last executing test programs:
44.365243537s ago: executing program 2 (id=3044):
r0 = syz_usb_connect(0x0, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0xd0, 0xff, 0xec, 0x20, 0x789, 0x160, 0x2cd1, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x10, 0x0, [{{0x9, 0x4, 0xbf, 0x0, 0x2, 0xe6, 0xfb, 0x6a, 0x0, [], [{{0x9, 0x5, 0x4, 0x2, 0x200}}, {{0x9, 0x5, 0x82, 0x2, 0x18}}]}}]}}]}}, 0x0)
syz_usb_control_io$hid(r0, 0x0, 0x0)
40.872865307s ago: executing program 2 (id=3110):
r0 = socket$nl_audit(0x10, 0x3, 0x9)
ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000380)={'team_slave_0\x00', &(0x7f0000000200)=@ethtool_sset_info={0x16, 0x0, 0x101}})
40.015237097s ago: executing program 2 (id=3131):
r0 = socket(0x10, 0x3, 0x0)
sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000052c0)={0x368, 0x19, 0x1, 0x0, 0x0, {0x1d, 0xd601, 0x9}, [@nested={0x4d, 0x12, 0x0, 0x1, [@typed={0x8, 0x121, 0x0, 0x0, @uid}, @generic="428184a477201ac90f24d8c531680464a01e08554baff2279134e2a452c739471e1c7bd4aef903f973120a8762bddc1900f269ce3068ee8401e0199c9cf16ed3db"]}, @nested={0x304, 0x5, 0x0, 0x1, [@nested={0x300, 0x124, 0x0, 0x1, [@generic="e52cfdc68ae361504fb4c62b8d9ac5e3dbef730cb2cf00eac243342b13b4b2783e39f91b", @nested={0xc1, 0x95, 0x0, 0x1, [@nested={0x4, 0x151}, @generic="9f04e2e04c5e100d9e58807b0096f337701f7abd7496b5b3ca4cc3c940ca62110404496d613fb09e1b288a498db87682d4352c7b0bdf2c65590cd71a73eb0e7784562bf1f677c65ddb15175cb931cab7a37a62f6e4c9c52327f48dd9952d429bb2a199dc6ddee341de7a400bdd0e6928657e2de5a6d05869fb6773ae19db71894e2711b8864a9b1d9178a18d0e0329ae717bc4892619efe6e32e57f3b248aab32dbf6abddece7fa450210297ee", @typed={0x8, 0xac, 0x0, 0x0, @uid}, @nested={0x4, 0xd7}]}, @typed={0x4, 0x138}, @nested={0x20d, 0x110, 0x0, 0x1, [@typed={0x14, 0x67, 0x0, 0x0, @ipv6=@mcast1}, @generic="11277c096e5b2d7552ca4f113df5e2b9cb2c8a2aedb1ac80f4027491f90f75b0286a2340c5a0f49430ed6ffe7c03ece4148486d5976f0ae19577fbfc7a8d2ca4f725832d", @generic="037e1ee9f7b0a4220dd524d682cc8cbbbdea4835ea4084f3a42b8263beaacbb438155fb626b5605be64b919ff93802c1e5e24c6193c4198fee8b119e011113f8920122e3b4fffc8efce6031d349a3848fc3126e8aeb1d282b47c74f6e6648e6179a4be3bd11a2c4b84623e4129c26e0c4a7b9293fb5b2598cd45c43ab1910968bb4aff9c74ad264076f3134d86dc36948a4daa60062b27cb2fefcf86572d37bcd40a7ed907bb11a98cea45381165f55a6fe6bd1897874865ab2987ae36390edcc29f987d98c534e2", @generic="081b173ca8c2c3138757b83f4768f5a0e07d1416eb8cc8d0fac2af900348d0587fd3d18489f4d44c5fd6f5a340322156f395402e880b7def364e3d08298d018b6e2a2eacfb0fe275314f07c051c112b70523e0dd9a59166bc4358134bb63c4a540d8545f7f7f85d829", @nested={0x4, 0x53}, @generic="95ee4c3a9c6424b78ca9e13d79519fd93d569f0e73125311f414ab609624114982a1df7b89262ede6bdab02ab1886d3197d0ff5dc7fd26fc1baf07a6b0eac5bb9d7109c54efe4c72aae082e9726422bdaeb64f1eb08e9d04ccd4d078542502ee386e0955d63dabb459ad711c1d", @nested={0x4, 0x1e}, @generic="e0e599aa90e954075c89b6"]}]}]}]}, 0x368}, 0x1, 0x0, 0x0, 0x4}, 0x804)
39.114761869s ago: executing program 2 (id=3152):
r0 = socket(0x8000000010, 0x2, 0x0)
write(r0, &(0x7f00000002c0)="fc0000001c000704ab5b2509b868030002ab087a0100000015481093210001c0f0030584050060100000000000039815fa2c53c28648000000b9d95662537a00bc000c00f0ff7f0000b400600033d44000040560916a0033f436313012dafd5a32e273fc83ab82d710f74cec184406f90d435ef8b29d3ef3d92c94170e5bba2e177312e081bea05d3a021e8ca062914a46ccfc510bb73c9455cdc8363ae4f5df77bc4cfd6239ec2a0f0d1bcae5fa0f5f9dcdd51af51af8502943283f4bb102b2b8f5566791cf190201ded815b2ccd243f395ed94e0ad91bd6433802e0784f2013cd1890058a10000c880ac801fe4af000049f0d4796f0000090548de", 0xfc)
38.23074386s ago: executing program 2 (id=3173):
r0 = socket$netlink(0x10, 0x3, 0x8000000004)
writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f6400947e570028925a01000000000000008000f0fffeffe809000000fff5dd000000100001000d081000418e00000004fcff", 0x58}], 0x1)
37.830660303s ago: executing program 0 (id=3182):
r0 = socket(0x10, 0x3, 0x0)
sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x20, 0x52, 0x1, 0x0, 0x0, {0xa}, [@typed={0xc, 0x1, 0x0, 0x0, @u64=0xfe}]}, 0x20}}, 0x0)
37.775935896s ago: executing program 1 (id=3183):
mkdirat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0)
move_mount(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x220)
37.761552457s ago: executing program 3 (id=3184):
r0 = socket(0x10, 0x3, 0x0)
setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, 0x0, 0x0)
37.724329949s ago: executing program 0 (id=3185):
r0 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_generic(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="300000001e0021002dbd70000000000007"], 0x30}, 0x1, 0x0, 0x0, 0x4014}, 0x0)
37.658692523s ago: executing program 3 (id=3186):
r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000a00), 0x2, 0x0)
ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x48)
37.648199893s ago: executing program 1 (id=3187):
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
setsockopt$inet6_int(r0, 0x29, 0xcf, 0x0, 0x0)
37.579777487s ago: executing program 0 (id=3188):
r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0)
setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f0000000640)={0x1, 0x380, 0x8, 0x2, 0x4, 0x5, 0xffff}, 0xc)
37.53925899s ago: executing program 1 (id=3189):
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0)
mprotect(&(0x7f00003e4000/0x2000)=nil, 0x2000, 0x2)
37.52779083s ago: executing program 3 (id=3190):
r0 = open_tree(0xffffffffffffff9c, &(0x7f00000000c0)='\x00', 0x89901)
mount_setattr(r0, &(0x7f0000000100)='.\x00', 0x9000, &(0x7f0000001dc0)={0x9, 0xd, 0x80000}, 0x20)
37.447468115s ago: executing program 0 (id=3191):
r0 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$netlink(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000540)=ANY=[@ANYBLOB=' \x00\x00\x00_\x00]'], 0x20}], 0x1}, 0x40)
37.413616847s ago: executing program 1 (id=3192):
r0 = socket$unix(0x1, 0x5, 0x0)
ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000001600)='ip6gre0\x00')
37.383938369s ago: executing program 0 (id=3193):
r0 = socket$nl_sock_diag(0x10, 0x3, 0x4)
sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000040)={0x14, 0x14, 0x1, 0x70bd2c, 0x25dfdbfe, {0x28, 0x1}}, 0x14}, 0x1, 0x0, 0x0, 0x10}, 0x20040000)
37.374704379s ago: executing program 1 (id=3194):
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
getsockopt$inet6_int(r0, 0x29, 0xc9, 0x0, 0x0)
37.36264295s ago: executing program 3 (id=3195):
r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000400)='./binderfs/binder1\x00', 0x0, 0x0)
ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000100)={0x68, 0x0, &(0x7f0000000140)=[@increfs_done={0x40106308, 0x1}, @request_death={0x400c630e, 0x3}, @reply={0x40406301, {0x2, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x48, 0x18, &(0x7f0000000000)={@flat=@binder={0x73622a85, 0x0, 0x1}, @flat=@handle={0x73682a85, 0xa, 0x1}, @flat=@weak_binder={0x77622a85, 0xa, 0x2}}, &(0x7f0000000080)={0x0, 0x18, 0x30}}}], 0x0, 0x0, 0x0})
36.857547849s ago: executing program 0 (id=3196):
r0 = socket$can_raw(0x1d, 0x3, 0x1)
sendmsg$can_raw(r0, &(0x7f0000000240)={&(0x7f0000000780), 0x2, &(0x7f0000000200)={&(0x7f0000000280)=@canfd={{0x4, 0x1, 0x1, 0x1}, 0x14, 0x1, 0x0, 0x0, "6b2d51aa069bcf0c6685eae14415accfd9188107f201482d523b7cd8ee2d08357ba85cc784b9d54ceed4e145b0bb73ddffffff7fc81e211e55b4edba7ebc6c88"}, 0x10}}, 0x0)
35.995904638s ago: executing program 2 (id=3197):
mmap(&(0x7f0000ff4000/0xc000)=nil, 0xc000, 0x1000003, 0x20031, 0xffffffffffffffff, 0xffffe000)
madvise(&(0x7f0000ff3000/0xd000)=nil, 0xd000, 0x17)
35.535350625s ago: executing program 1 (id=3198):
r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/locks\x00', 0x0, 0x0)
pread64(r0, &(0x7f00000024c0)=""/209, 0xd1, 0x8)
35.152482947s ago: executing program 3 (id=3199):
r0 = socket(0x10, 0x3, 0x0)
sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=ANY=[@ANYBLOB="640100004a0005181b01ccae12fb00000a"], 0x164}}, 0x40014)
22.978836228s ago: executing program 3 (id=3200):
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000001c0)=@newsa={0x114, 0x10, 0x7, 0x0, 0x0, {{@in6=@mcast2, @in=@multicast2, 0x4e20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11, 0x0, 0xee00}, {@in6=@remote, 0x0, 0x2b}, @in6=@local, {0x0, 0x0, 0x2, 0x0, 0x8}, {0x0, 0x200000, 0x7}, {0x40000, 0xfffffffd, 0xae8}, 0x0, 0x0, 0xa, 0x2, 0x0, 0x70}, [@coaddr={0x14, 0xe, @in6=@remote}, @replay_val={0x10, 0xa, {0x70bd2a, 0x70bd2c, 0x3}}]}, 0x114}}, 0x0)
19.908015295s ago: executing program 32 (id=3196):
r0 = socket$can_raw(0x1d, 0x3, 0x1)
sendmsg$can_raw(r0, &(0x7f0000000240)={&(0x7f0000000780), 0x2, &(0x7f0000000200)={&(0x7f0000000280)=@canfd={{0x4, 0x1, 0x1, 0x1}, 0x14, 0x1, 0x0, 0x0, "6b2d51aa069bcf0c6685eae14415accfd9188107f201482d523b7cd8ee2d08357ba85cc784b9d54ceed4e145b0bb73ddffffff7fc81e211e55b4edba7ebc6c88"}, 0x10}}, 0x0)
4.987577213s ago: executing program 33 (id=3198):
r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/locks\x00', 0x0, 0x0)
pread64(r0, &(0x7f00000024c0)=""/209, 0xd1, 0x8)
3.286677591s ago: executing program 34 (id=3197):
mmap(&(0x7f0000ff4000/0xc000)=nil, 0xc000, 0x1000003, 0x20031, 0xffffffffffffffff, 0xffffe000)
madvise(&(0x7f0000ff3000/0xd000)=nil, 0xd000, 0x17)
0s ago: executing program 35 (id=3200):
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000001c0)=@newsa={0x114, 0x10, 0x7, 0x0, 0x0, {{@in6=@mcast2, @in=@multicast2, 0x4e20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11, 0x0, 0xee00}, {@in6=@remote, 0x0, 0x2b}, @in6=@local, {0x0, 0x0, 0x2, 0x0, 0x8}, {0x0, 0x200000, 0x7}, {0x40000, 0xfffffffd, 0xae8}, 0x0, 0x0, 0xa, 0x2, 0x0, 0x70}, [@coaddr={0x14, 0xe, @in6=@remote}, @replay_val={0x10, 0xa, {0x70bd2a, 0x70bd2c, 0x3}}]}, 0x114}}, 0x0)
kernel console output (not intermixed with test programs):
ermissive=1
[ 142.595775][ T36] audit: type=1400 audit(2000000027.285:460): avc: denied { read write open } for pid=525 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1
[ 142.655793][ T4506] SELinux: Context system_u:object_r:apt_var_lib_t:s0 is not valid (left unmapped).
[ 142.674060][ T36] audit: type=1400 audit(2000000027.285:461): avc: denied { ioctl } for pid=525 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1
[ 142.711996][ T36] audit: type=1400 audit(2000000027.323:462): avc: denied { read write } for pid=524 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1
[ 142.737203][ T36] audit: type=1400 audit(2000000027.323:463): avc: denied { read write open } for pid=524 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1
[ 142.807824][ T526] audit: audit_backlog=65 > audit_backlog_limit=64
[ 142.913886][ T4522] netlink: 9 bytes leftover after parsing attributes in process `syz.0.2124'.
[ 142.973191][ T4522] gretap0: entered promiscuous mode
[ 143.906155][ T4608] netlink: 393 bytes leftover after parsing attributes in process `syz.3.2167'.
[ 143.963765][ T65] usb 1-1: new high-speed USB device number 79 using dummy_hcd
[ 144.113681][ T4622] random: crng reseeded on system resumption
[ 144.144999][ T65] usb 1-1: Using ep0 maxpacket: 16
[ 144.168680][ T65] usb 1-1: config 0 has an invalid interface number: 105 but max is 0
[ 144.188795][ T65] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config
[ 144.205983][ T65] usb 1-1: config 0 has no interface number 0
[ 144.228754][ T65] usb 1-1: New USB device found, idVendor=046c, idProduct=14e8, bcdDevice= b.28
[ 144.243483][ T65] usb 1-1: New USB device strings: Mfr=5, Product=2, SerialNumber=3
[ 144.262213][ T65] usb 1-1: Product: syz
[ 144.266548][ T65] usb 1-1: Manufacturer: syz
[ 144.277268][ T65] usb 1-1: SerialNumber: syz
[ 144.303594][ T65] usb 1-1: config 0 descriptor??
[ 144.551999][ T65] usb 1-1: Found UVC 0.00 device syz (046c:14e8)
[ 144.561948][ T65] usb 1-1: No valid video chain found.
[ 144.591997][ T65] usb 1-1: USB disconnect, device number 79
[ 145.362309][ T4700] x_tables: unsorted entry at hook 1
[ 145.613266][ T4721] netlink: 'syz.3.2223': attribute type 5 has an invalid length.
[ 145.638563][ T4721] netlink: 3657 bytes leftover after parsing attributes in process `syz.3.2223'.
[ 146.414163][ T4765] netlink: 24 bytes leftover after parsing attributes in process `syz.0.2242'.
[ 146.605151][ T4776] netlink: 20 bytes leftover after parsing attributes in process `syz.0.2249'.
[ 146.786582][ T4790] netlink: 'syz.0.2256': attribute type 19 has an invalid length.
[ 147.115214][ T4817] SELinux: Context system_u:object_r:inetd_exec_t:s0 is not valid (left unmapped).
[ 147.579235][ T4860] netlink: 'syz.3.2290': attribute type 16 has an invalid length.
[ 147.663695][ T36] kauditd_printk_skb: 779 callbacks suppressed
[ 147.663713][ T36] audit: type=1400 audit(2000000032.276:1241): avc: denied { read write } for pid=525 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1
[ 147.726305][ T36] audit: type=1400 audit(2000000032.276:1242): avc: denied { read write } for pid=526 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1
[ 147.790278][ T36] audit: type=1400 audit(2000000032.276:1243): avc: denied { read write open } for pid=526 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1
[ 147.850278][ T36] audit: type=1400 audit(2000000032.276:1244): avc: denied { ioctl } for pid=526 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1
[ 147.886941][ T4883] netlink: 5 bytes leftover after parsing attributes in process `syz.1.2301'.
[ 147.900819][ T36] audit: type=1400 audit(2000000032.305:1245): avc: denied { read write open } for pid=525 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1
[ 147.955712][ T36] audit: type=1400 audit(2000000032.305:1246): avc: denied { ioctl } for pid=525 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1
[ 148.016947][ T36] audit: type=1400 audit(2000000032.314:1247): avc: denied { mounton } for pid=4866 comm="syz.3.2294" path="/456/file0" dev="tmpfs" ino=2305 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1
[ 148.105046][ T36] audit: type=1400 audit(2000000032.323:1248): avc: denied { mount } for pid=4866 comm="syz.3.2294" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1
[ 148.147200][ T524] audit: audit_backlog=65 > audit_backlog_limit=64
[ 148.163663][ T36] audit: type=1400 audit(2000000032.333:1249): avc: denied { read write } for pid=524 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1
[ 148.259730][ T805] usb 4-1: new high-speed USB device number 81 using dummy_hcd
[ 148.430139][ T805] usb 4-1: config 1 interface 0 altsetting 3 endpoint 0x81 has an invalid bInterval 159, changing to 11
[ 148.442219][ T805] usb 4-1: config 1 interface 0 altsetting 3 has 2 endpoint descriptors, different from the interface descriptor's value: 1
[ 148.456644][ T805] usb 4-1: config 1 interface 0 has no altsetting 0
[ 148.477901][ T805] usb 4-1: New USB device found, idVendor=0458, idProduct=0138, bcdDevice= 0.40
[ 148.481801][ T4922] EXT4-fs: Value of option "test_dummy_encryption" is unrecognized
[ 148.493790][ T805] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3
[ 148.505468][ T805] usb 4-1: Product: syz
[ 148.509835][ T805] usb 4-1: SerialNumber: syz
[ 148.610981][ T45] usb 2-1: new high-speed USB device number 78 using dummy_hcd
[ 148.770834][ T45] usb 2-1: Using ep0 maxpacket: 16
[ 148.776496][ T805] usbhid 4-1:1.0: can't add hid device: -71
[ 148.793397][ T805] usbhid 4-1:1.0: probe with driver usbhid failed with error -71
[ 148.796003][ T45] usb 2-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config
[ 148.811698][ T805] usb 4-1: USB disconnect, device number 81
[ 148.822365][ T45] usb 2-1: config 1 has 1 interface, different from the descriptor's value: 3
[ 148.867050][ T45] usb 2-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40
[ 148.877060][ T45] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3
[ 148.897991][ T45] usb 2-1: Product: syz
[ 148.902439][ T45] usb 2-1: Manufacturer: syz
[ 148.907411][ T45] usb 2-1: SerialNumber: syz
[ 148.946425][ T4936] netlink: 'syz.2.2327': attribute type 4 has an invalid length.
[ 149.046045][ T4940] incfs: Options parsing error. -22
[ 149.051582][ T4940] incfs: mount failed -22
[ 149.146681][ T4944] TCP: TCP_TX_DELAY enabled
[ 149.366602][ T45] usb 2-1: cannot find UAC_HEADER
[ 149.382015][ T45] snd-usb-audio 2-1:1.0: probe with driver snd-usb-audio failed with error -22
[ 149.406313][ T45] usb 2-1: USB disconnect, device number 78
[ 149.515193][ T694] udevd[694]: error opening ATTR{/sys/devices/platform/dummy_hcd.1/usb2/2-1/2-1:1.0/sound/card0/controlC0/../uevent} for writing: No such file or directory
[ 149.550088][ T4968] netlink: 12 bytes leftover after parsing attributes in process `syz.0.2343'.
[ 149.589967][ T4971] rust_binder: Transaction failed: BR_FAILED_REPLY { source: ENOENT } my_pid:927
[ 150.145815][ T65] usb 4-1: new high-speed USB device number 82 using dummy_hcd
[ 150.327038][ T65] usb 4-1: Using ep0 maxpacket: 8
[ 150.358199][ T65] usb 4-1: config 0 has an invalid interface number: 31 but max is 0
[ 150.371888][ T65] usb 4-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config
[ 150.396775][ T65] usb 4-1: config 0 has no interface number 0
[ 150.415962][ T65] usb 4-1: New USB device found, idVendor=046d, idProduct=08c3, bcdDevice=6b.16
[ 150.438955][ T65] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3
[ 150.456231][ T65] usb 4-1: Product: syz
[ 150.461125][ T65] usb 4-1: Manufacturer: syz
[ 150.470510][ T65] usb 4-1: SerialNumber: syz
[ 150.488686][ T65] usb 4-1: config 0 descriptor??
[ 150.605609][ T5048] netlink: 200 bytes leftover after parsing attributes in process `syz.1.2383'.
[ 150.615019][ T5048] tc_dump_action: action bad kind
[ 150.743891][ T65] usb 4-1: Found UVC 0.04 device syz (046d:08c3)
[ 150.750600][ T65] usb 4-1: No valid video chain found.
[ 150.983225][ T1138] usb 4-1: USB disconnect, device number 82
[ 151.086317][ T5078] netlink: 4 bytes leftover after parsing attributes in process `syz.1.2398'.
[ 152.011455][ T5148] netlink: 4 bytes leftover after parsing attributes in process `syz.3.2432'.
[ 152.168353][ T5163] netlink: 4 bytes leftover after parsing attributes in process `syz.1.2441'.
[ 152.373481][ T65] usb 4-1: new high-speed USB device number 83 using dummy_hcd
[ 152.547005][ T65] usb 4-1: config 220 has an invalid interface number: 76 but max is 2
[ 152.565361][ T65] usb 4-1: config 220 has an invalid descriptor of length 0, skipping remainder of the config
[ 152.577159][ T65] usb 4-1: config 220 has no interface number 2
[ 152.583557][ T65] usb 4-1: config 220 interface 1 altsetting 5 has an endpoint descriptor with address 0x6F, changing to 0xF
[ 152.625720][ T65] usb 4-1: config 220 interface 1 altsetting 5 endpoint 0xF has invalid wMaxPacketSize 0
[ 152.643594][ T5197] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2458'.
[ 152.649770][ T65] usb 4-1: config 220 interface 1 altsetting 5 has 1 endpoint descriptor, different from the interface descriptor's value: 12
[ 152.683153][ T65] usb 4-1: config 220 interface 0 has no altsetting 0
[ 152.703888][ T65] usb 4-1: config 220 interface 76 has no altsetting 0
[ 152.710802][ T65] usb 4-1: config 220 interface 1 has no altsetting 0
[ 152.730937][ T65] usb 4-1: New USB device found, idVendor=8086, idProduct=0b07, bcdDevice=6c.b9
[ 152.746533][ T65] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3
[ 152.762911][ T65] usb 4-1: Product: syz
[ 152.775790][ T65] usb 4-1: Manufacturer: syz
[ 152.782347][ T65] usb 4-1: SerialNumber: syz
[ 153.013887][ T36] kauditd_printk_skb: 852 callbacks suppressed
[ 153.013907][ T36] audit: type=1400 audit(2000000037.296:2073): avc: denied { ioctl } for pid=5210 comm="syz.1.2465" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[ 153.048825][ T36] audit: type=1400 audit(2000000037.296:2074): avc: denied { read write } for pid=525 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1
[ 153.075211][ T36] audit: type=1400 audit(2000000037.296:2075): avc: denied { read write open } for pid=525 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1
[ 153.103442][ T36] audit: type=1400 audit(2000000037.296:2076): avc: denied { ioctl } for pid=525 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1
[ 153.109473][ T65] usb 4-1: selecting invalid altsetting 0
[ 153.131373][ T36] audit: type=1400 audit(2000000037.352:2077): avc: denied { ioctl } for pid=5209 comm="syz.0.2466" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[ 153.136215][ T676] usb 1-1: new high-speed USB device number 80 using dummy_hcd
[ 153.162972][ T36] audit: type=1400 audit(2000000037.380:2078): avc: denied { ioctl } for pid=5210 comm="syz.1.2465" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[ 153.171785][ T45] usb 2-1: new high-speed USB device number 79 using dummy_hcd
[ 153.204854][ T65] usb 4-1: Found UVC 7.01 device syz (8086:0b07)
[ 153.213891][ T65] usb 4-1: No valid video chain found.
[ 153.222054][ T36] audit: type=1400 audit(2000000037.465:2079): avc: denied { create } for pid=5219 comm="syz.2.2469" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1
[ 153.243615][ T36] audit: type=1400 audit(2000000037.465:2080): avc: denied { write } for pid=5219 comm="syz.2.2469" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1
[ 153.267908][ T65] usb 4-1: USB disconnect, device number 83
[ 153.276772][ T36] audit: type=1400 audit(2000000037.465:2081): avc: denied { nlmsg_write } for pid=5219 comm="syz.2.2469" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1
[ 153.299995][ T36] audit: type=1400 audit(2000000037.474:2082): avc: denied { ioctl } for pid=5209 comm="syz.0.2466" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[ 153.365314][ T5224] netlink: 12 bytes leftover after parsing attributes in process `syz.2.2471'.
[ 153.375525][ T45] usb 2-1: Using ep0 maxpacket: 16
[ 153.386557][ T676] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7
[ 153.403588][ T45] usb 2-1: New USB device found, idVendor=17ef, idProduct=721e, bcdDevice=de.06
[ 153.414074][ T45] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3
[ 153.423379][ T676] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0
[ 153.434463][ T45] usb 2-1: Product: syz
[ 153.439035][ T45] usb 2-1: Manufacturer: syz
[ 153.445932][ T45] usb 2-1: SerialNumber: syz
[ 153.455696][ T676] usb 1-1: New USB device found, idVendor=18ec, idProduct=3288, bcdDevice=69.cf
[ 153.470737][ T676] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3
[ 153.494072][ T676] usb 1-1: Product: syz
[ 153.498768][ T45] r8152-cfgselector 2-1: Unknown version 0x0000
[ 153.514945][ T676] usb 1-1: Manufacturer: syz
[ 153.519642][ T676] usb 1-1: SerialNumber: syz
[ 153.524422][ T45] r8152-cfgselector 2-1: config 0 descriptor??
[ 153.540192][ T676] usb 1-1: config 0 descriptor??
[ 153.557352][ T676] usb 1-1: Found UVC 0.00 device syz (18ec:3288)
[ 153.564394][ T676] usb 1-1: No valid video chain found.
[ 153.908803][ T5244] rust_binder: BC_REQUEST_FREEZE_NOTIFICATION invalid ref 0
[ 153.935821][ T5244] rust_binder: Write failure EINVAL in pid:1161
[ 153.942108][ T45] usb 1-1: USB disconnect, device number 80
[ 154.115749][ T564] r8152-cfgselector 2-1: USB disconnect, device number 79
[ 154.582437][ T5287] netlink: 32 bytes leftover after parsing attributes in process `syz.0.2501'.
[ 154.681473][ T5294] kernel profiling enabled (shift: 17)
[ 155.507458][ T5367] netlink: 240 bytes leftover after parsing attributes in process `syz.2.2543'.
[ 155.519535][ T5365] netlink: 'syz.3.2542': attribute type 4 has an invalid length.
[ 155.527437][ T5365] netlink: 3657 bytes leftover after parsing attributes in process `syz.3.2542'.
[ 156.393907][ T5432] netlink: 80 bytes leftover after parsing attributes in process `syz.0.2574'.
[ 156.825229][ T5471] netlink: 8 bytes leftover after parsing attributes in process `syz.0.2591'.
[ 157.036302][ T5488] IPv6: NLM_F_CREATE should be specified when creating new route
[ 157.479330][ T5526] rust_binder: Write failure EFAULT in pid:1334
[ 157.553615][ T65] usb 3-1: new high-speed USB device number 79 using dummy_hcd
[ 157.586862][ T5536] rust_binder: Failure when writing BR_NOOP at beginning of buffer.
[ 157.586887][ T5536] rust_binder: Read failure Err(EFAULT) in pid:1260
[ 157.761356][ T65] usb 3-1: config 220 has an invalid interface number: 76 but max is 2
[ 157.780542][ T65] usb 3-1: config 220 contains an unexpected descriptor of type 0x2, skipping
[ 157.792208][ T65] usb 3-1: config 220 has an invalid descriptor of length 0, skipping remainder of the config
[ 157.807629][ T65] usb 3-1: config 220 has no interface number 2
[ 157.821156][ T65] usb 3-1: config 220 interface 1 altsetting 5 has 0 endpoint descriptors, different from the interface descriptor's value: 12
[ 157.836688][ T65] usb 3-1: config 220 interface 0 has no altsetting 0
[ 157.844570][ T65] usb 3-1: config 220 interface 76 has no altsetting 0
[ 157.852644][ T65] usb 3-1: config 220 interface 1 has no altsetting 0
[ 157.870428][ T65] usb 3-1: New USB device found, idVendor=8086, idProduct=0b07, bcdDevice=6c.b9
[ 157.879693][ T65] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3
[ 157.889480][ T65] usb 3-1: Product: syz
[ 157.893896][ T65] usb 3-1: Manufacturer: syz
[ 157.898602][ T65] usb 3-1: SerialNumber: syz
[ 158.043950][ T805] usb 4-1: new high-speed USB device number 84 using dummy_hcd
[ 158.150251][ T65] usb 3-1: selecting invalid altsetting 0
[ 158.157029][ T65] usb 3-1: Found UVC 7.01 device syz (8086:0b07)
[ 158.163829][ T65] usb 3-1: No valid video chain found.
[ 158.174683][ T65] usb 3-1: USB disconnect, device number 79
[ 158.203779][ T805] usb 4-1: Using ep0 maxpacket: 32
[ 158.212964][ T805] usb 4-1: config 4 has an invalid interface number: 128 but max is 0
[ 158.222223][ T805] usb 4-1: config 4 has no interface number 0
[ 158.228956][ T805] usb 4-1: config 4 interface 128 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7
[ 158.240386][ T805] usb 4-1: config 4 interface 128 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0
[ 158.251157][ T564] usb 2-1: new full-speed USB device number 80 using dummy_hcd
[ 158.259277][ T805] usb 4-1: New USB device found, idVendor=046d, idProduct=c314, bcdDevice= 0.40
[ 158.270425][ T805] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0
[ 158.283517][ T805] hub 4-1:4.128: USB hub found
[ 158.428317][ T36] kauditd_printk_skb: 820 callbacks suppressed
[ 158.428338][ T36] audit: type=1400 audit(2000000042.371:2903): avc: denied { ioctl } for pid=5571 comm="syz.1.2643" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[ 158.430310][ T564] usb 2-1: config 1 has too many interfaces: 235, using maximum allowed: 32
[ 158.435015][ T36] audit: type=1400 audit(2000000042.371:2904): avc: denied { ioctl } for pid=5571 comm="syz.1.2643" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[ 158.462865][ T564] usb 2-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config
[ 158.474026][ T36] audit: type=1400 audit(2000000042.371:2905): avc: denied { ioctl } for pid=5571 comm="syz.1.2643" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[ 158.497992][ T564] usb 2-1: config 1 has 2 interfaces, different from the descriptor's value: 235
[ 158.519337][ T36] audit: type=1400 audit(2000000042.371:2906): avc: denied { ioctl } for pid=5571 comm="syz.1.2643" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[ 158.535342][ T805] hub 4-1:4.128: 2 ports detected
[ 158.545355][ T36] audit: type=1400 audit(2000000042.371:2907): avc: denied { ioctl } for pid=5571 comm="syz.1.2643" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[ 158.570159][ T805] hub 4-1:4.128: Using single TT (err -22)
[ 158.576679][ T36] audit: type=1400 audit(2000000042.409:2908): avc: denied { ioctl } for pid=5571 comm="syz.1.2643" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[ 158.601512][ T564] usb 2-1: config 1 has no interface number 1
[ 158.608238][ T36] audit: type=1400 audit(2000000042.475:2909): avc: denied { ioctl } for pid=5555 comm="syz.3.2636" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[ 158.633083][ T564] usb 2-1: config 1 interface 105 altsetting 2 has 0 endpoint descriptors, different from the interface descriptor's value: 2
[ 158.640110][ T36] audit: type=1400 audit(2000000042.475:2910): avc: denied { ioctl } for pid=5555 comm="syz.3.2636" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[ 158.664980][ T564] usb 2-1: config 1 interface 105 has no altsetting 0
[ 158.713474][ T36] audit: type=1400 audit(2000000042.634:2911): avc: denied { ioctl } for pid=5571 comm="syz.1.2643" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[ 158.717429][ T564] usb 2-1: New USB device found, idVendor=20f4, idProduct=e05a, bcdDevice=6c.6d
[ 158.739897][ T36] audit: type=1400 audit(2000000042.634:2912): avc: denied { ioctl } for pid=5571 comm="syz.1.2643" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[ 158.751213][ T564] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3
[ 158.787534][ T805] hub 4-1:4.128: hub_hub_status failed (err = -71)
[ 158.795639][ T805] hub 4-1:4.128: config failed, can't get hub status (err -71)
[ 158.811183][ T564] usb 2-1: Product: syz
[ 158.816522][ T564] usb 2-1: Manufacturer: syz
[ 158.821187][ T564] usb 2-1: SerialNumber: syz
[ 158.827005][ T805] usb 4-1: USB disconnect, device number 84
[ 159.046970][ T5586] random: crng reseeded on system resumption
[ 159.083965][ T564] aqc111 2-1:1.105: probe with driver aqc111 failed with error -22
[ 159.119835][ T5586] Unrecognized hibernate image header format!
[ 159.126614][ T5586] PM: hibernation: Image mismatch: architecture specific data
[ 159.408609][ T65] usb 2-1: USB disconnect, device number 80
[ 159.615343][ T5623] bridge0: port 3(veth0_to_bridge) entered blocking state
[ 159.627820][ T5623] bridge0: port 3(veth0_to_bridge) entered disabled state
[ 159.642468][ T5623] veth0_to_bridge: entered allmulticast mode
[ 159.657447][ T5623] veth0_to_bridge: entered promiscuous mode
[ 159.666178][ T5623] bridge0: adding interface veth0_to_bridge with same address as a received packet (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 159.680454][ T5623] bridge0: port 3(veth0_to_bridge) entered blocking state
[ 159.688000][ T5623] bridge0: port 3(veth0_to_bridge) entered forwarding state
[ 160.103575][ T5658] netlink: 'syz.1.2683': attribute type 16 has an invalid length.
[ 160.581958][ T5695] kernel read not supported for file /policy (pid: 5695 comm: syz.0.2702)
[ 160.691383][ T5706] rust_binder: Transaction failed: BR_FAILED_REPLY { source: EINVAL } my_pid:1280
[ 160.790079][ T5719] rust_binder: Write failure EFAULT in pid:1282
[ 160.940135][ T5731] netlink: 288 bytes leftover after parsing attributes in process `syz.2.2718'.
[ 161.166735][ T5749] netlink: 'syz.3.2727': attribute type 27 has an invalid length.
[ 161.221039][ T5753] netlink: 'syz.1.2729': attribute type 1 has an invalid length.
[ 161.625247][ T564] usb 2-1: new high-speed USB device number 81 using dummy_hcd
[ 161.800657][ T564] usb 2-1: Using ep0 maxpacket: 16
[ 161.810814][ T564] usb 2-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config
[ 161.834357][ T564] usb 2-1: config 1 has 1 interface, different from the descriptor's value: 3
[ 161.863910][ T564] usb 2-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40
[ 161.881058][ T564] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3
[ 161.904338][ T564] usb 2-1: Product: syz
[ 161.908826][ T564] usb 2-1: Manufacturer: syz
[ 161.924760][ T564] usb 2-1: SerialNumber: syz
[ 162.195368][ T564] usb 2-1: 0:2 : does not exist
[ 162.202310][ T564] usb 2-1: unit 9 not found!
[ 162.245128][ T564] usb 2-1: 4:0: cannot get min/max values for control 1 (id 4)
[ 162.255788][ T564] usb 2-1: 4:0: cannot get min/max values for control 2 (id 4)
[ 162.277767][ T564] usb 2-1: USB disconnect, device number 81
[ 162.411752][ T566] udevd[566]: error opening ATTR{/sys/devices/platform/dummy_hcd.1/usb2/2-1/2-1:1.0/sound/card0/controlC0/../uevent} for writing: No such file or directory
[ 162.599222][ T5851] netlink: 4 bytes leftover after parsing attributes in process `syz.3.2778'.
[ 163.373273][ T5914] random: crng reseeded on system resumption
[ 163.657675][ T5938] netlink: 'syz.0.2820': attribute type 29 has an invalid length.
[ 163.776490][ T36] kauditd_printk_skb: 790 callbacks suppressed
[ 163.776509][ T36] audit: type=1400 audit(2000000047.381:3703): avc: denied { read write open } for pid=525 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1
[ 163.842241][ T36] audit: type=1400 audit(2000000047.400:3704): avc: denied { read write } for pid=526 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1
[ 163.878153][ T5955] netlink: 'syz.1.2829': attribute type 1 has an invalid length.
[ 163.898375][ T36] audit: type=1400 audit(2000000047.400:3705): avc: denied { read write open } for pid=526 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1
[ 163.949878][ T36] audit: type=1400 audit(2000000047.400:3706): avc: denied { ioctl } for pid=526 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1
[ 163.977630][ T36] audit: type=1400 audit(2000000047.428:3707): avc: denied { ioctl } for pid=525 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1
[ 164.009440][ T36] audit: type=1400 audit(2000000047.438:3708): avc: denied { read write } for pid=524 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1
[ 164.050755][ T36] audit: type=1400 audit(2000000047.438:3709): avc: denied { read write open } for pid=524 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1
[ 164.107505][ T36] audit: type=1400 audit(2000000047.438:3710): avc: denied { ioctl } for pid=524 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1
[ 164.142288][ T36] audit: type=1400 audit(2000000047.438:3711): avc: denied { read write } for pid=527 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1
[ 164.220727][ T36] audit: type=1400 audit(2000000047.438:3712): avc: denied { read write open } for pid=527 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1
[ 164.677967][ T6013] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=123 sclass=netlink_route_socket pid=6013 comm=syz.3.2855
[ 164.940631][ T6031] rust_binder: Failure when writing BR_NOOP at beginning of buffer.
[ 164.940657][ T6031] rust_binder: Read failure Err(EFAULT) in pid:1366
[ 165.078653][ T693] usb 4-1: new high-speed USB device number 85 using dummy_hcd
[ 165.161654][ T6048] netlink: 8 bytes leftover after parsing attributes in process `syz.2.2874'.
[ 165.262950][ T693] usb 4-1: config 220 has an invalid interface number: 76 but max is 2
[ 165.281170][ T693] usb 4-1: config 220 has an invalid descriptor of length 0, skipping remainder of the config
[ 165.330966][ T693] usb 4-1: config 220 has no interface number 2
[ 165.352483][ T693] usb 4-1: config 220 interface 1 altsetting 5 has 0 endpoint descriptors, different from the interface descriptor's value: 12
[ 165.376861][ T693] usb 4-1: config 220 interface 0 has no altsetting 0
[ 165.383860][ T693] usb 4-1: config 220 interface 76 has no altsetting 0
[ 165.395749][ T693] usb 4-1: config 220 interface 1 has no altsetting 0
[ 165.413529][ T693] usb 4-1: New USB device found, idVendor=8086, idProduct=0b07, bcdDevice=6c.b9
[ 165.430409][ T693] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3
[ 165.459081][ T693] usb 4-1: Product: syz
[ 165.473023][ T693] usb 4-1: Manufacturer: syz
[ 165.477851][ T693] usb 4-1: SerialNumber: syz
[ 165.737860][ T693] usb 4-1: Found UVC 7.01 device syz (8086:0b07)
[ 165.760806][ T693] usb 4-1: No valid video chain found.
[ 165.782228][ T693] usb 4-1: selecting invalid altsetting 0
[ 165.805090][ T6090] usb usb1: usbfs: interface 0 claimed by hub while 'syz.2.2894' sets config #0
[ 165.805618][ T693] usb 4-1: USB disconnect, device number 85
[ 165.963324][ T805] usb 2-1: new full-speed USB device number 82 using dummy_hcd
[ 166.158220][ T805] usb 2-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 10
[ 166.176982][ T805] usb 2-1: config 1 interface 0 altsetting 0 endpoint 0x3 has invalid wMaxPacketSize 0
[ 166.178861][ T6113] netlink: 4 bytes leftover after parsing attributes in process `syz.0.2906'.
[ 166.212454][ T805] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a5, bcdDevice= 0.40
[ 166.222216][ T805] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=1
[ 166.240459][ T805] usb 2-1: SerialNumber: syz
[ 166.264064][ T805] cdc_ether 2-1:1.0: probe with driver cdc_ether failed with error -22
[ 166.285504][ T805] usb-storage 2-1:1.0: USB Mass Storage device detected
[ 166.305846][ T805] usb-storage 2-1:1.0: Quirks match for vid 0525 pid a4a5: 10000
[ 166.327216][ T805] scsi host1: usb-storage 2-1:1.0
[ 167.818678][ T6200] netlink: 12 bytes leftover after parsing attributes in process `syz.2.2947'.
[ 167.830466][ T6200] bridge0: port 1(bridge_slave_0) entered disabled state
[ 167.842829][ T6200] bridge_slave_0 (unregistering): left allmulticast mode
[ 167.850847][ T6200] bridge_slave_0 (unregistering): left promiscuous mode
[ 167.871290][ T6200] bridge0: port 1(bridge_slave_0) entered disabled state
[ 168.331785][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 168.346437][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 168.361627][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 168.374833][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 168.387666][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 168.400118][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 168.412541][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 168.425246][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 168.438265][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 168.451003][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 169.126801][ T36] kauditd_printk_skb: 656 callbacks suppressed
[ 169.126823][ T36] audit: type=1400 audit(2000000052.401:4369): avc: denied { read } for pid=6266 comm="syz.1.2979" name="event1" dev="devtmpfs" ino=193 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1
[ 169.267707][ T36] audit: type=1400 audit(2000000052.457:4370): avc: denied { read open } for pid=6266 comm="syz.1.2979" path="/dev/input/event1" dev="devtmpfs" ino=193 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1
[ 169.381525][ T6276] rust_binder: Write failure EFAULT in pid:1491
[ 169.386148][ T36] audit: type=1400 audit(2000000052.457:4371): avc: denied { ioctl } for pid=6266 comm="syz.1.2979" path="/dev/input/event1" dev="devtmpfs" ino=193 ioctlcmd=0x4504 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1
[ 169.524659][ T36] audit: type=1400 audit(2000000052.504:4372): avc: denied { read write } for pid=524 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1
[ 169.629924][ T36] audit: type=1400 audit(2000000052.504:4373): avc: denied { read write open } for pid=524 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1
[ 169.726137][ T6288] netlink: 57 bytes leftover after parsing attributes in process `syz.0.2991'.
[ 169.749602][ T36] audit: type=1400 audit(2000000052.504:4374): avc: denied { ioctl } for pid=524 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1
[ 169.870693][ T36] audit: type=1400 audit(2000000052.513:4375): avc: denied { read write } for pid=527 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1
[ 169.970990][ T36] audit: type=1400 audit(2000000052.513:4376): avc: denied { read write open } for pid=527 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1
[ 170.120230][ T36] audit: type=1400 audit(2000000052.513:4377): avc: denied { ioctl } for pid=527 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1
[ 170.201174][ T524] audit: audit_backlog=65 > audit_backlog_limit=64
[ 170.666226][ T693] usb 2-1: USB disconnect, device number 82
[ 171.147050][ T6346] netlink: 'syz.1.3019': attribute type 1 has an invalid length.
[ 172.561103][ T45] usb 4-1: new full-speed USB device number 86 using dummy_hcd
[ 172.763096][ T45] usb 4-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config
[ 172.784339][ T45] usb 4-1: config 1 has 1 interface, different from the descriptor's value: 3
[ 172.815394][ T45] usb 4-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.00
[ 172.838517][ T6425] rust_binder: Write failure EFAULT in pid:1520
[ 172.854762][ T45] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=3
[ 172.874145][ T45] usb 4-1: SerialNumber: syz
[ 172.899337][ T45] usb 4-1: 0:2 : does not exist
[ 172.939606][ T6428] SELinux: policydb table sizes (0,0) do not match mine (8,7)
[ 172.947971][ T6428] SELinux: failed to load policy
[ 173.105632][ T693] usb 3-1: new high-speed USB device number 80 using dummy_hcd
[ 173.381480][ T65] usb 4-1: USB disconnect, device number 86
[ 173.470137][ T693] usb 3-1: Using ep0 maxpacket: 32
[ 173.608238][ T693] usb 3-1: config 0 has an invalid interface number: 191 but max is 0
[ 173.619069][ T693] usb 3-1: config 0 has no interface number 0
[ 173.637929][ T693] usb 3-1: config 0 interface 191 altsetting 0 bulk endpoint 0x82 has invalid maxpacket 24
[ 173.669563][ C0] net_ratelimit: 93987 callbacks suppressed
[ 173.669582][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 173.688688][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 173.701058][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 173.713731][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 173.726797][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 173.739449][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 173.751747][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 173.765301][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 173.778195][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 173.792090][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 174.081439][ T693] usb 3-1: New USB device found, idVendor=0789, idProduct=0160, bcdDevice=2c.d1
[ 174.093340][ T693] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3
[ 174.116928][ T693] usb 3-1: Product: syz
[ 174.123330][ T693] usb 3-1: Manufacturer: syz
[ 174.139107][ T693] usb 3-1: SerialNumber: syz
[ 174.158560][ T693] usb 3-1: config 0 descriptor??
[ 174.192087][ T6426] raw-gadget.1 gadget.2: fail, usb_ep_enable returned -22
[ 174.366744][ T6484] netlink: 'syz.0.3085': attribute type 15 has an invalid length.
[ 174.486232][ T36] kauditd_printk_skb: 492 callbacks suppressed
[ 174.486251][ T36] audit: type=1400 audit(2000000057.439:4862): avc: denied { create } for pid=6487 comm="syz.0.3087" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1
[ 174.526183][ T6426] raw-gadget.1 gadget.2: fail, usb_ep_enable returned -22
[ 174.587129][ T36] audit: type=1400 audit(2000000057.476:4863): avc: denied { ioctl } for pid=6487 comm="syz.0.3087" path="socket:[23894]" dev="sockfs" ino=23894 ioctlcmd=0x5411 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1
[ 174.660816][ T36] audit: type=1400 audit(2000000057.476:4864): avc: denied { ioctl } for pid=6423 comm="syz.2.3044" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[ 174.745109][ T36] audit: type=1400 audit(2000000057.476:4865): avc: denied { ioctl } for pid=6423 comm="syz.2.3044" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5506 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[ 174.783077][ T693] asix 3-1:0.191 (unnamed net_device) (uninitialized): Failed to read reg index 0x0000: -71
[ 174.847962][ T36] audit: type=1400 audit(2000000057.476:4866): avc: denied { ioctl } for pid=6423 comm="syz.2.3044" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5506 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[ 174.924899][ T36] audit: type=1400 audit(2000000057.476:4867): avc: denied { ioctl } for pid=6423 comm="syz.2.3044" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5505 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[ 174.994643][ T36] audit: type=1400 audit(2000000057.476:4868): avc: denied { ioctl } for pid=6423 comm="syz.2.3044" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5505 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[ 175.023624][ T36] audit: type=1400 audit(2000000057.486:4869): avc: denied { create } for pid=6490 comm="syz.1.3089" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1
[ 175.034654][ T693] asix 3-1:0.191: probe with driver asix failed with error -71
[ 175.081693][ T693] usb 3-1: USB disconnect, device number 80
[ 175.083347][ T36] audit: type=1400 audit(2000000057.495:4870): avc: denied { ioctl } for pid=6423 comm="syz.2.3044" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5504 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[ 175.129049][ T36] audit: type=1400 audit(2000000057.495:4871): avc: denied { write } for pid=6490 comm="syz.1.3089" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1
[ 175.235299][ T6514] sit0: entered promiscuous mode
[ 175.260035][ T6514] netlink: 'syz.3.3100': attribute type 1 has an invalid length.
[ 175.289287][ T6514] netlink: 1 bytes leftover after parsing attributes in process `syz.3.3100'.
[ 177.625926][ T6627] No source specified
[ 178.142947][ T6656] netlink: 12 bytes leftover after parsing attributes in process `syz.1.3167'.
[ 178.147756][ T6653] netlink: 'syz.2.3152': attribute type 12 has an invalid length.
[ 178.284427][ T6662] netlink: 'syz.3.3171': attribute type 25 has an invalid length.
[ 178.612642][ T6673] netlink: 37 bytes leftover after parsing attributes in process `syz.0.3177'.
[ 178.889305][ T6688] netlink: 20 bytes leftover after parsing attributes in process `syz.0.3185'.
[ 179.009555][ C0] net_ratelimit: 92087 callbacks suppressed
[ 179.009577][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 179.028194][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 179.040625][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 179.053930][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 179.067092][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 179.080296][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 179.093596][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 179.106033][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 179.118877][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 179.131772][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 179.295899][ T6708] rust_binder: BC_REQUEST_DEATH_NOTIFICATION invalid ref 3
[ 179.812001][ T6708] rust_binder: Transaction failed: BR_FAILED_REPLY { source: EINVAL } my_pid:1329
[ 179.875496][ T36] kauditd_printk_skb: 439 callbacks suppressed
[ 179.875520][ T36] audit: type=1400 audit(2000000062.496:5311): avc: denied { read write open } for pid=526 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1
[ 182.251185][ T36] audit: type=1400 audit(2000000062.533:5312): avc: denied { ioctl } for pid=526 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1
[ 183.627253][ C0] sched: DL replenish lagged too much
[ 184.349584][ C1] net_ratelimit: 137204 callbacks suppressed
[ 184.349608][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 184.349651][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 184.356740][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 184.369784][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 184.382607][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 184.395786][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 184.408341][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 184.421200][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 184.433316][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 184.446802][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 187.997841][ T36] audit: type=1400 audit(2000000062.655:5313): avc: denied { read write } for pid=525 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1
[ 188.412016][ T36] audit: type=1400 audit(2000000062.655:5314): avc: denied { read write open } for pid=525 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1
[ 189.689569][ C0] net_ratelimit: 141694 callbacks suppressed
[ 189.689593][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 189.689606][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 189.689669][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 189.696362][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 189.708831][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 189.721147][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 189.733422][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 189.745748][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 189.758426][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 189.770363][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 190.297565][ T36] audit: type=1400 audit(2000000062.655:5315): avc: denied { ioctl } for pid=525 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1
[ 190.441686][ T6712] netlink: 328 bytes leftover after parsing attributes in process `syz.3.3199'.
[ 190.959040][ T36] audit: type=1400 audit(2000000063.087:5316): avc: denied { read write } for pid=527 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1
[ 192.568621][ T36] audit: type=1400 audit(2000000063.087:5317): avc: denied { read write open } for pid=527 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1
[ 193.559016][ T36] audit: type=1400 audit(2000000063.087:5318): avc: denied { ioctl } for pid=527 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1
[ 195.029566][ C0] net_ratelimit: 138157 callbacks suppressed
[ 195.029591][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 195.029618][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 195.036416][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 195.050397][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 195.063384][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 195.076110][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 195.090047][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 195.103063][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 195.116056][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 195.129146][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 195.276149][ T36] audit: type=1400 audit(2000000063.744:5319): avc: denied { read write } for pid=524 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1
[ 200.369621][ C1] net_ratelimit: 139666 callbacks suppressed
[ 200.369646][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 200.369722][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 200.376296][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 200.389615][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 200.402323][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 200.414953][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 200.427081][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 200.439793][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 200.452086][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 200.464398][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 200.505497][ T36] audit: type=1400 audit(2000000063.744:5320): avc: denied { read write open } for pid=524 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1
[ 203.749613][ T36] audit: type=1400 audit(2000000063.744:5321): avc: denied { ioctl } for pid=524 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1
[ 205.274496][ T36] audit: type=1400 audit(2000000075.218:5322): avc: denied { create } for pid=6713 comm="syz.0.3196" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1
[ 205.709605][ C0] net_ratelimit: 141453 callbacks suppressed
[ 205.709631][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 205.709668][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 205.715889][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 205.728358][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 205.740802][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 205.753064][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 205.765822][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 205.778301][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 205.790970][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 205.803323][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 206.972024][ T36] audit: type=1400 audit(2000000075.246:5323): avc: denied { read write } for pid=527 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1
[ 211.049630][ C1] net_ratelimit: 138157 callbacks suppressed
[ 211.049653][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 211.049718][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 211.056004][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 211.068278][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 211.081677][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 211.094782][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 211.107777][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 211.120961][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 211.133619][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 211.146428][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 211.252382][ T36] audit: type=1400 audit(2000000075.246:5324): avc: denied { read write open } for pid=527 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1
[ 211.697180][ T36] audit: type=1400 audit(2000000075.246:5325): avc: denied { ioctl } for pid=527 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1
[ 214.056644][ T36] audit: type=1400 audit(2000000077.235:5326): avc: denied { read write } for pid=526 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1
[ 216.267959][ T36] audit: type=1400 audit(2000000077.235:5327): avc: denied { read write open } for pid=526 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1
[ 216.389646][ C1] net_ratelimit: 129482 callbacks suppressed
[ 216.389670][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 216.389703][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 216.396020][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 216.409021][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 216.421378][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 216.434163][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 216.446210][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 216.458528][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 216.470752][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 216.483290][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 219.779641][ T36] audit: type=1400 audit(2000000077.235:5328): avc: denied { ioctl } for pid=526 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1
[ 221.729617][ C1] net_ratelimit: 142208 callbacks suppressed
[ 221.729640][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 221.729659][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 221.736224][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 221.749255][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 221.761489][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 221.774031][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 221.786539][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 221.798818][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 221.811329][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 221.823626][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 224.193385][ T36] audit: type=1400 audit(2000000083.615:5329): avc: denied { read write } for pid=524 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1
[ 226.366844][ T36] audit: type=1400 audit(2000000083.615:5330): avc: denied { read write open } for pid=524 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1
[ 226.708509][ T36] audit: type=1400 audit(2000000084.056:5331): avc: denied { ioctl } for pid=524 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1
[ 227.069649][ C1] net_ratelimit: 138723 callbacks suppressed
[ 227.069675][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 227.069784][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 227.076331][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 227.088596][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 227.101181][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 227.113765][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 227.126837][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 227.139573][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 227.152200][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 227.165050][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 230.292640][ T36] audit: type=1400 audit(2000000086.223:5332): avc: denied { read write } for pid=525 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1
[ 232.409639][ C0] net_ratelimit: 137336 callbacks suppressed
[ 232.409665][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 232.409694][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 232.416024][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 232.429074][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 232.442664][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 232.456316][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 232.469213][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 232.481474][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 232.494669][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 232.507404][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 234.863558][ T36] audit: type=1400 audit(2000000086.223:5333): avc: denied { read write open } for pid=525 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1
[ 235.502505][ T36] audit: type=1400 audit(2000000086.223:5334): avc: denied { ioctl } for pid=525 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1
[ 237.749648][ C1] net_ratelimit: 136947 callbacks suppressed
[ 237.749670][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 237.749782][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 237.756518][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 237.769205][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 237.781850][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 237.794428][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 237.806775][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 237.819338][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 237.831281][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 237.844645][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 238.805385][ T36] audit: type=1400 audit(2000000092.415:5335): avc: denied { execmem } for pid=6718 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1
[ 239.809887][ T36] audit: type=1400 audit(2000000093.278:5336): avc: denied { execmem } for pid=6719 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1
[ 243.089661][ C1] net_ratelimit: 133454 callbacks suppressed
[ 243.089685][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 243.089853][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 243.096443][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 243.109517][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 243.122352][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 243.134887][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 243.146926][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 243.160439][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 243.174098][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 243.187406][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 245.329632][ T36] audit: type=1400 audit(2000000093.785:5337): avc: denied { create } for pid=6720 comm="syz.3.3200" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1
[ 248.047020][ T36] audit: type=1400 audit(2000000094.742:5338): avc: denied { read write } for pid=527 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1
[ 248.175479][ T36] audit: type=1400 audit(2000000094.742:5339): avc: denied { read write open } for pid=527 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1
[ 248.429669][ C0] net_ratelimit: 135877 callbacks suppressed
[ 248.429704][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 248.429743][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 248.436357][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 248.449651][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 248.463103][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 248.475891][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 248.489219][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 248.501686][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 248.514614][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 248.526875][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 249.997278][ T36] audit: type=1400 audit(2000000094.742:5340): avc: denied { ioctl } for pid=527 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1
[ 250.370569][ T36] audit: type=1400 audit(2000000097.566:5341): avc: denied { execmem } for pid=6724 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1
[ 253.769700][ C0] net_ratelimit: 132168 callbacks suppressed
[ 253.769724][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 253.769769][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 253.776816][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 253.790613][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 253.803698][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 253.816046][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 253.828797][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 253.841725][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 253.856083][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 253.869355][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 254.921179][ T36] audit: type=1400 audit(2000000100.408:5342): avc: denied { execmem } for pid=6725 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1
[ 257.899908][ T36] audit: type=1400 audit(2000000128.254:5343): avc: denied { read } for pid=6727 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1
[ 259.109753][ C0] net_ratelimit: 139590 callbacks suppressed
[ 259.109778][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 259.109833][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 259.116260][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 259.128795][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 259.140995][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 259.153920][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 259.167088][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 259.179803][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 259.192562][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 259.205312][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 259.771739][ T36] audit: type=1400 audit(2000000128.254:5344): avc: denied { read open } for pid=6727 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1
[ 261.355532][ T36] audit: type=1400 audit(2000000128.676:5345): avc: denied { mounton } for pid=6727 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1
[ 261.413228][ T36] audit: type=1400 audit(2000000128.958:5346): avc: denied { read } for pid=6728 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1
[ 262.254999][ T36] audit: type=1400 audit(2000000128.958:5347): avc: denied { read open } for pid=6728 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1
[ 263.385036][ T36] audit: type=1400 audit(2000000128.958:5348): avc: denied { mounton } for pid=6728 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1
[ 264.449737][ C1] net_ratelimit: 138183 callbacks suppressed
[ 264.449765][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 264.449788][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 264.456265][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 264.468673][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 264.481138][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 264.493124][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 264.505542][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 264.518747][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 264.530973][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 264.543671][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 267.237145][ T36] audit: type=1400 audit(2000000128.967:5349): avc: denied { read } for pid=6726 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1
[ 268.405118][ T36] audit: type=1400 audit(2000000128.967:5350): avc: denied { read open } for pid=6726 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1
[ 269.789692][ C1] net_ratelimit: 139216 callbacks suppressed
[ 269.789718][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 269.789876][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 269.795900][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 269.807981][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 269.820801][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 269.833354][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 269.845949][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 269.859569][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 269.871967][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 269.884518][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 270.792805][ T36] audit: type=1400 audit(2000000128.967:5351): avc: denied { mounton } for pid=6726 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1
[ 270.899084][ T36] audit: type=1400 audit(2000000129.399:5352): avc: denied { sys_module } for pid=6728 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1
[ 271.016125][ T36] audit: type=1400 audit(2000000129.418:5353): avc: denied { sys_module } for pid=6727 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1
[ 271.560314][ T36] audit: type=1400 audit(2000000138.134:5354): avc: denied { sys_module } for pid=6726 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1
[ 272.008985][ T36] audit: type=1400 audit(2000000140.038:5355): avc: denied { sys_module } for pid=6728 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1
[ 273.545370][ T36] audit: type=1400 audit(2000000140.047:5356): avc: denied { sys_module } for pid=6728 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1
[ 273.852160][ T36] audit: type=1400 audit(2000000140.066:5357): avc: denied { sys_module } for pid=6728 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1
[ 274.001295][ T36] audit: type=1400 audit(2000000140.498:5358): avc: denied { sys_module } for pid=6726 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1
[ 274.053858][ T36] audit: type=1400 audit(2000000140.563:5359): avc: denied { sys_module } for pid=6726 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1
[ 274.238239][ T36] audit: type=1400 audit(2000000140.573:5360): avc: denied { sys_module } for pid=6727 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1
[ 274.640733][ T36] audit: type=1400 audit(2000000140.582:5361): avc: denied { sys_module } for pid=6727 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1
[ 275.129739][ C1] net_ratelimit: 138704 callbacks suppressed
[ 275.129763][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 275.129795][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 275.135953][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 275.148604][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 275.162391][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 275.175390][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 275.188165][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 275.201541][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 275.216855][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 275.230066][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 275.492455][ T36] audit: type=1400 audit(2000000140.685:5362): avc: denied { sys_module } for pid=6726 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1
[ 276.878720][ T36] audit: type=1400 audit(2000000140.695:5363): avc: denied { sys_module } for pid=6727 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1
[ 278.521831][ T36] audit: type=1400 audit(2000000144.429:5364): avc: denied { read } for pid=6729 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1
[ 280.469762][ C0] net_ratelimit: 137662 callbacks suppressed
[ 280.469786][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 280.469831][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 280.476801][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 280.489741][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 280.502133][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 280.514611][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 280.527133][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 280.539539][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 280.552130][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 280.565329][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 282.709738][ T36] audit: type=1400 audit(2000000144.429:5365): avc: denied { read open } for pid=6729 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1
[ 283.326753][ T36] audit: type=1400 audit(2000000145.527:5366): avc: denied { mounton } for pid=6729 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1
[ 283.892702][ T36] audit: type=1400 audit(2000000146.146:5367): avc: denied { sys_module } for pid=6729 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1
[ 283.946172][ T36] audit: type=1400 audit(2000000146.240:5368): avc: denied { sys_module } for pid=6729 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1
[ 284.095640][ T36] audit: type=1400 audit(2000000147.947:5369): avc: denied { sys_module } for pid=6729 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1
[ 285.809766][ C1] net_ratelimit: 135483 callbacks suppressed
[ 285.809793][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 285.809828][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 285.816693][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 285.829578][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 285.843082][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 285.857630][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 285.872084][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 285.885986][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 285.902589][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 285.916406][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 289.063522][ T36] audit: type=1400 audit(2000000147.956:5370): avc: denied { sys_module } for pid=6729 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1
[ 291.002235][ T36] audit: type=1400 audit(2000000152.779:5371): avc: denied { execmem } for pid=6730 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1
[ 291.149783][ C0] net_ratelimit: 132572 callbacks suppressed
[ 291.149813][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 291.149856][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 291.157039][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 291.172300][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 291.190704][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 291.205419][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 291.220504][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 291.233784][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 291.247311][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 291.262108][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 291.609826][ T36] audit: type=1400 audit(2000000159.994:5372): avc: denied { execmem } for pid=6731 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1
[ 292.089535][ T36] audit: type=1400 audit(2000000167.415:5373): avc: denied { execmem } for pid=6732 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1
[ 294.072102][ T36] audit: type=1400 audit(2000000169.019:5374): avc: denied { execmem } for pid=6733 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1
[ 296.489776][ C1] net_ratelimit: 132469 callbacks suppressed
[ 296.489800][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 296.489824][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 296.496324][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 296.508671][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 296.522847][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 296.536545][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 296.549282][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 296.562573][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 296.574922][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 296.587054][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 301.829771][ C1] net_ratelimit: 142547 callbacks suppressed
[ 301.829797][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 301.829974][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 301.836410][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 301.849291][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 301.862140][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 301.874652][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 301.887408][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 301.900004][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 301.912637][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 301.925774][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 307.169782][ C1] net_ratelimit: 139079 callbacks suppressed
[ 307.169807][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 307.169808][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 307.169863][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 307.177368][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 307.192332][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 307.207721][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 307.220956][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 307.236706][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 307.250292][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 307.267672][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 308.292096][ T36] audit: type=1400 audit(2000000182.342:5375): avc: denied { read } for pid=6735 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1
[ 310.038368][ T36] audit: type=1400 audit(2000000182.342:5376): avc: denied { read open } for pid=6735 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1
[ 312.509776][ C1] net_ratelimit: 129805 callbacks suppressed
[ 312.509801][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 312.509858][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 312.516467][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 312.529395][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 312.542271][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 312.554947][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 312.567001][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 312.579617][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 312.591860][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 312.604665][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 312.771337][ T36] audit: type=1400 audit(2000000187.173:5377): avc: denied { read } for pid=6736 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1
[ 312.990486][ T36] audit: type=1400 audit(2000000187.230:5378): avc: denied { read open } for pid=6736 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1
[ 313.332833][ T36] audit: type=1400 audit(2000000187.230:5379): avc: denied { mounton } for pid=6735 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1
[ 313.533750][ T36] audit: type=1400 audit(2000000187.323:5380): avc: denied { mounton } for pid=6736 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1
[ 313.607713][ T36] audit: type=1400 audit(2000000187.333:5381): avc: denied { sys_module } for pid=6735 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1
[ 315.441993][ T36] audit: type=1400 audit(2000000187.567:5382): avc: denied { read } for pid=6737 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1
[ 317.232944][ T36] audit: type=1400 audit(2000000187.567:5383): avc: denied { read open } for pid=6737 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1
[ 317.595025][ T36] audit: type=1400 audit(2000000187.595:5384): avc: denied { mounton } for pid=6737 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1
[ 317.849778][ C1] net_ratelimit: 140041 callbacks suppressed
[ 317.849804][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 317.849922][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 317.856083][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 317.868296][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 317.880456][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 317.892875][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 317.905226][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 317.917543][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 317.930324][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 317.942758][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 322.946487][ T36] audit: type=1400 audit(2000000187.595:5385): avc: denied { sys_module } for pid=6737 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1
[ 323.189797][ C1] net_ratelimit: 156901 callbacks suppressed
[ 323.189823][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 323.189824][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 323.189878][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 323.196370][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 323.209098][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 323.221652][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 323.233805][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 323.246339][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 323.258769][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 323.270841][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 327.540015][ T36] audit: type=1400 audit(2000000187.605:5386): avc: denied { read } for pid=6738 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1
[ 328.529849][ C1] net_ratelimit: 160755 callbacks suppressed
[ 328.529874][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 328.529894][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 328.536329][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 328.549543][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 328.561858][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 328.574385][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 328.586893][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 328.599115][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 328.611374][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 328.623655][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 330.782478][ T36] audit: type=1400 audit(2000000187.605:5387): avc: denied { read open } for pid=6738 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1
[ 332.272774][ T36] audit: type=1400 audit(2000000187.605:5388): avc: denied { mounton } for pid=6738 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1
[ 332.469388][ T36] audit: type=1400 audit(2000000187.642:5389): avc: denied { sys_module } for pid=6736 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1
[ 333.869839][ C1] net_ratelimit: 154246 callbacks suppressed
[ 333.869864][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 333.869948][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 333.876563][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 333.888771][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 333.901119][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 333.913555][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 333.925814][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 333.938395][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 333.950990][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 333.963481][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 334.360976][ T36] audit: type=1400 audit(2000000187.689:5390): avc: denied { sys_module } for pid=6738 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1
[ 339.209842][ C1] net_ratelimit: 152838 callbacks suppressed
[ 339.209869][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 339.210117][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 339.216532][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 339.228817][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 339.241595][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 339.253841][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 339.266198][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 339.279639][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 339.292478][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 339.304738][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 343.033197][ T36] audit: type=1400 audit(2000000215.563:5391): avc: denied { sys_module } for pid=6738 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1
[ 344.139407][ T36] audit: type=1400 audit(2000000216.605:5392): avc: denied { sys_module } for pid=6737 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1
[ 344.549854][ C1] net_ratelimit: 138355 callbacks suppressed
[ 344.549878][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 344.549880][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 344.549935][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 344.556223][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 344.568489][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 344.581016][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 344.593410][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 344.605578][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 344.618488][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 344.631304][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 345.474759][ T36] audit: type=1400 audit(2000000217.852:5393): avc: denied { execmem } for pid=6739 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1
[ 349.889854][ C1] net_ratelimit: 140731 callbacks suppressed
[ 349.889879][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 349.889887][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 349.889937][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 349.896231][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 349.909038][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 349.921586][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 349.934375][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 349.946920][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 349.959374][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 349.971555][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 351.934827][ T36] audit: type=1400 audit(2000000223.913:5394): avc: denied { execmem } for pid=6740 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1
[ 355.229883][ C1] net_ratelimit: 143939 callbacks suppressed
[ 355.229907][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 355.229947][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 355.236344][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 355.248627][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 355.260769][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 355.273262][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 355.285527][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 355.297745][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 355.309969][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 355.322202][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 360.569901][ C1] net_ratelimit: 143014 callbacks suppressed
[ 360.569926][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 360.570087][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 360.576281][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 360.588388][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 360.600479][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 360.615054][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 360.627540][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 360.639839][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 360.651972][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 360.664270][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 361.594728][ T36] audit: type=1400 audit(2000000232.948:5395): avc: denied { read } for pid=6742 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1
[ 363.138294][ T36] audit: type=1400 audit(2000000233.173:5396): avc: denied { read open } for pid=6742 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1
[ 363.704953][ T36] audit: type=1400 audit(2000000233.201:5397): avc: denied { mounton } for pid=6742 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1
[ 364.674505][ T36] audit: type=1400 audit(2000000233.774:5398): avc: denied { execmem } for pid=6741 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1
[ 364.920650][ T36] audit: type=1400 audit(2000000234.036:5399): avc: denied { execmem } for pid=6743 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1
[ 365.909885][ C1] net_ratelimit: 141066 callbacks suppressed
[ 365.909909][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 365.909952][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 365.916203][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 365.928862][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 365.941344][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 365.953874][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 365.966091][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 365.978644][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 365.990913][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 366.003011][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 366.321425][ T36] audit: type=1400 audit(2000000234.168:5400): avc: denied { sys_module } for pid=6742 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1
[ 366.625345][ T36] audit: type=1400 audit(2000000234.505:5401): avc: denied { read } for pid=6744 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1
[ 370.078507][ T36] audit: type=1400 audit(2000000234.505:5402): avc: denied { read open } for pid=6744 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1
[ 370.334283][ T36] audit: type=1400 audit(2000000234.505:5403): avc: denied { mounton } for pid=6744 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1
[ 370.717387][ T36] audit: type=1400 audit(2000000234.618:5404): avc: denied { sys_module } for pid=6744 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1
[ 370.803011][ T36] audit: type=1400 audit(2000000238.268:5405): avc: denied { read } for pid=6745 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1
[ 371.219040][ T36] audit: type=1400 audit(2000000238.268:5406): avc: denied { read open } for pid=6745 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1
[ 371.249890][ C1] net_ratelimit: 141335 callbacks suppressed
[ 371.249914][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 371.249955][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 371.256178][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 371.268623][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 371.280788][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 371.293223][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 371.305750][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 371.318290][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 371.330181][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 371.342387][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 372.455444][ T36] audit: type=1400 audit(2000000238.268:5407): avc: denied { mounton } for pid=6745 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1
[ 374.170069][ T36] audit: type=1400 audit(2000000241.167:5408): avc: denied { sys_module } for pid=6745 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1
[ 375.473388][ T36] audit: type=1400 audit(2000000241.336:5409): avc: denied { read } for pid=6746 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1
[ 376.589875][ C0] net_ratelimit: 145972 callbacks suppressed
[ 376.589899][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 376.589927][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 376.597023][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 376.610053][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 376.622063][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 376.634601][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 376.647369][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 376.660013][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 376.672675][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 376.684850][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 377.221974][ T36] audit: type=1400 audit(2000000241.336:5410): avc: denied { read open } for pid=6746 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1
[ 377.411950][ T36] audit: type=1400 audit(2000000241.336:5411): avc: denied { mounton } for pid=6746 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1
[ 379.203767][ T36] audit: type=1400 audit(2000000241.458:5412): avc: denied { sys_module } for pid=6746 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1
[ 380.718020][ T36] audit: type=1400 audit(2000000241.964:5413): avc: denied { sys_module } for pid=6742 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1
[ 381.718204][ T36] audit: type=1400 audit(2000000241.974:5414): avc: denied { sys_module } for pid=6742 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1
[ 381.877156][ T36] audit: type=1400 audit(2000000241.974:5415): avc: denied { sys_module } for pid=6744 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1
[ 381.929927][ C1] net_ratelimit: 145674 callbacks suppressed
[ 381.929955][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 381.930276][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 381.936480][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 381.948949][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 381.961121][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 381.973272][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 381.985616][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 381.997822][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 382.009903][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 382.022212][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 382.348506][ T36] audit: type=1400 audit(2000000241.983:5416): avc: denied { sys_module } for pid=6744 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1
[ 382.485779][ T36] audit: type=1400 audit(2000000241.992:5417): avc: denied { sys_module } for pid=6744 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1
[ 382.537546][ T36] audit: type=1400 audit(2000000242.002:5418): avc: denied { sys_module } for pid=6745 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1
[ 383.008842][ T36] audit: type=1400 audit(2000000242.152:5419): avc: denied { sys_module } for pid=6746 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1
[ 383.327197][ T36] audit: type=1400 audit(2000000242.171:5420): avc: denied { sys_module } for pid=6746 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1
[ 383.775115][ T36] audit: type=1400 audit(2000000242.180:5421): avc: denied { sys_module } for pid=6746 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1
[ 384.185292][ T36] audit: type=1400 audit(2000000242.255:5422): avc: denied { sys_module } for pid=6745 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1
[ 384.404055][ T36] audit: type=1400 audit(2000000242.293:5423): avc: denied { sys_module } for pid=6742 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1
[ 387.269902][ C1] net_ratelimit: 146478 callbacks suppressed
[ 387.269928][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 387.269931][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 387.270021][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 387.276111][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 387.288732][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 387.301273][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 387.313422][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 387.325821][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 387.338228][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 387.350894][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 392.609941][ C1] net_ratelimit: 146076 callbacks suppressed
[ 392.609966][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 392.610072][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 392.619365][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 392.628746][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 392.640747][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 392.653028][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 392.665294][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 392.677730][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 392.689699][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 392.701775][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 392.761422][ T37] INFO: task syz-executor:527 blocked for more than 123 seconds.
[ 392.793716][ T37] Not tainted syzkaller #0
[ 392.798703][ T37] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
SYZFAIL: failed to recv rpc
fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor)
[ 393.006936][ T36] kauditd_printk_skb: 1 callbacks suppressed
[ 393.006960][ T36] audit: type=1400 audit(2000000262.379:5425): avc: denied { write } for pid=282 comm="syz-executor" path="pipe:[2354]" dev="pipefs" ino=2354 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1
[ 393.176121][ T37] task:syz-executor state:D stack:0 pid:527 tgid:527 ppid:1 flags:0x00004006
[ 393.272147][ T37] Call Trace:
[ 393.275502][ T37]
[ 393.278458][ T37] __schedule+0x134f/0x1ea0
[ 393.283102][ T37] ? __sched_text_start+0x10/0x10
[ 393.288465][ T37] ? __mutex_add_waiter+0xd0/0x2a0
[ 393.293786][ T37] ? __kasan_check_write+0x18/0x20
[ 393.299000][ T37] ? trace_contention_begin+0xc0/0xc0
[ 393.304670][ T37] schedule+0xc5/0x240
[ 393.308948][ T37] schedule_preempt_disabled+0x14/0x30
[ 393.314634][ T37] __mutex_lock+0x960/0x1bb0
[ 393.319766][ T37] ? __ww_mutex_lock_interruptible_slowpath+0x30/0x30
[ 393.327467][ T37] ? __kasan_check_write+0x18/0x20
[ 393.332789][ T37] ? _raw_spin_lock+0x92/0x120
[ 393.337596][ T37] ? __kasan_check_write+0x18/0x20
[ 393.342807][ T37] ? wake_up_q+0x10f/0x1c0
[ 393.347755][ T37] ? __mutex_unlock_slowpath+0x4b7/0x780
[ 393.353622][ T37] ? mutex_unlock+0x240/0x240
[ 393.358638][ T37] __mutex_lock_slowpath+0xe/0x20
[ 393.363945][ T37] mutex_lock+0x113/0x1d0
[ 393.368410][ T37] ? __cfi_mutex_lock+0x10/0x10
[ 393.373466][ T37] rcu_barrier+0x4d/0x540
[ 393.378164][ T37] ? __kasan_slab_free+0x6a/0x80
[ 393.383229][ T37] netdev_run_todo+0x118/0xce0
[ 393.388062][ T37] ? kvfree+0x39/0x50
[ 393.392228][ T37] ? netdev_state_change+0xaa/0x240
[ 393.397435][ T37] ? __cfi_netdev_run_todo+0x10/0x10
[ 393.402827][ T37] rtnl_unlock+0x12/0x20
[ 393.407250][ T37] tun_chr_close+0xc5/0x150
[ 393.411963][ T37] ? __cfi_tun_chr_close+0x10/0x10
[ 393.417172][ T37] __fput+0x1fe/0xa00
[ 393.421185][ T37] ? call_rcu+0x14/0x20
[ 393.425455][ T37] ____fput+0x20/0x30
[ 393.429878][ T37] task_work_run+0x1e5/0x260
[ 393.434498][ T37] ? __cfi_task_work_run+0x10/0x10
[ 393.439621][ T37] ? free_nsproxy+0x223/0x290
[ 393.444420][ T37] do_exit+0x9e3/0x2650
[ 393.448595][ T37] ? __cfi_avc_has_perm+0x10/0x10
[ 393.453731][ T37] ? __cfi_do_exit+0x10/0x10
[ 393.458430][ T37] ? nf_getsockopt+0x2a5/0x2b0
[ 393.463245][ T37] ? __kasan_check_write+0x18/0x20
[ 393.468471][ T37] ? _raw_spin_lock_irq+0x93/0x120
[ 393.473884][ T37] ? __cfi__raw_spin_lock_irq+0x10/0x10
[ 393.479702][ T37] do_group_exit+0x229/0x2f0
[ 393.484314][ T37] ? __kasan_check_write+0x18/0x20
[ 393.489581][ T37] get_signal+0x1398/0x14e0
[ 393.494140][ T37] arch_do_signal_or_restart+0xbc/0x760
[ 393.499929][ T37] ? __cfi_do_sock_getsockopt+0x10/0x10
[ 393.505593][ T37] ? __cfi_arch_do_signal_or_restart+0x10/0x10
[ 393.511884][ T37] ? __x64_sys_getsockopt+0x1f1/0x280
[ 393.517505][ T37] syscall_exit_to_user_mode+0x57/0xb0
[ 393.523096][ T37] do_syscall_64+0x63/0xf0
[ 393.527734][ T37] ? clear_bhb_loop+0x50/0xa0
[ 393.532778][ T37] entry_SYSCALL_64_after_hwframe+0x76/0x7e
[ 393.538715][ T37] RIP: 0033:0x7f5a2ad9c6aa
[ 393.543314][ T37] RSP: 002b:00007ffdc06bf9c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000037
[ 393.551925][ T37] RAX: 0000000000000000 RBX: 0000000000000003 RCX: 00007f5a2ad9c6aa
[ 393.559929][ T37] RDX: 0000000000000060 RSI: 0000000000000000 RDI: 0000000000000003
[ 393.568012][ T37] RBP: 00007ffdc06bf9e0 R08: 00007ffdc06bf9dc R09: 0000000000000000
[ 393.576178][ T37] R10: 00007ffdc06bf9e0 R11: 0000000000000246 R12: 00007ffdc06bf9dc
[ 393.584377][ T37] R13: 00000000000927c0 R14: 00000000000322f2 R15: 00007ffdc06c0120
[ 393.592553][ T37]
[ 393.642326][ T37] NMI backtrace for cpu 0
[ 393.642350][ T37] CPU: 0 UID: 0 PID: 37 Comm: khungtaskd Not tainted syzkaller #0 001c7e68fa735976e9f6b7ad125989e1d2b10b0e
[ 393.642380][ T37] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025
[ 393.642394][ T37] Call Trace:
[ 393.642401][ T37]
[ 393.642410][ T37] __dump_stack+0x21/0x30
[ 393.642441][ T37] dump_stack_lvl+0x140/0x1c0
[ 393.642467][ T37] ? __cfi_dump_stack_lvl+0x10/0x10
[ 393.642494][ T37] dump_stack+0x19/0x20
[ 393.642518][ T37] nmi_cpu_backtrace+0x2ba/0x2d0
[ 393.642555][ T37] ? rcu_read_unlock_special+0xb7/0x420
[ 393.642581][ T37] ? __cfi_nmi_cpu_backtrace+0x10/0x10
[ 393.642608][ T37] ? sched_show_task+0x371/0x530
[ 393.642631][ T37] ? __rcu_read_unlock+0xc0/0xc0
[ 393.642655][ T37] ? __cfi_nmi_raise_cpu_backtrace+0x10/0x10
[ 393.642680][ T37] ? __cfi_nmi_raise_cpu_backtrace+0x10/0x10
[ 393.642704][ T37] nmi_trigger_cpumask_backtrace+0x142/0x2c0
[ 393.642733][ T37] arch_trigger_cpumask_backtrace+0x14/0x20
[ 393.642757][ T37] watchdog+0xdad/0xf00
[ 393.642785][ T37] ? __kasan_check_write+0x18/0x20
[ 393.642812][ T37] ? __cfi_watchdog+0x10/0x10
[ 393.642840][ T37] ? __kasan_check_read+0x15/0x20
[ 393.642863][ T37] ? __kthread_parkme+0x137/0x180
[ 393.642891][ T37] ? schedule+0xc5/0x240
[ 393.642909][ T37] kthread+0x2c9/0x370
[ 393.642928][ T37] ? __cfi_watchdog+0x10/0x10
[ 393.642955][ T37] ? __cfi_kthread+0x10/0x10
[ 393.642974][ T37] ret_from_fork+0x67/0xa0
[ 393.642999][ T37] ? __cfi_kthread+0x10/0x10
[ 393.643019][ T37] ret_from_fork_asm+0x1a/0x30
[ 393.643047][ T37]
[ 393.643056][ T37] Sending NMI from CPU 0 to CPUs 1:
[ 393.704295][ T36] audit: type=1400 audit(2000000262.379:5426): avc: denied { write } for pid=282 comm="syz-executor" path="pipe:[2354]" dev="pipefs" ino=2354 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1
[ 393.705251][ C1] NMI backtrace for cpu 1
[ 393.705266][ C1] CPU: 1 UID: 0 PID: 36 Comm: kauditd Not tainted syzkaller #0 001c7e68fa735976e9f6b7ad125989e1d2b10b0e
[ 393.705288][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025
[ 393.705298][ C1] RIP: 0010:vsnprintf+0x0/0x1ad0
[ 393.705326][ C1] Code: 89 33 31 c0 eb 0a e8 9f a3 ec fb b8 f0 ff ff ff 5b 41 5e 5d c3 cc cc cc cc cc b8 43 34 02 03 90 90 90 90 90 90 90 90 90 90 90 0f 1e fa 55 48 89 e5 41 57 41 56 41 55 41 54 53 48 83 ec 60 48
[ 393.705340][ C1] RSP: 0018:ffffc9000025f358 EFLAGS: 00000246
[ 393.705356][ C1] RAX: ffffc9000025f370 RBX: ffffffff85e92620 RCX: ffffc9000025f3c0
[ 393.705369][ C1] RDX: ffffffff85e92620 RSI: 000000007fffffff RDI: ffffc9000025f5c0
[ 393.705382][ C1] RBP: ffffc9000025f450 R08: ffffc9000025f3d7 R09: 0000000000000000
[ 393.705394][ C1] R10: ffffc9000025f3c0 R11: fffff5200004be7b R12: 1ffff9200004be74
[ 393.705407][ C1] R13: dffffc0000000000 R14: ffffc9000025f5c0 R15: ffffc9000025f3c0
[ 393.705419][ C1] FS: 0000000000000000(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000
[ 393.705433][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 393.705445][ C1] CR2: 00007fffecf4ce8c CR3: 000000010c322000 CR4: 00000000003526b0
[ 393.705463][ C1] Call Trace:
[ 393.705469][ C1]
[ 393.705475][ C1] ? sprintf+0xe8/0x140
[ 393.705496][ C1] ? desc_read+0x1ab/0x3e0
[ 393.705519][ C1] ? __cfi_sprintf+0x10/0x10
[ 393.705538][ C1] ? desc_read+0x202/0x3e0
[ 393.705566][ C1] info_print_prefix+0x183/0x4a0
[ 393.705586][ C1] ? trace_raw_output_console+0xf0/0xf0
[ 393.705605][ C1] ? _prb_read_valid+0xa71/0xa80
[ 393.705627][ C1] record_print_text+0x177/0x450
[ 393.705645][ C1] ? prb_read_valid+0x80/0x80
[ 393.705666][ C1] ? printk_get_next_message+0x9e0/0x9e0
[ 393.705685][ C1] ? prb_read_valid+0x41/0x80
[ 393.705706][ C1] printk_get_next_message+0x2ab/0x9e0
[ 393.705724][ C1] ? __cfi_printk_get_next_message+0x10/0x10
[ 393.705743][ C1] ? prb_read_valid+0x80/0x80
[ 393.705764][ C1] ? __kasan_check_write+0x18/0x20
[ 393.705783][ C1] ? __kasan_check_read+0x15/0x20
[ 393.705800][ C1] ? __asan_memcpy+0x5a/0x80
[ 393.705817][ C1] console_flush_all+0x3ab/0xac0
[ 393.705835][ C1] ? vprintk_store+0xa5e/0x1100
[ 393.705852][ C1] ? __console_rewind_all+0x170/0x170
[ 393.705869][ C1] ? __kasan_check_read+0x15/0x20
[ 393.705886][ C1] ? is_printk_cpu_sync_owner+0x39/0x50
[ 393.705904][ C1] ? is_printk_legacy_deferred+0x5c/0x70
[ 393.705924][ C1] console_unlock+0xf8/0x2c0
[ 393.705939][ C1] ? _raw_spin_unlock_irqrestore+0x4a/0x70
[ 393.705961][ C1] ? __cfi_console_unlock+0x10/0x10
[ 393.705977][ C1] ? __kasan_check_write+0x18/0x20
[ 393.705994][ C1] ? _raw_spin_lock+0x92/0x120
[ 393.706012][ C1] ? __cfi__raw_spin_lock+0x10/0x10
[ 393.706032][ C1] ? __kasan_check_read+0x15/0x20
[ 393.706049][ C1] ? is_printk_cpu_sync_owner+0x39/0x50
[ 393.706068][ C1] vprintk_emit+0x282/0x650
[ 393.706084][ C1] ? __cfi_vprintk_emit+0x10/0x10
[ 393.706100][ C1] ? __kasan_check_write+0x18/0x20
[ 393.706117][ C1] ? _raw_spin_trylock+0xb5/0x140
[ 393.706136][ C1] vprintk_default+0x2a/0x40
[ 393.706152][ C1] vprintk+0x93/0xa0
[ 393.706170][ C1] _printk+0xde/0x140
[ 393.706187][ C1] ? __cfi__printk+0x10/0x10
[ 393.706204][ C1] kauditd_hold_skb+0x1cc/0x230
[ 393.706225][ C1] ? __cfi_kauditd_send_multicast_skb+0x10/0x10
[ 393.706257][ C1] ? __cfi_kauditd_hold_skb+0x10/0x10
[ 393.706278][ C1] kauditd_send_queue+0x2c4/0x310
[ 393.706299][ C1] ? _raw_spin_unlock_irqrestore+0x4a/0x70
[ 393.706320][ C1] ? __cfi_kauditd_hold_skb+0x10/0x10
[ 393.706340][ C1] ? __cfi_kauditd_send_multicast_skb+0x10/0x10
[ 393.706363][ C1] kauditd_thread+0x4e0/0x740
[ 393.706382][ C1] ? __kasan_check_write+0x18/0x20
[ 393.706399][ C1] ? __cfi__raw_spin_lock_irqsave+0x10/0x10
[ 393.706420][ C1] ? __cfi_kauditd_thread+0x10/0x10
[ 393.706440][ C1] ? set_cpus_allowed_ptr+0xa1/0xf0
[ 393.706461][ C1] ? __cfi_autoremove_wake_function+0x10/0x10
[ 393.706484][ C1] ? __kasan_check_read+0x15/0x20
[ 393.706501][ C1] ? schedule+0xc5/0x240
[ 393.706514][ C1] kthread+0x2c9/0x370
[ 393.706529][ C1] ? __cfi_kauditd_thread+0x10/0x10
[ 393.706555][ C1] ? __cfi_kthread+0x10/0x10
[ 393.706569][ C1] ret_from_fork+0x67/0xa0
[ 393.706588][ C1] ? __cfi_kthread+0x10/0x10
[ 393.706603][ C1] ret_from_fork_asm+0x1a/0x30
[ 393.706624][ C1]
[ 395.968501][ T36] audit: type=1400 audit(2000000262.379:5427): avc: denied { write } for pid=282 comm="syz-executor" path="pipe:[2354]" dev="pipefs" ino=2354 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1
[ 397.949914][ C1] net_ratelimit: 121254 callbacks suppressed
[ 397.949939][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 397.949947][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 397.949998][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 397.956021][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 397.968134][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 397.980272][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 397.992237][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 398.004340][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)
[ 398.016506][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 398.028826][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:2b:1a:c1:55:52, vlan:0)