last executing test programs: 26.907564918s ago: executing program 2 (id=5976): r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000440)={'sit0\x00', &(0x7f0000000400)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0xd1, 0x0, 0x0, @loopback, @multicast1}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8949, &(0x7f00000000c0)={'syztnl0\x00', 0x0}) 26.128992326s ago: executing program 2 (id=5989): getgroups(0x2, &(0x7f0000000000)=[0x0, 0x0]) setresgid(r1, r0, 0x0) setregid(0x0, 0x0) 25.958198024s ago: executing program 2 (id=5991): r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='veth0_virt_wifi\x00', 0x10) setsockopt$inet_mreq(r0, 0x0, 0x20, &(0x7f0000000340)={@broadcast, @remote}, 0x8) 25.803292571s ago: executing program 2 (id=5992): mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x1c0) mknodat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1/file2\x00', 0x81c0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000480)='./file1/file2\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file2\x00', 0x5) 25.548588894s ago: executing program 2 (id=5995): r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c0000005200010000000000000000000200000008000100", @ANYRES64], 0x1c}}, 0x0) 25.122335214s ago: executing program 2 (id=5998): r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @any, 0x4, 0x1}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, 0x0, &(0x7f00000001c0)) 24.867197796s ago: executing program 32 (id=5998): r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @any, 0x4, 0x1}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, 0x0, &(0x7f00000001c0)) 9.973906004s ago: executing program 0 (id=6048): r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000740)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000003580)=""/4092, 0xffc}, {&(0x7f0000000000)=""/187, 0xbb}, {&(0x7f0000000280)=""/75, 0x4b}, {&(0x7f0000000500)=""/83, 0x53}, {&(0x7f0000000780)=""/4080, 0xff0}], 0x5}, 0xef6a}, {{0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=""/35, 0x23}, 0xc2b4fb8d}, {{&(0x7f0000002a80)=@ax25={{0x3, @bcast}, [@default, @default, @bcast, @null, @rose, @remote, @null, @netrom]}, 0x80, 0x0}, 0x5}], 0x3, 0x0, 0x0) 9.972902915s ago: executing program 1 (id=6049): mkdirat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='sysfs\x00', 0x1214040, 0x0) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_default\x00', 0x0, 0x0) 9.971797525s ago: executing program 3 (id=6050): syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8)={[0xfffffffffffffffc]}, 0x8) read(r0, &(0x7f0000000740)=""/377, 0x179) 8.212691209s ago: executing program 0 (id=6051): r0 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r0, 0xfffffff7) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x5411, 0x0) 8.202052309s ago: executing program 1 (id=6052): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'syzkaller1\x00', 0xc201}) write$tun(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="000086dd05855600080054"], 0xfdef) 8.200115089s ago: executing program 3 (id=6053): mkdirat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0) mount$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='nr_inodes=1']) mount$incfs(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000000), 0x0, 0x0) 6.313547089s ago: executing program 0 (id=6054): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r0) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)={0x18, r1, 0x301, 0x70bd29, 0x25dfdbfc, {0x24}, [@HEADER={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x44}, 0x0) 6.29869451s ago: executing program 1 (id=6055): r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000007c0), 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_LOG_FD(r0, 0x8001af84, 0x0) 6.29789459s ago: executing program 3 (id=6056): syz_usb_connect(0x4, 0x2d, &(0x7f00000000c0)={{0x12, 0x1, 0x200, 0xca, 0xcb, 0xa4, 0xff, 0x1199, 0x9061, 0x4006, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1, 0xdc, 0xc, 0x70, 0x6, "", [{{0x9, 0x4, 0x24, 0xd, 0x1, 0xa6, 0x80, 0x34, 0x7, [], [{{0x9, 0x5, 0xf, 0x1, 0x10, 0x4, 0x3, 0x2}}]}}]}}]}}, 0x0) syz_usb_connect$cdc_ncm(0x4, 0xd1, &(0x7f0000000040)=ANY=[@ANYBLOB="12011003020000182505a1a44000010203010902bf0002010650000900000000020d00000524060001082400a9b30d240f010a0000000300ff000606241a05001407240a050905580c240c00000000a90c09000304240202042402000424060244"], 0x0) syz_usb_connect(0x3, 0xf5, &(0x7f0000000000)=ANY=[@ANYBLOB="12010000772aed408680070bb96c010203010902e30003dc2000000904003f000e01000505a40600010524007f000d240f0104000000080000000006241a03000a05240101070424020a1524120009a317a88b045e4f01a607c0ffcb7e392a09044c03003a92a2010a240109000102010205240401050c2402"], 0x0) 4.324655474s ago: executing program 0 (id=6057): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0xfffffffffffffffe}, 0x10) ioctl$FS_IOC_RESVSP(r0, 0x40305829, &(0x7f0000000100)={0x1100, 0x0, 0x4, 0x10003}) 4.318944554s ago: executing program 1 (id=6058): r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x40, &(0x7f0000000000)=0x10, 0x4) getsockopt$SO_TIMESTAMP(r0, 0x1, 0x1d, 0x0, &(0x7f0000000040)) 4.318698614s ago: executing program 3 (id=6059): r0 = add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="594b41a7ce73", 0x6, 0xffffffffffffffff) keyctl$revoke(0x3, r0) keyctl$read(0xb, r0, &(0x7f0000002a80)=""/110, 0x6e) 2.223169214s ago: executing program 0 (id=6060): mknod$loop(&(0x7f0000000080)='./file0\x00', 0x100000000000600d, 0x1) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0x301, 0x0) 2.214156774s ago: executing program 1 (id=6061): r0 = syz_usb_connect$uac2(0x3, 0x8f, &(0x7f0000000400)={{0x12, 0x1, 0x310, 0x0, 0x0, 0x0, 0x20, 0xdba, 0x1000, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x7d, 0x3, 0x1, 0x6, 0x10, 0x2, {0x8, 0xb, 0x1, 0x0, 0x1, 0xc}, {{{0x9, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x20, 0x0, {{0x9, 0x24, 0x1, 0xff80, 0x7, 0x1d, 0x4}, [@output_terminal={0xc, 0x24, 0x3, 0x2, 0x304, 0x5, 0x4, 0x0, 0x1ff, 0x1c}, @source_unit={0x8, 0x24, 0xa, 0x4, 0x2, 0x95, 0x5, 0x1}]}}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x20, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x10, 0xc, 0x2, 0x9, {0x8, 0x25, 0x1, 0x80, 0x30, 0xad, 0x100}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x20, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x20, 0x2, 0xfa, 0xbc, {0x8, 0x25, 0x1, 0x2, 0xfa4024f26d164786, 0x81, 0x9}}}}}}}}]}}, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$uac2(r0, &(0x7f0000000700)={0xffffff61, 0x0, &(0x7f00000006c0)={0x0, 0x3, 0x2, @string={0x2}}}, 0x0) syz_usb_control_io$uac2(r0, &(0x7f0000005700)={0x14, 0x0, &(0x7f00000056c0)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x412}}}, 0x0) 2.212254944s ago: executing program 3 (id=6062): r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000004c0)='setgroups\x00') getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/219, 0xdb) writev(r0, &(0x7f0000003740)=[{&(0x7f0000001440)='deny', 0x4}], 0x1) 2.16473ms ago: executing program 0 (id=6063): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_X86_SET_MSR_FILTER(r1, 0x4188aec6, &(0x7f0000000bc0)={0x0, [{0x2, 0x8, 0x1, &(0x7f0000000200)="05"}, {0x1, 0x8, 0x27a6, &(0x7f0000000280)}, {0x0, 0x0, 0x2, 0x0}, {0x1, 0x0, 0x200007f, 0x0}, {0x2, 0x0, 0x85a2, 0x0}, {0x1, 0x0, 0xa, 0x0}, {0x2, 0x0, 0x7f, 0x0}, {0x1, 0x0, 0x0, 0x0}, {0x3, 0x0, 0x5, 0x0}, {0x2, 0x0, 0x80000001, 0x0}, {0x2, 0x0, 0x0, 0x0}, {0x1, 0x0, 0x0, 0x0}, {0x2, 0xfffffffffffffdc2, 0x10001, 0x0}, {0x2, 0x0, 0x3, 0x0}, {0x2, 0x0, 0x3f, 0x0}, {0x3, 0x0, 0xd09f, 0x0}]}) 990.989µs ago: executing program 1 (id=6064): r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000440)=0x1000, 0x4) sendmmsg$inet6(r0, &(0x7f0000001cc0)=[{{&(0x7f0000000100)={0xa, 0x4e24, 0xfffffffe, @mcast2}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e24, 0x4, @mcast1, 0x6}, 0x1c, &(0x7f00000003c0)=[{&(0x7f0000000140)="6367703c2590c1c4a90201af98499b8a46ce833b7180152025c9f6d4f28f4b16ffe879904e9a6dbb50f5859763673daa83323f2bbbd0e4de5646173f636eee8994114794a0a55c9ccff9e0770c6b2bab8e180ef44a0aed0501823e8bbf1a7e7223b62870f93a447a583d49655df3a736c08c7b25e505055efa656b7b19f8946e113931a6d6d5dec46de7441d627e195cd13c9f9943234bef4e6e32c29b443e3ffd6edaf8479e68f275742c4497e6b095c5259cdd06182b5ad84776515aa3a9c456755aa022a3f6a1", 0xc8}, {&(0x7f0000000080)="9f9c2b405d82b352bf853753d43a9e026a6ad3117ad040ec20922b113f9a026bfb739e6384a4fff61c3b2d3ccf82503d4719518a53e5c38d3ed0e922edeb8b57dd85e9e22dfe6f6f3262f73c08ad", 0x4e}, {&(0x7f0000000800)="09a1f637681c358802beb201dd2f240a90f7486a895a9c6bd41829ed943dec4e4e13034419dd64c40fbe2c2886c6aa875cd694da0426bd5adc312f4fdbb1a46b05ea4bfdd220fac40b6aae648e807d2abcabff2b4aef8193f97254c007a6fd9956b910e5b27fda78c8328d6eea5ddb0b12234a02098758106c5e5abe0995750af00b4d1f05eaf4b9278c606b90e84b5dead408ce8bd89b9414975373cd3c8ba71978936e045390c643ac3724cbc992bdf7b14c2dd1d5522571c6be5b", 0xbc}, {&(0x7f0000000300)="ece23a1ab9a20d8a1894f0931b47b5961f4d8f5444c02e0bcd1c1804d134138ee28e134762a72b9043e8b1efb383273d352f48399b37f4b5b33a7f9971b932a3db9ee6c1b97e12c7288510cbf8c9", 0x4e}, {&(0x7f0000000480)="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", 0x379}], 0x5}}], 0x2, 0x80) 0s ago: executing program 3 (id=6065): r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000002280)={&(0x7f0000001e40)={0xa, 0x4e24, 0x0, @mcast1}, 0x1c, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="b00500"], 0x5b0}, 0x20008001) sendmmsg$inet6(r0, &(0x7f0000001e80)=[{{0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000100)='\x00#\x00', 0x3}, {&(0x7f0000000340)="751af6b645cce9debf3dec12794bb7b6591cf36c63ca18d36ce27bf9", 0x4}], 0x2}}, {{0x0, 0x0, &(0x7f00000012c0)=[{0x0, 0xe}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x3, 0x2008000) kernel console output (not intermixed with test programs): t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 201.946206][ T36] audit: type=1400 audit(2000004403.082:1849): avc: denied { read write } for pid=483 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 202.029152][ C0] net_ratelimit: 61846 callbacks suppressed [ 202.029176][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:1e:a7:6d:50:c3:15, vlan:0) [ 202.047647][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 202.056406][ T36] audit: type=1400 audit(2000004403.139:1850): avc: denied { read write } for pid=485 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 202.060049][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 202.096284][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 202.108493][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 202.120984][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 202.133103][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 202.145294][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 202.157647][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:1e:a7:6d:50:c3:15, vlan:0) [ 202.169822][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 202.189512][ T36] audit: type=1400 audit(2000004403.270:1851): avc: denied { read write } for pid=482 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 202.274323][ T36] audit: type=1400 audit(2000004403.279:1852): avc: denied { read write } for pid=485 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 202.340684][ T6945] netlink: 'syz.0.3305': attribute type 12 has an invalid length. [ 202.374053][ T36] audit: type=1400 audit(2000004403.561:1853): avc: denied { read write } for pid=483 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 204.276986][ T7039] netlink: 'syz.3.3350': attribute type 27 has an invalid length. [ 204.453636][ T7049] netlink: 'syz.1.3353': attribute type 4 has an invalid length. [ 206.793973][ T36] kauditd_printk_skb: 118 callbacks suppressed [ 206.793994][ T36] audit: type=1400 audit(2000004407.839:1972): avc: denied { read write } for pid=485 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 206.866590][ T36] audit: type=1400 audit(2000004407.877:1973): avc: denied { read write } for pid=483 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 206.928550][ T36] audit: type=1400 audit(2000004407.952:1974): avc: denied { read write } for pid=485 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 207.003486][ T36] audit: type=1400 audit(2000004407.998:1975): avc: denied { read write } for pid=483 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 207.057971][ T36] audit: type=1400 audit(2000004408.017:1976): avc: denied { read write } for pid=482 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 207.154292][ T36] audit: type=1400 audit(2000004408.083:1977): avc: denied { read write } for pid=485 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 207.238738][ T36] audit: type=1400 audit(2000004408.120:1978): avc: denied { read write } for pid=483 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 207.315738][ T36] audit: type=1400 audit(2000004408.224:1979): avc: denied { read write } for pid=482 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 207.369212][ C0] net_ratelimit: 59357 callbacks suppressed [ 207.369236][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 207.387492][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 207.394572][ T36] audit: type=1400 audit(2000004408.233:1980): avc: denied { read write } for pid=483 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 207.399887][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:1e:a7:6d:50:c3:15, vlan:0) [ 207.435703][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 207.447867][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 207.460263][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 207.472358][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 207.484548][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 207.496638][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 207.500439][ T36] audit: type=1400 audit(2000004408.317:1981): avc: denied { read write } for pid=482 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 207.508897][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 208.933587][ T7269] netlink: 'syz.3.3466': attribute type 4 has an invalid length. [ 209.520084][ T7302] netlink: 17 bytes leftover after parsing attributes in process `syz.0.3480'. [ 210.236826][ T7333] netlink: 'syz.1.3495': attribute type 28 has an invalid length. [ 210.450303][ T7337] netlink: 8 bytes leftover after parsing attributes in process `syz.0.3497'. [ 210.495039][ T7337] netlink: 8 bytes leftover after parsing attributes in process `syz.0.3497'. [ 210.940055][ T7351] netlink: 'syz.2.3503': attribute type 13 has an invalid length. [ 211.281588][ T7364] netlink: 'syz.1.3509': attribute type 58 has an invalid length. [ 212.138523][ T36] kauditd_printk_skb: 100 callbacks suppressed [ 212.138543][ T36] audit: type=1400 audit(2000004412.849:2082): avc: denied { read write } for pid=483 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 212.250883][ T36] audit: type=1400 audit(2000004412.924:2083): avc: denied { read write } for pid=482 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 212.280303][ T7389] netlink: 'syz.2.3521': attribute type 40 has an invalid length. [ 212.411594][ T36] audit: type=1400 audit(2000004413.093:2084): avc: denied { read write } for pid=484 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 212.503032][ T36] audit: type=1400 audit(2000004413.102:2085): avc: denied { read write } for pid=482 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 212.600768][ T36] audit: type=1400 audit(2000004413.130:2086): avc: denied { read write } for pid=483 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 212.698529][ T36] audit: type=1400 audit(2000004413.224:2087): avc: denied { read write } for pid=485 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 212.709411][ C0] net_ratelimit: 60220 callbacks suppressed [ 212.709472][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 212.741642][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 212.754008][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 212.766217][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 212.778489][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 212.791026][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:1e:a7:6d:50:c3:15, vlan:0) [ 212.803192][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 212.812981][ T36] audit: type=1400 audit(2000004413.271:2088): avc: denied { read write } for pid=482 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 212.815613][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 212.851657][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 212.863842][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 212.924289][ T36] audit: type=1400 audit(2000004413.440:2089): avc: denied { read write } for pid=483 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 212.996302][ T36] audit: type=1400 audit(2000004413.571:2090): avc: denied { read write } for pid=482 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 213.043435][ T36] audit: type=1400 audit(2000004413.618:2091): avc: denied { read write } for pid=484 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 213.761686][ T7441] netlink: 'syz.2.3547': attribute type 46 has an invalid length. [ 215.077351][ T7513] netlink: 'syz.1.3583': attribute type 6 has an invalid length. [ 215.657585][ T7540] netlink: 5 bytes leftover after parsing attributes in process `syz.3.3596'. [ 216.318059][ T7563] netlink: 'syz.0.3608': attribute type 8 has an invalid length. [ 216.802451][ C1] ip6_tunnel: syztnl1 xmit: Local address not yet configured! [ 217.523721][ T36] kauditd_printk_skb: 111 callbacks suppressed [ 217.523742][ T36] audit: type=1400 audit(2000004417.897:2203): avc: denied { read write } for pid=485 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 217.648367][ T36] audit: type=1400 audit(2000004417.943:2204): avc: denied { read write } for pid=482 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 217.730738][ T36] audit: type=1400 audit(2000004418.009:2205): avc: denied { read write } for pid=484 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 217.765961][ T7637] netlink: 4 bytes leftover after parsing attributes in process `syz.0.3642'. [ 217.857354][ T36] audit: type=1400 audit(2000004418.047:2206): avc: denied { read write } for pid=483 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 217.909067][ T7639] netlink: 'syz.3.3644': attribute type 28 has an invalid length. [ 217.953279][ T36] audit: type=1400 audit(2000004418.103:2207): avc: denied { read write } for pid=485 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 218.027890][ T36] audit: type=1400 audit(2000004418.140:2208): avc: denied { read write } for pid=482 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 218.049747][ C0] net_ratelimit: 59279 callbacks suppressed [ 218.049809][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 218.070439][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 218.083018][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 218.091989][ T36] audit: type=1400 audit(2000004418.178:2209): avc: denied { read write } for pid=484 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 218.095505][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 218.131118][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 218.143831][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:1e:a7:6d:50:c3:15, vlan:0) [ 218.155882][ T36] audit: type=1400 audit(2000004418.215:2210): avc: denied { read write } for pid=483 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 218.155956][ T36] audit: type=1400 audit(2000004418.300:2211): avc: denied { read write } for pid=482 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 218.180059][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 218.180145][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 218.180724][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 218.240758][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 218.258239][ T36] audit: type=1400 audit(2000004418.328:2212): avc: denied { read write } for pid=485 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 218.628738][ T7665] netlink: 'syz.3.3657': attribute type 4 has an invalid length. [ 218.662158][ T7665] netlink: 17 bytes leftover after parsing attributes in process `syz.3.3657'. [ 218.682616][ T7663] netlink: 'syz.0.3656': attribute type 15 has an invalid length. [ 218.708197][ T7663] netlink: 24 bytes leftover after parsing attributes in process `syz.0.3656'. [ 219.249766][ T7681] netlink: 188 bytes leftover after parsing attributes in process `syz.3.3666'. [ 219.488518][ T7690] netlink: 'syz.0.3669': attribute type 4 has an invalid length. [ 219.904372][ T7708] netlink: 24 bytes leftover after parsing attributes in process `syz.2.3678'. [ 220.417760][ T7730] x_tables: unsorted underflow at hook 3 [ 220.702122][ T7745] IPv6: Can't replace route, no match found [ 220.992955][ T7759] netlink: 288 bytes leftover after parsing attributes in process `syz.3.3705'. [ 221.141779][ T7767] netlink: 'syz.3.3708': attribute type 20 has an invalid length. [ 221.233996][ T7771] netlink: 12 bytes leftover after parsing attributes in process `syz.3.3709'. [ 221.622318][ T7790] netlink: 'syz.3.3719': attribute type 4 has an invalid length. [ 221.630118][ T7790] netlink: 3657 bytes leftover after parsing attributes in process `syz.3.3719'. [ 221.812321][ T7800] netlink: 40 bytes leftover after parsing attributes in process `syz.2.3723'. [ 222.622371][ T7845] netlink: 24 bytes leftover after parsing attributes in process `syz.1.3744'. [ 222.863925][ T36] kauditd_printk_skb: 107 callbacks suppressed [ 222.863945][ T36] audit: type=1400 audit(2000004422.906:2320): avc: denied { read write } for pid=484 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 222.954512][ T7861] netlink: 24 bytes leftover after parsing attributes in process `syz.0.3753'. [ 222.973527][ T36] audit: type=1400 audit(2000004422.982:2321): avc: denied { read write } for pid=482 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 223.080130][ T36] audit: type=1400 audit(2000004423.085:2322): avc: denied { read write } for pid=484 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 223.190465][ T36] audit: type=1400 audit(2000004423.094:2323): avc: denied { read write } for pid=483 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 223.280436][ T36] audit: type=1400 audit(2000004423.104:2324): avc: denied { read write } for pid=482 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 223.357246][ T36] audit: type=1400 audit(2000004423.141:2325): avc: denied { read write } for pid=485 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 223.389202][ C0] net_ratelimit: 58550 callbacks suppressed [ 223.389225][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 223.407828][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 223.420011][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 223.432418][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 223.444698][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 223.457325][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 223.469496][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:1e:a7:6d:50:c3:15, vlan:0) [ 223.481754][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 223.485207][ T36] audit: type=1400 audit(2000004423.263:2326): avc: denied { read write } for pid=483 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 223.494086][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 223.530383][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 223.625328][ T36] audit: type=1400 audit(2000004423.272:2327): avc: denied { read write } for pid=484 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 223.651393][ T7885] netlink: 'syz.0.3766': attribute type 4 has an invalid length. [ 223.677045][ T7885] netlink: 3657 bytes leftover after parsing attributes in process `syz.0.3766'. [ 223.728748][ T36] audit: type=1400 audit(2000004423.282:2328): avc: denied { read write } for pid=482 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 223.829403][ T36] audit: type=1400 audit(213.172:2329): avc: denied { read write } for pid=484 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 224.679280][ T7937] netlink: 'syz.3.3792': attribute type 27 has an invalid length. [ 225.682628][ T7989] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'filter' [ 226.695827][ T8043] netlink: 57 bytes leftover after parsing attributes in process `syz.2.3845'. [ 226.990263][ T8059] netlink: 12 bytes leftover after parsing attributes in process `syz.2.3853'. [ 227.674103][ T8095] kernel profiling enabled (shift: 9) [ 227.805217][ T8102] binfmt_misc: register: failed to install interpreter file ./cgroup.cpu/cpuset.cpus [ 227.834463][ T8101] netlink: 16 bytes leftover after parsing attributes in process `syz.1.3873'. [ 228.209818][ T36] kauditd_printk_skb: 124 callbacks suppressed [ 228.209837][ T36] audit: type=1400 audit(217.732:2454): avc: denied { read write } for pid=485 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 228.321045][ T36] audit: type=1400 audit(217.835:2455): avc: denied { read write } for pid=485 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 228.406827][ T36] audit: type=1400 audit(217.863:2456): avc: denied { read write } for pid=484 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 228.452379][ T8130] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=17 sclass=netlink_tcpdiag_socket pid=8130 comm=syz.2.3887 [ 228.485766][ T36] audit: type=1400 audit(217.873:2457): avc: denied { read write } for pid=483 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 228.581986][ T36] audit: type=1400 audit(217.957:2458): avc: denied { read write } for pid=485 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 228.686644][ T36] audit: type=1400 audit(217.985:2459): avc: denied { read write } for pid=482 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 228.729352][ C0] net_ratelimit: 58655 callbacks suppressed [ 228.729376][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 228.747440][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 228.759685][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 228.766784][ T36] audit: type=1400 audit(218.051:2460): avc: denied { read write } for pid=484 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 228.772133][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 228.807367][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 228.819722][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:1e:a7:6d:50:c3:15, vlan:0) [ 228.832083][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 228.844184][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 228.856642][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 228.868729][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 228.894138][ T36] audit: type=1400 audit(218.117:2461): avc: denied { read write } for pid=485 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 229.020147][ T36] audit: type=1400 audit(218.126:2462): avc: denied { read write } for pid=483 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 229.126884][ T36] audit: type=1400 audit(218.201:2463): avc: denied { read write } for pid=484 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 229.411509][ T8165] netlink: 'syz.0.3902': attribute type 4 has an invalid length. [ 229.434825][ T8165] netlink: 3657 bytes leftover after parsing attributes in process `syz.0.3902'. [ 229.457030][ T8167] netlink: 'syz.1.3905': attribute type 4 has an invalid length. [ 229.502672][ T8167] netlink: 17 bytes leftover after parsing attributes in process `syz.1.3905'. [ 229.636146][ T8173] EXT4-fs: Value of option "test_dummy_encryption" is unrecognized [ 229.750173][ T8180] netlink: 12 bytes leftover after parsing attributes in process `syz.2.3912'. [ 229.790272][ T8180] veth1_macvtap: left promiscuous mode [ 230.093483][ T8196] sit0: entered promiscuous mode [ 230.100563][ T8196] netlink: 'syz.2.3921': attribute type 1 has an invalid length. [ 230.111520][ T8196] netlink: 1 bytes leftover after parsing attributes in process `syz.2.3921'. [ 230.120992][ T8199] netlink: 12 bytes leftover after parsing attributes in process `syz.3.3922'. [ 230.538141][ T8221] syz.1.3929 (8221): /proc/8214/oom_adj is deprecated, please use /proc/8214/oom_score_adj instead. [ 230.933016][ T8241] netlink: 'syz.1.3942': attribute type 27 has an invalid length. [ 231.562551][ T8272] netlink: 'syz.3.3957': attribute type 2 has an invalid length. [ 231.939017][ T8290] netlink: 124 bytes leftover after parsing attributes in process `syz.0.3967'. [ 232.795667][ T8334] netlink: 'syz.2.3988': attribute type 5 has an invalid length. [ 232.822206][ T8334] netlink: 'syz.2.3988': attribute type 5 has an invalid length. [ 232.830023][ T8334] netlink: 3657 bytes leftover after parsing attributes in process `syz.2.3988'. [ 233.012651][ T8345] netlink: 4 bytes leftover after parsing attributes in process `syz.3.3992'. [ 233.198435][ T8355] netlink: 'syz.0.3997': attribute type 12 has an invalid length. [ 233.537055][ T8370] x_tables: duplicate underflow at hook 1 [ 233.573414][ T36] kauditd_printk_skb: 119 callbacks suppressed [ 233.573436][ T36] audit: type=1400 audit(222.761:2583): avc: denied { read write } for pid=482 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 233.668890][ T36] audit: type=1400 audit(222.817:2584): avc: denied { read write } for pid=484 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 233.740399][ T36] audit: type=1400 audit(222.883:2585): avc: denied { read write } for pid=483 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 233.856217][ T36] audit: type=1400 audit(223.024:2586): avc: denied { read write } for pid=484 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 233.970867][ T36] audit: type=1400 audit(223.136:2587): avc: denied { read write } for pid=483 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 234.069222][ C0] net_ratelimit: 58891 callbacks suppressed [ 234.069249][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:1e:a7:6d:50:c3:15, vlan:0) [ 234.087353][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 234.099430][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 234.111789][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 234.124006][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 234.136627][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 234.148918][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 234.161016][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 234.173223][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:1e:a7:6d:50:c3:15, vlan:0) [ 234.185483][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 234.358590][ T36] audit: type=1400 audit(223.502:2588): avc: denied { read write } for pid=483 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 234.462031][ T36] audit: type=1400 audit(223.596:2589): avc: denied { read write } for pid=485 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 234.527559][ T36] audit: type=1400 audit(223.633:2590): avc: denied { read write } for pid=483 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 234.612842][ T36] audit: type=1400 audit(223.737:2591): avc: denied { read write } for pid=485 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 234.698967][ T36] audit: type=1400 audit(223.783:2592): avc: denied { read write } for pid=483 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 235.246970][ T8423] netlink: 12 bytes leftover after parsing attributes in process `syz.2.4029'. [ 235.629644][ T8440] netlink: 'syz.2.4039': attribute type 11 has an invalid length. [ 236.570537][ T8492] netlink: 'syz.1.4062': attribute type 30 has an invalid length. [ 236.706270][ T8497] netlink: 16 bytes leftover after parsing attributes in process `syz.3.4066'. [ 236.987734][ T8514] netlink: 8 bytes leftover after parsing attributes in process `syz.1.4073'. [ 237.353062][ T8528] netlink: 16 bytes leftover after parsing attributes in process `syz.0.4082'. [ 238.144117][ T8573] netlink: 'syz.3.4105': attribute type 4 has an invalid length. [ 238.152057][ T8573] netlink: 'syz.3.4105': attribute type 2 has an invalid length. [ 238.186392][ T8575] x_tables: duplicate entry at hook 1 [ 238.318313][ T8580] sit0: entered promiscuous mode [ 238.347410][ T8580] netlink: 'syz.1.4107': attribute type 1 has an invalid length. [ 238.381524][ T8580] netlink: 9 bytes leftover after parsing attributes in process `syz.1.4107'. [ 238.593805][ T8592] netlink: 188 bytes leftover after parsing attributes in process `syz.1.4112'. [ 238.770378][ T8601] netlink: 8 bytes leftover after parsing attributes in process `syz.2.4117'. [ 238.912781][ T36] kauditd_printk_skb: 108 callbacks suppressed [ 238.912808][ T36] audit: type=1400 audit(227.771:2701): avc: denied { read write } for pid=483 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 239.009419][ T8613] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 239.016709][ T8613] IPv6: NLM_F_CREATE should be set when creating new route [ 239.024088][ T8613] IPv6: NLM_F_CREATE should be set when creating new route [ 239.025276][ T36] audit: type=1400 audit(227.808:2702): avc: denied { read write } for pid=484 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 239.165100][ T36] audit: type=1400 audit(227.827:2703): avc: denied { read write } for pid=482 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 239.243749][ T36] audit: type=1400 audit(227.921:2704): avc: denied { read write } for pid=483 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 239.354259][ T36] audit: type=1400 audit(227.958:2706): avc: denied { read write } for pid=484 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 239.409382][ C0] net_ratelimit: 60801 callbacks suppressed [ 239.409404][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 239.427727][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 239.440097][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 239.451957][ T36] audit: type=1400 audit(227.940:2705): avc: denied { read write } for pid=482 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 239.452847][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 239.487977][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 239.500146][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:1e:a7:6d:50:c3:15, vlan:0) [ 239.512316][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 239.524442][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 239.536983][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 239.549490][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 239.569123][ T36] audit: type=1400 audit(228.005:2707): avc: denied { read write } for pid=485 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 239.617318][ T8632] IPv6: NLM_F_CREATE should be specified when creating new route [ 239.668886][ T36] audit: type=1400 audit(228.033:2708): avc: denied { read write } for pid=483 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 239.764923][ T36] audit: type=1400 audit(228.071:2709): avc: denied { read write } for pid=484 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 239.816358][ T36] audit: type=1400 audit(228.137:2710): avc: denied { read write } for pid=483 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 239.958000][ T8648] cannot load conntrack support for proto=3 [ 240.332616][ T8668] netlink: 'syz.3.4151': attribute type 6 has an invalid length. [ 240.922323][ T8699] netlink: 'syz.3.4167': attribute type 28 has an invalid length. [ 241.263311][ T8718] netlink: 1072 bytes leftover after parsing attributes in process `syz.2.4176'. [ 241.291464][ T8718] netlink: 280 bytes leftover after parsing attributes in process `syz.2.4176'. [ 241.789514][ T8745] netlink: 37 bytes leftover after parsing attributes in process `syz.1.4189'. [ 242.975907][ T8808] netlink: 252 bytes leftover after parsing attributes in process `syz.1.4218'. [ 243.683275][ T8844] netlink: 8 bytes leftover after parsing attributes in process `syz.1.4239'. [ 244.280400][ T8879] netlink: 'syz.1.4257': attribute type 4 has an invalid length. [ 244.288329][ T36] kauditd_printk_skb: 146 callbacks suppressed [ 244.288358][ T36] audit: type=1400 audit(232.818:2857): avc: denied { create } for pid=8876 comm="syz.2.4254" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=0 [ 244.333197][ T36] audit: type=1400 audit(232.856:2858): avc: denied { read write } for pid=483 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 244.382308][ T36] audit: type=1400 audit(232.893:2859): avc: denied { read write } for pid=484 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 244.470762][ T36] audit: type=1400 audit(232.968:2860): avc: denied { read write } for pid=485 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 244.559016][ T36] audit: type=1400 audit(232.978:2861): avc: denied { read write } for pid=482 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 244.642672][ T36] audit: type=1400 audit(232.987:2862): avc: denied { read write } for pid=8882 comm="syz.0.4258" name="loop5" dev="devtmpfs" ino=54 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 244.733462][ T36] audit: type=1400 audit(233.025:2863): avc: denied { read write } for pid=483 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 244.749537][ C0] net_ratelimit: 59630 callbacks suppressed [ 244.749591][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 244.775338][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 244.787609][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 244.795762][ T8895] x_tables: unsorted underflow at hook 4 [ 244.800065][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 244.817307][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 244.829480][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:1e:a7:6d:50:c3:15, vlan:0) [ 244.841644][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 244.853994][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 244.866377][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 244.877270][ T36] audit: type=1400 audit(233.062:2864): avc: denied { create } for pid=8884 comm="syz.1.4261" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 244.878845][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 244.951774][ T36] audit: type=1400 audit(233.072:2865): avc: denied { read write } for pid=8886 comm="syz.3.4262" name="vhost-vsock" dev="devtmpfs" ino=200 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=0 [ 244.998907][ T36] audit: type=1400 audit(233.128:2866): avc: denied { read write } for pid=482 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 245.111138][ T8905] EXT4-fs: Value of option "test_dummy_encryption" is unrecognized [ 245.838349][ T8943] netlink: 4 bytes leftover after parsing attributes in process `syz.3.4289'. [ 246.402663][ T8975] netlink: 'syz.1.4303': attribute type 16 has an invalid length. [ 247.235180][ T9016] xt_CONNSECMARK: only valid in 'mangle' or 'security' table, not 'filter' [ 247.902557][ T9054] netlink: 8 bytes leftover after parsing attributes in process `syz.1.4343'. [ 248.863705][ C1] ip6_tunnel: syztnl1 xmit: Local address not yet configured! [ 248.937383][ T9105] netlink: 'syz.2.4367': attribute type 1 has an invalid length. [ 248.945278][ T9105] netlink: 1 bytes leftover after parsing attributes in process `syz.2.4367'. [ 249.638251][ T36] kauditd_printk_skb: 163 callbacks suppressed [ 249.638271][ T36] audit: type=1400 audit(237.838:3030): avc: denied { read write } for pid=484 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 249.725903][ T36] audit: type=1400 audit(237.875:3031): avc: denied { nlmsg_read } for pid=9143 comm="syz.3.4389" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=0 [ 249.820587][ T36] audit: type=1400 audit(237.903:3032): avc: denied { read write } for pid=482 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 249.908096][ T36] audit: type=1400 audit(237.950:3033): avc: denied { read write } for pid=485 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 249.972165][ T36] audit: type=1400 audit(237.978:3034): avc: denied { read write } for pid=484 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 249.998843][ T36] audit: type=1400 audit(238.035:3035): avc: denied { read write } for pid=483 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 250.024872][ T36] audit: type=1400 audit(238.044:3036): avc: denied { read write } for pid=482 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 250.089285][ C0] net_ratelimit: 60190 callbacks suppressed [ 250.089307][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 250.107371][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 250.119768][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 250.124012][ T36] audit: type=1400 audit(238.082:3037): avc: denied { read write } for pid=485 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 250.132232][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 250.167562][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 250.179723][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:1e:a7:6d:50:c3:15, vlan:0) [ 250.191912][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 250.204173][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 250.216546][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 250.228783][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 250.262179][ T9164] netlink: 'syz.0.4395': attribute type 11 has an invalid length. [ 250.272413][ T9164] netlink: 'syz.0.4395': attribute type 2 has an invalid length. [ 250.288917][ T36] audit: type=1400 audit(238.147:3038): avc: denied { read write } for pid=484 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 250.393659][ T36] audit: type=1400 audit(238.250:3039): avc: denied { mounton } for pid=9158 comm="syz.2.4397" path="/1001/file0" dev="tmpfs" ino=5052 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 250.698110][ T9186] netlink: 'syz.1.4410': attribute type 29 has an invalid length. [ 250.736279][ T9186] netlink: 8 bytes leftover after parsing attributes in process `syz.1.4410'. [ 251.174683][ T9210] 8021q: VLANs not supported on lo [ 251.559376][ T9231] netlink: 16 bytes leftover after parsing attributes in process `syz.1.4430'. [ 252.942562][ T9306] netlink: 'syz.3.4468': attribute type 28 has an invalid length. [ 253.727146][ T9346] netlink: 'syz.3.4487': attribute type 13 has an invalid length. [ 253.756271][ T9346] erspan0: refused to change device tx_queue_len [ 253.788873][ T9345] netlink: 'syz.0.4486': attribute type 11 has an invalid length. [ 253.809748][ T9345] netlink: 'syz.0.4486': attribute type 2 has an invalid length. [ 254.351708][ T9380] netlink: 12 bytes leftover after parsing attributes in process `syz.0.4504'. [ 254.603936][ T9394] netlink: 4096 bytes leftover after parsing attributes in process `syz.0.4511'. [ 254.975687][ T36] kauditd_printk_skb: 156 callbacks suppressed [ 254.975708][ T36] audit: type=1400 audit(242.848:3196): avc: denied { read write } for pid=485 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 255.074600][ T36] audit: type=1400 audit(242.904:3197): avc: denied { write } for pid=9415 comm="syz.3.4523" name="001" dev="devtmpfs" ino=120 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=0 [ 255.171722][ T36] audit: type=1400 audit(242.960:3198): avc: denied { read write } for pid=482 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 255.269408][ T36] audit: type=1400 audit(242.970:3199): avc: denied { read write } for pid=484 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 255.370347][ T36] audit: type=1400 audit(242.970:3200): avc: denied { read write } for pid=485 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 255.429321][ C0] net_ratelimit: 58760 callbacks suppressed [ 255.429345][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 255.447544][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 255.460084][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 255.472353][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:1e:a7:6d:50:c3:15, vlan:0) [ 255.482636][ T36] audit: type=1400 audit(243.017:3201): avc: denied { read write } for pid=483 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 255.484994][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 255.521750][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 255.534280][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 255.546835][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 255.559058][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 255.571194][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 255.572854][ T36] audit: type=1400 audit(243.092:3202): avc: denied { read write } for pid=484 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 255.738402][ T36] audit: type=1400 audit(243.110:3203): avc: denied { read write } for pid=485 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 255.844966][ T36] audit: type=1400 audit(243.148:3204): avc: denied { read write } for pid=483 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 255.957172][ T36] audit: type=1400 audit(243.251:3205): avc: denied { read write } for pid=484 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 256.330883][ T9471] netlink: 'syz.3.4549': attribute type 25 has an invalid length. [ 256.350063][ T9472] netlink: 'syz.1.4548': attribute type 39 has an invalid length. [ 257.025302][ T9507] tc_dump_action: action bad kind [ 257.231723][ T9519] netlink: 20 bytes leftover after parsing attributes in process `syz.2.4573'. [ 258.328872][ T9575] netlink: 'syz.3.4601': attribute type 21 has an invalid length. [ 259.019551][ T9614] netlink: 72 bytes leftover after parsing attributes in process `syz.1.4619'. [ 259.151428][ T9619] netlink: 'syz.2.4621': attribute type 13 has an invalid length. [ 259.239606][ T9624] IPv6: A: Disabled Multicast RS [ 259.322924][ T9631] netlink: 'syz.0.4628': attribute type 27 has an invalid length. [ 259.881501][ T9657] netlink: 'syz.3.4641': attribute type 9 has an invalid length. [ 260.317859][ T36] kauditd_printk_skb: 589 callbacks suppressed [ 260.317878][ T36] audit: type=1400 audit(247.858:3795): avc: denied { read write } for pid=482 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 260.397107][ T36] audit: type=1400 audit(247.914:3796): avc: denied { read write } for pid=483 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 260.509790][ T36] audit: type=1400 audit(248.017:3797): avc: denied { read write } for pid=484 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 260.598786][ T36] audit: type=1400 audit(248.027:3798): avc: denied { read write } for pid=482 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 260.671242][ T36] audit: type=1400 audit(248.036:3799): avc: denied { read write } for pid=483 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 260.744034][ T36] audit: type=1400 audit(248.158:3800): avc: denied { read write } for pid=482 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 260.769267][ C0] net_ratelimit: 59084 callbacks suppressed [ 260.769287][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 260.787388][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 260.799577][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 260.811695][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 260.823785][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 260.836133][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:1e:a7:6d:50:c3:15, vlan:0) [ 260.848289][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 260.860365][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 260.872703][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 260.878559][ T36] audit: type=1400 audit(248.177:3801): avc: denied { create } for pid=9691 comm="syz.3.4653" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 260.885117][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 260.952650][ T36] audit: type=1400 audit(248.214:3802): avc: denied { read write } for pid=483 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 261.043792][ T36] audit: type=1400 audit(248.224:3803): avc: denied { read write } for pid=485 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 261.127853][ T36] audit: type=1400 audit(248.233:3804): avc: denied { read write } for pid=484 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 262.434237][ T9777] netlink: 4 bytes leftover after parsing attributes in process `syz.1.4707'. [ 264.011340][ T9857] netlink: 4 bytes leftover after parsing attributes in process `syz.3.4741'. [ 264.804449][ T9900] netlink: 'syz.3.4763': attribute type 11 has an invalid length. [ 264.840980][ T9900] netlink: 'syz.3.4763': attribute type 2 has an invalid length. [ 265.675896][ T36] kauditd_printk_skb: 157 callbacks suppressed [ 265.675918][ T36] audit: type=1400 audit(252.886:3962): avc: denied { read write } for pid=485 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 265.784996][ T36] audit: type=1400 audit(252.933:3963): avc: denied { read write } for pid=484 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 265.874817][ T36] audit: type=1400 audit(252.952:3964): avc: denied { read write } for pid=483 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 265.958596][ T36] audit: type=1400 audit(252.961:3965): avc: denied { read write } for pid=482 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 266.013374][ T36] audit: type=1400 audit(253.018:3966): avc: denied { read } for pid=9947 comm="syz.2.4787" name="snapshot" dev="devtmpfs" ino=21 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=0 [ 266.051305][ T36] audit: type=1400 audit(253.055:3967): avc: denied { read write } for pid=483 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 266.094733][ T36] audit: type=1400 audit(253.065:3968): avc: denied { read write } for pid=484 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 266.109339][ C0] net_ratelimit: 60993 callbacks suppressed [ 266.109402][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 266.136689][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 266.149030][ T36] audit: type=1400 audit(253.112:3969): avc: denied { read write } for pid=482 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 266.149311][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:1e:a7:6d:50:c3:15, vlan:0) [ 266.185175][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 266.193193][ T36] audit: type=1400 audit(253.121:3970): avc: denied { create } for pid=9953 comm="syz.3.4786" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 266.197440][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 266.220514][ T36] audit: type=1400 audit(253.130:3971): avc: denied { read write } for pid=485 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 266.229172][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 266.264397][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 266.276581][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 266.288676][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 266.300839][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 266.965352][ T9995] 8021q: VLANs not supported on ip_vti0 [ 269.336855][T10121] netlink: 140 bytes leftover after parsing attributes in process `syz.0.4870'. [ 269.852926][T10148] netlink: 4 bytes leftover after parsing attributes in process `syz.2.4881'. [ 270.307585][T10170] netlink: 20 bytes leftover after parsing attributes in process `syz.1.4893'. [ 270.890479][T10202] netlink: 12 bytes leftover after parsing attributes in process `syz.0.4910'. [ 270.939186][T10204] netlink: 8 bytes leftover after parsing attributes in process `syz.0.4911'. [ 271.024716][ T36] kauditd_printk_skb: 158 callbacks suppressed [ 271.024737][ T36] audit: type=1400 audit(257.906:4130): avc: denied { read } for pid=10207 comm="syz.0.4913" name="ptp0" dev="devtmpfs" ino=196 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=0 [ 271.108235][ T36] audit: type=1400 audit(257.953:4131): avc: denied { read write } for pid=483 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 271.159208][ T36] audit: type=1400 audit(258.028:4132): avc: denied { read write } for pid=484 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 271.210702][ T36] audit: type=1400 audit(258.056:4133): avc: denied { read write } for pid=483 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 271.289471][ T36] audit: type=1400 audit(258.093:4134): avc: denied { read } for pid=10212 comm="syz.0.4916" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 271.396020][ T36] audit: type=1400 audit(258.122:4135): avc: denied { read write } for pid=482 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 271.449334][ C0] net_ratelimit: 60736 callbacks suppressed [ 271.449356][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 271.467828][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:1e:a7:6d:50:c3:15, vlan:0) [ 271.480036][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 271.490396][ T36] audit: type=1400 audit(258.131:4136): avc: denied { read write } for pid=483 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 271.492323][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 271.527828][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 271.540065][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 271.552305][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 271.564834][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 271.577029][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 271.589566][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:1e:a7:6d:50:c3:15, vlan:0) [ 271.603273][ T36] audit: type=1400 audit(258.215:4137): avc: denied { read write } for pid=482 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 271.656734][T10224] netlink: 'syz.0.4921': attribute type 4 has an invalid length. [ 271.689986][T10224] netlink: 3649 bytes leftover after parsing attributes in process `syz.0.4921'. [ 271.714395][ T36] audit: type=1400 audit(258.244:4138): avc: denied { read write } for pid=485 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 271.793646][ T36] audit: type=1400 audit(258.290:4139): avc: denied { read write } for pid=483 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 272.280159][T10251] GUP no longer grows the stack in syz.0.4932 (10251): 200000005000-200000008000 (200000004000) [ 272.313059][T10251] CPU: 1 UID: 0 PID: 10251 Comm: syz.0.4932 Not tainted syzkaller #0 49aa54d9fff9a118f1e320bc713a86df8a810573 [ 272.313106][T10251] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 272.313123][T10251] Call Trace: [ 272.313132][T10251] [ 272.313143][T10251] __dump_stack+0x21/0x30 [ 272.313189][T10251] dump_stack_lvl+0x140/0x1c0 [ 272.313220][T10251] ? __cfi_dump_stack_lvl+0x10/0x10 [ 272.313250][T10251] ? futex_lock_pi_atomic+0xe3/0xcd0 [ 272.313284][T10251] dump_stack+0x19/0x20 [ 272.313313][T10251] fixup_user_fault+0x62a/0x6b0 [ 272.313339][T10251] fault_in_user_writeable+0x75/0xe0 [ 272.313365][T10251] futex_lock_pi+0x2d7/0xa70 [ 272.313396][T10251] ? __cfi_futex_lock_pi+0x10/0x10 [ 272.313426][T10251] ? __cfi_futex_wake_mark+0x10/0x10 [ 272.313459][T10251] ? futex_setup_timer+0xb4/0xd0 [ 272.313484][T10251] ? __cfi_futex_wake_mark+0x10/0x10 [ 272.313517][T10251] ? __cfi_userfaultfd_unmap_complete+0x10/0x10 [ 272.313550][T10251] ? mas_find+0x358/0x5f0 [ 272.313574][T10251] do_futex+0x270/0x510 [ 272.313599][T10251] ? do_vmi_munmap+0x245/0x2e0 [ 272.313632][T10251] ? __cfi_do_futex+0x10/0x10 [ 272.313658][T10251] ? __vm_munmap+0x2de/0x390 [ 272.313691][T10251] __se_sys_futex+0x13c/0x320 [ 272.313718][T10251] ? __x64_sys_futex+0x110/0x110 [ 272.313746][T10251] ? __kasan_check_write+0x18/0x20 [ 272.313777][T10251] __x64_sys_futex+0xe9/0x110 [ 272.313805][T10251] x64_sys_call+0x227f/0x2ee0 [ 272.313838][T10251] do_syscall_64+0x57/0xf0 [ 272.313866][T10251] ? clear_bhb_loop+0x50/0xa0 [ 272.313896][T10251] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 272.313926][T10251] RIP: 0033:0x7fee2af9c799 [ 272.313955][T10251] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 272.313977][T10251] RSP: 002b:00007fee299f7028 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 272.314008][T10251] RAX: ffffffffffffffda RBX: 00007fee2b215fa0 RCX: 00007fee2af9c799 [ 272.314028][T10251] RDX: 0000000000000000 RSI: 000000000000008d RDI: 0000200000004000 [ 272.314045][T10251] RBP: 00007fee2b032c99 R08: 0000000000000000 R09: 0000000000000000 [ 272.314062][T10251] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 272.314077][T10251] R13: 00007fee2b216038 R14: 00007fee2b215fa0 R15: 00007ffed91e4e98 [ 272.314100][T10251] [ 276.370009][ T36] kauditd_printk_skb: 151 callbacks suppressed [ 276.370030][ T36] audit: type=1400 audit(262.916:4291): avc: denied { read } for pid=10441 comm="syz.2.5025" dev="nsfs" ino=4026532505 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 276.466046][ T36] audit: type=1400 audit(262.963:4292): avc: denied { read write } for pid=484 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 276.520803][ T36] audit: type=1400 audit(262.991:4293): avc: denied { read write } for pid=482 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 276.545421][ T36] audit: type=1400 audit(263.028:4294): avc: denied { read write } for pid=483 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 276.570977][ T36] audit: type=1400 audit(263.056:4295): avc: denied { read write } for pid=10449 comm="syz.1.5028" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 276.618821][ T36] audit: type=1400 audit(263.141:4296): avc: denied { read write } for pid=484 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 276.701471][ T36] audit: type=1400 audit(263.225:4297): avc: denied { read write } for pid=485 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 276.757532][ T36] audit: type=1400 audit(263.272:4298): avc: denied { read } for pid=10454 comm="syz.3.5031" name="rtc0" dev="devtmpfs" ino=195 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=0 [ 276.789542][ C0] net_ratelimit: 59218 callbacks suppressed [ 276.789566][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 276.807761][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 276.820135][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 276.821481][ T36] audit: type=1400 audit(263.329:4299): avc: denied { read write } for pid=485 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 276.832531][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 276.868072][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 276.880949][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:1e:a7:6d:50:c3:15, vlan:0) [ 276.893189][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 276.905278][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 276.917612][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 276.929714][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 276.938641][ T36] audit: type=1400 audit(263.404:4300): avc: denied { read write } for pid=484 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 278.801130][T10555] vlan1: entered promiscuous mode [ 278.827929][T10555] vlan1: entered allmulticast mode [ 278.833198][T10555] veth0_vlan: entered allmulticast mode [ 280.830866][T10667] vlan1: entered promiscuous mode [ 280.845491][T10667] vlan1: entered allmulticast mode [ 280.856313][T10667] veth0_vlan: entered allmulticast mode [ 281.734988][ T36] kauditd_printk_skb: 161 callbacks suppressed [ 281.735011][ T36] audit: type=1400 audit(267.945:4462): avc: denied { read write } for pid=485 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 281.849562][ T36] audit: type=1400 audit(268.057:4463): avc: denied { read write } for pid=484 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 281.940631][ T36] audit: type=1400 audit(268.113:4464): avc: denied { read write } for pid=483 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 282.025732][T10706] vlan1: entered promiscuous mode [ 282.030920][T10706] vlan1: entered allmulticast mode [ 282.052909][ T36] audit: type=1400 audit(268.198:4465): avc: denied { read } for pid=10701 comm="syz.3.5152" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 282.086911][T10706] veth0_vlan: entered allmulticast mode [ 282.118890][ T36] audit: type=1400 audit(268.207:4466): avc: denied { read write } for pid=484 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 282.129394][ C0] net_ratelimit: 63648 callbacks suppressed [ 282.129494][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 282.160865][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 282.172062][ T36] audit: type=1400 audit(268.235:4467): avc: denied { read write } for pid=485 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 282.173902][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 282.209100][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:1e:a7:6d:50:c3:15, vlan:0) [ 282.221271][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 282.233341][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 282.245889][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 282.258524][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 282.270820][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 282.283111][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 282.402520][ T36] audit: type=1400 audit(268.564:4468): avc: denied { read write } for pid=485 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 282.484792][ T36] audit: type=1400 audit(268.629:4469): avc: denied { read write } for pid=484 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 282.555716][ T36] audit: type=1400 audit(268.658:4470): avc: denied { read write } for pid=10712 comm="syz.3.5155" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 282.658065][ T36] audit: type=1400 audit(268.817:4471): avc: denied { read write } for pid=483 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 284.678320][T10784] can0: slcan on ptm0. [ 284.821146][T10783] can0 (unregistered): slcan off ptm0. [ 287.075570][ T36] kauditd_printk_skb: 1985 callbacks suppressed [ 287.075591][ T36] audit: type=1400 audit(272.964:6457): avc: denied { read } for pid=150 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 287.147393][ T36] audit: type=1400 audit(272.983:6458): avc: denied { read } for pid=150 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 287.189493][ T150] audit: audit_backlog=65 > audit_backlog_limit=64 [ 287.203997][ T150] audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 [ 287.211922][ T484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 287.220282][ T36] audit: type=1400 audit(272.983:6459): avc: denied { read } for pid=150 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 287.241923][ T484] audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 [ 287.249733][ T150] audit: backlog limit exceeded [ 287.256730][ T150] audit: audit_backlog=65 > audit_backlog_limit=64 [ 287.263307][ T150] audit: audit_lost=3 audit_rate_limit=0 audit_backlog_limit=64 [ 287.469376][ C0] net_ratelimit: 58591 callbacks suppressed [ 287.469398][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 287.487443][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 287.499711][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:1e:a7:6d:50:c3:15, vlan:0) [ 287.511989][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 287.524103][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 287.536489][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 287.548614][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 287.560813][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 287.572994][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 287.585075][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 288.354016][T10812] netlink: 'syz.0.5200': attribute type 4 has an invalid length. [ 288.374260][T10812] netlink: 'syz.0.5200': attribute type 5 has an invalid length. [ 288.394849][T10812] netlink: 'syz.0.5200': attribute type 1 has an invalid length. [ 288.708086][T10851] netlink: 72 bytes leftover after parsing attributes in process `syz.3.5218'. [ 292.415537][ T36] kauditd_printk_skb: 4246 callbacks suppressed [ 292.415557][ T36] audit: type=1400 audit(277.974:10704): avc: denied { read } for pid=150 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 292.517377][ T36] audit: type=1400 audit(278.002:10705): avc: denied { read write } for pid=482 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 292.551764][ T150] audit: audit_backlog=65 > audit_backlog_limit=64 [ 292.558205][T10969] audit: audit_backlog=65 > audit_backlog_limit=64 [ 292.563028][ T150] audit: audit_lost=4 audit_rate_limit=0 audit_backlog_limit=64 [ 292.573614][ T36] audit: type=1400 audit(278.011:10706): avc: denied { read } for pid=150 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 292.594277][ T150] audit: backlog limit exceeded [ 292.599220][T10969] audit: audit_lost=5 audit_rate_limit=0 audit_backlog_limit=64 [ 292.609189][ T150] audit: audit_backlog=65 > audit_backlog_limit=64 [ 292.618920][T10969] audit: backlog limit exceeded [ 292.809351][ C0] net_ratelimit: 62576 callbacks suppressed [ 292.809374][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:1e:a7:6d:50:c3:15, vlan:0) [ 292.827523][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 292.840310][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 292.852797][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 292.864930][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 292.877120][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 292.889203][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 292.901298][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 292.913551][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:1e:a7:6d:50:c3:15, vlan:0) [ 292.925817][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 294.663296][T11031] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=513 sclass=netlink_route_socket pid=11031 comm=syz.3.5303 [ 294.704578][T11031] netlink: 32 bytes leftover after parsing attributes in process `syz.3.5303'. [ 297.755181][ T36] kauditd_printk_skb: 3344 callbacks suppressed [ 297.755202][ T36] audit: type=1400 audit(282.984:13992): avc: denied { read } for pid=150 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 297.882413][ T36] audit: type=1400 audit(283.012:13993): avc: denied { read } for pid=150 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 297.963518][ T150] audit: audit_backlog=65 > audit_backlog_limit=64 [ 297.992674][T11123] audit: audit_backlog=65 > audit_backlog_limit=64 [ 297.999331][T11123] audit: audit_lost=26 audit_rate_limit=0 audit_backlog_limit=64 [ 298.010789][ T150] audit: audit_lost=27 audit_rate_limit=0 audit_backlog_limit=64 [ 298.018563][ T150] audit: backlog limit exceeded [ 298.035411][ T36] audit: type=1400 audit(283.012:13994): avc: denied { read } for pid=150 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 298.075097][ T150] audit: audit_backlog=65 > audit_backlog_limit=64 [ 298.081659][ T150] audit: audit_lost=28 audit_rate_limit=0 audit_backlog_limit=64 [ 298.149378][ C0] net_ratelimit: 62883 callbacks suppressed [ 298.149405][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 298.167709][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 298.179906][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 298.192082][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:1e:a7:6d:50:c3:15, vlan:0) [ 298.204679][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 298.216788][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 298.229262][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 298.241468][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 298.253653][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 298.265753][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 298.436412][T11135] can0: slcan on ptm0. [ 300.350411][T11129] can0 (unregistered): slcan off ptm0. [ 300.762834][T11171] netlink: 'syz.1.5367': attribute type 17 has an invalid length. [ 303.094986][ T36] kauditd_printk_skb: 3839 callbacks suppressed [ 303.095006][ T36] audit: type=1400 audit(287.984:17829): avc: denied { read } for pid=150 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 303.227005][ T36] audit: type=1400 audit(287.984:17830): avc: denied { read } for pid=150 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 303.258607][ T150] audit: audit_backlog=65 > audit_backlog_limit=64 [ 303.265259][ T150] audit: audit_lost=30 audit_rate_limit=0 audit_backlog_limit=64 [ 303.281724][T11244] audit: audit_backlog=65 > audit_backlog_limit=64 [ 303.292600][T11245] audit: audit_backlog=65 > audit_backlog_limit=64 [ 303.302755][T11244] audit: audit_lost=31 audit_rate_limit=0 audit_backlog_limit=64 [ 303.313446][T11245] audit: audit_lost=32 audit_rate_limit=0 audit_backlog_limit=64 [ 303.330267][ T36] audit: type=1400 audit(287.984:17831): avc: denied { read } for pid=150 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 303.350875][ T150] audit: backlog limit exceeded [ 303.489535][ C0] net_ratelimit: 63124 callbacks suppressed [ 303.489559][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 303.507685][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 303.519884][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 303.532351][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 303.544533][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 303.556712][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:1e:a7:6d:50:c3:15, vlan:0) [ 303.568929][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 303.581007][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 303.593397][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 303.605853][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 304.486613][T11273] netlink: 316 bytes leftover after parsing attributes in process `syz.0.5416'. [ 304.517614][T11273] netlink: 316 bytes leftover after parsing attributes in process `syz.0.5416'. [ 305.341072][T11296] netlink: 8 bytes leftover after parsing attributes in process `syz.0.5427'. [ 306.965230][T11339] erspan0: default FDB implementation only supports local addresses [ 308.443412][ T36] kauditd_printk_skb: 3805 callbacks suppressed [ 308.443431][ T36] audit: type=1400 audit(293.004:21482): avc: denied { read } for pid=150 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 308.512633][T11393] netlink: 'syz.2.5472': attribute type 27 has an invalid length. [ 308.561007][ T36] audit: type=1400 audit(293.032:21483): avc: denied { read } for pid=150 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 308.607408][ T150] audit: audit_backlog=65 > audit_backlog_limit=64 [ 308.613979][ T150] audit: audit_lost=84 audit_rate_limit=0 audit_backlog_limit=64 [ 308.628837][ T485] audit: audit_backlog=65 > audit_backlog_limit=64 [ 308.635508][ T485] audit: audit_lost=85 audit_rate_limit=0 audit_backlog_limit=64 [ 308.661668][ T36] audit: type=1400 audit(293.032:21484): avc: denied { read } for pid=150 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 308.683606][ T150] audit: backlog limit exceeded [ 308.690814][ T485] audit: backlog limit exceeded [ 308.709658][ T150] audit: audit_backlog=65 > audit_backlog_limit=64 [ 308.829367][ C0] net_ratelimit: 61814 callbacks suppressed [ 308.829391][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 308.848004][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 308.860246][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 308.872329][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 308.884412][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 308.896695][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:1e:a7:6d:50:c3:15, vlan:0) [ 308.908859][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 308.921553][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 308.933988][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 308.946394][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 313.775142][ T36] kauditd_printk_skb: 3601 callbacks suppressed [ 313.775163][ T36] audit: type=1400 audit(298.014:25000): avc: denied { read } for pid=150 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 313.875304][ T36] audit: type=1400 audit(298.033:25001): avc: denied { read } for pid=150 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 313.905665][ T150] audit: audit_backlog=65 > audit_backlog_limit=64 [ 313.912582][ T150] audit: audit_lost=115 audit_rate_limit=0 audit_backlog_limit=64 [ 313.921687][ T36] audit: type=1400 audit(298.033:25002): avc: denied { read } for pid=150 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 313.942759][ T150] audit: backlog limit exceeded [ 313.948740][ T150] audit: audit_backlog=65 > audit_backlog_limit=64 [ 313.982769][ T484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 313.996221][ T483] audit: audit_backlog=65 > audit_backlog_limit=64 [ 314.005065][ T150] audit: audit_lost=116 audit_rate_limit=0 audit_backlog_limit=64 [ 314.169607][ C0] net_ratelimit: 61110 callbacks suppressed [ 314.169630][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 314.187715][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 314.199999][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 314.212175][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 314.224264][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 314.236432][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:1e:a7:6d:50:c3:15, vlan:0) [ 314.248622][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 314.260706][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 314.273077][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 314.285277][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 315.689776][T11606] netlink: 'syz.0.5576': attribute type 11 has an invalid length. [ 315.890494][T11614] netlink: 72 bytes leftover after parsing attributes in process `syz.0.5579'. [ 317.079660][ C1] ip6_tunnel: syztnl1 xmit: Local address not yet configured! [ 318.241522][T11684] netlink: 96 bytes leftover after parsing attributes in process `syz.0.5614'. [ 319.115514][ T36] kauditd_printk_skb: 3537 callbacks suppressed [ 319.115534][ T36] audit: type=1400 audit(303.024:28535): avc: denied { read } for pid=150 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 319.200320][ T36] audit: type=1400 audit(303.043:28536): avc: denied { read } for pid=150 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 319.237375][ T150] audit: audit_backlog=65 > audit_backlog_limit=64 [ 319.255198][ T150] audit: audit_lost=119 audit_rate_limit=0 audit_backlog_limit=64 [ 319.263080][ T150] audit: backlog limit exceeded [ 319.289634][ T36] audit: type=1400 audit(303.043:28537): avc: denied { read } for pid=150 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 319.332292][ T150] audit: audit_backlog=65 > audit_backlog_limit=64 [ 319.355543][ T150] audit: audit_lost=120 audit_rate_limit=0 audit_backlog_limit=64 [ 319.372077][ T150] audit: backlog limit exceeded [ 319.378198][ T36] audit: type=1400 audit(303.043:28538): avc: denied { read } for pid=150 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 319.509607][ C0] net_ratelimit: 63227 callbacks suppressed [ 319.509631][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 319.527801][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 319.539986][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 319.552225][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 319.564335][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 319.576416][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 319.588586][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:1e:a7:6d:50:c3:15, vlan:0) [ 319.600759][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 319.612932][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 319.625420][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 322.328736][T11796] can0: slcan on ttyS3. [ 322.523839][T11793] can0 (unregistered): slcan off ttyS3. [ 324.455051][ T36] kauditd_printk_skb: 3135 callbacks suppressed [ 324.455070][ T36] audit: type=1400 audit(308.024:31542): avc: denied { read } for pid=150 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 324.526630][ T36] audit: type=1400 audit(308.062:31543): avc: denied { read } for pid=150 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 324.556229][ T150] audit: audit_backlog=65 > audit_backlog_limit=64 [ 324.565388][ T150] audit: audit_lost=165 audit_rate_limit=0 audit_backlog_limit=64 [ 324.574638][ T36] audit: type=1400 audit(308.062:31544): avc: denied { read } for pid=150 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 324.625667][ T150] audit: backlog limit exceeded [ 324.631122][ T150] audit: audit_backlog=65 > audit_backlog_limit=64 [ 324.647444][T11865] audit: audit_backlog=65 > audit_backlog_limit=64 [ 324.665920][ T150] audit: audit_lost=166 audit_rate_limit=0 audit_backlog_limit=64 [ 324.679885][ T484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 324.849403][ C0] net_ratelimit: 59473 callbacks suppressed [ 324.849425][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 324.867990][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 324.880141][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 324.892249][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 324.904444][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:1e:a7:6d:50:c3:15, vlan:0) [ 324.916726][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 324.928822][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 324.941232][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 324.953382][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 324.965685][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 329.537788][T12007] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1011 sclass=netlink_route_socket pid=12007 comm=syz.0.5762 [ 329.799750][ T36] kauditd_printk_skb: 3524 callbacks suppressed [ 329.799770][ T36] audit: type=1400 audit(313.044:35064): avc: denied { read } for pid=150 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 329.908161][ T36] audit: type=1400 audit(313.044:35065): avc: denied { read } for pid=150 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 329.956589][ T150] audit: audit_backlog=65 > audit_backlog_limit=64 [ 329.963163][ T150] audit: audit_lost=169 audit_rate_limit=0 audit_backlog_limit=64 [ 329.990442][ T36] audit: type=1400 audit(313.044:35066): avc: denied { read } for pid=150 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 330.018884][ T150] audit: backlog limit exceeded [ 330.025930][ T150] audit: audit_backlog=65 > audit_backlog_limit=64 [ 330.050869][ T150] audit: audit_lost=170 audit_rate_limit=0 audit_backlog_limit=64 [ 330.073044][ T36] audit: type=1400 audit(313.044:35067): avc: denied { read } for pid=150 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 330.104287][ T150] audit: backlog limit exceeded [ 330.189451][ C0] net_ratelimit: 62238 callbacks suppressed [ 330.189477][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 330.207724][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 330.219985][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 330.232206][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 330.244559][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 330.256653][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 330.268823][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:1e:a7:6d:50:c3:15, vlan:0) [ 330.281153][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 330.293511][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 330.306119][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 332.717089][T12083] SELinux: security_context_str_to_sid (Eá…) failed with errno=-22 [ 334.305804][T12132] netlink: 28 bytes leftover after parsing attributes in process `syz.0.5820'. [ 335.144858][ T36] kauditd_printk_skb: 2840 callbacks suppressed [ 335.144878][ T36] audit: type=1400 audit(318.054:37776): avc: denied { read } for pid=150 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 335.226778][ T36] audit: type=1400 audit(318.054:37777): avc: denied { read } for pid=150 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 335.300207][ T36] audit: type=1400 audit(318.054:37778): avc: denied { read } for pid=150 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 335.393878][ T36] audit: type=1400 audit(318.054:37779): avc: denied { read } for pid=150 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 335.417184][ T150] audit: audit_backlog=65 > audit_backlog_limit=64 [ 335.425042][T12168] audit: audit_backlog=65 > audit_backlog_limit=64 [ 335.425065][T12168] audit: audit_lost=215 audit_rate_limit=0 audit_backlog_limit=64 [ 335.425091][T12168] audit: backlog limit exceeded [ 335.476400][ T150] audit: audit_lost=216 audit_rate_limit=0 audit_backlog_limit=64 [ 335.484454][ T150] audit: backlog limit exceeded [ 335.529456][ C0] net_ratelimit: 71275 callbacks suppressed [ 335.529479][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 335.548444][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:1e:a7:6d:50:c3:15, vlan:0) [ 335.560629][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 335.572708][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 335.585056][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 335.597237][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 335.609455][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 335.621893][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 335.634164][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 335.646239][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 337.891811][T12252] netlink: 8 bytes leftover after parsing attributes in process `syz.0.5874'. [ 338.568054][T12276] netlink: 328 bytes leftover after parsing attributes in process `syz.0.5885'. [ 339.257379][T12297] netlink: 'syz.3.5897': attribute type 46 has an invalid length. [ 339.728721][T12313] netlink: 'syz.0.5905': attribute type 10 has an invalid length. [ 340.075032][T12328] netlink: 'syz.0.5912': attribute type 16 has an invalid length. [ 340.094886][T12328] netlink: 'syz.0.5912': attribute type 25 has an invalid length. [ 340.113875][T12328] netlink: 64094 bytes leftover after parsing attributes in process `syz.0.5912'. [ 340.475549][ T36] kauditd_printk_skb: 2909 callbacks suppressed [ 340.475568][ T36] audit: type=1400 audit(323.064:40686): avc: denied { read } for pid=150 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 340.566142][ T36] audit: type=1400 audit(323.083:40687): avc: denied { read } for pid=150 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 340.617975][ T150] audit: audit_backlog=65 > audit_backlog_limit=64 [ 340.631171][ T483] audit: audit_backlog=65 > audit_backlog_limit=64 [ 340.637966][ T150] audit: audit_lost=218 audit_rate_limit=0 audit_backlog_limit=64 [ 340.652984][ T36] audit: type=1400 audit(323.083:40688): avc: denied { read } for pid=150 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 340.671320][ T150] audit: backlog limit exceeded [ 340.677701][ T483] audit: audit_lost=219 audit_rate_limit=0 audit_backlog_limit=64 [ 340.697045][ T483] audit: backlog limit exceeded [ 340.711512][ T150] audit: audit_backlog=65 > audit_backlog_limit=64 [ 340.869426][ C0] net_ratelimit: 65955 callbacks suppressed [ 340.869445][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 340.887663][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 340.899849][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 340.912157][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 340.924335][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 340.936612][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 340.948866][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:1e:a7:6d:50:c3:15, vlan:0) [ 340.961138][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 340.973208][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 340.985559][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:1e:a7:6d:50:c3:15, vlan:0) [ 345.817359][ T36] kauditd_printk_skb: 4215 callbacks suppressed [ 345.817382][ T36] audit: type=1326 audit(328.064:44902): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12476 comm="syz.0.5984" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fee2af9c799 code=0x50000 [ 345.851632][ T150] audit: audit_backlog=65 > audit_backlog_limit=64 [ 345.877939][ T150] audit: audit_lost=221 audit_rate_limit=0 audit_backlog_limit=64 [ 345.903645][ T150] audit: backlog limit exceeded [ 345.917808][ T36] audit: type=1326 audit(328.064:44903): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12476 comm="syz.0.5984" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fee2af9c799 code=0x50000 [ 345.953856][ T150] audit: audit_backlog=66 > audit_backlog_limit=64 [ 345.977627][ T150] audit: audit_lost=222 audit_rate_limit=0 audit_backlog_limit=64 [ 345.997061][ T150] audit: backlog limit exceeded [ 346.008326][ T150] audit: audit_backlog=66 > audit_backlog_limit=64 [ 346.014925][ T36] audit: type=1326 audit(328.064:44904): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12476 comm="syz.0.5984" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fee2af9c799 code=0x50000 [ 346.209554][ C0] net_ratelimit: 70475 callbacks suppressed [ 346.209575][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:1e:a7:6d:50:c3:15, vlan:0) [ 346.227703][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 346.239796][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 346.251876][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 346.264242][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 346.276426][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 346.288532][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 346.301043][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 346.313349][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 346.325898][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:1e:a7:6d:50:c3:15, vlan:0) [ 351.157955][ T36] kauditd_printk_skb: 10500 callbacks suppressed [ 351.157975][ T36] audit: type=1400 audit(333.084:55268): avc: denied { write } for pid=12562 comm="syz.0.6023" name="001" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=0 [ 351.277023][ T36] audit: type=1400 audit(333.112:55269): avc: denied { read } for pid=150 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 351.301974][ T150] audit: audit_backlog=65 > audit_backlog_limit=64 [ 351.311284][ T150] audit: audit_lost=269 audit_rate_limit=0 audit_backlog_limit=64 [ 351.320052][ T150] audit: backlog limit exceeded [ 351.325433][ T36] audit: type=1400 audit(333.112:55270): avc: denied { read } for pid=150 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 351.346678][ T150] audit: audit_backlog=65 > audit_backlog_limit=64 [ 351.353455][ T150] audit: audit_lost=270 audit_rate_limit=0 audit_backlog_limit=64 [ 351.372682][ T150] audit: backlog limit exceeded [ 351.378537][ T36] audit: type=1400 audit(333.112:55271): avc: denied { read } for pid=150 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 351.549658][ C0] net_ratelimit: 64418 callbacks suppressed [ 351.549680][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:1e:a7:6d:50:c3:15, vlan:0) [ 351.567771][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 351.579878][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 351.592012][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 351.604241][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 351.616330][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 351.628413][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 351.640578][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 351.652832][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 351.665171][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:1e:a7:6d:50:c3:15, vlan:0) [ 356.495480][ T36] kauditd_printk_skb: 7280 callbacks suppressed [ 356.495501][ T36] audit: type=1400 audit(338.090:62492): avc: denied { read } for pid=150 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 356.600097][ T150] audit: audit_backlog=65 > audit_backlog_limit=64 [ 356.622225][ T485] audit: audit_backlog=65 > audit_backlog_limit=64 [ 356.629234][ T150] audit: audit_lost=291 audit_rate_limit=0 audit_backlog_limit=64 [ 356.638460][ T36] audit: type=1400 audit(338.127:62493): avc: denied { read } for pid=150 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 356.660225][ T150] audit: backlog limit exceeded [ 356.665713][ T485] audit: audit_lost=292 audit_rate_limit=0 audit_backlog_limit=64 [ 356.673564][ T485] audit: backlog limit exceeded [ 356.680772][ T150] audit: audit_backlog=65 > audit_backlog_limit=64 [ 356.697625][ T150] audit: audit_lost=293 audit_rate_limit=0 audit_backlog_limit=64 [ 356.889495][ C0] net_ratelimit: 62272 callbacks suppressed [ 356.889519][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 356.907787][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 356.920152][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 356.932255][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 356.944428][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 356.956598][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 356.968661][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 356.981267][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:1e:a7:6d:50:c3:15, vlan:0) [ 356.993538][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 357.005940][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 359.559175][T12616] netlink: 1363 bytes leftover after parsing attributes in process `syz.1.6045'. [ 361.835238][ T36] kauditd_printk_skb: 7638 callbacks suppressed [ 361.835258][ T36] audit: type=1400 audit(343.100:70131): avc: denied { read } for pid=150 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 361.900979][ T36] audit: type=1400 audit(343.128:70132): avc: denied { read } for pid=150 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 361.939549][ T150] audit: audit_backlog=65 > audit_backlog_limit=64 [ 361.962542][ T150] audit: audit_lost=294 audit_rate_limit=0 audit_backlog_limit=64 [ 361.973476][ T36] audit: type=1400 audit(343.128:70133): avc: denied { read } for pid=150 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 361.995552][ T150] audit: backlog limit exceeded [ 362.011029][ T150] audit: audit_backlog=65 > audit_backlog_limit=64 [ 362.017796][ T150] audit: audit_lost=295 audit_rate_limit=0 audit_backlog_limit=64 [ 362.025812][ T150] audit: backlog limit exceeded [ 362.030761][ T36] audit: type=1400 audit(343.128:70134): avc: denied { read } for pid=150 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 362.229564][ C0] net_ratelimit: 63203 callbacks suppressed [ 362.229584][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 362.248023][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:1e:a7:6d:50:c3:15, vlan:0) [ 362.260225][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 362.272506][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 362.284666][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 362.297019][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 362.309112][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 362.321197][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 362.333480][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 362.345573][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 367.175112][ T36] kauditd_printk_skb: 7711 callbacks suppressed [ 367.175131][ T36] audit: type=1400 audit(348.100:77729): avc: denied { read } for pid=150 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 367.226664][ T36] audit: type=1400 audit(348.138:77730): avc: denied { read } for pid=150 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 367.259349][ T150] audit: audit_backlog=65 > audit_backlog_limit=64 [ 367.266448][ T150] audit: audit_lost=335 audit_rate_limit=0 audit_backlog_limit=64 [ 367.276141][ T36] audit: type=1400 audit(348.138:77731): avc: denied { read } for pid=150 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 367.296688][ T150] audit: backlog limit exceeded [ 367.303895][ T150] audit: audit_backlog=65 > audit_backlog_limit=64 [ 367.310439][ T150] audit: audit_lost=336 audit_rate_limit=0 audit_backlog_limit=64 [ 367.319624][ T36] audit: type=1400 audit(348.138:77732): avc: denied { read } for pid=150 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 367.340213][ T150] audit: backlog limit exceeded [ 367.569485][ C0] net_ratelimit: 64607 callbacks suppressed [ 367.569507][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 367.587980][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:1e:a7:6d:50:c3:15, vlan:0) [ 367.600143][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 367.612648][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 367.625601][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:1e:a7:6d:50:c3:15, vlan:0) [ 367.637972][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 367.650048][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 367.662376][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 367.674555][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 367.686752][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 371.848920][T10296] bridge0: port 3(syz_tun) entered disabled state [ 371.893957][T10296] syz_tun (unregistering): left allmulticast mode [ 371.906125][T10296] syz_tun (unregistering): left promiscuous mode [ 371.922632][T10296] bridge0: port 3(syz_tun) entered disabled state [ 372.181855][ T53] veth0_vlan: left promiscuous mode [ 372.515869][ T36] kauditd_printk_skb: 7011 callbacks suppressed [ 372.515888][ T36] audit: type=1400 audit(353.120:84663): avc: denied { read } for pid=150 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 372.587419][ T36] audit: type=1400 audit(353.148:84664): avc: denied { read } for pid=150 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 372.617378][ T150] audit: audit_backlog=65 > audit_backlog_limit=64 [ 372.624392][ T150] audit: audit_lost=364 audit_rate_limit=0 audit_backlog_limit=64 [ 372.633724][ T36] audit: type=1400 audit(353.148:84665): avc: denied { read } for pid=150 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 372.654250][ T150] audit: backlog limit exceeded [ 372.660286][ T150] audit: audit_backlog=65 > audit_backlog_limit=64 [ 372.679081][ T150] audit: audit_lost=365 audit_rate_limit=0 audit_backlog_limit=64 [ 372.693027][ T36] audit: type=1400 audit(353.148:84666): avc: denied { read } for pid=150 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 372.713758][ T150] audit: backlog limit exceeded [ 372.909700][ C0] net_ratelimit: 62441 callbacks suppressed [ 372.909724][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 372.928248][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:1e:a7:6d:50:c3:15, vlan:0) [ 372.940614][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 372.952972][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 372.965337][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 372.977577][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 372.990124][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 373.002312][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 373.014773][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 373.026953][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 373.068998][ T53] veth1_to_bridge: left allmulticast mode [ 373.074962][ T53] veth1_to_bridge: left promiscuous mode [ 373.086421][ T53] bridge0: port 3(veth1_to_bridge) entered disabled state [ 373.095275][ T53] bridge_slave_1: left allmulticast mode [ 373.101684][ T53] bridge_slave_1: left promiscuous mode [ 373.107593][ T53] bridge0: port 2(bridge_slave_1) entered disabled state [ 373.116858][ T53] bridge_slave_0: left allmulticast mode [ 373.122898][ T53] bridge_slave_0: left promiscuous mode [ 373.128798][ T53] bridge0: port 1(bridge_slave_0) entered disabled state [ 373.140176][ T53] bridge0: port 1(bridge_slave_0) entered disabled state [ 373.358605][ T53] veth1_macvtap: left promiscuous mode [ 373.364598][ T53] veth1_macvtap: left promiscuous mode [ 373.723648][ T53] ------------[ cut here ]------------ [ 373.729179][ T53] WARNING: CPU: 1 PID: 53 at net/ipv6/xfrm6_tunnel.c:341 xfrm6_tunnel_net_exit+0xc4/0x140 [ 373.739180][ T53] Modules linked in: [ 373.743332][ T53] CPU: 1 UID: 0 PID: 53 Comm: kworker/u8:3 Not tainted syzkaller #0 49aa54d9fff9a118f1e320bc713a86df8a810573 [ 373.754940][ T53] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 373.765051][ T53] Workqueue: netns cleanup_net [ 373.769886][ T53] RIP: 0010:xfrm6_tunnel_net_exit+0xc4/0x140 [ 373.776118][ T53] Code: e8 61 09 db fc 4b 83 3c 3e 00 75 19 e8 15 e4 82 fc 49 81 ff f8 07 00 00 74 1b e8 07 e4 82 fc 49 83 c7 08 eb c9 e8 fc e3 82 fc <0f> 0b 49 81 ff f8 07 00 00 75 e5 49 8d 9e 00 08 00 00 45 31 ff 4a [ 373.795800][ T53] RSP: 0018:ffffc9000036fb90 EFLAGS: 00010293 [ 373.801910][ T53] RAX: ffffffff8504bf54 RBX: ffff888116583540 RCX: ffff888110279300 [ 373.810130][ T53] RDX: 0000000000000000 RSI: 0000000000c00000 RDI: ffff88812f6a00b8 [ 373.818216][ T53] RBP: ffffc9000036fbb0 R08: ffffffff87d36887 R09: 1ffffffff0fa6d10 [ 373.826349][ T53] R10: dffffc0000000000 R11: fffffbfff0fa6d11 R12: dffffc0000000000 [ 373.834548][ T53] R13: dffffc0000000000 R14: ffff88812f6a0000 R15: 00000000000000b8 [ 373.842584][ T53] FS: 0000000000000000(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 373.851803][ T53] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 373.858643][ T53] CR2: 000055c9cdde7af8 CR3: 000000010c31c000 CR4: 00000000003526b0 [ 373.866852][ T53] Call Trace: [ 373.870213][ T53] [ 373.873207][ T53] cleanup_net+0x6c0/0xc90 [ 373.877710][ T53] ? __cfi_cleanup_net+0x10/0x10 [ 373.882993][ T53] ? _raw_spin_lock_irq+0x93/0x120 [ 373.888153][ T53] ? kick_pool+0xb9/0x550 [ 373.892587][ T53] process_scheduled_works+0x7d4/0x1020 [ 373.898213][ T53] worker_thread+0xc70/0x10b0 [ 373.903051][ T53] ? __cfi_try_to_wake_up+0x10/0x10 [ 373.908292][ T53] kthread+0x2c6/0x370 [ 373.912432][ T53] ? __cfi_worker_thread+0x10/0x10 [ 373.917647][ T53] ? __cfi_kthread+0x10/0x10 [ 373.922426][ T53] ret_from_fork+0x64/0xa0 [ 373.927116][ T53] ? __cfi_kthread+0x10/0x10 [ 373.931758][ T53] ret_from_fork_asm+0x1a/0x30 [ 373.936690][ T53] [ 373.939814][ T53] ---[ end trace 0000000000000000 ]--- [ 373.952362][ T53] ------------[ cut here ]------------ [ 373.957939][ T53] WARNING: CPU: 1 PID: 53 at net/ipv6/xfrm6_tunnel.c:344 xfrm6_tunnel_net_exit+0x119/0x140 [ 373.967998][ T53] Modules linked in: [ 373.971927][ T53] CPU: 1 UID: 0 PID: 53 Comm: kworker/u8:3 Tainted: G W syzkaller #0 49aa54d9fff9a118f1e320bc713a86df8a810573 [ 373.985109][ T53] Tainted: [W]=WARN [ 373.988989][ T53] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 373.999127][ T53] Workqueue: netns cleanup_net [ 374.004040][ T53] RIP: 0010:xfrm6_tunnel_net_exit+0x119/0x140 [ 374.010467][ T53] Code: fc 4b 83 bc 3e 00 08 00 00 00 75 19 e8 c0 e3 82 fc 49 81 ff f8 07 00 00 74 1b e8 b2 e3 82 fc 49 83 c7 08 eb c5 e8 a7 e3 82 fc <0f> 0b 49 81 ff f8 07 00 00 75 e5 e8 97 e3 82 fc 5b 41 5c 41 5e 41 [ 374.030308][ T53] RSP: 0018:ffffc9000036fb90 EFLAGS: 00010293 [ 374.036503][ T53] RAX: ffffffff8504bfa9 RBX: ffff88812f6a0800 RCX: ffff888110279300 [ 374.044643][ T53] RDX: 0000000000000000 RSI: 0000000000c00000 RDI: ffff88812f6a0808 [ 374.052784][ T53] RBP: ffffc9000036fbb0 R08: ffffffff87d36887 R09: 1ffffffff0fa6d10 [ 374.061269][ T53] R10: dffffc0000000000 R11: fffffbfff0fa6d11 R12: dffffc0000000000 [ 374.069385][ T53] R13: dffffc0000000000 R14: ffff88812f6a0000 R15: 0000000000000008 [ 374.077551][ T53] FS: 0000000000000000(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 374.086561][ T53] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 374.093215][ T53] CR2: 000055c9cdde7af8 CR3: 000000010c3a4000 CR4: 00000000003526b0 [ 374.101242][ T53] Call Trace: [ 374.104681][ T53] [ 374.107658][ T53] cleanup_net+0x6c0/0xc90 [ 374.112476][ T53] ? __cfi_cleanup_net+0x10/0x10 [ 374.117595][ T53] ? _raw_spin_lock_irq+0x93/0x120 [ 374.122857][ T53] ? kick_pool+0xb9/0x550 [ 374.127351][ T53] process_scheduled_works+0x7d4/0x1020 [ 374.133051][ T53] worker_thread+0xc70/0x10b0 [ 374.137936][ T53] ? __cfi_try_to_wake_up+0x10/0x10 [ 374.143190][ T53] kthread+0x2c6/0x370 [ 374.147326][ T53] ? __cfi_worker_thread+0x10/0x10 [ 374.152510][ T53] ? __cfi_kthread+0x10/0x10 [ 374.157513][ T53] ret_from_fork+0x64/0xa0 [ 374.161976][ T53] ? __cfi_kthread+0x10/0x10 [ 374.166620][ T53] ret_from_fork_asm+0x1a/0x30 [ 374.171512][ T53] [ 374.174600][ T53] ---[ end trace 0000000000000000 ]--- [ 374.185192][ T53] ------------[ cut here ]------------ [ 374.191152][ T53] WARNING: CPU: 1 PID: 53 at net/xfrm/xfrm_state.c:3216 xfrm_state_fini+0x2be/0x310 [ 374.200625][ T53] Modules linked in: [ 374.204739][ T53] CPU: 1 UID: 0 PID: 53 Comm: kworker/u8:3 Tainted: G W syzkaller #0 49aa54d9fff9a118f1e320bc713a86df8a810573 [ 374.217881][ T53] Tainted: [W]=WARN [ 374.221775][ T53] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 374.231905][ T53] Workqueue: netns cleanup_net [ 374.236746][ T53] RIP: 0010:xfrm_state_fini+0x2be/0x310 [ 374.242390][ T53] Code: 3c 20 00 74 08 48 89 df e8 0f d3 f5 fc 48 8b 3b e8 f7 ff e0 fc 5b 41 5c 41 5d 41 5e 41 5f 5d e9 88 cb b7 00 cc e8 b2 ad 9d fc <0f> 0b e9 b0 fd ff ff e8 a6 ad 9d fc 0f 0b e9 18 fe ff ff e8 9a ad [ 374.262350][ T53] RSP: 0018:ffffc9000036fb70 EFLAGS: 00010293 [ 374.268676][ T53] RAX: ffffffff84e9f59e RBX: ffff888116583540 RCX: ffff888110279300 [ 374.276919][ T53] RDX: 0000000000000000 RSI: 0000000000c00000 RDI: ffff888110279300 [ 374.285267][ T53] RBP: ffffc9000036fb98 R08: ffffffff87d36887 R09: 1ffffffff0fa6d10 [ 374.293291][ T53] R10: dffffc0000000000 R11: fffffbfff0fa6d11 R12: 1ffffffff0fa6a60 [ 374.301341][ T53] R13: dffffc0000000000 R14: ffff888116584140 R15: dffffc0000000000 [ 374.309391][ T53] FS: 0000000000000000(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 374.318382][ T53] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 374.325191][ T53] CR2: 000055c9cdde7af8 CR3: 000000010c3a4000 CR4: 00000000003526b0 [ 374.333342][ T53] Call Trace: [ 374.336744][ T53] [ 374.339743][ T53] xfrm_net_exit+0x31/0x80 [ 374.344201][ T53] cleanup_net+0x6c0/0xc90 [ 374.349210][ T53] ? __cfi_cleanup_net+0x10/0x10 [ 374.354212][ T53] ? _raw_spin_lock_irq+0x93/0x120 [ 374.359383][ T53] ? kick_pool+0xb9/0x550 [ 374.363813][ T53] process_scheduled_works+0x7d4/0x1020 [ 374.369427][ T53] worker_thread+0xc70/0x10b0 [ 374.374289][ T53] ? __cfi_try_to_wake_up+0x10/0x10 [ 374.379562][ T53] kthread+0x2c6/0x370 [ 374.383889][ T53] ? __cfi_worker_thread+0x10/0x10 [ 374.389251][ T53] ? __cfi_kthread+0x10/0x10 [ 374.394172][ T53] ret_from_fork+0x64/0xa0 [ 374.398641][ T53] ? __cfi_kthread+0x10/0x10 [ 374.403297][ T53] ret_from_fork_asm+0x1a/0x30 [ 374.408122][ T53] [ 374.411230][ T53] ---[ end trace 0000000000000000 ]--- [ 377.855172][ T36] kauditd_printk_skb: 10524 callbacks suppressed [ 377.855193][ T36] audit: type=1400 audit(358.120:95074): avc: denied { read } for pid=150 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 377.884242][ T36] audit: type=1400 audit(358.130:95075): avc: denied { read } for pid=150 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 377.905928][ T36] audit: type=1400 audit(358.130:95076): avc: denied { read } for pid=150 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 377.927311][ T36] audit: type=1400 audit(358.130:95077): avc: denied { read } for pid=150 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 377.947366][ T150] audit: audit_backlog=65 > audit_backlog_limit=64 [ 377.950270][ T36] audit: type=1400 audit(358.130:95078): avc: denied { read } for pid=150 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 377.954869][ T150] audit: audit_lost=405 audit_rate_limit=0 audit_backlog_limit=64 [ 377.977291][ T36] audit: type=1400 audit(358.130:95079): avc: denied { read } for pid=150 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 377.983721][ T150] audit: backlog limit exceeded [ 378.006189][ T36] audit: type=1400 audit(358.130:95080): avc: denied { read } for pid=150 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0