last executing test programs: 1m0.79126655s ago: executing program 0 (id=2555): r0 = socket(0x8000000010, 0x2, 0x0) write(r0, &(0x7f00000002c0)="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", 0xfc) 1m0.658098518s ago: executing program 0 (id=2560): r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/xfrm_stat\x00') ftruncate(r0, 0x3119c976) 1m0.545209745s ago: executing program 0 (id=2562): futex(&(0x7f000000cffc), 0x9, 0x0, 0x0, 0x0, 0x80) futex(&(0x7f000000cffc)=0x2, 0xa, 0x0, 0x0, 0x0, 0x1000000) 59.536837252s ago: executing program 0 (id=2590): syz_usb_connect(0x0, 0x36, &(0x7f0000001300)=ANY=[@ANYBLOB="120100000cb78a405e0483020b990102030109022400010000000009040000025c291d000905dc00000000000009050b"], 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, 0x0) 59.05471703s ago: executing program 1 (id=2602): r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0), 0x40800, 0x0) preadv(r0, &(0x7f0000000240)=[{&(0x7f0000033a80)=""/102386, 0xfffffd6e}], 0x1, 0x0, 0x0) 58.974866715s ago: executing program 1 (id=2604): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="cc0000001b0001032dbd7000fbdbdf25ac1414aa000000000000000000000000e00000010000000000000000000000004e2300004e2300080200802084000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000000001040020000000000500000000000000f80000000f0000005e0000000000000001000000000000002f060000000000000c00000000000000f8fffffffffffffffaffffffc06b6e00020003010000000002000000000000000a"], 0xcc}}, 0x0) 58.878394971s ago: executing program 1 (id=2606): munmap(&(0x7f00003fe000/0xc00000)=nil, 0xc00000) msync(&(0x7f0000461000/0x4000)=nil, 0x4000, 0x2) 58.818325824s ago: executing program 1 (id=2608): r0 = syz_usb_connect$uac1(0x0, 0x71, &(0x7f00000002c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x2, {{0x9, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, {{0xa, 0x24, 0x1, 0x0, 0x3}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x40, 0x0, 0x0, 0x8, {0x7, 0x25, 0x1, 0x3, 0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x3ff, 0x0, 0x0, 0x80, {0x7, 0x25, 0x1, 0x0, 0x0, 0xff1d}}}}}}}]}}, 0x0) syz_usb_control_io$uac1(r0, &(0x7f0000000180)={0x14, &(0x7f0000000000)={0x40, 0xa, 0x2, {0x2, 0xe}}, &(0x7f0000000140)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x1c}}}, 0x0) 58.741320558s ago: executing program 2 (id=2610): r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5500000020007fafb72d13b2a4a2719302000000030b43026c26236925001900fe7f0000bd2dca8a9848a3c728f1c46b7b31afdc1338d509000000000100005ae583de0dd7d8319f98af84fda542e718f94b929ade", 0x55}], 0x1}, 0x0) 58.706295511s ago: executing program 2 (id=2611): r0 = syz_open_procfs(0x0, &(0x7f0000000000)='ns\x00') openat$cgroup_int(r0, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) 58.644468764s ago: executing program 2 (id=2613): futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x6, 0x1, 0x0, 0x0, 0x2) 58.098298096s ago: executing program 3 (id=2628): r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0xcf, 0x0, 0x0) 58.058904238s ago: executing program 3 (id=2629): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000900)=@updsa={0x138, 0x1a, 0xffffffffffffffff, 0x70bd2a, 0x3, {{@in=@private=0xa010101, @in6=@loopback, 0x0, 0x0, 0x4e24, 0x0, 0x0, 0x20, 0xa0, 0x11}, {@in=@multicast1, 0x84d4, 0x6c}, @in6=@private1, {0x100000000, 0x0, 0x0, 0xfffffffffffffffd, 0x7ff, 0xfffffffffffffffc, 0xfffffffffffffffd}, {0x0, 0x0, 0x80000000, 0xa6}, {0x936d, 0x3d49, 0x4000}, 0x0, 0x3503, 0xa, 0x1, 0x4, 0x60}, [@algo_comp={0x48, 0x3, {{'deflate\x00'}}}]}, 0x138}}, 0x0) 58.02728334s ago: executing program 3 (id=2630): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000001040), 0x2002, 0x0) ioctl$AUTOFS_IOC_FAIL(r0, 0x4c81, 0xffffffffffffffb6) 57.981482332s ago: executing program 3 (id=2631): mkdir(&(0x7f0000000000)='./file0\x00', 0x2) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000380)='debugfs\x00', 0x80, &(0x7f00000003c0)='Q*2aGx\xc3P\'7\x0f\xfd`P\x06\xca\a+\x9f\xe4cm,p0\x9f\x0e\x1b\x9a\xc1]\f\x89\xf0\xce[\x9b\xfaE4>DZD\xd8*\x88A\xaaV\x16x\fN\xad\xb7\xb5W\xc1\x7f\xf8%._\x9c\x10D\x1b\x9d%\xa1$\xe5o\xe1\xad\xb3n6H\xa2\xc5\x85\x83\xd0\x03\x8c#\xce\x8f\xbdIX2v\x95\xf4|\xd2\xe7EW\x88\xd0\xd0\x98\xd1\x15\"\xd9\xf1\x1a\x17\x19\x8cR\xfaz\xe8\xa4\x0f\xb7\xf4\x84$0&\r\x04\x85S\xb9$\xaf\x16\xaf\xe1\x93zT\xddGGr\'\x81\x04\x90U\xc5m\xa31\xf6\x86,]') 56.938413853s ago: executing program 2 (id=2632): r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TCSETS(r0, 0x545c, 0x0) 53.879544308s ago: executing program 1 (id=2633): r0 = syz_usb_connect(0x0, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0xd0, 0xff, 0xec, 0x20, 0x789, 0x160, 0x2cd1, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x10, 0x0, [{{0x9, 0x4, 0xbf, 0x0, 0x2, 0xe6, 0xfb, 0x6a, 0x0, [], [{{0x9, 0x5, 0x4, 0x2, 0x200}}, {{0x9, 0x5, 0x82, 0x2, 0x18}}]}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) 53.345871839s ago: executing program 0 (id=2634): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched_retired(r0, &(0x7f0000003b80)={0x0, 0x0, &(0x7f0000003b40)={&(0x7f00000015c0)=@newtfilter={0x24, 0x2c, 0x603, 0x70bd2a, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, {0xc, 0xc}, {0xffff, 0xa}, {0x4}}}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x80) 49.301233682s ago: executing program 3 (id=2635): r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x1, 0x0, &(0x7f00000048c0)) 46.428569157s ago: executing program 2 (id=2636): r0 = syz_open_dev$usbmon(&(0x7f0000000080), 0x0, 0x181440) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f0000000180)={0x0, 0x0, 0xffffffff}) 44.381849545s ago: executing program 0 (id=2637): r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) bind$bt_l2cap(r0, &(0x7f0000001640)={0x1f, 0xfdce}, 0xe) 44.12680591s ago: executing program 1 (id=2638): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8b04, &(0x7f0000000040)={'wlan1\x00', @random="010008000100"}) 42.642402345s ago: executing program 3 (id=2639): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000005e00)={0xffffffffffffffff}) getsockopt$sock_int(r0, 0x1, 0x9, 0x0, &(0x7f0000000300)) 38.893733671s ago: executing program 2 (id=2640): r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0xd0, 0x0, 0x0) 17.785778716s ago: executing program 32 (id=2637): r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) bind$bt_l2cap(r0, &(0x7f0000001640)={0x1f, 0xfdce}, 0xe) 12.478501441s ago: executing program 33 (id=2638): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8b04, &(0x7f0000000040)={'wlan1\x00', @random="010008000100"}) 10.624216758s ago: executing program 34 (id=2639): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000005e00)={0xffffffffffffffff}) getsockopt$sock_int(r0, 0x1, 0x9, 0x0, &(0x7f0000000300)) 0s ago: executing program 35 (id=2640): r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0xd0, 0x0, 0x0) kernel console output (not intermixed with test programs): 37437][ T528] usb 4-1: 0:2 : does not exist [ 115.144489][ T528] usb 4-1: USB disconnect, device number 69 [ 115.704723][ T3385] process 'syz.2.1480' launched '/dev/fd/3' with NULL argv: empty string added [ 115.880203][ T3423] erofs: dax options not supported [ 115.909164][ T3433] tc_dump_action: action bad kind [ 115.935971][ T3436] 2N: renamed from vcan0 (while UP) [ 116.045821][ T3457] EXT4-fs: Value of option "test_dummy_encryption" is unrecognized [ 116.227061][ T3497] /dev/nbd0: Can't lookup blockdev [ 116.304086][ T3511] netlink: 'syz.3.1541': attribute type 22 has an invalid length. [ 116.427980][ T3540] netlink: 24 bytes leftover after parsing attributes in process `syz.0.1553'. [ 116.769490][ T45] usb 1-1: new high-speed USB device number 70 using dummy_hcd [ 116.790001][ T391] usb 4-1: new low-speed USB device number 70 using dummy_hcd [ 116.881267][ T3573] SELinux: Context system_u:object_r:fsadm_exec_t:s0 is not valid (left unmapped). [ 116.950744][ T45] usb 1-1: Using ep0 maxpacket: 8 [ 116.953919][ T391] usb 4-1: config 1 has an invalid interface descriptor of length 6, skipping [ 116.959497][ T45] usb 1-1: unable to get BOS descriptor or descriptor too short [ 116.964754][ T391] usb 4-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 116.976338][ T45] usb 1-1: config 4 has an invalid interface number: 147 but max is 0 [ 116.982515][ T391] usb 4-1: config 1 has 2 interfaces, different from the descriptor's value: 3 [ 116.992250][ T45] usb 1-1: config 4 contains an unexpected descriptor of type 0x2, skipping [ 116.999718][ T391] usb 4-1: config 1 has no interface number 1 [ 117.009533][ T45] usb 1-1: config 4 has no interface number 0 [ 117.019937][ T391] usb 4-1: string descriptor 0 read error: -22 [ 117.025423][ T45] usb 1-1: New USB device found, idVendor=04f2, idProduct=b746, bcdDevice=8e.6e [ 117.027794][ T391] usb 4-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 117.037410][ T45] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 117.046064][ T391] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 117.052989][ T45] usb 1-1: Product: syz [ 117.066335][ T45] usb 1-1: Manufacturer: syz [ 117.070343][ T391] usb 4-1: MIDIStreaming interface descriptor not found [ 117.071732][ T45] usb 1-1: SerialNumber: syz [ 117.085863][ T10] usb 2-1: new high-speed USB device number 69 using dummy_hcd [ 117.163868][ T365] usb 3-1: new high-speed USB device number 70 using dummy_hcd [ 117.262670][ T10] usb 2-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 117.272951][ T10] usb 2-1: New USB device found, idVendor=13e5, idProduct=0001, bcdDevice=4e.53 [ 117.285007][ T10] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 117.295963][ T10] usb 2-1: config 0 descriptor?? [ 117.335757][ T365] usb 3-1: Using ep0 maxpacket: 16 [ 117.351287][ T365] usb 3-1: config 0 has an invalid interface number: 105 but max is 0 [ 117.366714][ T365] usb 3-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 117.377102][ T45] usb 1-1: Found UVC 0.00 device syz (04f2:b746) [ 117.383538][ T45] usb 1-1: No valid video chain found. [ 117.390685][ T365] usb 3-1: config 0 has no interface number 0 [ 117.399377][ T391] usb 4-1: USB disconnect, device number 70 [ 117.401592][ T45] usb 1-1: USB disconnect, device number 70 [ 117.414332][ T365] usb 3-1: New USB device found, idVendor=046c, idProduct=14e8, bcdDevice= b.28 [ 117.425432][ T365] usb 3-1: New USB device strings: Mfr=5, Product=2, SerialNumber=3 [ 117.433551][ T365] usb 3-1: Product: syz [ 117.438406][ T365] usb 3-1: Manufacturer: syz [ 117.458974][ T365] usb 3-1: SerialNumber: syz [ 117.473206][ T365] usb 3-1: config 0 descriptor?? [ 117.543907][ T10] usb 2-1: USB disconnect, device number 69 [ 117.585928][ T638] udevd[638]: error opening ATTR{/sys/devices/platform/dummy_hcd.1/usb2/2-1/2-1:0.0/sound/card1/controlC1/../uevent} for writing: No such file or directory [ 117.711930][ T365] usb 3-1: Found UVC 0.00 device syz (046c:14e8) [ 117.718529][ T365] usb 3-1: No valid video chain found. [ 117.727499][ T365] usb 3-1: USB disconnect, device number 70 [ 118.211070][ T3593] SELinux: Context system_u:object_r:apt_var_lib_t:s0 is not valid (left unmapped). [ 118.226583][ T3595] netlink: 24 bytes leftover after parsing attributes in process `syz.3.1582'. [ 118.396677][ T3606] netlink: 'syz.3.1587': attribute type 1 has an invalid length. [ 119.066296][ T36] kauditd_printk_skb: 372 callbacks suppressed [ 119.066316][ T36] audit: type=1400 audit(2000000029.602:643): avc: denied { read write } for pid=290 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 119.125052][ T36] audit: type=1400 audit(2000000029.602:644): avc: denied { read write open } for pid=290 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 119.152979][ T36] audit: type=1400 audit(2000000029.602:645): avc: denied { ioctl } for pid=290 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 119.213353][ T36] audit: type=1400 audit(2000000029.649:646): avc: denied { create } for pid=3658 comm="syz.2.1613" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 119.232940][ T36] audit: type=1400 audit(2000000029.649:647): avc: denied { setopt } for pid=3658 comm="syz.2.1613" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 119.282006][ T36] audit: type=1400 audit(2000000029.677:648): avc: denied { read write } for pid=290 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 119.322134][ T36] audit: type=1400 audit(2000000029.677:649): avc: denied { read write open } for pid=290 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 119.347028][ T36] audit: type=1400 audit(2000000029.677:650): avc: denied { ioctl } for pid=290 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 119.378909][ T36] audit: type=1400 audit(2000000029.687:651): avc: denied { read write } for pid=289 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 119.416353][ T36] audit: type=1400 audit(2000000029.687:652): avc: denied { read write open } for pid=289 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 119.604711][ T365] usb 3-1: new high-speed USB device number 71 using dummy_hcd [ 119.775998][ T365] usb 3-1: Using ep0 maxpacket: 16 [ 119.793853][ T365] usb 3-1: New USB device found, idVendor=05d1, idProduct=2001, bcdDevice=29.00 [ 119.807617][ T365] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 119.808887][ T3698] netlink: 'syz.0.1630': attribute type 5 has an invalid length. [ 119.823795][ T365] usb 3-1: Product: syz [ 119.832995][ T365] usb 3-1: Manufacturer: syz [ 119.837678][ T365] usb 3-1: SerialNumber: syz [ 119.839397][ T3698] netlink: 3657 bytes leftover after parsing attributes in process `syz.0.1630'. [ 119.882928][ T365] usb 3-1: config 0 descriptor?? [ 119.905736][ T365] ftdi_sio 3-1:0.0: FTDI USB Serial Device converter detected [ 119.932542][ T365] usb 3-1: Detected FT4233HP [ 120.005717][ T3707] x_tables: arp_tables: NFLOG.0 target: invalid size 80 (kernel) != (user) 0 [ 120.358393][ T365] ftdi_sio ttyUSB0: Unable to write latency timer: -71 [ 120.382930][ T365] usb 3-1: FTDI USB Serial Device converter now attached to ttyUSB0 [ 120.414264][ T365] usb 3-1: USB disconnect, device number 71 [ 120.446631][ T365] ftdi_sio ttyUSB0: FTDI USB Serial Device converter now disconnected from ttyUSB0 [ 120.456343][ T365] ftdi_sio 3-1:0.0: device disconnected [ 120.746035][ T3743] incfs: Options parsing error. -22 [ 120.759165][ T3743] incfs: mount failed -22 [ 121.715138][ T10] usb 4-1: new high-speed USB device number 71 using dummy_hcd [ 121.899407][ T10] usb 4-1: Using ep0 maxpacket: 8 [ 121.910266][ T10] usb 4-1: config 0 has an invalid interface number: 31 but max is 0 [ 121.923195][ T10] usb 4-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 121.951921][ T10] usb 4-1: config 0 has no interface number 0 [ 121.972014][ T10] usb 4-1: New USB device found, idVendor=046d, idProduct=08c3, bcdDevice=6b.16 [ 121.991930][ T10] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 122.009277][ T10] usb 4-1: Product: syz [ 122.019256][ T10] usb 4-1: Manufacturer: syz [ 122.029455][ T10] usb 4-1: SerialNumber: syz [ 122.067079][ T10] usb 4-1: config 0 descriptor?? [ 122.312070][ T10] usb 4-1: Found UVC 0.04 device syz (046d:08c3) [ 122.318584][ T10] usb 4-1: No valid video chain found. [ 122.534040][ T365] usb 4-1: USB disconnect, device number 71 [ 122.548603][ T3856] netlink: 'syz.2.1708': attribute type 27 has an invalid length. [ 122.886354][ T3871] overlayfs: option "volatile" is meaningless in a non-upper mount, ignoring it. [ 122.909150][ T3871] overlayfs: missing 'lowerdir' [ 122.986384][ T3878] usb usb8: usbfs: process 3878 (syz.0.1719) did not claim interface 0 before use [ 123.291590][ T3900] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 123.298902][ T3900] IPv6: NLM_F_CREATE should be set when creating new route [ 123.306184][ T3900] IPv6: NLM_F_CREATE should be set when creating new route [ 123.337535][ T424] usb 1-1: new high-speed USB device number 71 using dummy_hcd [ 123.531531][ T424] usb 1-1: config 220 has an invalid interface number: 76 but max is 2 [ 123.560314][ T424] usb 1-1: config 220 contains an unexpected descriptor of type 0x2, skipping [ 123.569251][ T424] usb 1-1: config 220 has an invalid descriptor of length 0, skipping remainder of the config [ 123.601717][ T424] usb 1-1: config 220 has no interface number 2 [ 123.611038][ T3920] netlink: 'syz.3.1740': attribute type 7 has an invalid length. [ 123.619002][ T424] usb 1-1: config 220 interface 1 altsetting 5 has 0 endpoint descriptors, different from the interface descriptor's value: 12 [ 123.649186][ T424] usb 1-1: config 220 interface 0 has no altsetting 0 [ 123.663242][ T424] usb 1-1: config 220 interface 76 has no altsetting 0 [ 123.685412][ T424] usb 1-1: config 220 interface 1 has no altsetting 0 [ 123.702445][ T424] usb 1-1: New USB device found, idVendor=8086, idProduct=0b07, bcdDevice=6c.b9 [ 123.717033][ T3926] syz.2.1743 (3926): /proc/3924/oom_adj is deprecated, please use /proc/3924/oom_score_adj instead. [ 123.727954][ T424] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 123.740272][ T424] usb 1-1: Product: syz [ 123.744527][ T424] usb 1-1: Manufacturer: syz [ 123.777587][ T424] usb 1-1: SerialNumber: syz [ 123.857604][ T3931] EXT4-fs: Value of option "test_dummy_encryption" is unrecognized [ 124.106044][ T424] usb 1-1: selecting invalid altsetting 0 [ 124.117771][ T424] usb 1-1: Found UVC 7.01 device syz (8086:0b07) [ 124.137466][ T424] usb 1-1: No valid video chain found. [ 124.158139][ T424] usb 1-1: USB disconnect, device number 71 [ 124.426884][ T36] kauditd_printk_skb: 662 callbacks suppressed [ 124.426905][ T36] audit: type=1400 audit(2000000034.631:1315): avc: denied { read append } for pid=3966 comm="syz.1.1762" name="rnullb0" dev="devtmpfs" ino=31 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 124.504171][ T36] audit: type=1400 audit(2000000034.659:1316): avc: denied { read write } for pid=292 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 124.540976][ T36] audit: type=1400 audit(2000000034.659:1317): avc: denied { read write open } for pid=292 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 124.566893][ T36] audit: type=1400 audit(2000000034.659:1318): avc: denied { ioctl } for pid=292 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 124.592865][ T36] audit: type=1400 audit(2000000034.678:1319): avc: denied { ioctl open } for pid=3966 comm="syz.1.1762" path="/dev/rnullb0" dev="devtmpfs" ino=31 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 124.687619][ T36] audit: type=1400 audit(2000000034.678:1320): avc: denied { ioctl } for pid=3966 comm="syz.1.1762" path="/dev/rnullb0" dev="devtmpfs" ino=31 ioctlcmd=0x1284 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 124.729743][ T36] audit: type=1400 audit(2000000034.697:1321): avc: denied { read write } for pid=291 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 124.817877][ T36] audit: type=1400 audit(2000000034.697:1322): avc: denied { read write open } for pid=291 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 124.888098][ T36] audit: type=1400 audit(2000000034.697:1323): avc: denied { ioctl } for pid=291 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 124.985008][ T36] audit: type=1400 audit(2000000034.743:1324): avc: denied { write } for pid=3968 comm="syz.3.1763" name="001" dev="devtmpfs" ino=120 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 125.615071][ T4040] netlink: 12 bytes leftover after parsing attributes in process `syz.3.1797'. [ 125.968014][ T391] usb 1-1: new high-speed USB device number 72 using dummy_hcd [ 126.099371][ T4074] netlink: 80 bytes leftover after parsing attributes in process `syz.1.1814'. [ 126.138502][ T391] usb 1-1: Using ep0 maxpacket: 16 [ 126.155253][ T391] usb 1-1: New USB device found, idVendor=05d1, idProduct=2001, bcdDevice= 2.00 [ 126.206433][ T391] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 126.247147][ T391] usb 1-1: config 0 descriptor?? [ 126.259275][ T391] ftdi_sio 1-1:0.0: FTDI USB Serial Device converter detected [ 126.459103][ T4092] rust_binder: Transaction failed: BR_FAILED_REPLY { source: ENOENT } my_pid:926 [ 126.523432][ T391] usb 1-1: Detected FT232B [ 126.636849][ T4101] incfs: Options parsing error. -22 [ 126.659874][ T4101] incfs: mount failed -22 [ 126.738115][ T391] ftdi_sio ttyUSB0: Unable to read latency timer: -71 [ 126.776600][ T391] ftdi_sio ttyUSB0: Unable to write latency timer: -71 [ 126.790915][ T391] usb 1-1: FTDI USB Serial Device converter now attached to ttyUSB0 [ 126.815287][ T391] usb 1-1: USB disconnect, device number 72 [ 126.838625][ T391] ftdi_sio ttyUSB0: FTDI USB Serial Device converter now disconnected from ttyUSB0 [ 126.869393][ T391] ftdi_sio 1-1:0.0: device disconnected [ 127.010153][ T4121] netlink: 'syz.3.1838': attribute type 4 has an invalid length. [ 127.028963][ T4121] netlink: 17 bytes leftover after parsing attributes in process `syz.3.1838'. [ 127.154119][ T4128] netlink: 32 bytes leftover after parsing attributes in process `syz.2.1842'. [ 127.418325][ T4146] netlink: 12 bytes leftover after parsing attributes in process `syz.0.1850'. [ 128.384097][ T4211] rust_binder: Write failure EFAULT in pid:956 [ 128.475112][ T4217] netlink: 'syz.3.1887': attribute type 4 has an invalid length. [ 128.506142][ T4219] netlink: 240 bytes leftover after parsing attributes in process `syz.1.1886'. [ 128.515589][ T4217] netlink: 3657 bytes leftover after parsing attributes in process `syz.3.1887'. [ 128.864193][ T4238] SELinux: Context system_u:object_r:inetd_exec_t:s0 is not valid (left unmapped). [ 129.004789][ T421] usb 3-1: new full-speed USB device number 72 using dummy_hcd [ 129.200545][ T421] usb 3-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 10 [ 129.232209][ T421] usb 3-1: config 1 interface 0 altsetting 0 endpoint 0x3 has invalid wMaxPacketSize 0 [ 129.254187][ T421] usb 3-1: New USB device found, idVendor=0525, idProduct=a4a5, bcdDevice= 0.40 [ 129.272192][ T421] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=1 [ 129.293376][ T421] usb 3-1: SerialNumber: syz [ 129.309041][ T421] cdc_ether 3-1:1.0: probe with driver cdc_ether failed with error -22 [ 129.344610][ T421] usb-storage 3-1:1.0: USB Mass Storage device detected [ 129.369152][ T421] usb-storage 3-1:1.0: Quirks match for vid 0525 pid a4a5: 10000 [ 129.412552][ T421] scsi host1: usb-storage 3-1:1.0 [ 129.636776][ T4281] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1915'. [ 129.781554][ T36] kauditd_printk_skb: 696 callbacks suppressed [ 129.781574][ T36] audit: type=1400 audit(2000000039.660:2021): avc: denied { create } for pid=4291 comm="syz.3.1922" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 129.869045][ T36] audit: type=1400 audit(2000000039.688:2022): avc: denied { create } for pid=4291 comm="syz.3.1922" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 129.922316][ T36] audit: type=1400 audit(2000000039.697:2023): avc: denied { ioctl } for pid=4291 comm="syz.3.1922" path="socket:[16509]" dev="sockfs" ino=16509 ioctlcmd=0x89e1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 130.003761][ T36] audit: type=1400 audit(2000000039.707:2024): avc: denied { read write } for pid=289 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 130.071188][ T36] audit: type=1400 audit(2000000039.707:2025): avc: denied { read write open } for pid=289 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 130.135907][ T36] audit: type=1400 audit(2000000039.707:2026): avc: denied { ioctl } for pid=289 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 130.163449][ T36] audit: type=1400 audit(2000000039.716:2027): avc: denied { read write } for pid=291 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 130.201653][ T36] audit: type=1400 audit(2000000039.716:2028): avc: denied { read write open } for pid=291 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 130.251683][ T36] audit: type=1400 audit(2000000039.716:2029): avc: denied { ioctl } for pid=291 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 130.306713][ T36] audit: type=1400 audit(2000000039.725:2030): avc: denied { read write } for pid=292 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 130.338938][ T4322] IPv6: NLM_F_CREATE should be specified when creating new route [ 130.391316][ T45] usb 2-1: new high-speed USB device number 70 using dummy_hcd [ 130.425627][ T4326] rtc_cmos 00:00: Alarms can be up to one day in the future [ 130.556811][ T45] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x8E has invalid wMaxPacketSize 0 [ 130.586627][ T45] usb 2-1: config 0 interface 0 altsetting 0 bulk endpoint 0x8E has invalid maxpacket 0 [ 130.609120][ T45] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0xA has invalid wMaxPacketSize 0 [ 130.632484][ T45] usb 2-1: config 0 interface 0 altsetting 0 bulk endpoint 0xA has invalid maxpacket 0 [ 130.670514][ T45] usb 2-1: New USB device found, idVendor=05ab, idProduct=0301, bcdDevice= 1.00 [ 130.680265][ T45] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 130.696146][ T45] usb 2-1: Product: syz [ 130.700506][ T45] usb 2-1: Manufacturer: syz [ 130.705167][ T45] usb 2-1: SerialNumber: syz [ 130.712375][ T45] usb 2-1: config 0 descriptor?? [ 130.729793][ T45] ums-isd200 2-1:0.0: USB Mass Storage device detected [ 130.769881][ T424] usb 3-1: USB disconnect, device number 72 [ 131.007026][ T45] ums-isd200 2-1:0.0: probe with driver ums-isd200 failed with error -22 [ 131.106525][ T4362] xt_NFQUEUE: number of total queues is 0 [ 131.199590][ T424] usb 2-1: USB disconnect, device number 70 [ 131.222883][ T391] usb 1-1: new high-speed USB device number 73 using dummy_hcd [ 131.406155][ T391] usb 1-1: config 17 interface 0 altsetting 0 has an endpoint descriptor with address 0xFF, changing to 0x8F [ 131.419705][ T391] usb 1-1: config 17 interface 0 altsetting 0 endpoint 0x8F has an invalid bInterval 0, changing to 7 [ 131.433323][ T391] usb 1-1: config 17 interface 0 altsetting 0 endpoint 0x8F has invalid maxpacket 59391, setting to 1024 [ 131.445138][ T391] usb 1-1: New USB device found, idVendor=0458, idProduct=5003, bcdDevice= 0.00 [ 131.454255][ T391] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 131.468093][ T4356] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 131.551855][ T4381] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1963'. [ 131.928265][ T391] aiptek 1-1:17.0: Aiptek using 400 ms programming speed [ 131.938720][ T391] input: Aiptek as /devices/platform/dummy_hcd.0/usb1/1-1/1-1:17.0/input/input20 [ 131.958993][ T391] usb 1-1: USB disconnect, device number 73 [ 132.091121][ T4411] netlink: 8 bytes leftover after parsing attributes in process `syz.3.1979'. [ 133.002694][ T424] usb 4-1: new high-speed USB device number 72 using dummy_hcd [ 133.177296][ T424] usb 4-1: Using ep0 maxpacket: 16 [ 133.193901][ T424] usb 4-1: New USB device found, idVendor=17ef, idProduct=721e, bcdDevice=de.06 [ 133.214997][ T424] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 133.247854][ T424] usb 4-1: Product: syz [ 133.258491][ T424] usb 4-1: Manufacturer: syz [ 133.269144][ T424] usb 4-1: SerialNumber: syz [ 133.282176][ T424] r8152-cfgselector 4-1: Unknown version 0x0000 [ 133.288775][ T4495] rust_binder: Write failure EFAULT in pid:1025 [ 133.299313][ T424] r8152-cfgselector 4-1: config 0 descriptor?? [ 133.811260][ T391] r8152-cfgselector 4-1: USB disconnect, device number 72 [ 134.245897][ T4567] netlink: 'syz.2.2054': attribute type 4 has an invalid length. [ 134.254541][ T4567] netlink: 'syz.2.2054': attribute type 2 has an invalid length. [ 134.772856][ T4602] netlink: 'syz.3.2072': attribute type 1 has an invalid length. [ 134.878646][ T424] usb 3-1: new high-speed USB device number 73 using dummy_hcd [ 135.049179][ T424] usb 3-1: Using ep0 maxpacket: 16 [ 135.085677][ T424] usb 3-1: New USB device found, idVendor=17ef, idProduct=721e, bcdDevice=de.06 [ 135.108321][ T424] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 135.116431][ T36] kauditd_printk_skb: 758 callbacks suppressed [ 135.116450][ T36] audit: type=1400 audit(2000000044.651:2789): avc: denied { create } for pid=4621 comm="syz.3.2082" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 135.166421][ T424] usb 3-1: Product: syz [ 135.170728][ T424] usb 3-1: Manufacturer: syz [ 135.175343][ T424] usb 3-1: SerialNumber: syz [ 135.191724][ T36] audit: type=1400 audit(2000000044.651:2790): avc: denied { write } for pid=4621 comm="syz.3.2082" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 135.224034][ T424] r8152-cfgselector 3-1: Unknown version 0x0000 [ 135.230486][ T424] r8152-cfgselector 3-1: config 0 descriptor?? [ 135.257579][ T36] audit: type=1400 audit(2000000044.670:2791): avc: denied { read write } for pid=292 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 135.333457][ T36] audit: type=1400 audit(2000000044.698:2792): avc: denied { read write open } for pid=292 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 135.363440][ T4637] netlink: 4 bytes leftover after parsing attributes in process `syz.0.2087'. [ 135.385808][ T36] audit: type=1400 audit(2000000044.698:2793): avc: denied { ioctl } for pid=292 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 135.411375][ T4638] netlink: 36 bytes leftover after parsing attributes in process `syz.1.2089'. [ 135.489086][ T36] audit: type=1400 audit(2000000044.726:2794): avc: denied { read write } for pid=291 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 135.514969][ T4641] netlink: 'syz.0.2090': attribute type 1 has an invalid length. [ 135.572524][ T36] audit: type=1400 audit(2000000044.726:2795): avc: denied { read write open } for pid=291 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 135.653132][ T36] audit: type=1400 audit(2000000044.735:2796): avc: denied { read write } for pid=289 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 135.692264][ T36] audit: type=1400 audit(2000000044.735:2797): avc: denied { read write open } for pid=289 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 135.721157][ T36] audit: type=1400 audit(2000000044.735:2798): avc: denied { ioctl } for pid=289 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 135.721364][ T4652] netlink: 'syz.1.2095': attribute type 14 has an invalid length. [ 135.771043][ T391] r8152-cfgselector 3-1: USB disconnect, device number 73 [ 136.448617][ T4699] netlink: 'syz.3.2119': attribute type 27 has an invalid length. [ 136.690189][ T4720] netlink: 'syz.2.2130': attribute type 1 has an invalid length. [ 137.107063][ T4748] netlink: 4 bytes leftover after parsing attributes in process `syz.0.2142'. [ 137.294817][ T4758] overlayfs: failed to resolve './file1': -2 [ 138.225478][ T365] usb 3-1: new high-speed USB device number 74 using dummy_hcd [ 138.406645][ T365] usb 3-1: Using ep0 maxpacket: 16 [ 138.417920][ T365] usb 3-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 138.436943][ T365] usb 3-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 138.464096][ T365] usb 3-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 138.479105][ T365] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 138.487946][ T365] usb 3-1: Product: syz [ 138.493204][ T365] usb 3-1: Manufacturer: syz [ 138.498207][ T365] usb 3-1: SerialNumber: syz [ 138.773202][ T365] usb 3-1: 0:2 : does not exist [ 138.778137][ T365] usb 3-1: unit 9 not found! [ 138.793259][ T365] usb 3-1: 4:0: cannot get min/max values for control 1 (id 4) [ 138.821062][ T365] usb 3-1: 4:0: cannot get min/max values for control 2 (id 4) [ 138.842293][ T365] usb 3-1: USB disconnect, device number 74 [ 138.993989][ T638] udevd[638]: error opening ATTR{/sys/devices/platform/dummy_hcd.2/usb3/3-1/3-1:1.0/sound/card0/controlC0/../uevent} for writing: No such file or directory [ 139.303343][ T4862] netlink: 57 bytes leftover after parsing attributes in process `syz.3.2199'. [ 140.034266][ T4901] netlink: 'syz.2.2226': attribute type 16 has an invalid length. [ 140.482789][ T36] kauditd_printk_skb: 648 callbacks suppressed [ 140.482808][ T36] audit: type=1400 audit(2000000049.698:3447): avc: denied { read write } for pid=292 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 140.559392][ T36] audit: type=1400 audit(2000000049.698:3448): avc: denied { read write open } for pid=292 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 140.613056][ T36] audit: type=1400 audit(2000000049.698:3449): avc: denied { ioctl } for pid=292 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 140.644069][ T36] audit: type=1400 audit(2000000049.708:3450): avc: denied { read write } for pid=291 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 140.669681][ T36] audit: type=1400 audit(2000000049.708:3451): avc: denied { read write open } for pid=291 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 140.712954][ T36] audit: type=1400 audit(2000000049.708:3452): avc: denied { ioctl } for pid=291 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 140.744602][ T36] audit: type=1400 audit(2000000049.764:3453): avc: denied { create } for pid=4929 comm="syz.3.2232" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 140.776171][ T36] audit: type=1400 audit(2000000049.764:3454): avc: denied { read write } for pid=290 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 140.803155][ T36] audit: type=1400 audit(2000000049.764:3455): avc: denied { read write open } for pid=290 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 140.836052][ T365] usb 2-1: new high-speed USB device number 71 using dummy_hcd [ 140.860548][ T36] audit: type=1400 audit(2000000049.764:3456): avc: denied { ioctl } for pid=290 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 141.028697][ T365] usb 2-1: Using ep0 maxpacket: 16 [ 141.037269][ T365] usb 2-1: config 0 has 1 interface, different from the descriptor's value: 8 [ 141.053798][ T365] usb 2-1: New USB device found, idVendor=05d1, idProduct=2001, bcdDevice= 6.00 [ 141.063658][ T365] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 141.073004][ T365] usb 2-1: Product: syz [ 141.077335][ T365] usb 2-1: Manufacturer: syz [ 141.084323][ T365] usb 2-1: SerialNumber: syz [ 141.092874][ T365] usb 2-1: config 0 descriptor?? [ 141.105308][ T365] ftdi_sio 2-1:0.0: FTDI USB Serial Device converter detected [ 141.115438][ T365] usb 2-1: Detected FT232R [ 141.231225][ T391] usb 4-1: new full-speed USB device number 73 using dummy_hcd [ 141.404509][ T391] usb 4-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 141.423052][ T391] usb 4-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 141.437990][ T391] usb 4-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.00 [ 141.454108][ T391] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=3 [ 141.476350][ T391] usb 4-1: SerialNumber: syz [ 141.485502][ T391] usb 4-1: 0:2 : does not exist [ 141.549838][ T365] ftdi_sio ttyUSB0: Unable to write latency timer: -71 [ 141.564266][ T365] ftdi_sio 2-1:0.0: GPIO initialisation failed: -71 [ 141.584168][ T365] usb 2-1: FTDI USB Serial Device converter now attached to ttyUSB0 [ 141.600935][ T365] usb 2-1: USB disconnect, device number 71 [ 141.613757][ T365] ftdi_sio ttyUSB0: FTDI USB Serial Device converter now disconnected from ttyUSB0 [ 141.625991][ T365] ftdi_sio 2-1:0.0: device disconnected [ 141.965291][ T365] usb 4-1: USB disconnect, device number 73 [ 142.081736][ T5020] netlink: 12 bytes leftover after parsing attributes in process `syz.2.2277'. [ 142.092798][ T5020] bridge0: port 1(bridge_slave_0) entered disabled state [ 142.109919][ T5020] bridge_slave_0 (unregistering): left allmulticast mode [ 142.118679][ T5020] bridge_slave_0 (unregistering): left promiscuous mode [ 142.125661][ T5020] bridge0: port 1(bridge_slave_0) entered disabled state [ 142.196690][ T5026] netlink: 'syz.0.2280': attribute type 16 has an invalid length. [ 142.317096][ T5034] netlink: 16 bytes leftover after parsing attributes in process `syz.1.2284'. [ 142.701623][ T5066] rust_binder: Write failure EFAULT in pid:1188 [ 143.800454][ T5150] x_tables: unsorted underflow at hook 2 [ 144.654705][ T5211] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=123 sclass=netlink_route_socket pid=5211 comm=syz.2.2369 [ 144.779212][ T5222] netlink: 'syz.2.2374': attribute type 29 has an invalid length. [ 145.580211][ T5281] cgroup: name respecified [ 145.770688][ T5293] netlink: 12 bytes leftover after parsing attributes in process `syz.3.2407'. [ 145.816041][ T36] kauditd_printk_skb: 758 callbacks suppressed [ 145.816058][ T36] audit: type=1400 audit(2000000054.708:4215): avc: denied { read write } for pid=291 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 145.882376][ T36] audit: type=1400 audit(2000000054.708:4216): avc: denied { read write } for pid=292 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 145.951875][ T36] audit: type=1400 audit(2000000054.708:4217): avc: denied { read write open } for pid=292 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 145.992726][ T5307] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2413'. [ 146.004431][ T36] audit: type=1400 audit(2000000054.708:4218): avc: denied { ioctl } for pid=292 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 146.061197][ T36] audit: type=1400 audit(2000000054.737:4219): avc: denied { read write } for pid=290 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 146.126577][ T36] audit: type=1400 audit(2000000054.737:4220): avc: denied { read write open } for pid=290 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 146.183831][ T36] audit: type=1400 audit(2000000054.737:4221): avc: denied { ioctl } for pid=290 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 146.251449][ T36] audit: type=1400 audit(2000000054.737:4222): avc: denied { create } for pid=5298 comm="syz.3.2410" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 146.296048][ T36] audit: type=1400 audit(2000000054.746:4223): avc: denied { read write open } for pid=291 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 146.376467][ T36] audit: type=1400 audit(2000000054.746:4224): avc: denied { ioctl } for pid=291 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 146.443854][ T5331] xt_CONNSECMARK: only valid in 'mangle' or 'security' table, not 'filter' [ 146.783946][ T5355] bridge0: port 3(veth0_to_bridge) entered blocking state [ 146.797794][ T5355] bridge0: port 3(veth0_to_bridge) entered disabled state [ 146.805011][ T5355] veth0_to_bridge: entered allmulticast mode [ 146.827623][ T5355] veth0_to_bridge: entered promiscuous mode [ 146.834473][ T5355] bridge0: adding interface veth0_to_bridge with same address as a received packet (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 146.852821][ T5355] bridge0: port 3(veth0_to_bridge) entered blocking state [ 146.860013][ T5355] bridge0: port 3(veth0_to_bridge) entered forwarding state [ 147.104167][ T391] usb 3-1: new high-speed USB device number 75 using dummy_hcd [ 147.196683][ T5377] rust_binder: Write failure EFAULT in pid:1267 [ 147.274703][ T391] usb 3-1: Using ep0 maxpacket: 16 [ 147.291799][ T391] usb 3-1: unable to get BOS descriptor or descriptor too short [ 147.307199][ T391] usb 3-1: config 1 contains an unexpected descriptor of type 0x1, skipping [ 147.326927][ T391] usb 3-1: config 1 has an invalid descriptor of length 1, skipping remainder of the config [ 147.338430][ T391] usb 3-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 147.352562][ T391] usb 3-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 147.363637][ T391] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 147.371740][ T391] usb 3-1: Product: syz [ 147.376177][ T391] usb 3-1: Manufacturer: syz [ 147.380839][ T391] usb 3-1: SerialNumber: syz [ 147.841489][ T391] usb 3-1: 0:2 : does not exist [ 147.853056][ T391] usb 3-1: USB disconnect, device number 75 [ 147.898156][ T638] udevd[638]: error opening ATTR{/sys/devices/platform/dummy_hcd.2/usb3/3-1/3-1:1.0/sound/card0/controlC0/../uevent} for writing: No such file or directory [ 148.613812][ T5449] SELinux: policydb table sizes (0,0) do not match mine (8,7) [ 148.648710][ T5449] SELinux: failed to load policy [ 148.725007][ T5457] netlink: 'syz.2.2484': attribute type 15 has an invalid length. [ 148.881129][ T5467] No source specified [ 148.969344][ T5475] No source specified [ 149.010821][ T5481] __vm_enough_memory: pid: 5481, comm: syz.1.2496, bytes: 21200161906688 not enough memory for the allocation [ 149.918429][ T5547] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable [ 150.664724][ T5602] netlink: 'syz.0.2555': attribute type 12 has an invalid length. [ 150.801140][ T5615] netlink: 'syz.1.2558': attribute type 1 has an invalid length. [ 150.834705][ T5615] netlink: 1 bytes leftover after parsing attributes in process `syz.1.2558'. [ 151.176101][ T36] kauditd_printk_skb: 693 callbacks suppressed [ 151.176119][ T36] audit: type=1400 audit(2000000059.737:4918): avc: denied { read write } for pid=290 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 151.241949][ T36] audit: type=1400 audit(2000000059.737:4919): avc: denied { read write } for pid=291 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 151.323550][ T36] audit: type=1400 audit(2000000059.737:4920): avc: denied { read write open } for pid=291 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 151.393040][ T36] audit: type=1400 audit(2000000059.737:4921): avc: denied { ioctl } for pid=291 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 151.452890][ T36] audit: type=1400 audit(2000000059.765:4922): avc: denied { read write open } for pid=290 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 151.520397][ T36] audit: type=1400 audit(2000000059.765:4923): avc: denied { ioctl } for pid=290 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 151.556602][ T36] audit: type=1400 audit(2000000059.775:4924): avc: denied { read write } for pid=292 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 151.606605][ T36] audit: type=1400 audit(2000000059.775:4925): avc: denied { read write open } for pid=292 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 151.642355][ T36] audit: type=1400 audit(2000000059.775:4926): avc: denied { ioctl } for pid=292 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 151.670097][ T36] audit: type=1400 audit(2000000059.812:4927): avc: denied { create } for pid=5641 comm="syz.2.2574" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 151.804634][ T10] usb 3-1: new high-speed USB device number 76 using dummy_hcd [ 151.975199][ T10] usb 3-1: Using ep0 maxpacket: 16 [ 151.984362][ T10] usb 3-1: config 0 has no interfaces? [ 151.998528][ T10] usb 3-1: config 0 has no interfaces? [ 152.013466][ T10] usb 3-1: config 0 has no interfaces? [ 152.037169][ T10] usb 3-1: string descriptor 0 read error: -71 [ 152.051574][ T10] usb 3-1: New USB device found, idVendor=0403, idProduct=e80c, bcdDevice=fb.ba [ 152.084624][ T10] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 152.103280][ T10] usb 3-1: rejected 3 configurations due to insufficient available bus power [ 152.115361][ T10] usb 3-1: no configuration chosen from 3 choices [ 152.122473][ T10] usb 3-1: USB disconnect, device number 76 [ 152.458185][ T5702] netlink: 12 bytes leftover after parsing attributes in process `syz.1.2604'. [ 152.654260][ T5713] netlink: 'syz.2.2610': attribute type 25 has an invalid length. [ 152.861802][ T5727] netlink: 37 bytes leftover after parsing attributes in process `syz.3.2616'. [ 152.881173][ T10] usb 2-1: new high-speed USB device number 72 using dummy_hcd [ 153.051701][ T10] usb 2-1: Using ep0 maxpacket: 16 [ 153.070027][ T10] usb 2-1: config 1 contains an unexpected descriptor of type 0x1, skipping [ 153.093957][ T10] usb 2-1: config 1 has an invalid descriptor of length 1, skipping remainder of the config [ 153.126600][ T10] usb 2-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 153.159037][ T10] usb 2-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 153.169086][ T10] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 153.190313][ T10] usb 2-1: Product: syz [ 153.198822][ T10] usb 2-1: Manufacturer: syz [ 153.208300][ T10] usb 2-1: SerialNumber: syz [ 153.263664][ T5749] netlink: 20 bytes leftover after parsing attributes in process `syz.3.2627'. [ 153.381486][ T5755] deleting an unspecified loop device is not supported. [ 153.404611][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 153.405164][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 153.416958][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 153.428796][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 153.440675][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 153.452892][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 153.464756][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 153.476680][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 153.488725][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 154.372641][ T10] usb 2-1: 0:2 : does not exist [ 154.502500][ T10] usb 2-1: USB disconnect, device number 72 [ 155.258053][ C0] net_ratelimit: 58497 callbacks suppressed [ 155.258077][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 155.258118][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 155.264077][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 155.276754][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 155.288608][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 155.300605][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 155.312510][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 155.324625][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 155.336683][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 155.348852][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 157.718884][ T36] kauditd_printk_skb: 294 callbacks suppressed [ 157.718904][ T36] audit: type=1400 audit(2000000065.864:5222): avc: denied { read write } for pid=289 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 158.977915][ C0] sched: DL replenish lagged too much [ 160.598040][ C0] net_ratelimit: 173623 callbacks suppressed [ 160.598065][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 160.598095][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 160.604189][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 160.616044][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 160.628221][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 160.640276][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 160.652194][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 160.664110][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 160.676240][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 160.688330][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 162.042943][ T36] audit: type=1400 audit(2000000066.511:5223): avc: denied { read write open } for pid=289 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 162.162440][ T638] udevd[638]: error opening ATTR{/sys/devices/platform/dummy_hcd.1/usb2/2-1/2-1:1.0/sound/card0/controlC0/../uevent} for writing: No such file or directory [ 163.357746][ T36] audit: type=1400 audit(2000000066.511:5224): avc: denied { ioctl } for pid=289 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 164.575246][ T10] usb 2-1: new high-speed USB device number 73 using dummy_hcd [ 164.620953][ T36] audit: type=1400 audit(2000000068.153:5225): avc: denied { mounton } for pid=5756 comm="syz.3.2631" path="/703/file0" dev="tmpfs" ino=3545 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 165.938075][ C1] net_ratelimit: 156445 callbacks suppressed [ 165.938099][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 165.938197][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 165.944217][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 165.956263][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 165.968157][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 165.980190][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 165.992006][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 166.004101][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 166.015955][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 166.027975][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 167.271294][ T36] audit: type=1400 audit(2000000068.153:5226): avc: denied { mount } for pid=5756 comm="syz.3.2631" name="/" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=filesystem permissive=1 [ 167.847997][ T10] usb 2-1: device not accepting address 73, error -71 [ 168.147630][ T36] audit: type=1400 audit(2000000069.926:5227): avc: denied { unmount } for pid=292 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=filesystem permissive=1 [ 169.199758][ T36] audit: type=1400 audit(2000000070.029:5228): avc: denied { read write } for pid=5758 comm="syz.1.2633" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 171.278060][ C0] net_ratelimit: 123972 callbacks suppressed [ 171.278083][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 171.278095][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 171.278175][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 171.284307][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 171.296196][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 171.308195][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 171.320159][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 171.332167][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 171.343931][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 171.356017][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 172.070440][ T36] audit: type=1400 audit(2000000070.029:5229): avc: denied { read write open } for pid=5758 comm="syz.1.2633" path="/dev/raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 174.371738][ T36] audit: type=1400 audit(2000000070.029:5230): avc: denied { ioctl } for pid=5758 comm="syz.1.2633" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 176.618083][ C1] net_ratelimit: 123944 callbacks suppressed [ 176.618108][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 176.618187][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 176.624218][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 176.636132][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 176.648001][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 176.660212][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 176.672164][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 176.684273][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 176.696131][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 176.708438][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 181.958083][ C0] net_ratelimit: 128839 callbacks suppressed [ 181.958110][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 181.958161][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 181.964315][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 181.976165][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 181.988177][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 182.000226][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 182.012247][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 182.024066][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 182.036081][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 182.048052][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 184.595163][ T36] audit: type=1400 audit(2000000070.029:5231): avc: denied { ioctl } for pid=5758 comm="syz.1.2633" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5501 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 185.913829][ T36] audit: type=1400 audit(2000000070.029:5232): avc: denied { ioctl } for pid=5758 comm="syz.1.2633" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 187.298086][ C1] net_ratelimit: 127555 callbacks suppressed [ 187.298110][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 187.298230][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 187.304210][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 187.316304][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 187.328166][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 187.340368][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 187.352221][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 187.364125][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 187.375982][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 187.388108][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 191.968287][ T36] audit: type=1400 audit(2000000070.029:5233): avc: denied { ioctl } for pid=5758 comm="syz.1.2633" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 192.638131][ C1] net_ratelimit: 127710 callbacks suppressed [ 192.638156][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 192.638203][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 192.644222][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 192.656333][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 192.668235][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 192.680338][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 192.692163][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 192.704290][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 192.716349][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 192.728453][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 195.498170][ T36] audit: type=1400 audit(2000000070.958:5234): avc: denied { ioctl } for pid=5758 comm="syz.1.2633" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 196.609125][ T36] audit: type=1400 audit(2000000070.967:5235): avc: denied { read write } for pid=292 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 197.105471][ T36] audit: type=1400 audit(2000000070.967:5236): avc: denied { read write open } for pid=292 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 197.978093][ C1] net_ratelimit: 120029 callbacks suppressed [ 197.978117][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 197.978221][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 197.984209][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 197.996391][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 198.008300][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 198.020308][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 198.032111][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 198.044117][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 198.056034][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 198.068197][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 199.504546][ T36] audit: type=1400 audit(2000000070.967:5237): avc: denied { ioctl } for pid=292 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 201.134442][ T36] audit: type=1400 audit(2000000071.155:5238): avc: denied { ioctl } for pid=5758 comm="syz.1.2633" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 201.531786][ T36] audit: type=1400 audit(2000000072.450:5239): avc: denied { read write } for pid=290 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 203.318117][ C1] net_ratelimit: 122619 callbacks suppressed [ 203.318140][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 203.318246][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 203.324225][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 203.336255][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 203.348166][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 203.360268][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 203.372187][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 203.384278][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 203.396235][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 203.408264][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 208.658132][ C0] net_ratelimit: 126392 callbacks suppressed [ 208.658159][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 208.658189][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 208.664384][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 208.676565][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 208.688520][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 208.700579][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 208.712775][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 208.724727][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 208.736699][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 208.748704][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 213.998149][ C0] net_ratelimit: 122210 callbacks suppressed [ 213.998175][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 213.998219][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 214.004281][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 214.016184][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 214.028205][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 214.040105][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 214.052289][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 214.064183][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 214.076537][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 214.088388][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 215.460081][ T36] audit: type=1400 audit(2000000072.450:5240): avc: denied { read write open } for pid=290 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 216.141781][ T36] audit: type=1400 audit(2000000072.450:5241): avc: denied { ioctl } for pid=290 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 217.815561][ T36] audit: type=1400 audit(2000000072.562:5242): avc: denied { ioctl } for pid=5758 comm="syz.1.2633" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 217.868924][ T36] audit: type=1400 audit(2000000072.562:5243): avc: denied { ioctl } for pid=5758 comm="syz.1.2633" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 219.338137][ C0] net_ratelimit: 122957 callbacks suppressed [ 219.338162][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 219.338193][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 219.344353][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 219.356324][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 219.368559][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 219.380435][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 219.392313][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 219.404183][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 219.416403][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 219.428400][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 219.509656][ T36] audit: type=1400 audit(2000000072.562:5244): avc: denied { ioctl } for pid=5758 comm="syz.1.2633" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 220.820311][ T36] audit: type=1400 audit(2000000072.825:5245): avc: denied { ioctl } for pid=5758 comm="syz.1.2633" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 224.678157][ C1] net_ratelimit: 119292 callbacks suppressed [ 224.678183][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 224.678234][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 224.684300][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 224.696304][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 224.708237][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 224.720459][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 224.732407][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 224.744925][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 224.756843][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 224.769020][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 224.882671][ T36] audit: type=1400 audit(2000000074.748:5246): avc: denied { read write } for pid=289 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 224.934496][ T36] audit: type=1400 audit(2000000074.748:5247): avc: denied { read write open } for pid=289 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 226.076556][ T36] audit: type=1400 audit(2000000074.748:5248): avc: denied { ioctl } for pid=289 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 228.234219][ T36] audit: type=1400 audit(2000000074.945:5249): avc: denied { read write } for pid=291 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 230.018156][ C1] net_ratelimit: 120595 callbacks suppressed [ 230.018182][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 230.018388][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 230.024287][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 230.036293][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 230.048219][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 230.060512][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 230.072385][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 230.084409][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 230.096225][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 230.108458][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 231.511027][ T36] audit: type=1400 audit(2000000074.945:5250): avc: denied { read write open } for pid=291 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 235.358226][ C0] net_ratelimit: 122703 callbacks suppressed [ 235.358250][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 235.358642][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 235.364362][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 235.376264][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 235.388281][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 235.400115][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 235.412136][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 235.424108][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 235.436197][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 235.448060][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 239.697842][ T36] audit: type=1400 audit(2000000074.945:5251): avc: denied { ioctl } for pid=291 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 240.698191][ C1] net_ratelimit: 126515 callbacks suppressed [ 240.698217][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 240.698379][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 240.704324][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 240.716232][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 240.728353][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 240.740562][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 240.752416][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 240.764394][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 240.776251][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 240.788454][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 242.137497][ T36] audit: type=1400 audit(2000000075.930:5252): avc: denied { read append } for pid=5766 comm="syz.2.2636" name="usbmon0" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 246.038207][ C1] net_ratelimit: 119808 callbacks suppressed [ 246.038233][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 246.038340][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 246.044306][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 246.056439][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 246.068304][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 246.080508][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 246.092405][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 246.104428][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 246.116308][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 246.128431][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 251.335886][ T36] audit: type=1400 audit(2000000075.930:5253): avc: denied { read open } for pid=5766 comm="syz.2.2636" path="/dev/usbmon0" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 251.378187][ C0] net_ratelimit: 129837 callbacks suppressed [ 251.378211][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 251.378237][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 251.384352][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 251.396306][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 251.408391][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 251.420152][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 251.432152][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 251.444053][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 251.456239][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 251.468069][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 251.870275][ T36] audit: type=1400 audit(2000000075.996:5254): avc: denied { ioctl } for pid=5766 comm="syz.2.2636" path="/dev/usbmon0" dev="devtmpfs" ino=90 ioctlcmd=0x9207 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 256.490311][ T36] audit: type=1400 audit(2000000076.024:5255): avc: denied { read write } for pid=292 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 256.718254][ C1] net_ratelimit: 124496 callbacks suppressed [ 256.718279][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 256.718351][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 256.724357][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 256.736458][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 256.748526][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 256.760516][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 256.772359][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 256.784389][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 256.796265][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 256.808275][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 257.327291][ T36] audit: type=1400 audit(2000000076.024:5256): avc: denied { read write open } for pid=292 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 257.839488][ T36] audit: type=1400 audit(2000000076.024:5257): avc: denied { ioctl } for pid=292 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 258.520748][ T36] audit: type=1400 audit(2000000081.438:5258): avc: denied { read write } for pid=290 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 261.004173][ T36] audit: type=1400 audit(2000000081.438:5259): avc: denied { read write open } for pid=290 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 261.814073][ T36] audit: type=1400 audit(2000000081.438:5260): avc: denied { ioctl } for pid=290 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 262.058222][ C1] net_ratelimit: 121602 callbacks suppressed [ 262.058247][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 262.058305][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 262.064359][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 262.076469][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 262.088282][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 262.100400][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 262.112363][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 262.124398][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 262.136279][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 262.148298][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 263.220159][ T36] audit: type=1400 audit(2000000104.320:5261): avc: denied { execmem } for pid=5768 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 263.455390][ T36] audit: type=1400 audit(2000000104.996:5262): avc: denied { read write } for pid=292 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 263.509163][ T36] audit: type=1400 audit(2000000104.996:5263): avc: denied { read write open } for pid=292 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 263.608225][ T36] audit: type=1400 audit(2000000104.996:5264): avc: denied { ioctl } for pid=292 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 267.092656][ T36] audit: type=1400 audit(2000000106.835:5265): avc: denied { execmem } for pid=5772 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 267.398270][ C1] net_ratelimit: 124872 callbacks suppressed [ 267.398296][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 267.398450][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 267.404357][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 267.416468][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 267.428587][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 267.440609][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 267.452630][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 267.464721][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 267.476630][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 267.488816][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 268.854410][ T36] audit: type=1400 audit(2000000106.872:5266): avc: denied { create } for pid=5773 comm="syz.2.2640" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 272.738249][ C1] net_ratelimit: 124566 callbacks suppressed [ 272.738273][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 272.738397][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 272.744544][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 272.756640][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 272.768668][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 272.780980][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 272.792815][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 272.804792][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 272.816811][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 272.829004][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 276.215776][ T36] audit: type=1400 audit(2000000106.872:5267): avc: denied { setopt } for pid=5773 comm="syz.2.2640" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 278.078236][ C1] net_ratelimit: 128797 callbacks suppressed [ 278.078262][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 278.078372][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 278.084471][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 278.096372][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 278.108222][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 278.120357][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 278.132301][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 278.144329][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 278.156375][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 278.168514][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 280.861882][ T36] audit: type=1400 audit(2000000125.205:5268): avc: denied { execmem } for pid=5774 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 283.418271][ C1] net_ratelimit: 126713 callbacks suppressed [ 283.418297][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 283.418365][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 283.424392][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 283.436390][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 283.448243][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 283.460370][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 283.472319][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 283.484209][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 283.496072][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 283.508282][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 284.538781][ T36] audit: type=1400 audit(2000000135.760:5269): avc: denied { read } for pid=5777 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 286.296628][ T36] audit: type=1400 audit(2000000135.760:5270): avc: denied { read open } for pid=5777 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 287.043488][ T36] audit: type=1400 audit(2000000135.760:5271): avc: denied { mounton } for pid=5777 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 287.257012][ T36] audit: type=1400 audit(2000000135.769:5272): avc: denied { execmem } for pid=5776 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 288.758255][ C0] net_ratelimit: 119814 callbacks suppressed [ 288.758281][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 288.758301][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 288.764495][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 288.776358][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 288.788349][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 288.800842][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 288.812246][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 288.824073][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 288.836086][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 288.847974][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 289.026328][ T36] audit: type=1400 audit(2000000153.698:5273): avc: denied { sys_module } for pid=5777 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 289.344814][ T36] audit: type=1400 audit(2000000160.547:5274): avc: denied { read } for pid=5778 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 289.665472][ T36] audit: type=1400 audit(2000000160.547:5275): avc: denied { read open } for pid=5778 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 291.213843][ T36] audit: type=1400 audit(2000000168.034:5276): avc: denied { mounton } for pid=5778 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 292.723463][ T36] audit: type=1400 audit(2000000186.441:5277): avc: denied { read } for pid=5780 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 293.300666][ T36] audit: type=1400 audit(2000000186.441:5278): avc: denied { read open } for pid=5780 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 294.098292][ C1] net_ratelimit: 131536 callbacks suppressed [ 294.098317][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 294.098339][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 294.104425][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 294.116397][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 294.128426][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 294.140327][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 294.152178][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 294.164363][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 294.176242][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 294.188399][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 294.458186][ T36] audit: type=1400 audit(2000000187.182:5279): avc: denied { execmem } for pid=5779 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 297.101268][ T36] audit: type=1400 audit(2000000188.083:5280): avc: denied { read } for pid=5782 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 298.022241][ T36] audit: type=1400 audit(2000000188.083:5281): avc: denied { read open } for pid=5782 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 299.438264][ C1] net_ratelimit: 142948 callbacks suppressed [ 299.438287][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 299.438297][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 299.438378][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 299.444396][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 299.456431][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 299.468378][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 299.480366][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 299.492329][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 299.504265][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 299.516104][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 302.583094][ T36] audit: type=1400 audit(2000000189.809:5282): avc: denied { execmem } for pid=5781 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 302.969545][ T36] audit: type=1400 audit(2000000189.819:5283): avc: denied { execmem } for pid=5783 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 303.702597][ T36] audit: type=1400 audit(2000000190.954:5284): avc: denied { execmem } for pid=5784 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 304.778317][ C0] net_ratelimit: 138430 callbacks suppressed [ 304.778343][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 304.778360][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 304.778436][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 304.784448][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 304.796365][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 304.808495][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 304.820298][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 304.832489][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 304.844433][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 304.856404][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 305.932884][ T36] audit: type=1400 audit(2000000202.175:5285): avc: denied { read } for pid=5785 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 306.539750][ T36] audit: type=1400 audit(2000000202.175:5286): avc: denied { read open } for pid=5785 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 309.077853][ T36] audit: type=1400 audit(2000000202.175:5287): avc: denied { mounton } for pid=5785 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 310.118303][ C1] net_ratelimit: 130610 callbacks suppressed [ 310.118326][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 310.118429][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 310.124430][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 310.136366][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 310.148502][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 310.160493][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 310.172538][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 310.184742][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 310.196571][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 310.208687][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 311.866780][ T36] audit: type=1400 audit(2000000202.794:5288): avc: denied { sys_module } for pid=5785 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 315.458317][ C0] net_ratelimit: 129531 callbacks suppressed [ 315.458341][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 315.458401][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 315.464577][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 315.476576][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 315.488675][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 315.500407][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 315.512638][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 315.524690][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 315.536596][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 315.548543][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 316.631665][ T36] audit: type=1400 audit(2000000202.878:5289): avc: denied { sys_module } for pid=5785 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 316.783612][ T36] audit: type=1400 audit(2000000203.019:5290): avc: denied { sys_module } for pid=5785 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 320.798317][ C0] net_ratelimit: 132106 callbacks suppressed [ 320.798343][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 320.798352][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 320.798443][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 320.804558][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 320.816313][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 320.828362][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 320.840280][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 320.852407][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 320.864272][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 320.876405][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 321.909803][ T36] audit: type=1400 audit(2000000203.028:5291): avc: denied { sys_module } for pid=5785 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 322.878402][ T36] audit: type=1400 audit(2000000203.047:5292): avc: denied { read } for pid=5786 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 323.720401][ T36] audit: type=1400 audit(2000000203.047:5293): avc: denied { read open } for pid=5786 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 326.138332][ C0] net_ratelimit: 130150 callbacks suppressed [ 326.138357][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 326.138373][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 326.138446][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 326.144504][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 326.156463][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 326.168459][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 326.180328][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 326.192252][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 326.204264][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 326.216266][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 326.639608][ T36] audit: type=1400 audit(2000000203.047:5294): avc: denied { mounton } for pid=5786 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 328.762206][ T36] audit: type=1400 audit(2000000204.417:5295): avc: denied { read } for pid=5787 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 331.478354][ C1] net_ratelimit: 131187 callbacks suppressed [ 331.478380][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 331.478423][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 331.484472][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 331.496623][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 331.508533][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 331.520629][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 331.532503][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 331.544555][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 331.556579][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 331.568586][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 332.164744][ T36] audit: type=1400 audit(2000000204.417:5296): avc: denied { read open } for pid=5787 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 332.513863][ T36] audit: type=1400 audit(2000000204.417:5297): avc: denied { mounton } for pid=5787 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 336.818347][ C1] net_ratelimit: 130511 callbacks suppressed [ 336.818369][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 336.818437][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 336.824555][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 336.836570][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 336.848500][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 336.860673][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 336.872543][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 336.884662][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 336.896664][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 336.908691][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 341.625621][ T36] audit: type=1400 audit(2000000204.455:5298): avc: denied { sys_module } for pid=5786 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 342.158396][ C1] net_ratelimit: 131565 callbacks suppressed [ 342.158420][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 342.158488][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 342.164509][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 342.176708][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 342.188893][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 342.200931][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 342.212834][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 342.225137][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 342.237067][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 342.248975][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 347.297155][ T36] audit: type=1400 audit(2000000205.449:5299): avc: denied { sys_module } for pid=5787 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 347.498372][ C0] net_ratelimit: 130568 callbacks suppressed [ 347.498399][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 347.498441][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 347.504612][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 347.516426][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 347.528523][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 347.540537][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 347.552621][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 347.564666][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 347.576652][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 347.588610][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 348.063651][ T36] audit: type=1400 audit(2000000205.487:5300): avc: denied { sys_module } for pid=5787 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 349.172453][ T36] audit: type=1400 audit(2000000205.496:5301): avc: denied { sys_module } for pid=5787 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 349.750347][ T36] audit: type=1400 audit(2000000205.665:5302): avc: denied { sys_module } for pid=5787 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 351.198017][ T36] audit: type=1400 audit(2000000207.485:5303): avc: denied { sys_module } for pid=5786 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 352.414292][ T36] audit: type=1400 audit(2000000207.513:5304): avc: denied { read } for pid=5788 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 352.807080][ T36] audit: type=1400 audit(2000000207.513:5305): avc: denied { read open } for pid=5788 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 352.838392][ C1] net_ratelimit: 125823 callbacks suppressed [ 352.838419][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 352.838438][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 352.844594][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 352.856657][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 352.868378][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 352.880581][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 352.892765][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 352.904869][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 352.916830][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 352.928789][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 353.500559][ T36] audit: type=1400 audit(2000000207.513:5306): avc: denied { mounton } for pid=5788 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 353.788003][ T36] audit: type=1400 audit(2000000208.489:5307): avc: denied { sys_module } for pid=5786 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 354.193362][ T36] audit: type=1400 audit(2000000209.052:5308): avc: denied { sys_module } for pid=5788 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 355.142050][ T36] audit: type=1400 audit(2000000210.450:5309): avc: denied { sys_module } for pid=5786 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 356.463463][ T36] audit: type=1400 audit(2000000211.313:5310): avc: denied { sys_module } for pid=5788 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 357.307159][ T36] audit: type=1400 audit(2000000246.458:5311): avc: denied { sys_module } for pid=5788 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 358.178365][ C0] net_ratelimit: 121080 callbacks suppressed [ 358.178391][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 358.178398][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 358.178473][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 358.184646][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 358.196572][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 358.208688][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 358.220624][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 358.232763][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 358.244496][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 358.256504][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 360.205118][ T36] audit: type=1400 audit(2000000249.225:5312): avc: denied { execmem } for pid=5789 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 362.667222][ T36] audit: type=1400 audit(2000000249.394:5313): avc: denied { sys_module } for pid=5788 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 362.719954][ T36] audit: type=1400 audit(2000000250.257:5314): avc: denied { execmem } for pid=5790 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 363.518402][ C0] net_ratelimit: 125202 callbacks suppressed [ 363.518427][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 363.518444][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 363.524571][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 363.536584][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 363.548832][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 363.560711][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 363.572639][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 363.584563][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 363.596564][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 363.608589][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 366.055244][ T36] audit: type=1400 audit(2000000250.445:5315): avc: denied { execmem } for pid=5791 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 367.577703][ T36] audit: type=1400 audit(2000000250.745:5316): avc: denied { execmem } for pid=5792 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 368.858400][ C1] net_ratelimit: 127298 callbacks suppressed [ 368.858424][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 368.858517][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 368.864689][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 368.876799][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 368.888940][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 368.900907][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 368.912842][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 368.924884][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 368.936778][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 368.949063][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 369.201266][ T36] audit: type=1400 audit(2000000262.736:5317): avc: denied { read } for pid=5793 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 369.638807][ T36] audit: type=1400 audit(2000000262.736:5318): avc: denied { read open } for pid=5793 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 370.384135][ T37] INFO: task syz-executor:289 blocked for more than 122 seconds. [ 370.392029][ T37] Not tainted syzkaller #0 SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 371.226704][ T37] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 371.235566][ T37] task:syz-executor state:D stack:0 pid:289 tgid:289 ppid:1 flags:0x00004006 [ 371.245784][ T37] Call Trace: [ 371.249115][ T37] [ 371.252069][ T37] __schedule+0x134f/0x1ea0 [ 371.256640][ T37] ? __sched_text_start+0x10/0x10 [ 371.261709][ T37] ? _raw_spin_unlock_irqrestore+0x4a/0x70 [ 371.267571][ T37] ? wake_nocb_gp+0x120/0x1b0 [ 371.272278][ T37] ? rcu_barrier_entrain+0x37b/0x4f0 [ 371.277591][ T37] schedule+0xc5/0x240 [ 371.281699][ T37] schedule_timeout+0xc7/0x3b0 [ 371.286493][ T37] ? __cfi_schedule_timeout+0x10/0x10 [ 371.291951][ T37] ? __cfi__raw_spin_lock_irq+0x10/0x10 [ 371.297541][ T37] ? rcu_barrier_handler+0x9b/0xe0 [ 371.302695][ T37] ? generic_exec_single+0x206/0x500 [ 371.308008][ T37] wait_for_common+0x369/0x650 [ 371.312812][ T37] ? wait_for_completion+0x40/0x40 [ 371.317945][ T37] ? _raw_spin_lock_irqsave+0xc1/0x160 [ 371.323524][ T37] wait_for_completion+0x1c/0x40 [ 371.328492][ T37] rcu_barrier+0x415/0x540 [ 371.332975][ T37] netdev_run_todo+0x118/0xce0 [ 371.337759][ T37] ? kvfree+0x39/0x50 [ 371.341868][ T37] ? netdev_state_change+0xaa/0x240 [ 371.347273][ T37] ? __cfi_netdev_run_todo+0x10/0x10 [ 371.352616][ T37] rtnl_unlock+0x12/0x20 [ 371.357062][ T37] tun_chr_close+0xc5/0x150 [ 371.361602][ T37] ? __cfi_tun_chr_close+0x10/0x10 [ 371.366855][ T37] __fput+0x1fe/0xa00 [ 371.370944][ T37] ? call_rcu+0x14/0x20 [ 371.375265][ T37] ____fput+0x20/0x30 [ 371.379271][ T37] task_work_run+0x1e5/0x260 [ 371.383882][ T37] ? __cfi_task_work_run+0x10/0x10 [ 371.389054][ T37] ? free_nsproxy+0x223/0x290 [ 371.393768][ T37] do_exit+0x9e3/0x2650 [ 371.397999][ T37] ? __cfi_avc_has_perm+0x10/0x10 [ 371.403047][ T37] ? __cfi_do_exit+0x10/0x10 [ 371.407680][ T37] ? __kasan_check_write+0x18/0x20 [ 371.412814][ T37] ? mutex_unlock+0x90/0x240 [ 371.417451][ T37] ? __cfi_mutex_unlock+0x10/0x10 [ 371.422501][ T37] ? __kasan_check_write+0x18/0x20 [ 371.427651][ T37] ? _raw_spin_lock_irq+0x93/0x120 [ 371.432808][ T37] ? __cfi__raw_spin_lock_irq+0x10/0x10 [ 371.438429][ T37] do_group_exit+0x229/0x2f0 [ 371.443044][ T37] ? __kasan_check_write+0x18/0x20 [ 371.448189][ T37] get_signal+0x1398/0x14e0 [ 371.452745][ T37] arch_do_signal_or_restart+0xbc/0x760 [ 371.458324][ T37] ? __cfi_do_sock_setsockopt+0x10/0x10 [ 371.463919][ T37] ? __cfi_arch_do_signal_or_restart+0x10/0x10 [ 371.470121][ T37] ? __kasan_check_read+0x15/0x20 [ 371.475262][ T37] ? __x64_sys_setsockopt+0x1d5/0x250 [ 371.480694][ T37] syscall_exit_to_user_mode+0x57/0xb0 [ 371.486189][ T37] do_syscall_64+0x63/0xf0 [ 371.490648][ T37] ? clear_bhb_loop+0x50/0xa0 [ 371.495381][ T37] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 371.501301][ T37] RIP: 0033:0x7f36e899c71a [ 371.505771][ T37] RSP: 002b:00007fffe4b17d48 EFLAGS: 00000206 ORIG_RAX: 0000000000000036 [ 371.514225][ T37] RAX: 0000000000000000 RBX: 00007fffe4b17dd0 RCX: 00007f36e899c71a [ 371.522227][ T37] RDX: 0000000000000040 RSI: 0000000000000029 RDI: 0000000000000003 [ 371.530276][ T37] RBP: 0000000000000003 R08: 00000000000002e8 R09: 0000000000000000 [ 371.538315][ T37] R10: 00007f36e8be1140 R11: 0000000000000206 R12: 00007f36e8be10e0 [ 371.546522][ T37] R13: 00007fffe4b17d6c R14: 0000000000000000 R15: 00007f36e8be1e60 [ 371.554545][ T37] [ 371.557734][ T37] INFO: task syz-executor:5770 blocked for more than 124 seconds. [ 371.571403][ T36] audit: type=1400 audit(2000000263.092:5319): avc: denied { mounton } for pid=5793 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 371.577368][ T37] Not tainted syzkaller #0 [ 371.637031][ T37] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 371.645785][ T37] task:syz-executor state:D stack:0 pid:5770 tgid:5770 ppid:291 flags:0x00004006 [ 371.656083][ T37] Call Trace: [ 371.659393][ T37] [ 371.662370][ T37] __schedule+0x134f/0x1ea0 [ 371.666997][ T37] ? __sched_text_start+0x10/0x10 [ 371.672065][ T37] ? __kasan_check_write+0x18/0x20 [ 371.677251][ T37] ? __mutex_add_waiter+0x184/0x2a0 [ 371.682589][ T37] ? __kasan_check_write+0x18/0x20 [ 371.687753][ T37] ? trace_contention_begin+0xc0/0xc0 [ 371.693250][ T37] schedule+0xc5/0x240 [ 371.697453][ T37] schedule_preempt_disabled+0x14/0x30 [ 371.703057][ T37] __mutex_lock+0x960/0x1bb0 [ 371.707711][ T37] ? __ww_mutex_lock_interruptible_slowpath+0x30/0x30 [ 371.714513][ T37] ? __kasan_check_write+0x18/0x20 [ 371.719758][ T37] ? _raw_spin_lock+0x92/0x120 [ 371.724549][ T37] ? __kasan_check_write+0x18/0x20 [ 371.729699][ T37] ? wake_up_q+0x10f/0x1c0 [ 371.734149][ T37] ? __mutex_unlock_slowpath+0x4b7/0x780 [ 371.739998][ T37] ? mutex_unlock+0x240/0x240 [ 371.744709][ T37] __mutex_lock_slowpath+0xe/0x20 [ 371.749777][ T37] mutex_lock+0x113/0x1d0 [ 371.754208][ T37] ? __cfi_mutex_lock+0x10/0x10 [ 371.759098][ T37] rcu_barrier+0x4d/0x540 [ 371.763454][ T37] ? __kasan_slab_free+0x6a/0x80 [ 371.768557][ T37] netdev_run_todo+0x118/0xce0 [ 371.773345][ T37] ? kvfree+0x39/0x50 [ 371.777352][ T37] ? netdev_state_change+0xaa/0x240 [ 371.782593][ T37] ? __cfi_netdev_run_todo+0x10/0x10 [ 371.787991][ T37] rtnl_unlock+0x12/0x20 [ 371.792366][ T37] tun_chr_close+0xc5/0x150 [ 371.796896][ T37] ? __cfi_tun_chr_close+0x10/0x10 [ 371.802051][ T37] __fput+0x1fe/0xa00 [ 371.806143][ T37] ? call_rcu+0x14/0x20 [ 371.810334][ T37] ____fput+0x20/0x30 [ 371.814348][ T37] task_work_run+0x1e5/0x260 [ 371.819047][ T37] ? __cfi_task_work_run+0x10/0x10 [ 371.824372][ T37] ? free_nsproxy+0x223/0x290 [ 371.829081][ T37] do_exit+0x9e3/0x2650 [ 371.833282][ T37] ? __cfi_do_exit+0x10/0x10 [ 371.837896][ T37] ? __count_memcg_events+0xdf/0x3b0 [ 371.843227][ T37] ? __kasan_check_write+0x18/0x20 [ 371.848360][ T37] ? _raw_spin_lock_irq+0x93/0x120 [ 371.853508][ T37] ? __cfi__raw_spin_lock_irq+0x10/0x10 [ 371.859082][ T37] do_group_exit+0x229/0x2f0 [ 371.863796][ T37] ? __kasan_check_write+0x18/0x20 [ 371.868950][ T37] get_signal+0x1398/0x14e0 [ 371.873662][ T37] arch_do_signal_or_restart+0xbc/0x760 [ 371.879251][ T37] ? __kasan_check_read+0x15/0x20 [ 371.884303][ T37] ? __cfi_arch_do_signal_or_restart+0x10/0x10 [ 371.890521][ T37] irqentry_exit_to_user_mode+0x4d/0xb0 [ 371.896128][ T37] irqentry_exit+0x16/0x60 [ 371.900577][ T37] exc_page_fault+0x65/0xc0 [ 371.905194][ T37] asm_exc_page_fault+0x2b/0x30 [ 371.910087][ T37] RIP: 0033:0x7fa9e6b2a180 [ 371.914525][ T37] RSP: 002b:00007fff514831c8 EFLAGS: 00010286 [ 371.920634][ T37] RAX: ffffffffffffffff RBX: 00007fff514831d0 RCX: 0000000000000000 [ 371.928820][ T37] RDX: ffffffffffffffff RSI: 00007fff514831d0 RDI: 00000000000000c8 [ 371.936822][ T37] RBP: 00007fff5148360c R08: 0000000000000000 R09: 0000000000000000 [ 371.944848][ T37] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000296 [ 371.952947][ T37] R13: 0000000000000062 R14: 0000000000025f8d R15: 00007fff51483660 [ 371.960985][ T37] [ 372.056461][ T37] NMI backtrace for cpu 1 [ 372.056485][ T37] CPU: 1 UID: 0 PID: 37 Comm: khungtaskd Not tainted syzkaller #0 001c7e68fa735976e9f6b7ad125989e1d2b10b0e [ 372.056515][ T37] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 372.056527][ T37] Call Trace: [ 372.056534][ T37] [ 372.056543][ T37] __dump_stack+0x21/0x30 [ 372.056574][ T37] dump_stack_lvl+0x140/0x1c0 [ 372.056599][ T37] ? __cfi_dump_stack_lvl+0x10/0x10 [ 372.056625][ T37] dump_stack+0x19/0x20 [ 372.056647][ T37] nmi_cpu_backtrace+0x2ba/0x2d0 [ 372.056675][ T37] ? rcu_read_unlock_special+0xb7/0x420 [ 372.056699][ T37] ? __cfi_nmi_cpu_backtrace+0x10/0x10 [ 372.056725][ T37] ? sched_show_task+0x371/0x530 [ 372.056748][ T37] ? __rcu_read_unlock+0xc0/0xc0 [ 372.056771][ T37] ? __cfi_nmi_raise_cpu_backtrace+0x10/0x10 [ 372.056795][ T37] ? __cfi_nmi_raise_cpu_backtrace+0x10/0x10 [ 372.056818][ T37] nmi_trigger_cpumask_backtrace+0x142/0x2c0 [ 372.056846][ T37] arch_trigger_cpumask_backtrace+0x14/0x20 [ 372.056870][ T37] watchdog+0xdad/0xf00 [ 372.056898][ T37] ? __kasan_check_write+0x18/0x20 [ 372.056924][ T37] ? __cfi_watchdog+0x10/0x10 [ 372.056962][ T37] ? __kasan_check_read+0x15/0x20 [ 372.056985][ T37] ? __kthread_parkme+0x137/0x180 [ 372.057012][ T37] ? schedule+0xc5/0x240 [ 372.057031][ T37] kthread+0x2c9/0x370 [ 372.057050][ T37] ? __cfi_watchdog+0x10/0x10 [ 372.057077][ T37] ? __cfi_kthread+0x10/0x10 [ 372.057096][ T37] ret_from_fork+0x67/0xa0 [ 372.057121][ T37] ? __cfi_kthread+0x10/0x10 [ 372.057140][ T37] ret_from_fork_asm+0x1a/0x30 [ 372.057169][ T37] [ 372.057177][ T37] Sending NMI from CPU 1 to CPUs 0: [ 372.069769][ T36] audit: type=1400 audit(2000000264.631:5320): avc: denied { read } for pid=5794 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 372.074539][ C0] NMI backtrace for cpu 0 [ 372.074553][ C0] CPU: 0 UID: 0 PID: 36 Comm: kauditd Not tainted syzkaller #0 001c7e68fa735976e9f6b7ad125989e1d2b10b0e [ 372.074575][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 372.074585][ C0] RIP: 0010:io_serial_in+0x7b/0xc0 [ 372.074609][ C0] Code: e8 ea a0 64 fe 44 89 f9 d3 e3 49 83 c6 08 4c 89 f0 48 c1 e8 03 42 80 3c 20 00 74 08 4c 89 f7 e8 8b 67 bc fe 41 03 1e 89 da ec <0f> b6 c0 5b 41 5c 41 5e 41 5f 5d e9 c5 13 7e 02 cc 44 89 f9 80 e1 [ 372.074622][ C0] RSP: 0018:ffffc9000025f690 EFLAGS: 00000002 [ 372.074638][ C0] RAX: 1ffffffff1182200 RBX: 00000000000003fd RCX: 0000000000000000 [ 372.074650][ C0] RDX: 00000000000003fd RSI: 0000000000000000 RDI: 0000000000000020 [ 372.074661][ C0] RBP: ffffc9000025f6b0 R08: 0000000000000000 R09: 0000000000000000 [ 372.074672][ C0] R10: 0000000000000000 R11: ffffffff8322fbd0 R12: dffffc0000000000 [ 372.074683][ C0] R13: 000000000000270d R14: ffffffff88c11508 R15: 0000000000000000 [ 372.074696][ C0] FS: 0000000000000000(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 372.074710][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 372.074722][ C0] CR2: 000055797e763af8 CR3: 000000010bfc6000 CR4: 00000000003526b0 [ 372.074739][ C0] Call Trace: [ 372.074745][ C0] [ 372.074752][ C0] serial8250_console_write+0x14e6/0x21a0 [ 372.074772][ C0] ? __cfi_serial8250_console_write+0x10/0x10 [ 372.074789][ C0] ? __kasan_check_write+0x18/0x20 [ 372.074808][ C0] ? _raw_spin_lock+0x92/0x120 [ 372.074829][ C0] ? __cfi__raw_spin_lock+0x10/0x10 [ 372.074848][ C0] ? __kasan_check_read+0x15/0x20 [ 372.074866][ C0] univ8250_console_write+0x6f/0xb0 [ 372.074887][ C0] console_flush_all+0x5fa/0xac0 [ 372.074907][ C0] ? __console_rewind_all+0x170/0x170 [ 372.074924][ C0] ? __kasan_check_read+0x15/0x20 [ 372.074941][ C0] ? is_printk_cpu_sync_owner+0x39/0x50 [ 372.074960][ C0] ? is_printk_legacy_deferred+0x5c/0x70 [ 372.074980][ C0] console_unlock+0xf8/0x2c0 [ 372.074995][ C0] ? _raw_spin_unlock_irqrestore+0x4a/0x70 [ 372.075016][ C0] ? __cfi_console_unlock+0x10/0x10 [ 372.075032][ C0] ? __kasan_check_write+0x18/0x20 [ 372.075049][ C0] ? _raw_spin_lock+0x92/0x120 [ 372.075068][ C0] ? __cfi__raw_spin_lock+0x10/0x10 [ 372.075087][ C0] ? __kasan_check_read+0x15/0x20 [ 372.075103][ C0] ? is_printk_cpu_sync_owner+0x39/0x50 [ 372.075122][ C0] vprintk_emit+0x282/0x650 [ 372.075139][ C0] ? __cfi_vprintk_emit+0x10/0x10 [ 372.075155][ C0] ? __kasan_check_write+0x18/0x20 [ 372.075172][ C0] ? _raw_spin_trylock+0xb5/0x140 [ 372.075199][ C0] vprintk_default+0x2a/0x40 [ 372.075215][ C0] vprintk+0x93/0xa0 [ 372.075233][ C0] _printk+0xde/0x140 [ 372.075250][ C0] ? __cfi__printk+0x10/0x10 [ 372.075265][ C0] ? __kasan_check_write+0x18/0x20 [ 372.075283][ C0] kauditd_hold_skb+0x1cc/0x230 [ 372.075305][ C0] ? __cfi_kauditd_send_multicast_skb+0x10/0x10 [ 372.075327][ C0] ? __cfi_kauditd_hold_skb+0x10/0x10 [ 372.075347][ C0] kauditd_send_queue+0x2c4/0x310 [ 372.075367][ C0] ? __cfi_kauditd_hold_skb+0x10/0x10 [ 372.075387][ C0] ? __cfi_kauditd_send_multicast_skb+0x10/0x10 [ 372.075410][ C0] kauditd_thread+0x4e0/0x740 [ 372.075430][ C0] ? __kasan_check_write+0x18/0x20 [ 372.075447][ C0] ? __cfi__raw_spin_lock_irqsave+0x10/0x10 [ 372.075467][ C0] ? __cfi_native_send_call_func_single_ipi+0x10/0x10 [ 372.075484][ C0] ? __cfi_kauditd_thread+0x10/0x10 [ 372.075504][ C0] ? __cfi_autoremove_wake_function+0x10/0x10 [ 372.075525][ C0] ? __kasan_check_read+0x15/0x20 [ 372.075543][ C0] ? schedule+0xc5/0x240 [ 372.075556][ C0] kthread+0x2c9/0x370 [ 372.075571][ C0] ? __cfi_kauditd_thread+0x10/0x10 [ 372.075591][ C0] ? __cfi_kthread+0x10/0x10 [ 372.075606][ C0] ret_from_fork+0x67/0xa0 [ 372.075624][ C0] ? __cfi_kthread+0x10/0x10 [ 372.075638][ C0] ret_from_fork_asm+0x1a/0x30 [ 372.075659][ C0] [ 374.198396][ C1] net_ratelimit: 116391 callbacks suppressed [ 374.198421][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 374.198441][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 374.204514][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 374.216640][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 374.228389][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 374.241043][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 374.252424][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 374.264458][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 374.276290][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 374.288284][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 374.395809][ T36] audit: type=1400 audit(2000000264.631:5321): avc: denied { read open } for pid=5794 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 374.455465][ T36] audit: type=1400 audit(2000000264.631:5322): avc: denied { mounton } for pid=5794 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 374.509311][ T36] audit: type=1400 audit(2000000264.649:5323): avc: denied { sys_module } for pid=5793 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 374.561169][ T36] audit: type=1400 audit(2000000264.668:5324): avc: denied { read } for pid=5795 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 374.615395][ T36] audit: type=1400 audit(2000000264.668:5325): avc: denied { read open } for pid=5795 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 374.669030][ T36] audit: type=1400 audit(2000000264.668:5326): avc: denied { mounton } for pid=5795 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 374.731590][ T36] audit: type=1400 audit(2000000264.978:5327): avc: denied { sys_module } for pid=5795 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 374.784679][ T36] audit: type=1400 audit(2000000265.428:5328): avc: denied { sys_module } for pid=5794 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 379.538441][ C0] net_ratelimit: 133937 callbacks suppressed [ 379.538468][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 379.538473][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 379.538540][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 379.544595][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 379.556617][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 379.568773][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 379.580781][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 379.601793][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 379.604742][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:01:dc:32:c9:b2, vlan:0) [ 379.616888][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)