last executing test programs: 5.67895091s ago: executing program 0 (id=3505): r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f00000001c0)=0x1) fcntl$setstatus(r0, 0x4, 0x0) 5.181586822s ago: executing program 0 (id=3508): r0 = userfaultfd(0x801) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_WRITEPROTECT(r0, 0xc018aa06, &(0x7f00000000c0)={{&(0x7f000040a000/0x800000)=nil, 0x800000}, 0x3}) 4.619927846s ago: executing program 0 (id=3514): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000640)=ANY=[], 0x8) setsockopt$inet6_IPV6_RTHDR(r0, 0x29, 0x6, 0x0, 0x0) 4.500957808s ago: executing program 3 (id=3516): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000013c0)={0x18, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='contention_end\x00', r0}, 0x10) syz_usb_connect(0x0, 0x24, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x55, 0x27, 0x48, 0x8, 0xb48, 0x1008, 0x14ec, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xec, 0x4a, 0xc2}}]}}]}}, 0x0) 3.629372102s ago: executing program 3 (id=3524): r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f00000005c0)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x2, [{{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @mcast2}}]}, 0x190) 3.586517723s ago: executing program 1 (id=3525): capset(&(0x7f0000000080)={0x20080522}, &(0x7f00000000c0)={0x200000, 0x200000, 0x0, 0x0, 0x0, 0x6}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8919, &(0x7f0000002080)={{0x2, 0x4e20, @empty}, {0x306, @remote}, 0x4, {0x2, 0x4e20, @broadcast}, 'veth1_to_hsr\x00'}) 3.478668408s ago: executing program 2 (id=3526): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x11, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000a8000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000a700000095"], &(0x7f0000000b00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 3.358903743s ago: executing program 1 (id=3527): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000880), 0xfffffffffffffddd, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0x22, 0x0, &(0x7f0000000140)="3d6ee2e04b91ab10143d9abe86dd", 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 3.281274647s ago: executing program 3 (id=3529): capset(&(0x7f0000000080)={0x20080522}, &(0x7f00000000c0)={0x200000, 0x200000}) r0 = syz_open_dev$tty1(0xc, 0x4, 0x4) ioctl$KIOCSOUND(r0, 0x4b2f, 0x7) 3.08809984s ago: executing program 1 (id=3530): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="640000000206050000000000000000000000000015000300686173683a69702c706f72742c6e6574000000000900020073797a30000000000500040000400000050005000a000000050001000600000014000780080006400000000008001340"], 0x64}}, 0x0) sendmsg$IPSET_CMD_DESTROY(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000000c0)={0x1c, 0x3, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 2.841175084s ago: executing program 3 (id=3532): r0 = syz_open_dev$radio(&(0x7f0000000600), 0x3, 0x2) r1 = epoll_create1(0x80000) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000880)={0x8}) 2.619169295s ago: executing program 2 (id=3533): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r0 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_mreqsrc(r0, 0x0, 0x53, &(0x7f0000000000)={@dev, @local, @broadcast}, &(0x7f0000000040)=0xc) 2.506903164s ago: executing program 3 (id=3534): r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xffff, 0x3}, 0x6) write(r0, &(0x7f0000000100)="52000300010007", 0x7) 2.273805909s ago: executing program 2 (id=3536): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000440)={0x14, r1, 0x301}, 0x14}}, 0x0) 2.092606286s ago: executing program 1 (id=3537): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) bind$packet(r0, &(0x7f0000001840)={0x11, 0x9, 0x0, 0x1, 0x6, 0x6, @multicast}, 0x14) 1.966578033s ago: executing program 4 (id=3538): capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)={0x0, 0x0, 0x40000000, 0x0, 0x0, 0x1}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r0, 0x0, 0x13, &(0x7f0000000180)=0x872, 0x4) 1.908805727s ago: executing program 2 (id=3539): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x15) ioctl$TCFLSH(r0, 0x80044704, 0xf0ff1f00000000) 1.830532114s ago: executing program 0 (id=3540): r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000300)={{0x6, @rose}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) sendto$netrom(r0, 0x0, 0x11000, 0x0, &(0x7f0000000240)={{0x6, @rose}, [@bcast, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) 1.660845074s ago: executing program 4 (id=3541): r0 = socket$nl_route(0x10, 0x3, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002980)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000002900)=@newqdisc={0x24, 0x58, 0x4ee4e6a52ff56541}, 0x24}}, 0x0) 1.485343026s ago: executing program 0 (id=3542): r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) listen(r0, 0x0) listen(r0, 0x7f3d) 1.353823821s ago: executing program 4 (id=3543): socket$inet_sctp(0x2, 0x1, 0x84) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x40000) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) 1.151673205s ago: executing program 0 (id=3544): r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040), 0x801, 0x0) write$rfkill(r0, &(0x7f0000000080)={0x0, 0x0, 0x3, 0x1}, 0x8) 1.03698451s ago: executing program 4 (id=3545): r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x103042, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8) 798.491666ms ago: executing program 2 (id=3546): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_REG(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000500)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="030100000005000000001a0e00000700210061610000100022"], 0x2c}}, 0x0) 689.091202ms ago: executing program 4 (id=3547): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_CLOCK(r1, 0xc008aeba, 0x0) 538.005629ms ago: executing program 1 (id=3548): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_SUBFLOW_DESTROY(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x18, r1, 0x1, 0x70bd2a, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x51}, 0x20000000) 372.289044ms ago: executing program 3 (id=3549): r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/address_bits', 0x20400, 0x0) io_setup(0x20, &(0x7f0000001140)=0x0) io_submit(r1, 0x1, &(0x7f0000000500)=[&(0x7f0000000000)={0xf, 0x400000000000, 0x25, 0x1, 0x0, r0, 0x0}]) 235.747082ms ago: executing program 2 (id=3550): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = io_uring_setup(0x57c7, &(0x7f0000000340)) sendmmsg$unix(r0, &(0x7f0000003c40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [r1]}}], 0x18}}], 0x1, 0x0) 211.680677ms ago: executing program 4 (id=3551): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_MEMORY_ATTRIBUTES(r1, 0x4020aed2, &(0x7f00000000c0)={0xeeef4000, 0x1000}) 0s ago: executing program 1 (id=3552): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$NL802154_CMD_GET_SEC_LEVEL(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x14, r1, 0x301}, 0x14}, 0x1, 0x3000000}, 0x0) kernel console output (not intermixed with test programs): tcp or -p udp Sep 28 05:40:52 syzkaller kern.info kernel: [ 294.782179][T10212] xt_TPROXY: Can be used only with -p tcp or -p udp [ 298.050596][ T29] kauditd_printk_skb: 198 callbacks suppressed [ 298.050619][ T29] audit: type=1400 audit(1727502055.429:1512): avc: denied { read write } for pid=5232 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Sep 28 05:40:55 syzkaller kern.warn kernel: [ 298.050596][ T29] kauditd_printk_skb: 198 callbacks suppressed Sep 28 05:40:55 syzkaller kern.notice kernel: [ 298.050619][ T29] audit: type=1400 audit(1727502055.429:1512): avc: denied { read write } for pid=5232 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 298.128194][ T29] audit: type=1400 audit(1727502055.466:1513): avc: denied { read } for pid=4655 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Sep 28 05:40:55 syzkaller kern.notice kernel: [ 298.128194][ T29] audit: type=1400 audit(1727502055.466:1513): avc: denied { read } for pid=4655 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 298.221037][ T29] audit: type=1400 audit(1727502055.466:1514): avc: denied { read } for pid=4655 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Sep 28 05:40:55 syzkaller kern.notice kernel: [ 298.221037][ T29] audit: type=1400 audit(1727502055.466:1514): avc: denied { read } for pid=4655 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 298.288658][ T29] audit: type=1400 audit(1727502055.485:1515): avc: denied { read write } for pid=5227 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Sep 28 05:40:55 syzkaller kern.notice kernel: [ 298.288658][ T29] audit: type=1400 audit(1727502055.485:1515): avc: denied { read write } for pid=5227 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 298.384950][ T29] audit: type=1400 audit(1727502055.532:1516): avc: denied { read } for pid=4655 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Sep 28 05:40:55 syzkaller kern.notice kernel: [ 298.384950][ T29] audit: type=1400 audit(1727502055.532:1516): avc: denied { read } for pid=4655 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 298.454860][ T29] audit: type=1400 audit(1727502055.550:1517): avc: denied { create } for pid=10379 comm="syz.3.2430" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 Sep 28 05:40:55 syzkaller kern.notice kernel: [ 298.454860][ T29] audit: type=1400 audit(1727502055.550:1517): avc: denied { create } for pid=10379 comm="syz.3.2430" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 298.528125][ T29] audit: type=1400 audit(1727502055.560:1518): avc: denied { read write } for pid=5234 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 298.565209][ T29] audit: type=1400 audit(1727502055.588:1519): avc: denied { read write } for pid=5222 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 298.590227][ T29] audit: type=1400 audit(1727502055.625:1520): avc: denied { read } for pid=4655 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 298.613350][ T29] audit: type=1400 audit(1727502055.644:1521): avc: denied { read write } for pid=5233 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Sep 28 05:40:55 syzkaller kern.notice kernel: [ 298.528125][ T29] audit: type=1400 audit(1727502055.560:1518): avc: denied { read write } for pid=5234 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Sep 28 05:40:55 syzkaller kern.notice kernel: [ 298.565209][ T29] audit: type=1400 audit(1727502055.588:1519): avc: denied { read write } for pid=5222 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Sep 28 05:40:55 syzkaller kern.notice kernel: [ 298.590227][ T29] audit: type=1400 audit(1727502055.625:1520): avc: denied { read } for pid=4655 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Sep 28 05:40:55 syzkaller kern.notice kernel: [ 298.613350][ T29] audit: type=1400 audit(1727502055.644:1521): avc: denied { read write } for pid=5233 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 299.917103][ T5242] Bluetooth: hci4: unexpected cc 0x042f length: 181 > 7 [ 299.929244][ T5242] Bluetooth: hci4: unexpected event for opcode 0x042f Sep 28 05:40:57 syzkaller kern.warn kernel: [ 299.917103][ T5242] Bluetooth: hci4: unexpected cc 0x042f length: 181 > 7 Sep 28 05:40:57 syzkaller kern.err kernel: [ 299.929244][ T5242] Bluetooth: hci4: unexpected event for opcode 0x042f [ 300.736074][T10502] netdevsim netdevsim3: loading /lib/firmware/. failed with error -22 [ 300.747382][T10502] netdevsim netdevsim3: Direct firmware load for . failed with error -22 Sep 28 05:40:57 [ 300.781911][T10502] netdevsim netdevsim3: Falling back to sysfs fallback for: . syzkaller kern.warn kernel: [ 300.736074][T10502] netdevsim netdevsim3: loading /lib/firmware/. failed with error -22 Sep 28 05:40:57 syzkaller kern.warn kernel: [ 300.747382][T10502] netdevsim netdevsim3: Direct firmware load for . failed with error -22 Sep 28 05:40:58 syzkaller kern.warn kernel: [ 300.781911][T10502] netdevsim netdevsim3: Falling back to sysfs fallback for: . [ 300.852376][T10505] ipt_rpfilter: unknown options Sep 28 05:40:58 syzkaller kern.info kernel: [ 300.852376][T10505] ipt_rpfilter: unknown options [ 303.415650][ T29] kauditd_printk_skb: 211 callbacks suppressed [ 303.415674][ T29] audit: type=1400 audit(1727502060.452:1733): avc: denied { read write } for pid=5233 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Sep 28 05:41:00 syzkaller kern.warn kernel: [ 303.415650][ T29] kauditd_printk_skb: 211 callbacks suppressed Sep 28 05:41:00 syzkaller kern.notice kernel: [ 303.415674][ T29] audit: type=1400 audit(1727502060.452:1733): avc: denied { read write } for pid=5233 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 303.494938][ T29] audit: type=1400 audit(1727502060.452:1734): avc: denied { read write } for pid=5222 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Sep 28 05:41:00 syzkaller kern.notice kernel: [ 303.494938][ T29] audit: type=1400 audit(1727502060.452:1734): avc: denied { read write } for pid=5222 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 303.599562][ T29] audit: type=1400 audit(1727502060.462:1735): avc: denied { read } for pid=4655 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Sep 28 05:41:00 syzkaller kern.notice kernel: [ 303.599562][ T29] audit: type=1400 audit(1727502060.462:1735): avc: denied { read } for pid=4655 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 303.676118][ T29] audit: type=1400 audit(1727502060.490:1736): avc: denied { read } for pid=4655 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Sep 28 05:41:00 syzkaller kern.notice kernel: [ 303.676118][ T29] audit: type=1400 audit(1727502060.490:1736): avc: denied { read } for pid=4655 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 303.752351][ T29] audit: type=1400 audit(1727502060.555:1737): avc: denied { read } for pid=4655 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 303.803145][ T29] audit: type=1400 audit(1727502060.564:1738): avc: denied { read write } for pid=5227 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Sep 28 05:41:00 syzkaller kern.notice kernel: [ 303.752351][ T29] audit: type=1400 audit(1727502060.555:1737): avc: denied { read } for pid=4655 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Sep 28 05:41:00 syzkaller kern.notice kernel: [ 303.803145][ T29] audit: type=1400 audit(1727502060.564:1738): avc: denied { read write } for pid=5227 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 303.885016][ T29] audit: type=1400 audit(1727502060.574:1739): avc: denied { read write } for pid=5234 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Sep 28 05:41:00 syzkaller kern.notice kernel: [ 303.885016][ T29] audit: type=1400 audit(1727502060.574:1739): avc: denied { read write } for pid=5234 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 303.975445][ T29] audit: type=1400 audit(1727502060.592:1740): avc: denied { mounton } for pid=10640 comm="syz.3.2557" path="/511/file0" dev="tmpfs" ino=2583 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 Sep 28 05:41:01 syzkaller kern.notice kernel: [ 303.975445][ T29] audit: type=1400 audit(1727502060.592:1740): avc: denied { mounton } for pid=10640 comm="syz.3.2557" path="/511/file0" dev="tmpfs" ino=2583 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tm [ 304.070605][ T29] audit: type=1400 audit(1727502060.621:1741): avc: denied { read write } for pid=5222 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Sep 28 05:41:01 syzkaller kern.notice kernel: [ 304.070605][ T29] audit: type=1400 audit(1727502060.621:1741): avc: denied { read write } for pid=5222 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 304.146491][ T29] audit: type=1400 audit(1727502060.667:1742): avc: denied { read } for pid=4655 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Sep 28 05:41:01 syzkaller kern.notice kernel: [ 304.146491][ T29] audit: type=1400 audit(1727502060.667:1742): avc: denied { read } for pid=4655 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 304.581255][T10685] netlink: 'syz.0.2580': attribute type 5 has an invalid length. Sep 28 05:41:01 syzkaller kern.warn kernel: [ 304.581255][T10685] netlink: 'syz.0.2580': attribute type 5 has an invalid length. [ 304.984368][T10704] netlink: 'syz.4.2588': attribute type 27 has an invalid length. Sep 28 05:41:02 syzkaller kern.warn kernel: [ 304.984368][T10704] netlink: 'syz.4.2588': attribute type 27 has an invalid length. [ 307.943861][T10850] ip6t_srh: unknown srh invflags 7D00 Sep 28 05:41:04 syzkaller kern.info kernel: [ 307.943861][T10850] ip6t_srh: unknown srh invflags 7D00 [ 308.778704][ T29] kauditd_printk_skb: 203 callbacks suppressed [ 308.778729][ T29] audit: type=1400 audit(1727502065.466:1946): avc: denied { read write } for pid=5227 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Sep 28 05:41:05 syzkaller kern.warn kernel: [ 308.778704][ T29] kauditd_printk_skb: 203 callbacks suppressed Sep 28 05:41:05 syzkaller kern.notice kernel: [ 308.778729][ T29] audit: type=1400 audit(1727502065.466:1946): avc: denied { read write } for pid=5227 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 308.926088][ T29] audit: type=1400 audit(1727502065.503:1947): avc: denied { read } for pid=4655 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 309.030613][ T29] audit: type=1400 audit(1727502065.503:1948): avc: denied { read } for pid=4655 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Sep 28 05:41:05 syzkaller kern.notice kernel: [ 308.926088][ T29] audit: type=1400 audit(1727502065.503:1947): avc: denied { read } for pid=4655 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Sep 28 05:41:05 syzkaller kern.notice kernel: [ 309.030613][ T29] audit: type=1400 audit(1727502065.503:1948): avc: denied { read } for pid=4655 comm="syslogd" name="log" dev="sda1" ino=1915 scontex[ 309.117808][ T29] audit: type=1400 audit(1727502065.522:1949): avc: denied { read write } for pid=5227 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 t=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Sep 28 05:41:05 syzkaller kern.notice kernel: [ 309.117808][ T29] audit: type=1400 audit(1727502065.522:1949): avc: denied { read write } for pid=5227 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 309.234398][ T29] audit: type=1400 audit(1727502065.569:1950): avc: denied { prog_load } for pid=10891 comm="syz.2.2682" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Sep 28 05:41:05 syzkaller kern.notice kernel: [ 309.234398][ T29] audit: type=1400 audit(1727502065.569:1950): avc: denied { prog_load } for pid=10891 comm="syz.2.2682" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t t[ 309.334593][ T29] audit: type=1400 audit(1727502065.578:1951): avc: denied { read write } for pid=5227 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 class=bpf permissive=0 Sep 28 05:41:06 syzkaller kern.notice kernel: [ 309.334593][ T29] audit: type=1400 audit(1727502065.578:1951): avc: denied { read write } for pid=5227 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 309.430718][ T29] audit: type=1400 audit(1727502065.616:1952): avc: denied { read write } for pid=5222 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Sep 28 05:41:06 syzkaller kern.notice kernel: [ 309.430718][ T29] audit: type=1400 audit(1727502065.616:1952): avc: denied { read write } for pid=5222 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 309.561484][ T29] audit: type=1400 audit(1727502065.681:1953): avc: denied { read write } for pid=5233 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Sep 28 05:41:06 syzkaller kern.notice kernel: [ 309.561484][ T29] audit: type=1400 audit(1727502065.681:1953): avc: denied { read write } for pid=5233 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 309.716285][ T29] audit: type=1400 audit(1727502065.690:1954): avc: denied { read write } for pid=5222 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Sep 28 05:41:06 syzkaller kern.notice kernel: [ 309.716285][ T29] audit: type=1400 audit(1727502065.690:1954): avc: denied { read write } for pid=5222 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Sep 28 05:41:06 [ 309.771904][ T29] audit: type=1400 audit(1727502065.700:1955): avc: denied { read } for pid=10901 comm="syz.1.2688" name="iommu" dev="devtmpfs" ino=624 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 syzkaller daemon.err dhcpcd[4887]: ps_sendpsmmsg: Connection refused Sep 28 05:41:06 syzkaller daemon.err dhcpcd[4887]: ps_root_recvmsgcb: failed to send message to pid 7861: Connection refused Sep 28 05:41:06 syzkaller kern.notice kernel: [ 309.771904][ T29] audit: type=1400 audit(1727502065.700:1955): avc: denied { read } for pid=10901 comm="syz.1.2688" name="iommu" dev="devtmpfs" ino=624 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t [ 310.331855][ T5225] Bluetooth: hci4: command 0x0406 tx timeout Sep 28 05:41:06 syzkaller kern.err kernel: [ 310.331855][ T5225] Bluetooth: hci4: command 0x0406 tx timeout [ 310.746550][T10981] x_tables: eb_tables: snat.0 target: invalid size 16 (kernel) != (user) 0 Sep 28 05:41:07 syzkaller kern.err kernel: [ 310.746550][T10981] x_tables: eb_tables: snat.0 target: invalid size 16 (kernel) != (user) 0 Sep 28 05:41:07 syzkaller daemon.err dhcpcd[4887]: ps_sendpsmmsg: Connection refused Sep 28 05:41:07 syzkaller daemon.err dhcpcd[4887]: ps_root_recvmsgcb: failed to send message to pid 7910: Connection refused [ 314.132142][ T29] kauditd_printk_skb: 195 callbacks suppressed [ 314.132164][ T29] audit: type=1400 audit(1727502070.480:2151): avc: denied { read write } for pid=5234 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Sep 28 05:41:10 syzkaller kern.warn kernel: [ 314.132142][ T29] kauditd_printk_skb: 195 callbacks suppressed Sep 28 05:41:10 syzkaller kern.notice kernel: [ 314.132164][ T29] audit: type=1400 audit(1727502070.480:2151): avc: denied { read write } for pid=5234 comm="syz-executor" name="loop2" dev="devtmpfs" in[ 314.195659][ T29] audit: type=1400 audit(1727502070.508:2152): avc: denied { read } for pid=4655 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 o=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Sep 28 05:41:10 syzkaller daemon.err dhcpcd[4887]: ps_sendpsmmsg: Connection refused Sep 28 05:41:10 syzkaller daemon.err dhcpcd[4887]: ps_root_recvmsgcb: failed to send message to pid 7998: Connection refused Sep 28 05:41:10 syzkaller kern.notice kernel: [ 314.195659][ T29] audit: type=1400 audit(1727502070.[ 314.250077][ T29] audit: type=1400 audit(1727502070.508:2153): avc: denied { read } for pid=4655 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 508:2152): avc: denied { read } for pid=4655 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Sep 28 05:41:10 syzkaller kern.notice kernel: [ 314.250077][ T29] audit: type=1400 audit(1727502070.508:2153): avc: denied [ 314.301696][ T29] audit: type=1400 audit(1727502070.536:2154): avc: denied { read } for pid=4655 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 { read } for pid=4655 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:obje[ 314.334222][ T29] audit: type=1400 audit(1727502070.536:2155): avc: denied { read } for pid=4655 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ct_r:var_t tclass= Sep 28 05:41:10 syzkaller daemon.err dhcpcd[4887]: ps_sendpsmmsg: Connection refused Sep 28 05:41:10 syzkal[ 314.367571][T11159] veth1_macvtap: entered allmulticast mode ler daemon.err d[ 314.375392][ T29] audit: type=1400 audit(1727502070.545:2156): avc: denied { read write } for pid=5222 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 hcpcd[4887]: ps_root_recvmsgcb: failed to send message to pid 7986: Connection r[ 314.406469][ T29] audit: type=1400 audit(1727502070.573:2157): avc: denied { read } for pid=4655 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 efused Sep 28 05:41:10 syzkaller kern.notice kernel: [ 314.301696][ T29] audit: type=1400 audit(1727502070.5[ 314.437691][ T29] audit: type=1400 audit(1727502070.583:2158): avc: denied { read write } for pid=5227 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 36:2154): avc: denied { read } for pid=4655 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:s[ 314.472030][ T29] audit: type=1400 audit(1727502070.620:2159): avc: denied { read } for pid=4655 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ystem_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Sep 28 05:41:10 syzkaller kern.notice kernel: [ 314.334222][ T29] audit: type=1400 audit(1727502070.536:2155): avc: denied { read } for pid=4655 comm="syslogd" name="log" dev="sda1" ino=1915[ 314.516381][ T29] audit: type=1400 audit(1727502070.629:2161): avc: denied { read write } for pid=11154 comm="syz.1.2814" name="raw-gadget" dev="devtmpfs" ino=732 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Sep 28 05:41:10 syzkaller kern.info kernel: [ 314.367571][T11159] veth1_macvtap: entered allmulticast mode Sep 28 05:41:10 syzkaller kern.notice kernel: [ 314.375392][ T29] audit: type=1400 audit(1727502070.545:2156): avc: denied { read write } for pid=5222 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Sep 28 05:41:10 syzkaller kern.notice kernel: [ 314.406469][ T29] audit: type=1400 audit(1727502070.573:2157): avc: denied { read } for pid=4655 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Sep 28 05:41:10 syzkaller kern.notice kernel: [ 314.437691][ T29] audit: type=1400 audit(1727502070.583:2158): avc: denied { read write } for pid=5227 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Sep 28 05:41:10 syzkaller kern.notice kernel: [ 314.472030][ T29] audit: type=1400 audit(1727502070.620:2159): avc: denied { read } for pid=4655 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Sep 28 05:41:10 syzkaller kern.notice kernel: [ 314.516381][ T29] audit: type=1400 audit(1727502070.629:2161): avc: denied { read write } for pid=11154 comm="syz.1.2814" name="raw-gadget" dev="devtmpfs" ino=732 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_ Sep 28 05:41:11 syzkaller daemon.err dhcpcd[4887]: ps_sendpsmmsg: Connection refused Sep 28 05:41:11 syzkaller daemon.err dhcpcd[4887]: ps_root_recvmsgcb: failed to send message to pid 8106: Connection refused [ 315.394924][T11201] veth0_vlan: entered allmulticast mode [ 315.410158][T11201] batman_adv: batadv0: Interface deactivated: vlan1 Sep 28 05:41:11 syzkaller kern.info kernel: [ 315.394924][T11201] veth0_vlan: entered allmulticast mode Sep 28 05:41:11 syzkaller kern.info kernel: [ 315.410158][T11201] batman_adv: batadv0: Interface deactivated: vlan1 [ 316.187087][T11242] xt_l2tp: v2 tid > 0xffff: 262144 Sep 28 05:41:12 syzkaller kern.info kernel: [ 316.187087][T11242] xt_l2tp: v2 tid > 0xffff: 262144 Sep 28 05:41:12 syzkaller daemon.err dhcpcd[4887]: ps_sendpsmmsg: Connection refused Sep 28 05:41:12 syzkaller daemon.err dhcpcd[4887]: ps_root_recvmsgcb: failed to send message to pid 8121: Connection refused [ 318.987684][T11382] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2925'. Sep 28 05:41:15 syzkaller kern.warn kernel: [ 318.987684][T11382] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2925'. [ 319.526335][ T29] kauditd_printk_skb: 197 callbacks suppressed [ 319.526356][ T29] audit: type=1400 audit(1727502075.522:2358): avc: denied { read write } for pid=5222 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Sep 28 05:41:15 syzkaller kern.warn kernel: [ 319.526335][ T29] kauditd_printk_skb: 197 callbacks suppressed Sep 28 05:41:15 syzkaller kern.notice kernel: [ 319.526356][ T29] audit: type=1400 audit(1727502075.522:2358): avc: denied { read write } for pid=5222 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=s[ 319.589232][ T29] audit: type=1400 audit(1727502075.522:2359): avc: denied { read write } for pid=5232 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 ystem_u:object_r:fi Sep 28 05:41:15 syzkaller kern.notice kernel: [ 319.589232][ T29] audit: type=1400 audit(1727502075.522:2359): avc: denied { read write } for pid=5232 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=ro[ 319.638095][ T29] audit: type=1400 audit(1727502075.550:2360): avc: denied { read } for pid=4655 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ot:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Sep 28 05:41:15 syzkaller kern.notice kernel: [ 319.638095][ T29] audit: type=1400 audit(1727502075.550:2360): avc: denied { read } for pid=4655 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 319.703774][ T29] audit: type=1400 audit(1727502075.550:2361): avc: denied { read } for pid=4655 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Sep 28 05:41:15 syzkaller kern.notice kernel: [ 319.703774][ T29] audit: type=1400 audit(1727502075.550:2361): avc: denied { read } for pid=4655 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 319.765346][ T29] audit: type=1400 audit(1727502075.568:2362): avc: denied { read write } for pid=5233 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Sep 28 05:41:15 syzkaller kern.notice kernel: [ 319.765346][ T29] audit: type=1400 audit(1727502075.568:2362): avc: denied { read write } for pid=5233 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 319.843822][ T29] audit: type=1400 audit(1727502075.606:2363): avc: denied { read } for pid=4655 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Sep 28 05:41:15 syzkaller kern.notice kernel: [ 319.843822][ T29] audit: type=1400 audit(1727502075.606:2363): avc: denied { read } for pid=4655 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 319.928661][ T29] audit: type=1400 audit(1727502075.624:2364): avc: denied { create } for pid=11410 comm="syz.4.2941" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=0 Sep 28 05:41:15 syzkaller kern.notice kernel: [ 319.928661][ T29] audit: type=1400 audit(1727502075.624:2364): avc: denied { create } for pid=11410 comm="syz.4.2941" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=0 [ 320.000313][ T29] audit: type=1400 audit(1727502075.662:2365): avc: denied { read } for pid=4655 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Sep 28 05:41:15 syzkaller kern.notice kernel: [ 320.000313][ T29] audit: type=1400 audit(1727502075.662:2365): avc: denied { read } for pid=4655 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 320.054368][ T29] audit: type=1400 audit(1727502075.681:2366): avc: denied { read write } for pid=5222 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Sep 28 05:41:16 syzkaller kern.notice kernel: [ 320.054368][ T29] audit: type=1400 audit(1727502075.681:2366): avc: denied { read write } for pid=5222 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 320.120760][ T29] audit: type=1400 audit(1727502075.699:2367): avc: denied { read write } for pid=5227 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Sep 28 05:41:16 syzkaller kern.notice kernel: [ 320.120760][ T29] audit: type=1400 audit(1727502075.699:2367): avc: denied { read write } for pid=5227 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 324.880977][ T29] kauditd_printk_skb: 196 callbacks suppressed [ 324.881001][ T29] audit: type=1400 audit(1727502080.535:2564): avc: denied { read write } for pid=5222 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Sep 28 05:41:20 syzkaller kern.warn kernel: [ 324.880977][ T29] kauditd_printk_skb: 196 callbacks suppressed Sep 28 05:41:20 syzkaller kern.notice kernel: [ 324.881001][ T29] audit: type=1400 audit(1727502080.535:2564): avc: denied { read write } for pid=5222 co[ 324.935250][ T29] audit: type=1400 audit(1727502080.545:2565): avc: denied { read } for pid=4655 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 mm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Sep 28 05:41:20 syzkaller kern.notice kernel: [ 324.935250][ [ 324.989955][ T29] audit: type=1400 audit(1727502080.563:2566): avc: denied { read } for pid=4655 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 T29] audit: type=1400 audit(1727502080.545:2565): avc: denied { read } for pid=4655 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Sep 28 05:41:20 syzkaller kern.notice kernel: [ 324.989955][ T29] audit: type=1400 audit(1727502080.563:2566): avc: denied { read } for pid=4655 comm="syslogd" name="[ 325.045032][ T29] audit: type=1400 audit(1727502080.582:2567): avc: denied { create } for pid=11658 comm="syz.2.3063" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=0 log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Sep 28 05:41:20 syzkaller kern.notice kernel: [ 325.045032][ T29] audit: type=1400 audit(1727502080.582:2567): avc: denied { create } for pid=11658 comm="syz.2.3063" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive= [ 325.121251][ T29] audit: type=1400 audit(1727502080.619:2568): avc: denied { read write } for pid=5232 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Sep 28 05:41:20 syzkaller kern.notice kernel: [ 325.121251][ T29] audit: type=1400 audit(1727502080.619:2568): avc: denied { read write } for pid=5232 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 325.190761][ T29] audit: type=1400 audit(1727502080.629:2569): avc: denied { read } for pid=4655 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Sep 28 05:41:20 syzkaller kern.notice kernel: [ 325.190761][ T29] audit: type=1400 audit(1727502080.629:2569): avc: denied { read } for pid=4655 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 325.255068][ T29] audit: type=1400 audit(1727502080.629:2570): avc: denied { read write } for pid=5227 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Sep 28 05:41:20 syzkaller kern.notice kernel: [ 325.255068][ T29] audit: type=1400 audit(1727502080.629:2570): avc: denied { read write } for pid=5227 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi[ 325.320200][ T29] audit: type=1400 audit(1727502080.676:2571): avc: denied { read } for pid=4655 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Sep 28 05:41:20 syzkaller kern.notice kernel: [ 325.320200][ T29] audit: type=1400 audit(1727502080.676:2571): avc: denied { read } for pid=4655 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 325.420063][ T29] audit: type=1400 audit(1727502080.713:2572): avc: denied { read write } for pid=5234 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 325.530508][ T29] audit: type=1400 audit(1727502080.722:2573): avc: denied { read } for pid=4655 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Sep 28 05:41:21 syzkaller kern.notice kernel: [ 325.420063][ T29] audit: type=1400 audit(1727502080.713:2572): avc: denied { read write } for pid=5234 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Sep 28 05:41:21 syzkaller kern.notice kernel: [ 325.530508][ T29] audit: type=1400 audit(1727502080.722:2573): avc: denied { read } for pid=4655 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 327.665344][T11792] trusted_key: encrypted_key: hex blob is missing Sep 28 05:41:23 syzkaller kern.info kernel: [ 327.665344][T11792] trusted_key: encrypted_key: hex blob is missing [ 330.248451][ T29] kauditd_printk_skb: 198 callbacks suppressed [ 330.248476][ T29] audit: type=1400 audit(1727502085.484:2772): avc: denied { mounton } for pid=11910 comm="syz.1.3188" path="/656/file0" dev="tmpfs" ino=3309 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 330.278823][ T29] audit: type=1400 audit(1727502085.493:2773): avc: denied { prog_load } for pid=11915 comm="syz.4.3190" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 330.298309][ T29] audit: type=1400 audit(1727502085.521:2774): avc: denied { read write } for pid=5232 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 330.322896][ T29] audit: type=1400 audit(1727502085.540:2775): avc: denied { read write } for pid=5233 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 330.322964][ T29] audit: type=1400 audit(1727502085.558:2776): avc: denied { read } for pid=11917 comm="syz.4.3191" name="v4l-subdev6" dev="devtmpfs" ino=863 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 330.323019][ T29] audit: type=1400 audit(1727502085.596:2777): avc: denied { read write } for pid=5227 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 330.323078][ T29] audit: type=1400 audit(1727502085.615:2778): avc: denied { read write } for pid=5222 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 330.323142][ T29] audit: type=1400 audit(1727502085.624:2779): avc: denied { read } for pid=4655 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 330.359979][ T29] audit: type=1400 audit(1727502085.652:2780): avc: denied { read write } for pid=5232 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 330.360046][ T29] audit: type=1400 audit(1727502085.652:2781): avc: denied { read write } for pid=5234 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Sep 28 05:41:25 syzkaller kern.warn kernel: [ 330.248451][ T29] kauditd_printk_skb: 198 callbacks suppressed Sep 28 05:41:25 syzkaller kern.notice kernel: [ 330.248476][ T29] audit: type=1400 audit(1727502085.484:2772): avc: denied { mounton } for pid=11910 comm="syz.1.3188" path="/656/file0" dev="tmpfs" ino=3309 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tm Sep 28 05:41:25 syzkaller kern.notice kernel: [ 330.278823][ T29] audit: type=1400 audit(1727502085.493:2773): avc: denied { prog_load } for pid=11915 comm="syz.4.3190" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Sep 28 05:41:25 syzkaller kern.notice kernel: [ 330.298309][ T29] audit: type=1400 audit(1727502085.521:2774): avc: denied { read write } for pid=5232 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Sep 28 05:41:25 syzkaller kern.notice kernel: [ 330.322896][ T29] audit: type=1400 audit(1727502085.540:2775): avc: denied { read write } for pid=5233 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Sep 28 05:41:25 syzkaller kern.notice kernel: [ 330.322964][ T29] audit: type=1400 audit(1727502085.558:2776): avc: denied { read } for pid=11917 comm="syz.4.3191" name="v4l-subdev6" dev="devtmpfs" ino=863 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dev Sep 28 05:41:25 syzkaller kern.notice kernel: [ 330.323019][ T29] audit: type=1400 audit(1727502085.596:2777): avc: denied { read write } for pid=5227 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Sep 28 05:41:25 syzkaller kern.notice kernel: [ 330.323078][ T29] audit: type=1400 audit(1727502085.615:2778): avc: denied { read write } for pid=5222 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Sep 28 05:41:25 syzkaller kern.notice kernel: [ 330.323142][ T29] audit: type=1400 audit(1727502085.624:2779): avc: denied { read } for pid=4655 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Sep 28 05:41:25 syzkaller kern.notice kernel: [ 330.359979][ T29] audit: type=1400 audit(1727502085.652:2780): avc: denied { read write } for pid=5232 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Sep 28 05:41:25 syzkaller kern.notice kernel: [ 330.360046][ T29] audit: type=1400 audit(1727502085.652:2781): avc: denied { read write } for pid=5234 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 332.044161][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 332.056882][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 332.069398][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 332.081849][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 332.094339][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 332.101755][ T1268] ieee802154 phy0 wpan0: encryption failed: -22 [ 332.106764][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 332.112759][ T1268] ieee802154 phy1 wpan1: encryption failed: -22 [ 332.125033][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 332.143443][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 332.155913][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 332.168402][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) Sep 28 05:41:27 syzkaller kern.warn kernel: [ 332.044161][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) Sep 28 05:41:27 syzkaller kern.warn kernel: [ 332.056882][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) Sep 28 05:41:27 syzkaller kern.warn kernel: [ 332.069398][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) Sep 28 05:41:27 syzkaller kern.warn kernel: [ 332.081849][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) Sep 28 05:41:27 syzkaller kern.warn kernel: [ 332.094339][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) Sep 28 05:41:27 syzkaller kern.warn kernel: [ 332.101755][ T1268] ieee802154 phy0 wpan0: encryption failed: -22 Sep 28 05:41:27 syzkaller kern.warn kernel: [ 332.106764][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) Sep 28 05:41:27 syzkaller kern.warn kernel: [ 332.112759][ T1268] ieee802154 phy1 wpan1: encryption failed: -22 Sep 28 05:41:27 syzkaller kern.warn kernel: [ 332.125033][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) Sep 28 05:41:27 syzkaller kern.warn kernel: [ 332.143443][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) Sep 28 05:41:27 syzkaller kern.warn kernel: [ 332.155913][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) Sep 28 05:41:27 syzkaller kern.warn kernel: [ 332.168402][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 333.557922][T12033] ip6t_rpfilter: unknown options Sep 28 05:41:28 syzkaller kern.info kernel: [ 333.557922][T12033] ip6t_rpfilter: unknown options [ 335.600505][ T29] kauditd_printk_skb: 141 callbacks suppressed [ 335.600530][ T29] audit: type=1400 audit(1727502090.563:2923): avc: denied { read } for pid=12075 comm="syz.1.3271" name="fb0" dev="devtmpfs" ino=629 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=0 Sep 28 05:41:30 syzkaller kern.warn kernel: [ 335.600505][ T29] kauditd_printk_skb: 141 callbacks suppressed Sep 28 05:41:30 syzkaller kern.notice kernel: [ 335.600530][ T29] audit: type=1400 audit(1727502090.563:2923): avc: denied { read } for pid=12075 comm="syz.1.3271" name="fb0" dev="devtmpfs" ino=629 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_de [ 335.812182][ T29] audit: type=1400 audit(1727502090.591:2924): avc: denied { read } for pid=4655 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Sep 28 05:41:30 syzkaller kern.notice kernel: [ 335.812182][ T29] audit: type=1400 audit(1727502090.591:2924): avc: denied { read } for pid=4655 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 335.978459][ T29] audit: type=1400 audit(1727502090.591:2925): avc: denied { read } for pid=4655 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Sep 28 05:41:30 syzkaller kern.notice kernel: [ 335.978459][ T29] audit: type=1400 audit(1727502090.591:2925): avc: denied { read } for pid=4655 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 336.130311][ T29] audit: type=1400 audit(1727502090.694:2926): avc: denied { read write } for pid=5234 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Sep 28 05:41:31 syzkaller kern.notice kernel: [ 336.130311][ T29] audit: type=1400 audit(1727502090.694:2926): avc: denied { read write } for pid=5234 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 336.331623][ T29] audit: type=1400 audit(1727502090.703:2927): avc: denied { read write } for pid=5232 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Sep 28 05:41:31 syzkaller kern.notice kernel: [ 336.331623][ T29] audit: type=1400 audit(1727502090.703:2927): avc: denied { read write } for pid=5232 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 336.514466][ T29] audit: type=1400 audit(1727502090.750:2928): avc: denied { read write } for pid=5222 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Sep 28 05:41:31 syzkaller kern.notice kernel: [ 336.514466][ T29] audit: type=1400 audit(1727502090.750:2928): avc: denied { read write } for pid=5222 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 336.742130][ T29] audit: type=1400 audit(1727502090.778:2929): avc: denied { read write } for pid=5233 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Sep 28 05:41:31 syzkaller kern.notice kernel: [ 336.742130][ T29] audit: type=1400 audit(1727502090.778:2929): avc: denied { read write } for pid=5233 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 336.944994][ T29] audit: type=1400 audit(1727502090.806:2930): avc: denied { read } for pid=4655 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Sep 28 05:41:31 syzkaller kern.notice kernel: [ 336.944994][ T29] audit: type=1400 audit(1727502090.806:2930): avc: denied { read } for pid=4655 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 337.103946][ T29] audit: type=1400 audit(1727502090.937:2931): avc: denied { read } for pid=4655 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Sep 28 05:41:32 syzkaller kern.notice kernel: [ 337.103946][ T29] audit: type=1400 audit(1727502090.937:2931): avc: denied { read } for pid=4655 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 337.261266][ T29] audit: type=1400 audit(1727502090.984:2932): avc: denied { mounton } for pid=12082 comm="syz.2.3273" path="/585/file1" dev="tmpfs" ino=2953 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 Sep 28 05:41:32 syzkaller kern.notice kernel: [ 337.261266][ T29] audit: type=1400 audit(1727502090.984:2932): avc: denied { mounton } for pid=12082 comm="syz.2.3273" path="/585/file1" dev="tmpfs" ino=2953 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tm [ 337.394298][ C0] net_ratelimit: 14544 callbacks suppressed [ 337.394327][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 337.412753][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 337.425274][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 337.425643][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 337.426013][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 337.426472][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 337.426860][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 337.427230][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 337.427605][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 337.427979][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 337.450959][T12111] netlink: 'syz.0.3287': attribute type 1 has an invalid length. [ 338.001490][ T16] sched: DL replenish lagged too much Sep 28 05:41:32 syzkaller kern.warn kernel: [ 337.394298][ C0] net_ratelimit: 14544 callbacks suppressed Sep 28 05:41:32 syzkaller kern.warn kernel: [ 337.394327][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) Sep 28 05:41:32 syzkaller kern.warn kernel: [ 337.412753][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) Sep 28 05:41:32 syzkaller kern.warn kernel: [ 337.425274][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) Sep 28 05:41:32 syzkaller kern.warn kernel: [ 337.425643][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) Sep 28 05:41:32 syzkaller kern.warn kernel: [ 337.426013][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) Sep 28 05:41:32 syzkaller kern.warn kernel: [ 337.426472][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) Sep 28 05:41:32 syzkaller kern.warn kernel: [ 337.426860][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) Sep 28 05:41:32 syzkaller kern.warn kernel: [ 337.427230][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) Sep 28 05:41:32 syzkaller kern.warn kernel: [ 337.427605][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) Sep 28 05:41:32 syzkaller kern.warn kernel: [ 337.427979][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) Sep 28 05:41:32 syzkaller kern.warn kernel: [ 337.450959][T12111] netlink: 'syz.0.3287': attribute type 1 has an invalid length. Sep 28 05:41:32 syzkaller kern.warn kernel: [ 338.001490][ T16] sched: DL replenish lagged too much [ 341.046735][ T29] kauditd_printk_skb: 96 callbacks suppressed [ 341.046758][ T29] audit: type=1400 audit(1727502095.651:3029): avc: denied { read write } for pid=5234 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Sep 28 05:41:35 syzkaller kern.warn kernel: [ 341.046735][ T29] kauditd_printk_skb: 96 callbacks suppressed Sep 28 05:41:35 syzkaller kern.notice kernel: [ 341.046758][ T29] audit: type=1400 audit(1727502095.651:3029): avc: denied { read write } for pid=5234 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 341.243663][ T29] audit: type=1400 audit(1727502095.698:3030): avc: denied { read } for pid=4655 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Sep 28 05:41:35 syzkaller kern.notice kernel: [ 341.243663][ T29] audit: type=1400 audit(1727502095.698:3030): avc: denied { read } for pid=4655 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 341.440546][ T29] audit: type=1400 audit(1727502095.736:3031): avc: denied { read } for pid=4655 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Sep 28 05:41:36 syzkaller kern.notice kernel: [ 341.440546][ T29] audit: type=1400 audit(1727502095.736:3031): avc: denied { read } for pid=4655 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 341.594539][ T29] audit: type=1400 audit(1727502095.857:3032): avc: denied { read } for pid=4655 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Sep 28 05:41:36 syzkaller kern.notice kernel: [ 341.594539][ T29] audit: type=1400 audit(1727502095.857:3032): avc: denied { read } for pid=4655 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 341.756058][ T29] audit: type=1400 audit(1727502095.941:3033): avc: denied { read write } for pid=5222 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Sep 28 05:41:36 syzkaller kern.notice kernel: [ 341.756058][ T29] audit: type=1400 audit(1727502095.941:3033): avc: denied { read write } for pid=5222 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 341.916405][ T29] audit: type=1400 audit(1727502095.960:3034): avc: denied { read write } for pid=5233 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Sep 28 05:41:36 syzkaller kern.notice kernel: [ 341.916405][ T29] audit: type=1400 audit(1727502095.960:3034): avc: denied { read write } for pid=5233 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 342.082046][ T29] audit: type=1400 audit(1727502095.969:3035): avc: denied { read write } for pid=5232 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Sep 28 05:41:36 syzkaller kern.notice kernel: [ 342.082046][ T29] audit: type=1400 audit(1727502095.969:3035): avc: denied { read write } for pid=5232 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 342.210592][ T29] audit: type=1400 audit(1727502095.997:3036): avc: denied { read write } for pid=5227 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Sep 28 05:41:36 syzkaller kern.notice kernel: [ 342.210592][ T29] audit: type=1400 audit(1727502095.997:3036): avc: denied { read write } for pid=5227 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 342.382941][ T29] audit: type=1400 audit(1727502096.054:3037): avc: denied { read } for pid=4655 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Sep 28 05:41:36 syzkaller kern.notice kernel: [ 342.382941][ T29] audit: type=1400 audit(1727502096.054:3037): avc: denied { read } for pid=4655 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 342.528093][ T29] audit: type=1400 audit(1727502096.128:3038): avc: denied { read write } for pid=5234 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Sep 28 05:41:37 syzkaller kern.notice kernel: [ 342.528093][ T29] audit: type=1400 audit(1727502096.128:3038): avc: denied { read write } for pid=5234 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 342.750434][ C0] net_ratelimit: 15081 callbacks suppressed [ 342.750462][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 342.769080][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 342.769491][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 342.769893][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 342.770268][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 342.770651][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 342.771048][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 342.771522][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 342.771890][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 342.772261][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) Sep 28 05:41:37 syzkaller kern.warn kernel: [ 342.750434][ C0] net_ratelimit: 15081 callbacks suppressed Sep 28 05:41:37 syzkaller kern.warn kernel: [ 342.750462][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) Sep 28 05:41:37 syzkaller kern.warn kernel: [ 342.769080][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) Sep 28 05:41:37 syzkaller kern.warn kernel: [ 342.769491][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) Sep 28 05:41:37 syzkaller kern.warn kernel: [ 342.769893][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) Sep 28 05:41:37 syzkaller kern.warn kernel: [ 342.770268][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) Sep 28 05:41:37 syzkaller kern.warn kernel: [ 342.770651][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) Sep 28 05:41:37 syzkaller kern.warn kernel: [ 342.771048][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) Sep 28 05:41:37 syzkaller kern.warn kernel: [ 342.771522][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) Sep 28 05:41:37 syzkaller kern.warn kernel: [ 342.771890][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) Sep 28 05:41:37 syzkaller kern.warn kernel: [ 342.772261][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 346.529927][ T29] kauditd_printk_skb: 81 callbacks suppressed [ 346.529949][ T29] audit: type=1400 audit(1727502100.777:3120): avc: denied { read write } for pid=5234 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Sep 28 05:41:40 syzkaller kern.warn kernel: [ 346.529927][ T29] kauditd_printk_skb: 81 callbacks suppressed Sep 28 05:41:40 syzkaller kern.notice kernel: [ 346.529949][ T29] audit: type=1400 audit(1727502100.777:3120): avc: denied { read write } for pid=5234 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 346.769942][ T29] audit: type=1400 audit(1727502100.852:3121): avc: denied { read } for pid=4655 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Sep 28 05:41:41 syzkaller kern.notice kernel: [ 346.769942][ T29] audit: type=1400 audit(1727502100.852:3121): avc: denied { read } for pid=4655 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 346.950807][ T29] audit: type=1400 audit(1727502100.852:3122): avc: denied { read } for pid=4655 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Sep 28 05:41:41 syzkaller kern.notice kernel: [ 346.950807][ T29] audit: type=1400 audit(1727502100.852:3122): avc: denied { read } for pid=4655 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 347.138861][ T29] audit: type=1400 audit(1727502100.899:3123): avc: denied { view } for pid=12288 comm="syz.3.3374" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=0 Sep 28 05:41:41 syzkaller kern.notice kernel: [ 347.138861][ T29] audit: type=1400 audit(1727502100.899:3123): avc: denied { view } for pid=12288 comm="syz.3.3374" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=0 [ 347.300466][ T29] audit: type=1400 audit(1727502100.899:3124): avc: denied { view } for pid=12288 comm="syz.3.3374" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=0 Sep 28 05:41:41 syzkaller kern.notice kernel: [ 347.300466][ T29] audit: type=1400 audit(1727502100.899:3124): avc: denied { view } for pid=12288 comm="syz.3.3374" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=0 [ 347.484086][ T29] audit: type=1400 audit(1727502100.899:3125): avc: denied { view } for pid=12288 comm="syz.3.3374" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=0 Sep 28 05:41:41 syzkaller kern.notice kernel: [ 347.484086][ T29] audit: type=1400 audit(1727502100.899:3125): avc: denied { view } for pid=12288 comm="syz.3.3374" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=0 [ 347.659499][ T29] audit: type=1400 audit(1727502100.899:3126): avc: denied { view } for pid=12288 comm="syz.3.3374" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=0 Sep 28 05:41:41 syzkaller kern.notice kernel: [ 347.659499][ T29] audit: type=1400 audit(1727502100.899:3126): avc: denied { view } for pid=12288 comm="syz.3.3374" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=0 [ 347.809225][ T29] audit: type=1400 audit(1727502100.899:3127): avc: denied { view } for pid=12288 comm="syz.3.3374" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=0 Sep 28 05:41:42 syzkaller kern.notice kernel: [ 347.809225][ T29] audit: type=1400 audit(1727502100.899:3127): avc: denied { view } for pid=12288 comm="syz.3.3374" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=0 [ 347.935213][ T29] audit: type=1400 audit(1727502100.899:3128): avc: denied { view } for pid=12288 comm="syz.3.3374" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=0 Sep 28 05:41:42 syzkaller kern.notice kernel: [ 347.935213][ T29] audit: type=1400 audit(1727502100.899:3128): avc: denied { view } for pid=12288 comm="syz.3.3374" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=0 [ 348.023698][T12310] netlink: 52 bytes leftover after parsing attributes in process `syz.2.3384'. [ 348.067350][ T29] audit: type=1400 audit(1727502100.899:3129): avc: denied { view } for pid=12288 comm="syz.3.3374" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=0 [ 348.106279][ C0] net_ratelimit: 15323 callbacks suppressed [ 348.106306][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 348.124715][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 348.125071][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 348.125416][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 348.125763][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 348.126105][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 348.126477][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 348.126823][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 348.127156][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 348.223537][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) Sep 28 05:41:42 syzkaller kern.warn kernel: [ 348.023698][T12310] netlink: 52 bytes leftover after parsing attributes in process `syz.2.3384'. Sep 28 05:41:42 syzkaller kern.notice kernel: [ 348.067350][ T29] audit: type=1400 audit(1727502100.899:3129): avc: denied { view } for pid=12288 comm="syz.3.3374" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=0 Sep 28 05:41:42 syzkaller kern.warn kernel: [ 348.106279][ C0] net_ratelimit: 15323 callbacks suppressed Sep 28 05:41:42 syzkaller kern.warn kernel: [ 348.106306][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) Sep 28 05:41:42 syzkaller kern.warn kernel: [ 348.124715][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) Sep 28 05:41:42 syzkaller kern.warn kernel: [ 348.125071][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) Sep 28 05:41:42 syzkaller kern.warn kernel: [ 348.125416][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) Sep 28 05:41:42 syzkaller kern.warn kernel: [ 348.125763][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) Sep 28 05:41:42 syzkaller kern.warn kernel: [ 348.126105][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) Sep 28 05:41:42 syzkaller kern.warn kernel: [ 348.126477][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) Sep 28 05:41:42 syzkaller kern.warn kernel: [ 348.126823][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) Sep 28 05:41:42 syzkaller kern.warn kernel: [ 348.127156][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) Sep 28 05:41:42 syzkaller kern.warn kernel: [ 348.223537][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) Sep 28 05:41:43 syzkaller kern.debug kernel: [ 349.481678][T12336] PM: Image not found (code -6) [ 351.937592][ T29] kauditd_printk_skb: 118 callbacks suppressed [ 351.937623][ T29] audit: type=1400 audit(1727502105.838:3248): avc: denied { read write } for pid=5232 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Sep 28 05:41:45 syzkaller kern.warn kernel: [ 351.937592][ T29] kauditd_printk_skb: 118 callbacks suppressed Sep 28 05:41:45 syzkaller kern.notice kernel: [ 351.937623][ T29] audit: type=1400 audit(1727502105.838:3248): avc: denied { read write } for pid=5232 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 352.096678][T12399] tc_dump_action: action bad kind Sep 28 05:41:45 syzkaller kern.info kernel: [ 352.096678][T12399] tc_dump_action: action bad kind [ 352.131578][ T29] audit: type=1400 audit(1727502105.913:3249): avc: denied { read } for pid=4655 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Sep 28 05:41:46 syzkaller kern.notice kernel: [ 352.131578][ T29] audit: type=1400 audit(1727502105.913:3249): avc: denied { read } for pid=4655 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 352.283510][ T29] audit: type=1400 audit(1727502105.922:3250): avc: denied { read } for pid=4655 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Sep 28 05:41:46 syzkaller kern.notice kernel: [ 352.283510][ T29] audit: type=1400 audit(1727502105.922:3250): avc: denied { read } for pid=4655 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 352.435821][ T29] audit: type=1400 audit(1727502105.969:3251): avc: denied { read write } for pid=12396 comm="syz.1.3429" name="raw-gadget" dev="devtmpfs" ino=732 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 Sep 28 05:41:46 syzkaller kern.notice kernel: [ 352.435821][ T29] audit: type=1400 audit(1727502105.969:3251): avc: denied { read write } for pid=12396 comm="syz.1.3429" name="raw-gadget" dev="devtmpfs" ino=732 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_ [ 352.578594][ T29] audit: type=1400 audit(1727502105.997:3252): avc: denied { read } for pid=4655 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Sep 28 05:41:46 syzkaller kern.notice kernel: [ 352.578594][ T29] audit: type=1400 audit(1727502105.997:3252): avc: denied { read } for pid=4655 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 352.723402][ T29] audit: type=1400 audit(1727502106.081:3253): avc: denied { read } for pid=4655 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Sep 28 05:41:46 syzkaller kern.notice kernel: [ 352.723402][ T29] audit: type=1400 audit(1727502106.081:3253): avc: denied { read } for pid=4655 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 352.873441][ T29] audit: type=1400 audit(1727502106.109:3254): avc: denied { read write } for pid=5233 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Sep 28 05:41:46 syzkaller kern.notice kernel: [ 352.873441][ T29] audit: type=1400 audit(1727502106.109:3254): avc: denied { read write } for pid=5233 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 353.030900][ T29] audit: type=1400 audit(1727502106.118:3255): avc: denied { read } for pid=12400 comm="syz.4.3431" dev="nsfs" ino=4026533075 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 Sep 28 05:41:46 syzkaller kern.notice kernel: [ 353.030900][ T29] audit: type=1400 audit(1727502106.118:3255): avc: denied { read } for pid=12400 comm="syz.4.3431" dev="nsfs" ino=4026533075 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file [ 353.205564][ T29] audit: type=1400 audit(1727502106.137:3256): avc: denied { read write } for pid=5227 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Sep 28 05:41:47 syzkaller kern.notice kernel: [ 353.205564][ T29] audit: type=1400 audit(1727502106.137:3256): avc: denied { read write } for pid=5227 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 353.419597][ T29] audit: type=1400 audit(1727502106.165:3257): avc: denied { read write } for pid=5234 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 353.462328][ C0] net_ratelimit: 15560 callbacks suppressed [ 353.462355][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 353.480766][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 353.493313][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 353.493689][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 353.494086][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 353.494591][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 353.495071][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 353.495445][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 353.495822][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 353.496163][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) Sep 28 05:41:47 syzkaller kern.notice kernel: [ 353.419597][ T29] audit: type=1400 audit(1727502106.165:3257): avc: denied { read write } for pid=5234 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Sep 28 05:41:47 syzkaller kern.warn kernel: [ 353.462328][ C0] net_ratelimit: 15560 callbacks suppressed Sep 28 05:41:47 syzkaller kern.warn kernel: [ 353.462355][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) Sep 28 05:41:47 syzkaller kern.warn kernel: [ 353.480766][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) Sep 28 05:41:47 syzkaller kern.warn kernel: [ 353.493313][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) Sep 28 05:41:47 syzkaller kern.warn kernel: [ 353.493689][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) Sep 28 05:41:47 syzkaller kern.warn kernel: [ 353.494086][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) Sep 28 05:41:47 syzkaller kern.warn kernel: [ 353.494591][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) Sep 28 05:41:47 syzkaller kern.warn kernel: [ 353.495071][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) Sep 28 05:41:47 syzkaller kern.warn kernel: [ 353.495445][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) Sep 28 05:41:47 syzkaller kern.warn kernel: [ 353.495822][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) Sep 28 05:41:47 syzkaller kern.warn kernel: [ 353.496163][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 355.901172][T12473] xt_CT: No such helper "syz0" Sep 28 05:41:49 syzkaller kern.info kernel: [ 355.901172][T12473] xt_CT: No such helper "syz0" [ 356.670263][T12493] i2c i2c-0: Invalid block write size 34 Sep 28 05:41:50 syzkaller kern.err kernel: [ 356.670263][T12493] i2c i2c-0: Invalid block write size 34 [ 357.289439][ T29] kauditd_printk_skb: 101 callbacks suppressed [ 357.289466][ T29] audit: type=1400 audit(1727502110.842:3359): avc: denied { create } for pid=12504 comm="syz.3.3483" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=0 Sep 28 05:41:50 syzkaller kern.warn kernel: [ 357.289439][ T29] kauditd_printk_skb: 101 callbacks suppressed Sep 28 05:41:50 syzkaller kern.notice kernel: [ 357.289466][ T29] audit: type=1400 audit(1727502110.842:3359): avc: denied { create } for pid=12504 comm="syz.3.3483" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissi [ 357.454735][ T29] audit: type=1400 audit(1727502110.908:3360): avc: denied { read } for pid=4655 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Sep 28 05:41:51 syzkaller kern.notice kernel: [ 357.454735][ T29] audit: type=1400 audit(1727502110.908:3360): avc: denied { read } for pid=4655 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 357.652921][ T29] audit: type=1400 audit(1727502110.936:3361): avc: denied { read } for pid=4655 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Sep 28 05:41:51 syzkaller kern.notice kernel: [ 357.652921][ T29] audit: type=1400 audit(1727502110.936:3361): avc: denied { read } for pid=4655 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 357.830930][ T29] audit: type=1400 audit(1727502111.020:3362): avc: denied { read } for pid=4655 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Sep 28 05:41:51 syzkaller kern.notice kernel: [ 357.830930][ T29] audit: type=1400 audit(1727502111.020:3362): avc: denied { read } for pid=4655 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 357.993591][ T29] audit: type=1400 audit(1727502111.029:3363): avc: denied { create } for pid=12508 comm="syz.0.3484" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 Sep 28 05:41:51 syzkaller kern.notice kernel: [ 357.993591][ T29] audit: type=1400 audit(1727502111.029:3363): avc: denied { create } for pid=12508 comm="syz.0.3484" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permis [ 358.175796][ T29] audit: type=1400 audit(1727502111.048:3364): avc: denied { read write } for pid=5233 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Sep 28 05:41:51 syzkaller kern.notice kernel: [ 358.175796][ T29] audit: type=1400 audit(1727502111.048:3364): avc: denied { read write } for pid=5233 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 358.365796][ T29] audit: type=1400 audit(1727502111.104:3365): avc: denied { read write } for pid=12512 comm="syz.2.3487" name="video1" dev="devtmpfs" ino=848 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l_device_t tclass=chr_file permissive=0 Sep 28 05:41:51 syzkaller kern.notice kernel: [ 358.365796][ T29] audit: type=1400 audit(1727502111.104:3365): avc: denied { read write } for pid=12512 comm="syz.2.3487" name="video1" dev="devtmpfs" ino=848 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4 [ 358.549055][ T29] audit: type=1400 audit(1727502111.235:3366): avc: denied { read write } for pid=5232 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Sep 28 05:41:52 syzkaller kern.notice kernel: [ 358.549055][ T29] audit: type=1400 audit(1727502111.235:3366): avc: denied { read write } for pid=5232 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 358.754006][ T29] audit: type=1400 audit(1727502111.235:3367): avc: denied { read } for pid=4655 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Sep 28 05:41:52 syzkaller kern.notice kernel: [ [ 358.818146][ C0] net_ratelimit: 15863 callbacks suppressed 358.754006][ [ 358.818171][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) T29] audit: type[ 358.839535][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) =1400 audit(1727502111.235:3367): avc: denied { read } for pid=4655 comm="sys[ 358.852835][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) logd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 358.853186][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 358.853549][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 358.854044][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 358.854399][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 358.854761][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 358.855251][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 358.855646][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 358.949461][ T29] audit: type=1400 audit(1727502111.244:3368): avc: denied { read write } for pid=5222 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Sep 28 05:41:52 syzkaller kern.warn kernel: [ 358.818146][ C0] net_ratelimit: 15863 callbacks suppressed Sep 28 05:41:52 syzkaller kern.warn kernel: [ 358.818171][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) Sep 28 05:41:52 syzkaller kern.warn kernel: [ 358.839535][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) Sep 28 05:41:52 syzkaller kern.warn kernel: [ 358.852835][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) Sep 28 05:41:52 syzkaller kern.warn kernel: [ 358.853186][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) Sep 28 05:41:52 syzkaller kern.warn kernel: [ 358.853549][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) Sep 28 05:41:52 syzkaller kern.warn kernel: [ 358.854044][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) Sep 28 05:41:52 syzkaller kern.warn kernel: [ 358.854399][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) Sep 28 05:41:52 syzkaller kern.warn kernel: [ 358.854761][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) Sep 28 05:41:52 syzkaller kern.warn kernel: [ 358.855251][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) Sep 28 05:41:52 syzkaller kern.warn kernel: [ 358.855646][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) Sep 28 05:41:52 syzkaller kern.notice kernel: [ 358.949461][ T29] audit: type=1400 audit(1727502111.244:3368): avc: denied { read write } for pid=5222 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 360.199048][ T1183] IPVS: starting estimator thread 0... Sep 28 05:41:53 syzkaller kern.info kernel: [ 360.199048][ T1183] IPVS: starting estimator thread 0... [ 360.365426][T12564] IPVS: using max 17 ests per chain, 40800 per kthread Sep 28 05:41:53 syzkaller kern.info kernel: [ 360.365426][T12564] IPVS: using max 17 ests per chain, 40800 per kthread [ 362.779730][ T29] kauditd_printk_skb: 105 callbacks suppressed [ 362.779764][ T29] audit: type=1400 audit(1727502115.978:3474): avc: denied { read write } for pid=5222 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Sep 28 05:41:56 syzkaller kern.warn kernel: [ 362.779730][ T29] kauditd_printk_skb: 105 callbacks suppressed Sep 28 05:41:56 syzkaller kern.notice kernel: [ 362.779764][ T29] audit: type=1400 audit(1727502115.978:3474): avc: denied { read write } for pid=5222 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 362.888744][ T29] audit: type=1400 audit(1727502116.024:3475): avc: denied { create } for pid=12620 comm="syz.2.3536" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 Sep 28 05:41:56 syzkaller kern.notice kernel: [ 362.888744][ T29] audit: type=1400 audit(1727502116.024:3475): avc: denied { create } for pid=12620 comm="syz.2.3536" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissi [ 362.984256][ T29] audit: type=1400 audit(1727502116.034:3476): avc: denied { create } for pid=12620 comm="syz.2.3536" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 Sep 28 05:41:56 syzkaller kern.notice kernel: [ 362.984256][ T29] audit: type=1400 audit(1727502116.034:3476): avc: denied { create } for pid=12620 comm="syz.2.3536" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissi [ 363.088127][ T29] audit: type=1400 audit(1727502116.043:3477): avc: denied { read } for pid=4655 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Sep 28 05:41:56 syzkaller kern.notice kernel: [ 363.088127][ T29] audit: type=1400 audit(1727502116.043:3477): avc: denied { read } for pid=4655 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 363.190851][ T29] audit: type=1400 audit(1727502116.043:3478): avc: denied { read } for pid=4655 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Sep 28 05:41:56 syzkaller kern.notice kernel: [ 363.190851][ T29] audit: type=1400 audit(1727502116.043:3478): avc: denied { read } for pid=4655 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 363.304622][ T29] audit: type=1400 audit(1727502116.109:3479): avc: denied { read } for pid=4655 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Sep 28 05:41:56 syzkaller kern.notice kernel: [ 363.304622][ T29] audit: type=1400 audit(1727502116.109:3479): avc: denied { read } for pid=4655 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 363.410290][ T29] audit: type=1400 audit(1727502116.118:3480): avc: denied { read write } for pid=5232 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Sep 28 05:41:56 syzkaller kern.notice kernel: [ 363.410290][ T29] audit: type=1400 audit(1727502116.118:3480): avc: denied { read write } for pid=5232 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 363.516578][ T29] audit: type=1400 audit(1727502116.127:3481): avc: denied { read write } for pid=5234 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Sep 28 05:41:56 syzkaller kern.notice kernel: [ 363.516578][ T29] audit: type=1400 audit(1727502116.127:3481): avc: denied { read write } for pid=5234 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 363.627288][ T29] audit: type=1400 audit(1727502116.211:3482): avc: denied { read } for pid=4655 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Sep 28 05:41:56 syzkaller kern.notice kernel: [ 363.627288][ T29] audit: type=1400 audit(1727502116.211:3482): avc: denied { read } for pid=4655 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 363.724160][ T29] audit: type=1400 audit(1727502116.221:3483): avc: denied { read write } for pid=5227 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Sep 28 05:41:56 syzkaller kern.notice kernel: [ 363.724160][ T29] audit: type=1400 audit(1727502116.221:3483): avc: denied { read write } for pid=5227 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Sep 28 05:41:57 syzkaller daemon.info dhcpcd[4887]: lapb4: carrier lost [ 364.174791][ C0] net_ratelimit: 6321 callbacks suppressed [ 364.174823][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 364.194700][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 364.207809][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 364.220940][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 364.234029][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 364.247115][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 364.260299][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 364.273444][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) Sep 28 05:41:57 [ 364.286674][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) syzkaller kern.w[ 364.300197][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) arn kernel: [ 364.174791][ C0] net_ratelimit: 6321 callbacks suppressed Sep 28 05:41:57 syzkaller kern.warn kernel: [ 364.174823][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) Sep 28 05:41:57 syzkaller kern.warn kernel: [ 364.194700][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) Sep 28 05:41:57 syzkaller kern.warn kernel: [ 364.207809][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) Sep 28 05:41:57 syzkaller kern.warn kernel: [ 364.220940][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) Sep 28 05:41:57 syzkaller kern.warn kernel: [ 364.234029][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) Sep 28 05:41:57 syzkaller kern.warn kernel: [ 364.247115][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) Sep 28 05:41:57 syzkaller kern.warn kernel: [ 364.260299][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) Sep 28 05:41:57 syzkaller kern.warn kernel: [ 364.273444][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) Sep 28 05:41:57 syzkaller kern.warn kernel: [ 364.286674][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) Sep 28 05:41:57 syzkaller kern.warn kernel: [ 364.300197][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 365.486767][T12637] Bluetooth: hci2: Opcode 0x0c1a failed: -4 [ 369.530215][ C0] net_ratelimit: 18070 callbacks suppressed [ 369.530241][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 369.530275][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 369.537301][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 369.548531][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 369.561325][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 369.573176][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 369.585209][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 369.596423][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 369.610284][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 369.620525][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 374.886078][ C1] net_ratelimit: 22640 callbacks suppressed [ 374.886105][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 374.886571][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 374.892372][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 374.904377][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 374.916512][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 374.929286][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 374.940208][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 374.952257][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 374.964277][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 374.976980][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 380.242122][ C1] net_ratelimit: 23151 callbacks suppressed [ 380.242166][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 380.242371][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 380.248491][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 380.260274][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 380.272289][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 380.285159][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 380.296315][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 380.308038][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 380.320073][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 380.332840][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 385.598204][ C1] net_ratelimit: 23189 callbacks suppressed [ 385.598231][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 385.599254][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 385.604442][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 385.616442][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 385.628537][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 385.641253][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 385.652236][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 385.664220][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 385.676363][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 385.689039][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 390.954157][ C0] net_ratelimit: 23041 callbacks suppressed [ 390.954183][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 390.954425][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 390.961236][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 390.972402][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 390.984223][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 390.996249][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 391.009176][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 391.020262][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 391.032019][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 391.044005][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 396.310362][ C1] net_ratelimit: 22785 callbacks suppressed [ 396.310388][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 396.310479][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 396.316575][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 396.328636][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 396.340717][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 396.353461][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 396.364387][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 396.376432][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 396.388529][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 396.401212][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 401.666266][ C1] net_ratelimit: 22991 callbacks suppressed [ 401.666293][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 401.667086][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 401.672612][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 401.684387][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 401.696386][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 401.709382][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 401.720481][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 401.732439][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 401.744215][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 401.757030][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 407.022164][ C1] net_ratelimit: 23201 callbacks suppressed [ 407.022190][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 407.022613][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 407.028375][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 407.040376][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 407.052488][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 407.065793][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 407.076258][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 407.088229][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 407.100366][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 407.113016][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 412.378114][ C0] net_ratelimit: 23323 callbacks suppressed [ 412.378140][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 412.378165][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 412.385144][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 412.396358][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 412.408150][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 412.420135][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 412.432986][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 412.444160][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 412.455965][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 412.467976][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 417.734259][ C1] net_ratelimit: 22939 callbacks suppressed [ 417.734285][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 417.735357][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 417.740639][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 417.752470][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 417.764457][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 417.777559][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 417.788557][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 417.800382][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 417.812334][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 417.825317][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 423.090233][ C1] net_ratelimit: 22745 callbacks suppressed [ 423.090262][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 423.090277][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 423.091452][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 423.096604][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 423.108362][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 423.120293][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 423.133220][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 423.144355][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 423.156153][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 423.168046][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 428.446031][ C0] net_ratelimit: 22996 callbacks suppressed [ 428.446067][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 428.446260][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 428.453139][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 428.464376][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 428.476085][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 428.488051][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 428.500866][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 428.512100][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 428.523853][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 428.535864][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 433.802211][ C1] net_ratelimit: 23002 callbacks suppressed [ 433.802239][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 433.802990][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 433.808461][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 433.820513][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 433.832653][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 433.846017][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 433.856284][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 433.868306][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 433.880393][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 433.893105][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 439.158200][ C0] net_ratelimit: 23039 callbacks suppressed [ 439.158230][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 439.158267][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 439.164490][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 439.176495][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 439.189396][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 439.200516][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 439.212303][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 439.224273][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 439.237159][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 439.248284][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 444.514090][ C1] net_ratelimit: 23000 callbacks suppressed [ 444.514119][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 444.514413][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 444.520300][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 444.532313][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 444.544464][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 444.557151][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 444.568113][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 444.580164][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 444.592253][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 444.604910][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 449.870074][ C1] net_ratelimit: 22687 callbacks suppressed [ 449.870101][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 449.870224][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 449.876586][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 449.889225][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 449.900335][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 449.912428][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 449.924534][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 449.937315][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 449.948236][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 449.960344][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 455.226075][ C1] net_ratelimit: 22558 callbacks suppressed [ 455.226104][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 455.226697][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 455.232511][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 455.244229][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 455.256204][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 455.269204][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 455.280233][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 455.292035][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 455.304010][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 455.316859][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 460.582151][ C1] net_ratelimit: 22781 callbacks suppressed [ 460.582178][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 460.582636][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 460.588376][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 460.600364][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 460.612457][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 460.625287][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 460.636136][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 460.648174][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 460.660266][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 460.673030][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 465.938209][ C1] net_ratelimit: 23268 callbacks suppressed [ 465.938234][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 465.938861][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 465.944568][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 465.956420][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 465.968433][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 465.981424][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 465.992501][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 466.004262][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 466.016248][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 466.029507][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 471.294013][ C0] net_ratelimit: 22347 callbacks suppressed [ 471.294042][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 471.294098][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 471.301241][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 471.312236][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 471.324294][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 471.336383][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 471.349121][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 471.360119][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 471.372369][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 471.384218][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 476.650094][ C0] net_ratelimit: 22585 callbacks suppressed [ 476.650126][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 476.650258][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 476.657318][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 476.668243][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 476.680267][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 476.692404][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 476.705089][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 476.716117][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 476.728143][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 476.740272][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 477.323478][ C1] rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: [ 477.330480][ C1] rcu: Tasks blocked on level-0 rcu_node (CPUs 0-1): P12655/1:b..l [ 477.338990][ C1] rcu: (detected by 1, t=10503 jiffies, g=49465, q=270 ncpus=2) [ 477.346756][ C1] task:syz.4.3551 state:R running task stack:25824 pid:12655 tgid:12655 ppid:5232 flags:0x00000000 [ 477.359538][ C1] Call Trace: [ 477.362941][ C1] [ 477.365912][ C1] __schedule+0xef5/0x5750 [ 477.370404][ C1] ? __pfx_stack_trace_consume_entry+0x10/0x10 [ 477.376616][ C1] ? __lock_acquire+0xbdd/0x3ce0 [ 477.381623][ C1] ? __pfx___schedule+0x10/0x10 [ 477.386536][ C1] ? hlock_class+0x4e/0x130 [ 477.391096][ C1] ? mark_lock+0xb5/0xc60 [ 477.395496][ C1] ? __pfx_mark_lock+0x10/0x10 [ 477.400331][ C1] preempt_schedule_irq+0x51/0x90 [ 477.405403][ C1] irqentry_exit+0x36/0x90 [ 477.409869][ C1] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 477.415910][ C1] RIP: 0010:write_comp_data+0x11/0x90 [ 477.421349][ C1] Code: cc cc cc cc 0f 1f 44 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 49 89 d2 49 89 f8 49 89 f1 65 48 8b 15 9f c5 76 7e <65> 8b 05 a0 c5 76 7e a9 00 01 ff 00 74 1d f6 c4 01 74 67 a9 00 00 [ 477.441008][ C1] RSP: 0018:ffffc90018c5f510 EFLAGS: 00000246 [ 477.447123][ C1] RAX: 0000000000000007 RBX: ffff88805dc09188 RCX: ffffffff8448f667 [ 477.455147][ C1] RDX: ffff888029215a00 RSI: 0000000000000000 RDI: 0000000000000005 [ 477.463158][ C1] RBP: ffffc90018c5f6a0 R08: 0000000000000005 R09: 0000000000000000 [ 477.471175][ C1] R10: 0000000000000800 R11: 0000000000000000 R12: 0000000000000800 [ 477.479192][ C1] R13: 0000000000000600 R14: ffffc90018c5f6a0 R15: dffffc0000000000 [ 477.487225][ C1] ? avtab_search_node+0x67/0x4b0 [ 477.492310][ C1] avtab_search_node+0x67/0x4b0 [ 477.497214][ C1] cond_compute_av+0x59/0x340 [ 477.501941][ C1] ? avtab_search_node+0x39d/0x4b0 [ 477.507106][ C1] context_struct_compute_av+0x839/0x1270 [ 477.512931][ C1] ? __pfx_context_struct_compute_av+0x10/0x10 [ 477.519163][ C1] security_compute_av+0x48f/0xfd0 [ 477.524385][ C1] ? kernel_clone+0xfd/0x960 [ 477.529061][ C1] avc_compute_av+0x86/0x5c0 [ 477.533716][ C1] avc_perm_nonode+0xaa/0x170 [ 477.538454][ C1] ? __pfx_avc_perm_nonode+0x10/0x10 [ 477.543799][ C1] ? avc_has_perm_noaudit+0x2b1/0x3a0 [ 477.549240][ C1] ? lock_acquire+0x2f/0xb0 [ 477.553791][ C1] ? avc_has_perm_noaudit+0x61/0x3a0 [ 477.559134][ C1] avc_has_perm_noaudit+0x2d2/0x3a0 [ 477.564399][ C1] avc_has_perm+0xc1/0x1c0 [ 477.568876][ C1] ? __pfx_avc_has_perm+0x10/0x10 [ 477.573958][ C1] ? __kmalloc_noprof+0x207/0x400 [ 477.579034][ C1] ? audit_alloc+0xa3/0x7b0 [ 477.583604][ C1] security_task_alloc+0xf7/0x260 [ 477.588690][ C1] copy_process+0x24cf/0x8dc0 [ 477.593447][ C1] ? __pfx___lock_acquire+0x10/0x10 [ 477.598755][ C1] ? __pfx_copy_process+0x10/0x10 [ 477.603843][ C1] ? __might_fault+0x13b/0x190 [ 477.608771][ C1] ? __pfx_lock_release+0x10/0x10 [ 477.613863][ C1] ? trace_lock_acquire+0x14a/0x1d0 [ 477.619126][ C1] ? lock_acquire+0x2f/0xb0 [ 477.623674][ C1] ? __might_fault+0xe3/0x190 [ 477.628411][ C1] ? __might_fault+0xe3/0x190 [ 477.633160][ C1] ? _copy_from_user+0x5d/0xf0 [ 477.637976][ C1] kernel_clone+0xfd/0x960 [ 477.642448][ C1] ? __pfx_kernel_clone+0x10/0x10 [ 477.647544][ C1] ? find_held_lock+0x2d/0x110 [ 477.652369][ C1] __do_sys_clone3+0x1f5/0x270 [ 477.657191][ C1] ? __pfx___do_sys_clone3+0x10/0x10 [ 477.662588][ C1] do_syscall_64+0xcd/0x250 [ 477.667153][ C1] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 477.673120][ C1] RIP: 0033:0x7faf75bb2029 [ 477.677600][ C1] RSP: 002b:00007fff5be78e08 EFLAGS: 00000206 ORIG_RAX: 00000000000001b3 [ 477.686065][ C1] RAX: ffffffffffffffda RBX: 00007faf75b34960 RCX: 00007faf75bb2029 [ 477.694077][ C1] RDX: 00007faf75b34960 RSI: 0000000000000058 RDI: 00007fff5be78e50 [ 477.702095][ C1] RBP: 00007faf769386c0 R08: 00007faf769386c0 R09: 00007fff5be78f37 [ 477.710114][ C1] R10: 0000000000000008 R11: 0000000000000206 R12: ffffffffffffffa8 [ 477.718136][ C1] R13: 000000000000000b R14: 00007fff5be78e50 R15: 00007fff5be78f38 [ 477.726187][ C1] [ 477.729337][ C1] rcu: rcu_preempt kthread starved for 10466 jiffies! g49465 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=1 [ 477.740589][ C1] rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. [ 477.750593][ C1] rcu: RCU grace-period kthread stack dump: [ 477.756510][ C1] task:rcu_preempt state:R running task stack:27696 pid:17 tgid:17 ppid:2 flags:0x00004000 [ 477.768351][ C1] Call Trace: [ 477.771662][ C1] [ 477.774627][ C1] __schedule+0xef5/0x5750 [ 477.779100][ C1] ? __pfx___lock_acquire+0x10/0x10 [ 477.784397][ C1] ? _raw_spin_lock_irqsave+0x42/0x60 [ 477.789841][ C1] ? __pfx___schedule+0x10/0x10 [ 477.794753][ C1] ? schedule+0x298/0x350 [ 477.799133][ C1] ? __pfx_lock_release+0x10/0x10 [ 477.804246][ C1] ? trace_lock_acquire+0x14a/0x1d0 [ 477.809506][ C1] ? lock_acquire+0x2f/0xb0 [ 477.814058][ C1] ? schedule+0x1fd/0x350 [ 477.818447][ C1] schedule+0xe7/0x350 [ 477.822570][ C1] schedule_timeout+0x136/0x2a0 [ 477.827478][ C1] ? __pfx_schedule_timeout+0x10/0x10 [ 477.832920][ C1] ? __pfx_process_timeout+0x10/0x10 [ 477.838266][ C1] ? _raw_spin_unlock_irqrestore+0x3b/0x80 [ 477.844139][ C1] ? prepare_to_swait_event+0xf3/0x470 [ 477.849661][ C1] rcu_gp_fqs_loop+0x1eb/0xb00 [ 477.854476][ C1] ? __pfx_rcu_gp_fqs_loop+0x10/0x10 [ 477.859806][ C1] ? rcu_gp_init+0xc82/0x1630 [ 477.864550][ C1] ? _raw_spin_unlock_irq+0x2e/0x50 [ 477.869807][ C1] ? _raw_spin_unlock_irqrestore+0x52/0x80 [ 477.875693][ C1] rcu_gp_kthread+0x271/0x380 [ 477.880415][ C1] ? __pfx_rcu_gp_kthread+0x10/0x10 [ 477.885754][ C1] ? lockdep_hardirqs_on+0x7c/0x110 [ 477.891006][ C1] ? __kthread_parkme+0x148/0x220 [ 477.896103][ C1] ? __pfx_rcu_gp_kthread+0x10/0x10 [ 477.901355][ C1] kthread+0x2c1/0x3a0 [ 477.905480][ C1] ? _raw_spin_unlock_irq+0x23/0x50 [ 477.910725][ C1] ? __pfx_kthread+0x10/0x10 [ 477.915365][ C1] ret_from_fork+0x45/0x80 [ 477.919828][ C1] ? __pfx_kthread+0x10/0x10 [ 477.924488][ C1] ret_from_fork_asm+0x1a/0x30 [ 477.929330][ C1] [ 477.932398][ C1] rcu: Stack dump where RCU GP kthread last ran: [ 477.938798][ C1] CPU: 1 UID: 0 PID: 25 Comm: kworker/1:0 Not tainted 6.11.0-syzkaller-11728-gad46e8f95e93 #0 [ 477.949099][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 477.959203][ C1] Workqueue: events nsim_dev_trap_report_work [ 477.965343][ C1] RIP: 0010:debug_lockdep_rcu_enabled+0x0/0x40 [ 477.971558][ C1] Code: 00 00 00 eb b6 e8 30 fa ff ff eb b6 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1e fa 8b 05 0a 08 3e 05 85 c0 74 20 8b 05 34 3a 3e 05 85 c0 [ 477.991216][ C1] RSP: 0018:ffffc90000a183e0 EFLAGS: 00000246 [ 477.997334][ C1] RAX: 0000000000000000 RBX: 0000000000000003 RCX: ffffffff89c8fe2f [ 478.005368][ C1] RDX: ffff88801d6f9e00 RSI: ffffffff89c8fe43 RDI: 0000000000000001 [ 478.013400][ C1] RBP: ffffc90000a184d0 R08: 0000000000000001 R09: 0000000000000000 [ 478.021414][ C1] R10: 0000000000000000 R11: 0000000000000000 R12: ffff88807c29accf [ 478.029425][ C1] R13: 1ffff92000143088 R14: ffff88807c29acb8 R15: ffff888031a37000 [ 478.037443][ C1] FS: 0000000000000000(0000) GS:ffff8880b8700000(0000) knlGS:0000000000000000 [ 478.046431][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 478.053062][ C1] CR2: 0000555591116588 CR3: 000000007db5c000 CR4: 00000000003506f0 [ 478.061091][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 478.069111][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 478.077131][ C1] Call Trace: [ 478.080441][ C1] [ 478.083318][ C1] ? rcu_check_gp_kthread_starvation+0x31b/0x450 [ 478.089713][ C1] ? do_raw_spin_unlock+0x172/0x230 [ 478.094971][ C1] ? rcu_sched_clock_irq+0x23d7/0x32a0 [ 478.100508][ C1] ? __pfx_rcu_sched_clock_irq+0x10/0x10 [ 478.106196][ C1] ? tmigr_requires_handle_remote+0x141/0x480 [ 478.112317][ C1] ? __pfx_tmigr_requires_handle_remote+0x10/0x10 [ 478.118809][ C1] ? hrtimer_run_queues+0x97/0x450 [ 478.123992][ C1] ? update_process_times+0x178/0x220 [ 478.129478][ C1] ? __pfx_update_process_times+0x10/0x10 [ 478.135276][ C1] ? tick_nohz_handler+0x376/0x530 [ 478.140455][ C1] ? __pfx_tick_nohz_handler+0x10/0x10 [ 478.145959][ C1] ? __hrtimer_run_queues+0x5fb/0xae0 [ 478.151389][ C1] ? __pfx___hrtimer_run_queues+0x10/0x10 [ 478.157156][ C1] ? ktime_get_update_offsets_now+0x201/0x310 [ 478.163303][ C1] ? hrtimer_interrupt+0x31b/0x800 [ 478.168486][ C1] ? __sysvec_apic_timer_interrupt+0x10f/0x450 [ 478.174705][ C1] ? sysvec_apic_timer_interrupt+0x52/0xc0 [ 478.180563][ C1] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 478.186784][ C1] ? find_match+0x34f/0xf80 [ 478.191343][ C1] ? find_match+0x363/0xf80 [ 478.195995][ C1] ? __pfx_debug_lockdep_rcu_enabled+0x10/0x10 [ 478.202245][ C1] rcu_read_lock_held+0x9/0x50 [ 478.207071][ C1] find_match+0x368/0xf80 [ 478.211471][ C1] ? __pfx_find_match+0x10/0x10 [ 478.216387][ C1] ? __pfx_br_handle_frame_finish+0x10/0x10 [ 478.222341][ C1] __find_rr_leaf+0x141/0xe00 [ 478.227092][ C1] ? __pfx___find_rr_leaf+0x10/0x10 [ 478.232375][ C1] ? fib6_node_lookup+0x125/0x180 [ 478.237453][ C1] ? __pfx_fib6_node_lookup+0x10/0x10 [ 478.242898][ C1] fib6_table_lookup+0x57e/0xa30 [ 478.247901][ C1] ? __pfx_fib6_table_lookup+0x10/0x10 [ 478.253421][ C1] ? trace_lock_acquire+0x14a/0x1d0 [ 478.258686][ C1] ? lock_acquire+0x2f/0xb0 [ 478.263252][ C1] ? ip6_pol_route+0x186/0x1120 [ 478.268177][ C1] ip6_pol_route+0x1cd/0x1120 [ 478.272902][ C1] ? __pfx_ip6_pol_route+0x10/0x10 [ 478.278077][ C1] ? __pfx_rt6_multipath_hash+0x10/0x10 [ 478.283692][ C1] ? __pfx_ip6_pol_route_input+0x10/0x10 [ 478.289377][ C1] fib6_rule_lookup+0x536/0x720 [ 478.294299][ C1] ? ip6t_do_table+0xd50/0x1d40 [ 478.299229][ C1] ? __pfx_fib6_rule_lookup+0x10/0x10 [ 478.304666][ C1] ? nf_nat_ipv6_fn+0x103/0x2e0 [ 478.309582][ C1] ? __pfx_nf_nat_ipv6_fn+0x10/0x10 [ 478.314858][ C1] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 478.320832][ C1] ip6_route_input+0x663/0xc10 [ 478.325656][ C1] ? __pfx_ip6_route_input+0x10/0x10 [ 478.330993][ C1] ? __pfx_lock_release+0x10/0x10 [ 478.336082][ C1] ? trace_lock_acquire+0x14a/0x1d0 [ 478.341375][ C1] ? __pfx_ip6_rcv_finish+0x10/0x10 [ 478.346637][ C1] ip6_rcv_finish_core.constprop.0+0x1a0/0x5d0 [ 478.352848][ C1] ipv6_rcv+0x1e4/0x680 [ 478.357053][ C1] ? __pfx_ipv6_rcv+0x10/0x10 [ 478.361776][ C1] __netif_receive_skb_one_core+0x12e/0x1e0 [ 478.367726][ C1] ? __pfx___netif_receive_skb_one_core+0x10/0x10 [ 478.374195][ C1] ? trace_lock_acquire+0x14a/0x1d0 [ 478.379447][ C1] ? process_backlog+0x3f1/0x15f0 [ 478.384535][ C1] ? process_backlog+0x3f1/0x15f0 [ 478.389612][ C1] __netif_receive_skb+0x1d/0x160 [ 478.394698][ C1] process_backlog+0x443/0x15f0 [ 478.399617][ C1] __napi_poll.constprop.0+0xb7/0x550 [ 478.405054][ C1] net_rx_action+0xa92/0x1010 [ 478.409800][ C1] ? __pfx_net_rx_action+0x10/0x10 [ 478.414972][ C1] ? __pfx_mark_lock+0x10/0x10 [ 478.419820][ C1] ? kvm_sched_clock_read+0x11/0x20 [ 478.425086][ C1] ? sched_clock+0x38/0x60 [ 478.429577][ C1] ? sched_clock_cpu+0x6d/0x4d0 [ 478.434516][ C1] ? mark_held_locks+0x9f/0xe0 [ 478.439363][ C1] handle_softirqs+0x213/0x8f0 [ 478.444192][ C1] ? __pfx_handle_softirqs+0x10/0x10 [ 478.449540][ C1] ? irqtime_account_irq+0x18d/0x2e0 [ 478.454883][ C1] ? nsim_dev_trap_report_work+0x870/0xc80 [ 478.460761][ C1] do_softirq+0xb2/0xf0 [ 478.464968][ C1] [ 478.467933][ C1] [ 478.470908][ C1] __local_bh_enable_ip+0x100/0x120 [ 478.476159][ C1] nsim_dev_trap_report_work+0x870/0xc80 [ 478.481907][ C1] process_one_work+0x9c5/0x1ba0 [ 478.486910][ C1] ? __pfx_gc_worker+0x10/0x10 [ 478.491746][ C1] ? __pfx_process_one_work+0x10/0x10 [ 478.497181][ C1] ? assign_work+0x1a0/0x250 [ 478.501836][ C1] worker_thread+0x6c8/0xf00 [ 478.506493][ C1] ? __pfx_worker_thread+0x10/0x10 [ 478.511654][ C1] kthread+0x2c1/0x3a0 [ 478.515771][ C1] ? _raw_spin_unlock_irq+0x23/0x50 [ 478.521029][ C1] ? __pfx_kthread+0x10/0x10 [ 478.525683][ C1] ret_from_fork+0x45/0x80 [ 478.530147][ C1] ? __pfx_kthread+0x10/0x10 [ 478.534796][ C1] ret_from_fork_asm+0x1a/0x30 [ 478.539640][ C1] [ 482.006019][ C1] net_ratelimit: 19882 callbacks suppressed [ 482.006047][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 482.006408][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 482.012257][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 482.024260][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 482.036397][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 482.049124][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0) [ 482.060107][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 482.072095][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 482.084375][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 482.096943][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:63:7e:f2:63:e2, vlan:0)