 3-1: USB disconnect, device number 79 [ 158.203779][ T805] usb 4-1: Using ep0 maxpacket: 32 [ 158.212964][ T805] usb 4-1: config 4 has an invalid interface number: 128 but max is 0 [ 158.222223][ T805] usb 4-1: config 4 has no interface number 0 [ 158.228956][ T805] usb 4-1: config 4 interface 128 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 158.240386][ T805] usb 4-1: config 4 interface 128 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 158.251157][ T564] usb 2-1: new full-speed USB device number 80 using dummy_hcd [ 158.259277][ T805] usb 4-1: New USB device found, idVendor=046d, idProduct=c314, bcdDevice= 0.40 [ 158.270425][ T805] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 158.283517][ T805] hub 4-1:4.128: USB hub found [ 158.428317][ T36] kauditd_printk_skb: 820 callbacks suppressed [ 158.428338][ T36] audit: type=1400 audit(2000000042.371:2903): avc: denied { ioctl } for pid=5571 comm="syz.1.2643" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 158.430310][ T564] usb 2-1: config 1 has too many interfaces: 235, using maximum allowed: 32 [ 158.435015][ T36] audit: type=1400 audit(2000000042.371:2904): avc: denied { ioctl } for pid=5571 comm="syz.1.2643" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 158.462865][ T564] usb 2-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 158.474026][ T36] audit: type=1400 audit(2000000042.371:2905): avc: denied { ioctl } for pid=5571 comm="syz.1.2643" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 158.497992][ T564] usb 2-1: config 1 has 2 interfaces, different from the descriptor's value: 235 [ 158.519337][ T36] audit: type=1400 audit(2000000042.371:2906): avc: denied { ioctl } for pid=5571 comm="syz.1.2643" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 158.535342][ T805] hub 4-1:4.128: 2 ports detected [ 158.545355][ T36] audit: type=1400 audit(2000000042.371:2907): avc: denied { ioctl } for pid=5571 comm="syz.1.2643" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 158.570159][ T805] hub 4-1:4.128: Using single TT (err -22) [ 158.576679][ T36] audit: type=1400 audit(2000000042.409:2908): avc: denied { ioctl } for pid=5571 comm="syz.1.2643" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 158.601512][ T564] usb 2-1: config 1 has no interface number 1 [ 158.608238][ T36] audit: type=1400 audit(2000000042.475:2909): avc: denied { ioctl } for pid=5555 comm="syz.3.2636" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 158.633083][ T564] usb 2-1: config 1 interface 105 altsetting 2 has 0 endpoint descriptors, different from the interface descriptor's value: 2 [ 158.640110][ T36] audit: type=1400 audit(2000000042.475:2910): avc: denied { ioctl } for pid=5555 comm="syz.3.2636" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 158.664980][ T564] usb 2-1: config 1 interface 105 has no altsetting 0 [ 158.713474][ T36] audit: type=1400 audit(2000000042.634:2911): avc: denied { ioctl } for pid=5571 comm="syz.1.2643" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 158.717429][ T564] usb 2-1: New USB device found, idVendor=20f4, idProduct=e05a, bcdDevice=6c.6d [ 158.739897][ T36] audit: type=1400 audit(2000000042.634:2912): avc: denied { ioctl } for pid=5571 comm="syz.1.2643" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 158.751213][ T564] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 158.787534][ T805] hub 4-1:4.128: hub_hub_status failed (err = -71) [ 158.795639][ T805] hub 4-1:4.128: config failed, can't get hub status (err -71) [ 158.811183][ T564] usb 2-1: Product: syz [ 158.816522][ T564] usb 2-1: Manufacturer: syz [ 158.821187][ T564] usb 2-1: SerialNumber: syz [ 158.827005][ T805] usb 4-1: USB disconnect, device number 84 [ 159.046970][ T5586] random: crng reseeded on system resumption [ 159.083965][ T564] aqc111 2-1:1.105: probe with driver aqc111 failed with error -22 [ 159.119835][ T5586] Unrecognized hibernate image header format! [ 159.126614][ T5586] PM: hibernation: Image mismatch: architecture specific data [ 159.408609][ T65] usb 2-1: USB disconnect, device number 80 [ 159.615343][ T5623] bridge0: port 3(veth0_to_bridge) entered blocking state [ 159.627820][ T5623] bridge0: port 3(veth0_to_bridge) entered disabled state [ 159.642468][ T5623] veth0_to_bridge: entered allmulticast mode [ 159.657447][ T5623] veth0_to_bridge: entered promiscuous mode [ 159.666178][ T5623] bridge0: adding interface veth0_to_bridge with same address as a received packet (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 159.680454][ T5623] bridge0: port 3(veth0_to_bridge) entered blocking state [ 159.688000][ T5623] bridge0: port 3(veth0_to_bridge) entered forwarding state [ 160.103575][ T5658] netlink: 'syz.1.2683': attribute type 16 has an invalid length. [ 160.581958][ T5695] kernel read not supported for file /policy (pid: 5695 comm: syz.0.2702) [ 160.691383][ T5706] rust_binder: Transaction failed: BR_FAILED_REPLY { source: EINVAL } my_pid:1280 [ 160.790079][ T5719] rust_binder: Write failure EFAULT in pid:1282 [ 160.940135][ T5731] netlink: 288 bytes leftover after parsing attributes in process `syz.2.2718'. [ 161.166735][ T5749] netlink: 'syz.3.2727': attribute type 27 has an invalid length. [ 161.221039][ T5753] netlink: 'syz.1.2729': attribute type 1 has an invalid length. [ 161.625247][ T564] usb 2-1: new high-speed USB device number 81 using dummy_hcd [ 161.800657][ T564] usb 2-1: Using ep0 maxpacket: 16 [ 161.810814][ T564] usb 2-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 161.834357][ T564] usb 2-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 161.863910][ T564] usb 2-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 161.881058][ T564] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 161.904338][ T564] usb 2-1: Product: syz [ 161.908826][ T564] usb 2-1: Manufacturer: syz [ 161.924760][ T564] usb 2-1: SerialNumber: syz [ 162.195368][ T564] usb 2-1: 0:2 : does not exist [ 162.202310][ T564] usb 2-1: unit 9 not found! [ 162.245128][ T564] usb 2-1: 4:0: cannot get min/max values for control 1 (id 4) [ 162.255788][ T564] usb 2-1: 4:0: cannot get min/max values for control 2 (id 4) [ 162.277767][ T564] usb 2-1: USB disconnect, device number 81 [ 162.411752][ T566] udevd[566]: error opening ATTR{/sys/devices/platform/dummy_hcd.1/usb2/2-1/2-1:1.0/sound/card0/controlC0/../uevent} for writing: No such file or directory [ 162.599222][ T5851] netlink: 4 bytes leftover after parsing attributes in process `syz.3.2778'. [ 163.373273][ T5914] random: crng reseeded on system resumption [ 163.657675][ T5938] netlink: 'syz.0.2820': attribute type 29 has an invalid length. [ 163.776490][ T36] kauditd_printk_skb: 790 callbacks suppressed [ 163.776509][ T36] audit: type=1400 audit(2000000047.381:3703): avc: denied { read write open } for pid=525 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 163.842241][ T36] audit: type=1400 audit(2000000047.400:3704): avc: denied { read write } for pid=526 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 163.878153][ T5955] netlink: 'syz.1.2829': attribute type 1 has an invalid length. [ 163.898375][ T36] audit: type=1400 audit(2000000047.400:3705): avc: denied { read write open } for pid=526 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 163.949878][ T36] audit: type=1400 audit(2000000047.400:3706): avc: denied { ioctl } for pid=526 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 163.977630][ T36] audit: type=1400 audit(2000000047.428:3707): avc: denied { ioctl } for pid=525 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 164.009440][ T36] audit: type=1400 audit(2000000047.438:3708): avc: denied { read write } for pid=524 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 164.050755][ T36] audit: type=1400 audit(2000000047.438:3709): avc: denied { read write open } for pid=524 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 164.107505][ T36] audit: type=1400 audit(2000000047.438:3710): avc: denied { ioctl } for pid=524 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 164.142288][ T36] audit: type=1400 audit(2000000047.438:3711): avc: denied { read write } for pid=527 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 164.220727][ T36] audit: type=1400 audit(2000000047.438:3712): avc: denied { read write open } for pid=527 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 164.677967][ T6013] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=123 sclass=netlink_route_socket pid=6013 comm=syz.3.2855 [ 164.940631][ T6031] rust_binder: Failure when writing BR_NOOP at beginning of buffer. [ 164.940657][ T6031] rust_binder: Read failure Err(EFAULT) in pid:1366 [ 165.078653][ T693] usb 4-1: new high-speed USB device number 85 using dummy_hcd [ 165.161654][ T6048] netlink: 8 bytes leftover after parsing attributes in process `syz.2.2874'. [ 165.262950][ T693] usb 4-1: config 220 has an invalid interface number: 76 but max is 2 [ 165.281170][ T693] usb 4-1: config 220 has an invalid descriptor of length 0, skipping remainder of the config [ 165.330966][ T693] usb 4-1: config 220 has no interface number 2 [ 165.352483][ T693] usb 4-1: config 220 interface 1 altsetting 5 has 0 endpoint descriptors, different from the interface descriptor's value: 12 [ 165.376861][ T693] usb 4-1: config 220 interface 0 has no altsetting 0 [ 165.383860][ T693] usb 4-1: config 220 interface 76 has no altsetting 0 [ 165.395749][ T693] usb 4-1: config 220 interface 1 has no altsetting 0 [ 165.413529][ T693] usb 4-1: New USB device found, idVendor=8086, idProduct=0b07, bcdDevice=6c.b9 [ 165.430409][ T693] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 165.459081][ T693] usb 4-1: Product: syz [ 165.473023][ T693] usb 4-1: Manufacturer: syz [ 165.477851][ T693] usb 4-1: SerialNumber: syz [ 165.737860][ T693] usb 4-1: Found UVC 7.01 device syz (8086:0b07) [ 165.760806][ T693] usb 4-1: No valid video chain found. [ 165.782228][ T693] usb 4-1: selecting invalid altsetting 0 [ 165.805090][ T6090] usb usb1: usbfs: interface 0 claimed by hub while 'syz.2.2894' sets config #0 [ 165.805618][ T693] usb 4-1: USB disconnect, device number 85 [ 165.963324][ T805] usb 2-1: new full-speed USB device number 82 using dummy_hcd [ 166.158220][ T805] usb 2-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 10 [ 166.176982][ T805] usb 2-1: config 1 interface 0 altsetting 0 endpoint 0x3 has invalid wMaxPacketSize 0 [ 166.178861][ T6113] netlink: 4 bytes leftover after parsing attributes in process `syz.0.2906'. [ 166.212454][ T805] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a5, bcdDevice= 0.40 [ 166.222216][ T805] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=1 [ 166.240459][ T805] usb 2-1: SerialNumber: syz [ 166.264064][ T805] cdc_ether 2-1:1.0: probe with driver cdc_ether failed with error -22 [ 166.285504][ T805] usb-storage 2-1:1.0: USB Mass Storage device detected [ 166.305846][ T805] usb-storage 2-1:1.0: Quirks match for vid 0525 pid a4a5: 10000 [ 166.327216][ T805] scsi host1: usb-storage 2-1:1.0 [ 167.818678][ T6200] netlink: 12 bytes leftover after parsing attributes in process `syz.2.2947'. [ 167.830466][ T6200] bridge0: port 1(bridge_slave_0) entered disabled state [ 167.842829][ T6200] bridge_slave_0 (unregistering): left allmulticast mode [ 167.850847][ T6200] bridge_slave_0 (unregistering): left promiscuous mode [ 167.871290][ T6200] bridge0: port 1(bridge_slave_0) entered disabled state [ 168.331785][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 168.346437][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 168.361627][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 168.374833][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 168.387666][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 168.400118][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 168.412541][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 168.425246][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 168.438265][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 168.451003][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 169.126801][ T36] kauditd_printk_skb: 656 callbacks suppressed [ 169.126823][ T36] audit: type=1400 audit(2000000052.401:4369): avc: denied { read } for pid=6266 comm="syz.1.2979" name="event1" dev="devtmpfs" ino=193 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 169.267707][ T36] audit: type=1400 audit(2000000052.457:4370): avc: denied { read open } for pid=6266 comm="syz.1.2979" path="/dev/input/event1" dev="devtmpfs" ino=193 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 169.381525][ T6276] rust_binder: Write failure EFAULT in pid:1491 [ 169.386148][ T36] audit: type=1400 audit(2000000052.457:4371): avc: denied { ioctl } for pid=6266 comm="syz.1.2979" path="/dev/input/event1" dev="devtmpfs" ino=193 ioctlcmd=0x4504 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 169.524659][ T36] audit: type=1400 audit(2000000052.504:4372): avc: denied { read write } for pid=524 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 169.629924][ T36] audit: type=1400 audit(2000000052.504:4373): avc: denied { read write open } for pid=524 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 169.726137][ T6288] netlink: 57 bytes leftover after parsing attributes in process `syz.0.2991'. [ 169.749602][ T36] audit: type=1400 audit(2000000052.504:4374): avc: denied { ioctl } for pid=524 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 169.870693][ T36] audit: type=1400 audit(2000000052.513:4375): avc: denied { read write } for pid=527 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 169.970990][ T36] audit: type=1400 audit(2000000052.513:4376): avc: denied { read write open } for pid=527 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 170.120230][ T36] audit: type=1400 audit(2000000052.513:4377): avc: denied { ioctl } for pid=527 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 170.201174][ T524] audit: audit_backlog=65 > audit_backlog_limit=64 [ 170.666226][ T693] usb 2-1: USB disconnect, device number 82 [ 171.147050][ T6346] netlink: 'syz.1.3019': attribute type 1 has an invalid length. [ 172.561103][ T45] usb 4-1: new full-speed USB device number 86 using dummy_hcd [ 172.763096][ T45] usb 4-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 172.784339][ T45] usb 4-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 172.815394][ T45] usb 4-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.00 [ 172.838517][ T6425] rust_binder: Write failure EFAULT in pid:1520 [ 172.854762][ T45] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=3 [ 172.874145][ T45] usb 4-1: SerialNumber: syz [ 172.899337][ T45] usb 4-1: 0:2 : does not exist [ 172.939606][ T6428] SELinux: policydb table sizes (0,0) do not match mine (8,7) [ 172.947971][ T6428] SELinux: failed to load policy [ 173.105632][ T693] usb 3-1: new high-speed USB device number 80 using dummy_hcd [ 173.381480][ T65] usb 4-1: USB disconnect, device number 86 [ 173.470137][ T693] usb 3-1: Using ep0 maxpacket: 32 [ 173.608238][ T693] usb 3-1: config 0 has an invalid interface number: 191 but max is 0 [ 173.619069][ T693] usb 3-1: config 0 has no interface number 0 [ 173.637929][ T693] usb 3-1: config 0 interface 191 altsetting 0 bulk endpoint 0x82 has invalid maxpacket 24 [ 173.669563][ C0] net_ratelimit: 93987 callbacks suppressed [ 173.669582][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 173.688688][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 173.701058][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 173.713731][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 173.726797][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 173.739449][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 173.751747][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 173.765301][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 173.778195][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 173.792090][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 174.081439][ T693] usb 3-1: New USB device found, idVendor=0789, idProduct=0160, bcdDevice=2c.d1 [ 174.093340][ T693] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 174.116928][ T693] usb 3-1: Product: syz [ 174.123330][ T693] usb 3-1: Manufacturer: syz [ 174.139107][ T693] usb 3-1: SerialNumber: syz [ 174.158560][ T693] usb 3-1: config 0 descriptor?? [ 174.192087][ T6426] raw-gadget.1 gadget.2: fail, usb_ep_enable returned -22 [ 174.366744][ T6484] netlink: 'syz.0.3085': attribute type 15 has an invalid length. [ 174.486232][ T36] kauditd_printk_skb: 492 callbacks suppressed [ 174.486251][ T36] audit: type=1400 audit(2000000057.439:4862): avc: denied { create } for pid=6487 comm="syz.0.3087" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 174.526183][ T6426] raw-gadget.1 gadget.2: fail, usb_ep_enable returned -22 [ 174.587129][ T36] audit: type=1400 audit(2000000057.476:4863): avc: denied { ioctl } for pid=6487 comm="syz.0.3087" path="socket:[23894]" dev="sockfs" ino=23894 ioctlcmd=0x5411 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 174.660816][ T36] audit: type=1400 audit(2000000057.476:4864): avc: denied { ioctl } for pid=6423 comm="syz.2.3044" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 174.745109][ T36] audit: type=1400 audit(2000000057.476:4865): avc: denied { ioctl } for pid=6423 comm="syz.2.3044" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5506 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 174.783077][ T693] asix 3-1:0.191 (unnamed net_device) (uninitialized): Failed to read reg index 0x0000: -71 [ 174.847962][ T36] audit: type=1400 audit(2000000057.476:4866): avc: denied { ioctl } for pid=6423 comm="syz.2.3044" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5506 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 174.924899][ T36] audit: type=1400 audit(2000000057.476:4867): avc: denied { ioctl } for pid=6423 comm="syz.2.3044" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5505 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 174.994643][ T36] audit: type=1400 audit(2000000057.476:4868): avc: denied { ioctl } for pid=6423 comm="syz.2.3044" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5505 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 175.023624][ T36] audit: type=1400 audit(2000000057.486:4869): avc: denied { create } for pid=6490 comm="syz.1.3089" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 175.034654][ T693] asix 3-1:0.191: probe with driver asix failed with error -71 [ 175.081693][ T693] usb 3-1: USB disconnect, device number 80 [ 175.083347][ T36] audit: type=1400 audit(2000000057.495:4870): avc: denied { ioctl } for pid=6423 comm="syz.2.3044" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5504 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 175.129049][ T36] audit: type=1400 audit(2000000057.495:4871): avc: denied { write } for pid=6490 comm="syz.1.3089" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 175.235299][ T6514] sit0: entered promiscuous mode [ 175.260035][ T6514] netlink: 'syz.3.3100': attribute type 1 has an invalid length. [ 175.289287][ T6514] netlink: 1 bytes leftover after parsing attributes in process `syz.3.3100'. [ 177.625926][ T6627] No source specified [ 178.142947][ T6656] netlink: 12 bytes leftover after parsing attributes in process `syz.1.3167'. [ 178.147756][ T6653] netlink: 'syz.2.3152': attribute type 12 has an invalid length. [ 178.284427][ T6662] netlink: 'syz.3.3171': attribute type 25 has an invalid length. [ 178.612642][ T6673] netlink: 37 bytes leftover after parsing attributes in process `syz.0.3177'. [ 178.889305][ T6688] netlink: 20 bytes leftover after parsing attributes in process `syz.0.3185'. [ 179.009555][ C0] net_ratelimit: 92087 callbacks suppressed [ 179.009577][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 179.028194][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 179.040625][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 179.053930][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 179.067092][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 179.080296][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 179.093596][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 179.106033][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 179.118877][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 179.131772][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 179.295899][ T6708] rust_binder: BC_REQUEST_DEATH_NOTIFICATION invalid ref 3 [ 179.812001][ T6708] rust_binder: Transaction failed: BR_FAILED_REPLY { source: EINVAL } my_pid:1329 [ 179.875496][ T36] kauditd_printk_skb: 439 callbacks suppressed [ 179.875520][ T36] audit: type=1400 audit(2000000062.496:5311): avc: denied { read write open } for pid=526 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 182.251185][ T36] audit: type=1400 audit(2000000062.533:5312): avc: denied { ioctl } for pid=526 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 183.627253][ C0] sched: DL replenish lagged too much [ 184.349584][ C1] net_ratelimit: 137204 callbacks suppressed [ 184.349608][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 184.349651][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 184.356740][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 184.369784][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 184.382607][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 184.395786][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 184.408341][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 184.421200][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 184.433316][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 184.446802][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 187.997841][ T36] audit: type=1400 audit(2000000062.655:5313): avc: denied { read write } for pid=525 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 188.412016][ T36] audit: type=1400 audit(2000000062.655:5314): avc: denied { read write open } for pid=525 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 189.689569][ C0] net_ratelimit: 141694 callbacks suppressed [ 189.689593][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 189.689606][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 189.689669][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 189.696362][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 189.708831][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 189.721147][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 189.733422][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 189.745748][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 189.758426][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 189.770363][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 190.297565][ T36] audit: type=1400 audit(2000000062.655:5315): avc: denied { ioctl } for pid=525 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 190.441686][ T6712] netlink: 328 bytes leftover after parsing attributes in process `syz.3.3199'. [ 190.959040][ T36] audit: type=1400 audit(2000000063.087:5316): avc: denied { read write } for pid=527 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 192.568621][ T36] audit: type=1400 audit(2000000063.087:5317): avc: denied { read write open } for pid=527 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 193.559016][ T36] audit: type=1400 audit(2000000063.087:5318): avc: denied { ioctl } for pid=527 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 195.029566][ C0] net_ratelimit: 138157 callbacks suppressed [ 195.029591][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 195.029618][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 195.036416][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 195.050397][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 195.063384][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 195.076110][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 195.090047][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 195.103063][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 195.116056][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 195.129146][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 195.276149][ T36] audit: type=1400 audit(2000000063.744:5319): avc: denied { read write } for pid=524 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 200.369621][ C1] net_ratelimit: 139666 callbacks suppressed [ 200.369646][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 200.369722][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 200.376296][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 200.389615][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 200.402323][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 200.414953][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 200.427081][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 200.439793][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 200.452086][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 200.464398][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 200.505497][ T36] audit: type=1400 audit(2000000063.744:5320): avc: denied { read write open } for pid=524 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 203.749613][ T36] audit: type=1400 audit(2000000063.744:5321): avc: denied { ioctl } for pid=524 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 205.274496][ T36] audit: type=1400 audit(2000000075.218:5322): avc: denied { create } for pid=6713 comm="syz.0.3196" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 205.709605][ C0] net_ratelimit: 141453 callbacks suppressed [ 205.709631][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 205.709668][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 205.715889][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 205.728358][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 205.740802][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 205.753064][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 205.765822][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 205.778301][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 205.790970][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 205.803323][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 206.972024][ T36] audit: type=1400 audit(2000000075.246:5323): avc: denied { read write } for pid=527 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 211.049630][ C1] net_ratelimit: 138157 callbacks suppressed [ 211.049653][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 211.049718][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 211.056004][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 211.068278][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 211.081677][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 211.094782][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 211.107777][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 211.120961][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 211.133619][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 211.146428][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 211.252382][ T36] audit: type=1400 audit(2000000075.246:5324): avc: denied { read write open } for pid=527 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 211.697180][ T36] audit: type=1400 audit(2000000075.246:5325): avc: denied { ioctl } for pid=527 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 214.056644][ T36] audit: type=1400 audit(2000000077.235:5326): avc: denied { read write } for pid=526 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 216.267959][ T36] audit: type=1400 audit(2000000077.235:5327): avc: denied { read write open } for pid=526 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 216.389646][ C1] net_ratelimit: 129482 callbacks suppressed [ 216.389670][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 216.389703][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 216.396020][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 216.409021][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 216.421378][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 216.434163][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 216.446210][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 216.458528][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 216.470752][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 216.483290][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 219.779641][ T36] audit: type=1400 audit(2000000077.235:5328): avc: denied { ioctl } for pid=526 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 221.729617][ C1] net_ratelimit: 142208 callbacks suppressed [ 221.729640][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 221.729659][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 221.736224][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 221.749255][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 221.761489][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 221.774031][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 221.786539][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 221.798818][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 221.811329][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 221.823626][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 224.193385][ T36] audit: type=1400 audit(2000000083.615:5329): avc: denied { read write } for pid=524 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 226.366844][ T36] audit: type=1400 audit(2000000083.615:5330): avc: denied { read write open } for pid=524 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 226.708509][ T36] audit: type=1400 audit(2000000084.056:5331): avc: denied { ioctl } for pid=524 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 227.069649][ C1] net_ratelimit: 138723 callbacks suppressed [ 227.069675][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 227.069784][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 227.076331][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 227.088596][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 227.101181][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 227.113765][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 227.126837][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 227.139573][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 227.152200][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 227.165050][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 230.292640][ T36] audit: type=1400 audit(2000000086.223:5332): avc: denied { read write } for pid=525 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 232.409639][ C0] net_ratelimit: 137336 callbacks suppressed [ 232.409665][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 232.409694][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 232.416024][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 232.429074][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 232.442664][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 232.456316][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 232.469213][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 232.481474][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 232.494669][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 232.507404][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 234.863558][ T36] audit: type=1400 audit(2000000086.223:5333): avc: denied { read write open } for pid=525 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 235.502505][ T36] audit: type=1400 audit(2000000086.223:5334): avc: denied { ioctl } for pid=525 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 237.749648][ C1] net_ratelimit: 136947 callbacks suppressed [ 237.749670][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 237.749782][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 237.756518][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 237.769205][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 237.781850][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 237.794428][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 237.806775][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 237.819338][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 237.831281][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 237.844645][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 238.805385][ T36] audit: type=1400 audit(2000000092.415:5335): avc: denied { execmem } for pid=6718 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 239.809887][ T36] audit: type=1400 audit(2000000093.278:5336): avc: denied { execmem } for pid=6719 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 243.089661][ C1] net_ratelimit: 133454 callbacks suppressed [ 243.089685][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 243.089853][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 243.096443][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 243.109517][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 243.122352][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 243.134887][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 243.146926][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 243.160439][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 243.174098][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 243.187406][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 245.329632][ T36] audit: type=1400 audit(2000000093.785:5337): avc: denied { create } for pid=6720 comm="syz.3.3200" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 248.047020][ T36] audit: type=1400 audit(2000000094.742:5338): avc: denied { read write } for pid=527 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 248.175479][ T36] audit: type=1400 audit(2000000094.742:5339): avc: denied { read write open } for pid=527 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 248.429669][ C0] net_ratelimit: 135877 callbacks suppressed [ 248.429704][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 248.429743][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 248.436357][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 248.449651][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 248.463103][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 248.475891][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 248.489219][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 248.501686][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 248.514614][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 248.526875][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 249.997278][ T36] audit: type=1400 audit(2000000094.742:5340): avc: denied { ioctl } for pid=527 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 250.370569][ T36] audit: type=1400 audit(2000000097.566:5341): avc: denied { execmem } for pid=6724 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 253.769700][ C0] net_ratelimit: 132168 callbacks suppressed [ 253.769724][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 253.769769][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 253.776816][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 253.790613][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 253.803698][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 253.816046][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 253.828797][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 253.841725][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 253.856083][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 253.869355][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 254.921179][ T36] audit: type=1400 audit(2000000100.408:5342): avc: denied { execmem } for pid=6725 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 257.899908][ T36] audit: type=1400 audit(2000000128.254:5343): avc: denied { read } for pid=6727 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 259.109753][ C0] net_ratelimit: 139590 callbacks suppressed [ 259.109778][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 259.109833][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 259.116260][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 259.128795][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 259.140995][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 259.153920][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 259.167088][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 259.179803][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 259.192562][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 259.205312][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 259.771739][ T36] audit: type=1400 audit(2000000128.254:5344): avc: denied { read open } for pid=6727 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 261.355532][ T36] audit: type=1400 audit(2000000128.676:5345): avc: denied { mounton } for pid=6727 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 261.413228][ T36] audit: type=1400 audit(2000000128.958:5346): avc: denied { read } for pid=6728 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 262.254999][ T36] audit: type=1400 audit(2000000128.958:5347): avc: denied { read open } for pid=6728 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 263.385036][ T36] audit: type=1400 audit(2000000128.958:5348): avc: denied { mounton } for pid=6728 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 264.449737][ C1] net_ratelimit: 138183 callbacks suppressed [ 264.449765][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 264.449788][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 264.456265][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 264.468673][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 264.481138][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 264.493124][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 264.505542][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 264.518747][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 264.530973][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 264.543671][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 267.237145][ T36] audit: type=1400 audit(2000000128.967:5349): avc: denied { read } for pid=6726 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 268.405118][ T36] audit: type=1400 audit(2000000128.967:5350): avc: denied { read open } for pid=6726 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 269.789692][ C1] net_ratelimit: 139216 callbacks suppressed [ 269.789718][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 269.789876][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 269.795900][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 269.807981][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 269.820801][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 269.833354][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 269.845949][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 269.859569][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 269.871967][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 269.884518][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 270.792805][ T36] audit: type=1400 audit(2000000128.967:5351): avc: denied { mounton } for pid=6726 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 270.899084][ T36] audit: type=1400 audit(2000000129.399:5352): avc: denied { sys_module } for pid=6728 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 271.016125][ T36] audit: type=1400 audit(2000000129.418:5353): avc: denied { sys_module } for pid=6727 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 271.560314][ T36] audit: type=1400 audit(2000000138.134:5354): avc: denied { sys_module } for pid=6726 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 272.008985][ T36] audit: type=1400 audit(2000000140.038:5355): avc: denied { sys_module } for pid=6728 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 273.545370][ T36] audit: type=1400 audit(2000000140.047:5356): avc: denied { sys_module } for pid=6728 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 273.852160][ T36] audit: type=1400 audit(2000000140.066:5357): avc: denied { sys_module } for pid=6728 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 274.001295][ T36] audit: type=1400 audit(2000000140.498:5358): avc: denied { sys_module } for pid=6726 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 274.053858][ T36] audit: type=1400 audit(2000000140.563:5359): avc: denied { sys_module } for pid=6726 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 274.238239][ T36] audit: type=1400 audit(2000000140.573:5360): avc: denied { sys_module } for pid=6727 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 274.640733][ T36] audit: type=1400 audit(2000000140.582:5361): avc: denied { sys_module } for pid=6727 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 275.129739][ C1] net_ratelimit: 138704 callbacks suppressed [ 275.129763][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 275.129795][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 275.135953][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 275.148604][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 275.162391][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 275.175390][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 275.188165][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 275.201541][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 275.216855][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 275.230066][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 275.492455][ T36] audit: type=1400 audit(2000000140.685:5362): avc: denied { sys_module } for pid=6726 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 276.878720][ T36] audit: type=1400 audit(2000000140.695:5363): avc: denied { sys_module } for pid=6727 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 278.521831][ T36] audit: type=1400 audit(2000000144.429:5364): avc: denied { read } for pid=6729 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 280.469762][ C0] net_ratelimit: 137662 callbacks suppressed [ 280.469786][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 280.469831][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 280.476801][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 280.489741][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 280.502133][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 280.514611][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 280.527133][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 280.539539][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 280.552130][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 280.565329][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 282.709738][ T36] audit: type=1400 audit(2000000144.429:5365): avc: denied { read open } for pid=6729 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 283.326753][ T36] audit: type=1400 audit(2000000145.527:5366): avc: denied { mounton } for pid=6729 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 283.892702][ T36] audit: type=1400 audit(2000000146.146:5367): avc: denied { sys_module } for pid=6729 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 283.946172][ T36] audit: type=1400 audit(2000000146.240:5368): avc: denied { sys_module } for pid=6729 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 284.095640][ T36] audit: type=1400 audit(2000000147.947:5369): avc: denied { sys_module } for pid=6729 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 285.809766][ C1] net_ratelimit: 135483 callbacks suppressed [ 285.809793][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 285.809828][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 285.816693][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 285.829578][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 285.843082][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 285.857630][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 285.872084][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 285.885986][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 285.902589][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 285.916406][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 289.063522][ T36] audit: type=1400 audit(2000000147.956:5370): avc: denied { sys_module } for pid=6729 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 291.002235][ T36] audit: type=1400 audit(2000000152.779:5371): avc: denied { execmem } for pid=6730 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 291.149783][ C0] net_ratelimit: 132572 callbacks suppressed [ 291.149813][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 291.149856][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 291.157039][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 291.172300][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 291.190704][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 291.205419][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 291.220504][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 291.233784][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 291.247311][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 291.262108][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 291.609826][ T36] audit: type=1400 audit(2000000159.994:5372): avc: denied { execmem } for pid=6731 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 292.089535][ T36] audit: type=1400 audit(2000000167.415:5373): avc: denied { execmem } for pid=6732 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 294.072102][ T36] audit: type=1400 audit(2000000169.019:5374): avc: denied { execmem } for pid=6733 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 296.489776][ C1] net_ratelimit: 132469 callbacks suppressed [ 296.489800][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 296.489824][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 296.496324][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 296.508671][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 296.522847][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 296.536545][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 296.549282][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 296.562573][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 296.574922][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 296.587054][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 301.829771][ C1] net_ratelimit: 142547 callbacks suppressed [ 301.829797][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 301.829974][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 301.836410][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 301.849291][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 301.862140][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 301.874652][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 301.887408][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 301.900004][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 301.912637][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 301.925774][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 307.169782][ C1] net_ratelimit: 139079 callbacks suppressed [ 307.169807][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 307.169808][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 307.169863][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 307.177368][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 307.192332][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 307.207721][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 307.220956][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 307.236706][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 307.250292][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 307.267672][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 308.292096][ T36] audit: type=1400 audit(2000000182.342:5375): avc: denied { read } for pid=6735 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 310.038368][ T36] audit: type=1400 audit(2000000182.342:5376): avc: denied { read open } for pid=6735 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 312.509776][ C1] net_ratelimit: 129805 callbacks suppressed [ 312.509801][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 312.509858][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 312.516467][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 312.529395][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 312.542271][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 312.554947][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 312.567001][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 312.579617][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 312.591860][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 312.604665][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 312.771337][ T36] audit: type=1400 audit(2000000187.173:5377): avc: denied { read } for pid=6736 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 312.990486][ T36] audit: type=1400 audit(2000000187.230:5378): avc: denied { read open } for pid=6736 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 313.332833][ T36] audit: type=1400 audit(2000000187.230:5379): avc: denied { mounton } for pid=6735 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 313.533750][ T36] audit: type=1400 audit(2000000187.323:5380): avc: denied { mounton } for pid=6736 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 313.607713][ T36] audit: type=1400 audit(2000000187.333:5381): avc: denied { sys_module } for pid=6735 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 315.441993][ T36] audit: type=1400 audit(2000000187.567:5382): avc: denied { read } for pid=6737 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 317.232944][ T36] audit: type=1400 audit(2000000187.567:5383): avc: denied { read open } for pid=6737 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 317.595025][ T36] audit: type=1400 audit(2000000187.595:5384): avc: denied { mounton } for pid=6737 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 317.849778][ C1] net_ratelimit: 140041 callbacks suppressed [ 317.849804][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 317.849922][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 317.856083][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 317.868296][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 317.880456][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 317.892875][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 317.905226][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 317.917543][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 317.930324][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 317.942758][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 322.946487][ T36] audit: type=1400 audit(2000000187.595:5385): avc: denied { sys_module } for pid=6737 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 323.189797][ C1] net_ratelimit: 156901 callbacks suppressed [ 323.189823][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 323.189824][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 323.189878][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 323.196370][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 323.209098][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 323.221652][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 323.233805][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 323.246339][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 323.258769][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 323.270841][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 327.540015][ T36] audit: type=1400 audit(2000000187.605:5386): avc: denied { read } for pid=6738 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 328.529849][ C1] net_ratelimit: 160755 callbacks suppressed [ 328.529874][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 328.529894][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 328.536329][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 328.549543][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 328.561858][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 328.574385][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 328.586893][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 328.599115][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 328.611374][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 328.623655][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 330.782478][ T36] audit: type=1400 audit(2000000187.605:5387): avc: denied { read open } for pid=6738 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 332.272774][ T36] audit: type=1400 audit(2000000187.605:5388): avc: denied { mounton } for pid=6738 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 332.469388][ T36] audit: type=1400 audit(2000000187.642:5389): avc: denied { sys_module } for pid=6736 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 333.869839][ C1] net_ratelimit: 154246 callbacks suppressed [ 333.869864][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 333.869948][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 333.876563][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 333.888771][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 333.901119][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 333.913555][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 333.925814][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 333.938395][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 333.950990][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 333.963481][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 334.360976][ T36] audit: type=1400 audit(2000000187.689:5390): avc: denied { sys_module } for pid=6738 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 339.209842][ C1] net_ratelimit: 152838 callbacks suppressed [ 339.209869][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 339.210117][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 339.216532][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 339.228817][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 339.241595][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 339.253841][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 339.266198][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 339.279639][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 339.292478][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 339.304738][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 343.033197][ T36] audit: type=1400 audit(2000000215.563:5391): avc: denied { sys_module } for pid=6738 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 344.139407][ T36] audit: type=1400 audit(2000000216.605:5392): avc: denied { sys_module } for pid=6737 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 344.549854][ C1] net_ratelimit: 138355 callbacks suppressed [ 344.549878][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 344.549880][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 344.549935][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 344.556223][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 344.568489][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 344.581016][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 344.593410][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 344.605578][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 344.618488][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 344.631304][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 345.474759][ T36] audit: type=1400 audit(2000000217.852:5393): avc: denied { execmem } for pid=6739 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 349.889854][ C1] net_ratelimit: 140731 callbacks suppressed [ 349.889879][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 349.889887][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 349.889937][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 349.896231][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 349.909038][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 349.921586][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 349.934375][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 349.946920][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 349.959374][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 349.971555][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 351.934827][ T36] audit: type=1400 audit(2000000223.913:5394): avc: denied { execmem } for pid=6740 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 355.229883][ C1] net_ratelimit: 143939 callbacks suppressed [ 355.229907][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 355.229947][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 355.236344][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 355.248627][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 355.260769][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 355.273262][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 355.285527][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 355.297745][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 355.309969][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 355.322202][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 360.569901][ C1] net_ratelimit: 143014 callbacks suppressed [ 360.569926][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 360.570087][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 360.576281][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 360.588388][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 360.600479][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 360.615054][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 360.627540][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 360.639839][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 360.651972][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 360.664270][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 361.594728][ T36] audit: type=1400 audit(2000000232.948:5395): avc: denied { read } for pid=6742 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 363.138294][ T36] audit: type=1400 audit(2000000233.173:5396): avc: denied { read open } for pid=6742 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 363.704953][ T36] audit: type=1400 audit(2000000233.201:5397): avc: denied { mounton } for pid=6742 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 364.674505][ T36] audit: type=1400 audit(2000000233.774:5398): avc: denied { execmem } for pid=6741 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 364.920650][ T36] audit: type=1400 audit(2000000234.036:5399): avc: denied { execmem } for pid=6743 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 365.909885][ C1] net_ratelimit: 141066 callbacks suppressed [ 365.909909][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 365.909952][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 365.916203][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 365.928862][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 365.941344][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 365.953874][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 365.966091][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 365.978644][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 365.990913][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 366.003011][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 366.321425][ T36] audit: type=1400 audit(2000000234.168:5400): avc: denied { sys_module } for pid=6742 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 366.625345][ T36] audit: type=1400 audit(2000000234.505:5401): avc: denied { read } for pid=6744 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 370.078507][ T36] audit: type=1400 audit(2000000234.505:5402): avc: denied { read open } for pid=6744 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 370.334283][ T36] audit: type=1400 audit(2000000234.505:5403): avc: denied { mounton } for pid=6744 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 370.717387][ T36] audit: type=1400 audit(2000000234.618:5404): avc: denied { sys_module } for pid=6744 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 370.803011][ T36] audit: type=1400 audit(2000000238.268:5405): avc: denied { read } for pid=6745 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 371.219040][ T36] audit: type=1400 audit(2000000238.268:5406): avc: denied { read open } for pid=6745 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 371.249890][ C1] net_ratelimit: 141335 callbacks suppressed [ 371.249914][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 371.249955][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 371.256178][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 371.268623][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 371.280788][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 371.293223][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 371.305750][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 371.318290][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 371.330181][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 371.342387][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 372.455444][ T36] audit: type=1400 audit(2000000238.268:5407): avc: denied { mounton } for pid=6745 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 374.170069][ T36] audit: type=1400 audit(2000000241.167:5408): avc: denied { sys_module } for pid=6745 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 375.473388][ T36] audit: type=1400 audit(2000000241.336:5409): avc: denied { read } for pid=6746 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 376.589875][ C0] net_ratelimit: 145972 callbacks suppressed [ 376.589899][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 376.589927][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 376.597023][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 376.610053][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 376.622063][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 376.634601][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 376.647369][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 376.660013][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 376.672675][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 376.684850][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 377.221974][ T36] audit: type=1400 audit(2000000241.336:5410): avc: denied { read open } for pid=6746 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 377.411950][ T36] audit: type=1400 audit(2000000241.336:5411): avc: denied { mounton } for pid=6746 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 379.203767][ T36] audit: type=1400 audit(2000000241.458:5412): avc: denied { sys_module } for pid=6746 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 380.718020][ T36] audit: type=1400 audit(2000000241.964:5413): avc: denied { sys_module } for pid=6742 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 381.718204][ T36] audit: type=1400 audit(2000000241.974:5414): avc: denied { sys_module } for pid=6742 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 381.877156][ T36] audit: type=1400 audit(2000000241.974:5415): avc: denied { sys_module } for pid=6744 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 381.929927][ C1] net_ratelimit: 145674 callbacks suppressed [ 381.929955][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 381.930276][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 381.936480][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 381.948949][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 381.961121][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 381.973272][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 381.985616][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 381.997822][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 382.009903][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 382.022212][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 382.348506][ T36] audit: type=1400 audit(2000000241.983:5416): avc: denied { sys_module } for pid=6744 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 382.485779][ T36] audit: type=1400 audit(2000000241.992:5417): avc: denied { sys_module } for pid=6744 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 382.537546][ T36] audit: type=1400 audit(2000000242.002:5418): avc: denied { sys_module } for pid=6745 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 383.008842][ T36] audit: type=1400 audit(2000000242.152:5419): avc: denied { sys_module } for pid=6746 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 383.327197][ T36] audit: type=1400 audit(2000000242.171:5420): avc: denied { sys_module } for pid=6746 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 383.775115][ T36] audit: type=1400 audit(2000000242.180:5421): avc: denied { sys_module } for pid=6746 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 384.185292][ T36] audit: type=1400 audit(2000000242.255:5422): avc: denied { sys_module } for pid=6745 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 384.404055][ T36] audit: type=1400 audit(2000000242.293:5423): avc: denied { sys_module } for pid=6742 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 387.269902][ C1] net_ratelimit: 146478 callbacks suppressed [ 387.269928][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 387.269931][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 387.270021][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 387.276111][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 387.288732][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 387.301273][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 387.313422][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 387.325821][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 387.338228][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 387.350894][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 392.609941][ C1] net_ratelimit: 146076 callbacks suppressed [ 392.609966][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 392.610072][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 392.619365][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 392.628746][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 392.640747][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 392.653028][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 392.665294][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 392.677730][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 392.689699][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 392.701775][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 392.761422][ T37] INFO: task syz-executor:527 blocked for more than 123 seconds. [ 392.793716][ T37] Not tainted syzkaller #0 [ 392.798703][ T37] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 393.006936][ T36] kauditd_printk_skb: 1 callbacks suppressed [ 393.006960][ T36] audit: type=1400 audit(2000000262.379:5425): avc: denied { write } for pid=282 comm="syz-executor" path="pipe:[2354]" dev="pipefs" ino=2354 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 393.176121][ T37] task:syz-executor state:D stack:0 pid:527 tgid:527 ppid:1 flags:0x00004006 [ 393.272147][ T37] Call Trace: [ 393.275502][ T37] [ 393.278458][ T37] __schedule+0x134f/0x1ea0 [ 393.283102][ T37] ? __sched_text_start+0x10/0x10 [ 393.288465][ T37] ? __mutex_add_waiter+0xd0/0x2a0 [ 393.293786][ T37] ? __kasan_check_write+0x18/0x20 [ 393.299000][ T37] ? trace_contention_begin+0xc0/0xc0 [ 393.304670][ T37] schedule+0xc5/0x240 [ 393.308948][ T37] schedule_preempt_disabled+0x14/0x30 [ 393.314634][ T37] __mutex_lock+0x960/0x1bb0 [ 393.319766][ T37] ? __ww_mutex_lock_interruptible_slowpath+0x30/0x30 [ 393.327467][ T37] ? __kasan_check_write+0x18/0x20 [ 393.332789][ T37] ? _raw_spin_lock+0x92/0x120 [ 393.337596][ T37] ? __kasan_check_write+0x18/0x20 [ 393.342807][ T37] ? wake_up_q+0x10f/0x1c0 [ 393.347755][ T37] ? __mutex_unlock_slowpath+0x4b7/0x780 [ 393.353622][ T37] ? mutex_unlock+0x240/0x240 [ 393.358638][ T37] __mutex_lock_slowpath+0xe/0x20 [ 393.363945][ T37] mutex_lock+0x113/0x1d0 [ 393.368410][ T37] ? __cfi_mutex_lock+0x10/0x10 [ 393.373466][ T37] rcu_barrier+0x4d/0x540 [ 393.378164][ T37] ? __kasan_slab_free+0x6a/0x80 [ 393.383229][ T37] netdev_run_todo+0x118/0xce0 [ 393.388062][ T37] ? kvfree+0x39/0x50 [ 393.392228][ T37] ? netdev_state_change+0xaa/0x240 [ 393.397435][ T37] ? __cfi_netdev_run_todo+0x10/0x10 [ 393.402827][ T37] rtnl_unlock+0x12/0x20 [ 393.407250][ T37] tun_chr_close+0xc5/0x150 [ 393.411963][ T37] ? __cfi_tun_chr_close+0x10/0x10 [ 393.417172][ T37] __fput+0x1fe/0xa00 [ 393.421185][ T37] ? call_rcu+0x14/0x20 [ 393.425455][ T37] ____fput+0x20/0x30 [ 393.429878][ T37] task_work_run+0x1e5/0x260 [ 393.434498][ T37] ? __cfi_task_work_run+0x10/0x10 [ 393.439621][ T37] ? free_nsproxy+0x223/0x290 [ 393.444420][ T37] do_exit+0x9e3/0x2650 [ 393.448595][ T37] ? __cfi_avc_has_perm+0x10/0x10 [ 393.453731][ T37] ? __cfi_do_exit+0x10/0x10 [ 393.458430][ T37] ? nf_getsockopt+0x2a5/0x2b0 [ 393.463245][ T37] ? __kasan_check_write+0x18/0x20 [ 393.468471][ T37] ? _raw_spin_lock_irq+0x93/0x120 [ 393.473884][ T37] ? __cfi__raw_spin_lock_irq+0x10/0x10 [ 393.479702][ T37] do_group_exit+0x229/0x2f0 [ 393.484314][ T37] ? __kasan_check_write+0x18/0x20 [ 393.489581][ T37] get_signal+0x1398/0x14e0 [ 393.494140][ T37] arch_do_signal_or_restart+0xbc/0x760 [ 393.499929][ T37] ? __cfi_do_sock_getsockopt+0x10/0x10 [ 393.505593][ T37] ? __cfi_arch_do_signal_or_restart+0x10/0x10 [ 393.511884][ T37] ? __x64_sys_getsockopt+0x1f1/0x280 [ 393.517505][ T37] syscall_exit_to_user_mode+0x57/0xb0 [ 393.523096][ T37] do_syscall_64+0x63/0xf0 [ 393.527734][ T37] ? clear_bhb_loop+0x50/0xa0 [ 393.532778][ T37] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 393.538715][ T37] RIP: 0033:0x7f5a2ad9c6aa [ 393.543314][ T37] RSP: 002b:00007ffdc06bf9c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 393.551925][ T37] RAX: 0000000000000000 RBX: 0000000000000003 RCX: 00007f5a2ad9c6aa [ 393.559929][ T37] RDX: 0000000000000060 RSI: 0000000000000000 RDI: 0000000000000003 [ 393.568012][ T37] RBP: 00007ffdc06bf9e0 R08: 00007ffdc06bf9dc R09: 0000000000000000 [ 393.576178][ T37] R10: 00007ffdc06bf9e0 R11: 0000000000000246 R12: 00007ffdc06bf9dc [ 393.584377][ T37] R13: 00000000000927c0 R14: 00000000000322f2 R15: 00007ffdc06c0120 [ 393.592553][ T37] [ 393.642326][ T37] NMI backtrace for cpu 0 [ 393.642350][ T37] CPU: 0 UID: 0 PID: 37 Comm: khungtaskd Not tainted syzkaller #0 001c7e68fa735976e9f6b7ad125989e1d2b10b0e [ 393.642380][ T37] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 393.642394][ T37] Call Trace: [ 393.642401][ T37] [ 393.642410][ T37] __dump_stack+0x21/0x30 [ 393.642441][ T37] dump_stack_lvl+0x140/0x1c0 [ 393.642467][ T37] ? __cfi_dump_stack_lvl+0x10/0x10 [ 393.642494][ T37] dump_stack+0x19/0x20 [ 393.642518][ T37] nmi_cpu_backtrace+0x2ba/0x2d0 [ 393.642555][ T37] ? rcu_read_unlock_special+0xb7/0x420 [ 393.642581][ T37] ? __cfi_nmi_cpu_backtrace+0x10/0x10 [ 393.642608][ T37] ? sched_show_task+0x371/0x530 [ 393.642631][ T37] ? __rcu_read_unlock+0xc0/0xc0 [ 393.642655][ T37] ? __cfi_nmi_raise_cpu_backtrace+0x10/0x10 [ 393.642680][ T37] ? __cfi_nmi_raise_cpu_backtrace+0x10/0x10 [ 393.642704][ T37] nmi_trigger_cpumask_backtrace+0x142/0x2c0 [ 393.642733][ T37] arch_trigger_cpumask_backtrace+0x14/0x20 [ 393.642757][ T37] watchdog+0xdad/0xf00 [ 393.642785][ T37] ? __kasan_check_write+0x18/0x20 [ 393.642812][ T37] ? __cfi_watchdog+0x10/0x10 [ 393.642840][ T37] ? __kasan_check_read+0x15/0x20 [ 393.642863][ T37] ? __kthread_parkme+0x137/0x180 [ 393.642891][ T37] ? schedule+0xc5/0x240 [ 393.642909][ T37] kthread+0x2c9/0x370 [ 393.642928][ T37] ? __cfi_watchdog+0x10/0x10 [ 393.642955][ T37] ? __cfi_kthread+0x10/0x10 [ 393.642974][ T37] ret_from_fork+0x67/0xa0 [ 393.642999][ T37] ? __cfi_kthread+0x10/0x10 [ 393.643019][ T37] ret_from_fork_asm+0x1a/0x30 [ 393.643047][ T37] [ 393.643056][ T37] Sending NMI from CPU 0 to CPUs 1: [ 393.704295][ T36] audit: type=1400 audit(2000000262.379:5426): avc: denied { write } for pid=282 comm="syz-executor" path="pipe:[2354]" dev="pipefs" ino=2354 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 393.705251][ C1] NMI backtrace for cpu 1 [ 393.705266][ C1] CPU: 1 UID: 0 PID: 36 Comm: kauditd Not tainted syzkaller #0 001c7e68fa735976e9f6b7ad125989e1d2b10b0e [ 393.705288][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 393.705298][ C1] RIP: 0010:vsnprintf+0x0/0x1ad0 [ 393.705326][ C1] Code: 89 33 31 c0 eb 0a e8 9f a3 ec fb b8 f0 ff ff ff 5b 41 5e 5d c3 cc cc cc cc cc b8 43 34 02 03 90 90 90 90 90 90 90 90 90 90 90 0f 1e fa 55 48 89 e5 41 57 41 56 41 55 41 54 53 48 83 ec 60 48 [ 393.705340][ C1] RSP: 0018:ffffc9000025f358 EFLAGS: 00000246 [ 393.705356][ C1] RAX: ffffc9000025f370 RBX: ffffffff85e92620 RCX: ffffc9000025f3c0 [ 393.705369][ C1] RDX: ffffffff85e92620 RSI: 000000007fffffff RDI: ffffc9000025f5c0 [ 393.705382][ C1] RBP: ffffc9000025f450 R08: ffffc9000025f3d7 R09: 0000000000000000 [ 393.705394][ C1] R10: ffffc9000025f3c0 R11: fffff5200004be7b R12: 1ffff9200004be74 [ 393.705407][ C1] R13: dffffc0000000000 R14: ffffc9000025f5c0 R15: ffffc9000025f3c0 [ 393.705419][ C1] FS: 0000000000000000(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 393.705433][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 393.705445][ C1] CR2: 00007fffecf4ce8c CR3: 000000010c322000 CR4: 00000000003526b0 [ 393.705463][ C1] Call Trace: [ 393.705469][ C1] [ 393.705475][ C1] ? sprintf+0xe8/0x140 [ 393.705496][ C1] ? desc_read+0x1ab/0x3e0 [ 393.705519][ C1] ? __cfi_sprintf+0x10/0x10 [ 393.705538][ C1] ? desc_read+0x202/0x3e0 [ 393.705566][ C1] info_print_prefix+0x183/0x4a0 [ 393.705586][ C1] ? trace_raw_output_console+0xf0/0xf0 [ 393.705605][ C1] ? _prb_read_valid+0xa71/0xa80 [ 393.705627][ C1] record_print_text+0x177/0x450 [ 393.705645][ C1] ? prb_read_valid+0x80/0x80 [ 393.705666][ C1] ? printk_get_next_message+0x9e0/0x9e0 [ 393.705685][ C1] ? prb_read_valid+0x41/0x80 [ 393.705706][ C1] printk_get_next_message+0x2ab/0x9e0 [ 393.705724][ C1] ? __cfi_printk_get_next_message+0x10/0x10 [ 393.705743][ C1] ? prb_read_valid+0x80/0x80 [ 393.705764][ C1] ? __kasan_check_write+0x18/0x20 [ 393.705783][ C1] ? __kasan_check_read+0x15/0x20 [ 393.705800][ C1] ? __asan_memcpy+0x5a/0x80 [ 393.705817][ C1] console_flush_all+0x3ab/0xac0 [ 393.705835][ C1] ? vprintk_store+0xa5e/0x1100 [ 393.705852][ C1] ? __console_rewind_all+0x170/0x170 [ 393.705869][ C1] ? __kasan_check_read+0x15/0x20 [ 393.705886][ C1] ? is_printk_cpu_sync_owner+0x39/0x50 [ 393.705904][ C1] ? is_printk_legacy_deferred+0x5c/0x70 [ 393.705924][ C1] console_unlock+0xf8/0x2c0 [ 393.705939][ C1] ? _raw_spin_unlock_irqrestore+0x4a/0x70 [ 393.705961][ C1] ? __cfi_console_unlock+0x10/0x10 [ 393.705977][ C1] ? __kasan_check_write+0x18/0x20 [ 393.705994][ C1] ? _raw_spin_lock+0x92/0x120 [ 393.706012][ C1] ? __cfi__raw_spin_lock+0x10/0x10 [ 393.706032][ C1] ? __kasan_check_read+0x15/0x20 [ 393.706049][ C1] ? is_printk_cpu_sync_owner+0x39/0x50 [ 393.706068][ C1] vprintk_emit+0x282/0x650 [ 393.706084][ C1] ? __cfi_vprintk_emit+0x10/0x10 [ 393.706100][ C1] ? __kasan_check_write+0x18/0x20 [ 393.706117][ C1] ? _raw_spin_trylock+0xb5/0x140 [ 393.706136][ C1] vprintk_default+0x2a/0x40 [ 393.706152][ C1] vprintk+0x93/0xa0 [ 393.706170][ C1] _printk+0xde/0x140 [ 393.706187][ C1] ? __cfi__printk+0x10/0x10 [ 393.706204][ C1] kauditd_hold_skb+0x1cc/0x230 [ 393.706225][ C1] ? __cfi_kauditd_send_multicast_skb+0x10/0x10 [ 393.706257][ C1] ? __cfi_kauditd_hold_skb+0x10/0x10 [ 393.706278][ C1] kauditd_send_queue+0x2c4/0x310 [ 393.706299][ C1] ? _raw_spin_unlock_irqrestore+0x4a/0x70 [ 393.706320][ C1] ? __cfi_kauditd_hold_skb+0x10/0x10 [ 393.706340][ C1] ? __cfi_kauditd_send_multicast_skb+0x10/0x10 [ 393.706363][ C1] kauditd_thread+0x4e0/0x740 [ 393.706382][ C1] ? __kasan_check_write+0x18/0x20 [ 393.706399][ C1] ? __cfi__raw_spin_lock_irqsave+0x10/0x10 [ 393.706420][ C1] ? __cfi_kauditd_thread+0x10/0x10 [ 393.706440][ C1] ? set_cpus_allowed_ptr+0xa1/0xf0 [ 393.706461][ C1] ? __cfi_autoremove_wake_function+0x10/0x10 [ 393.706484][ C1] ? __kasan_check_read+0x15/0x20 [ 393.706501][ C1] ? schedule+0xc5/0x240 [ 393.706514][ C1] kthread+0x2c9/0x370 [ 393.706529][ C1] ? __cfi_kauditd_thread+0x10/0x10 [ 393.706555][ C1] ? __cfi_kthread+0x10/0x10 [ 393.706569][ C1] ret_from_fork+0x67/0xa0 [ 393.706588][ C1] ? __cfi_kthread+0x10/0x10 [ 393.706603][ C1] ret_from_fork_asm+0x1a/0x30 [ 393.706624][ C1] [ 395.968501][ T36] audit: type=1400 audit(2000000262.379:5427): avc: denied { write } for pid=282 comm="syz-executor" path="pipe:[2354]" dev="pipefs" ino=2354 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 397.949914][ C1] net_ratelimit: 121254 callbacks suppressed [ 397.949939][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 397.949947][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 397.949998][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 397.956021][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 397.968134][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 397.980272][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 397.992237][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 398.004340][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0) [ 398.016506][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 398.028826][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)