last executing test programs: 1m20.639432073s ago: executing program 2 (id=6268): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x2041, 0x0) write$binfmt_aout(r0, &(0x7f0000000280)=ANY=[], 0xff2e) ppoll(&(0x7f0000000180)=[{r0, 0x2111}], 0x1, &(0x7f0000000200), &(0x7f0000000240)={[0x461]}, 0x8) 1m19.827294206s ago: executing program 3 (id=6286): mount$9p_fd(0x0, 0x0, 0x0, 0xc00, &(0x7f0000000240)=ANY=[@ANYBLOB='tran']) r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000003640)=[{{&(0x7f0000000000)={0x2, 0x4e22, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="3400000000000000000000000700000094040020070f6e0a0101010a010102ac14141988040c08440c9eb00000000000000003000000000018"], 0x50}}], 0x1, 0x0) 1m19.32803708s ago: executing program 2 (id=6289): mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000100)={0x4, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @local}}}, 0x108) 1m18.273074037s ago: executing program 1 (id=6290): r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000040)=0x4ea5, 0x4) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x2c4, 0x4) 1m16.815112265s ago: executing program 3 (id=6291): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) unlinkat(0xffffffffffffff9c, &(0x7f0000000000)='mnt/encrypted_dir\x00', 0x200) 1m11.23569511s ago: executing program 3 (id=6292): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x8) sendto$inet6(r0, 0x0, 0x0, 0x2200c859, 0x0, 0x0) 1m7.003768824s ago: executing program 0 (id=6293): close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = signalfd4(0xffffffffffffffff, &(0x7f0000001400)={[0xffffffffffffffff]}, 0x8, 0x80000) flock(r0, 0x8) 1m5.237483224s ago: executing program 2 (id=6294): mlockall(0x7) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000080)) mmap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x1, 0x3032, 0xffffffffffffffff, 0x1000) 1m3.282414977s ago: executing program 1 (id=6295): sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000440)=ANY=[@ANYBLOB="84000000", @ANYRES16=0x0, @ANYBLOB="00032dbd7000fbdbdf25190000000c00018008c1a9000100000064000180080003000300000008000100", @ANYRES32, @ANYBLOB="08000300000000001400020076657468315f746f5f627269646765000800030003"], 0x84}, 0x1, 0x0, 0x0, 0x8004}, 0x240008d4) r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000240)="aefc00001a0025f01d85bc04fef7681d020b49ff708800008003280008021000ac0a1410bc71176a36ede498534108e58342fa94a235a2a441f9", 0xfcae) 1m2.313358121s ago: executing program 3 (id=6296): mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x3f, &(0x7f0000000040)=0x80000000, 0x4) 59.284368227s ago: executing program 0 (id=6297): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000019800)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}, 0x0) 57.338712882s ago: executing program 2 (id=6298): r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000080)=""/36, 0x24) getdents(r0, 0xfffffffffffffffd, 0x58) 55.496901357s ago: executing program 3 (id=6299): unshare(0x4000400) r0 = timerfd_create(0x1, 0x800) timerfd_gettime(r0, &(0x7f0000000540)) 53.452545063s ago: executing program 1 (id=6300): syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x90, 0x0, 0x2, {0x3, 0x0, 0x0, 0x5, 0x4, 0x1000, {0x0, 0x0, 0x20, 0xfffffffffffffffd, 0xf5, 0x4, 0x0, 0x0, 0x5, 0x2000, 0x2, 0x0, 0x0, 0x4}}}, 0x0, 0x0, 0x0, 0x0, 0x0}) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="44000000140001b66fb1b313ba36db000a0000000400000014000100fd010000000000000000000000000001150006"], 0x44}, 0x1, 0x0, 0x0, 0x4018}, 0x0) 48.224307035s ago: executing program 0 (id=6301): timer_create(0x2, 0x0, &(0x7f00000001c0)) timer_settime(0x0, 0x1, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) unshare(0x44040200) 47.415120109s ago: executing program 2 (id=6302): r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000180)={0xffffff}, 0x10) write(r0, &(0x7f0000000000)="240000001a005f0214f9f407000904000a000000200100000000000008000f0001000000", 0x24) 46.422885188s ago: executing program 3 (id=6303): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000000)={'veth0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}) 44.46240912s ago: executing program 1 (id=6304): r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/wireless\x00') read$FUSE(r0, &(0x7f0000000440)={0x2020}, 0x2020) syz_fuse_handle_req(r0, &(0x7f0000002480)="c42a39df6c930661eacbb3a76921a271b8d4faab015607dd565e051ef9bf78e2335ad8b82eb869aad5a7b584b354129d3770a664dece400699b51216853669885a7bb742af1abf7e0a177697b5c77a49a43afb8685933d6327e95c01c67e14d1fb086562447620d6e6e5fbfff097f990566a16871b2a4b0d4dd095c517e6bdfa0a6c5b224c1cde02ddf32d11a8b1e75ddbdf0f39aaf21036bd6ef9c8eb04ad00a5ff97b7a11b4a92abac9a6b222f5fff14799f382405dbb04a812084382fcb6041bf4c7895758f46cc0968d66650f1f870096b4da1bb0dd15c067d8394fea85543b25462bb66da043bb34f3e5dd3b08c9469f3ad647cb00923a45df4e906b8b894449daa10bfe1c4b51685b856cc8e6e8331953e2c8476f0b0efc6e1f0a1db951e43a5c30fcaf1d869c6ad8feb541dd47366ec7e36afef8be2ec9a824512b8df61067dbb57d621561ac833af1b386eb007aa42ee620ea1cea970eeea68a47442e4435c88fecf226bc0f34ac232b2b7dea5ce18c8959d8204a59c1b2cac9e5b2362d3123044b869f2fce92bad85d574f07e4b2c2d7544286692d5bae288ad2e8d91716fab2246521ced6716c1878c09504964f6d58de575ad8cb44fb91662d3675f2c5b9b76188c6f40afa6dd79dcc4b861012dbe72bced00319846b9dc9865d49259a41f3e4551b4396ae5bca1f64d8a96303094361569d15e18c6a72436a54673f34b07e01bc041fbfde4fb6f6acf62dbc519341cb539b783514a1aa3b69ff1a05ab122c6dd96b39a358b83991e3377aea1dc3cd8f4787af4303da7a661a3b7eb2d4ba0a38cfff9849a2bb4dcb83f88d379a5c738ac162dfa69556a865b1632da408aae82686f8b995c17570c0a162c17dfee5dde06ad79c9c5124381ab95eb387d864781ff4857ab5a20ce81bf3b93940937f1ff84be02a70e00b0e4ef5dcf6c358edb4835c2327d086d70a903f7d2c78df7f53e60a97a064969dd409c5e0459afc73a4baebb5b9388b3405110f22ad175b376c5c125d93fd574bdc437d7cf25bc237adb51bfcaf45eaaef6ac3f540b3a1934f124e7c0e223233d1c04ff7f3892de7d2af81a8147df883e9d78436babf122b700cbccc0bc21c821d2a3aca1122283dafa9abfb06c1ec28b06b95ae10fb0ba853ded3aef2b917b91f824274772a030398a2b3f8b42d436e9b7b57ee3820dedaaf1c5395229de28f14ba9471d4cd7124b5861a71cb447f22ab3715c99963707eb732f959207b603e08f8e7a0356fbda2fe28d0de16407755fd989f7f085125fbbdf6718a2b4446dc66e13a9f9c9a11c48fc720dbd9cbdbbe1be952a0647aae24f0eae9036ca36bf3d6141d46dc162315f6c561cb6a6e500c9c8ff77b03d371775cd7ceb261f7aeb560deac3355fde3a6f72f2eb321c36a83fa923828551a51e999be04b851a0af41329d985087b1234db695646b697639f4bb5eca9f40587f0275b7242e35c9cdb29a4caaeb95e61bada188992b0cba69fafcf9eef22b124fe7b06c97ac2d9f08a50449d169416a9f2be7982f88e85d9fd35a16cfcd0aa85a983aae0c8556ccf4ea93d1209d612b6ce6bbcbdd94912082ddfe7e89f74c99e6a5406bc0d2f41d8e9ac561d70769f415934595c9acf35607e3d8272c5f4fd64cf97bf2a04ad2467d1efb5e3c576a359cc59f49f66a0fc56ffab81f20c2721640d8fd3cdd4ed54320464476ff847aa4045ca7595a759dc9bbc3ffe02b4a5dbb0481f3fc72da942f80948e4724e2b48159b8f95c20265ebb187d361f1a40c85f35d4a57ced315b2fc31b67eaf007958ba92d31ce813635590e1feb35946b1714a9198b163fdf72b2e0163457bccff8ef1fba4e24737fc1bd7d0d03aa3ed5bc0b9a927362ad726ae12f27be33d1bd17e836cac2022b61a18c49f710c73f121de3feee3d35143eab1a907094a90dc35637902d47bb5621034f4fddc11708db5d7456dcf37797e857aea2a00838489b1975d7964fec67c793e1453f065a10e802759c68711844bc660b0f27661b9ba48953dae59c2fea547716b51999524d747849104ce2f3de1807f15583b44d90f58fe43af65f17ada9925565cb7d5a3f98e8eb23bc8fa0b37bf1fd07c3bbe78160ba1a5e03a9c3db881b0b857d2c2ec62d33d97c16ae6ae64b6aa4977f5e70beb6dad923c59cc658c7fc36eede04b98a558143b09a171bd2eddaa14ce434097b71813b299fdeede1a94dc2be7ca62cd3bfa26a677c911cd6d4777073ddebb0de94d2a0b192c1a216cf35d5652abaf65c27d869d2cf89c6ba7c0150cd7b95a917c6c44130b484a2a17db4e40f4bce5f494e1bd63a06e46bea8cead002e9296c029ec17922f8648ca3a3a3c0a89e9af72b74ad695c8802e69894669b874988d7c45152a1a08301a1a02c1905df6a3d36e8a54ce4eb1493a8b441206c0048eabaf0afa0e42fcc17bf8870398acf53023e44dd8e76897b6120e9a2c621ef2b2d5561a88cfd7e6851594da7d1f8e1e0ebe846d0370714daf54a0dadce982981dc69853162d09f1c60a5d4f511da9e509e7f3331cd1ab221027a152e0a1d7c3354033e05f986a058f371906fb695644bc46053d92d86bd1d9c50c776d9cd564dc4ca0e8740fb2261d8b243348f8feda9fc05f0a6f30875570eaed372fef9f0cd14aafef1b38296049e0afdefd50f70b8b12a142fda6d5abccbc381133095fb43a38b2e423e3a91892a58ebac4967de06946841bfa95c0b955b12fe0d85d3e766d26bb5435de4331f8a2e483920b0939710c7e9e2355090ddb915e04c47aa7574144bf93fdddc1132d0e9cab791704ac25ff3954e23f7c02344afa8df1edb2bd78c4bd95e53660cd967c8e77d840b61f5863d3d631d2966f0819615b4b2e11f47fc868cd02311ecb00ae09f85c383b1c3d42adefd7a731c810f3fbedce7665e539e2f74c31507101238b023a88370e8fa8d949c26f01c432ff9a6ed816dbe59203246c10df38b8967e177d8e2815f4b837b8af84261bd12d1cbbffdaed9270e4c1ababccb8017ce111e6776d0a9edd7f5869fff8035631cae1f71f8d89122f4a4c12c9b966b040d38a9ac6dced5ef11a16f764ad0aca6b723a5002d621cbc44cab672fd145f5aeecc3872e134e3ebfda25d2e928eac2fb4bce645ab4a8aed2c2841288eae236605147f5a93953056f544d35e9a141618e2f69eba75b488935a742f629157c746ef25afe7534ba0c679c5ceb7bf87c7afee0fc0005c4e190b54e9cd4b8f9005bead679122c22fb9924c5d7de42cd8b40f257f59be22c0f2c4cb9c7dc4d97ee1aa3f344197aff767b6b96192e20d03399f8271322253eac9739b154fee3d29246e859588464ebe7a4e9f44087917f81508667fb2ef25a77babe028ed00bb5b1300da73769fb50e887778adcb4deb89e63338d08b339580ed26202cf8c5a4f907d5bb0f20b0e1af6df56db9051505c81c2822aa897122469c2c3cd66c7efd8bcccf0790d5e935bcf20a6641cfa718f01cd4b2fc7b0ce4e02dd3b8124c5b204510423352c7e335815afaa6dd535557691b7e22d0d8006dc42a2b9999cf01a0d84fa7a10c4f8966bf1b669aeedc70213ab3d3dc4a38aef5d81f872c4b3184fa1d6bface793d08397cfeada265b1b72dc4e0959b667d726e0ad92f0660a976240ab5c642f6692376b3303c862b901213fd75a2cd83e3e976cdd2928e45ac6c4060694678ea3a1aa0d7f62a6921538d515b528a5e062b9efa009f9a969bcb94493b0901b9705f5175e92a2d6eb452cbfe36ce2f81e9b2347c9c74e7cb16dc3f100191f6457180afdb19f0d620adc195eb95164a05b5b60d324e6dc715a0ffc623f954a68f03216154a4a6e7b0b86064c15f49dfa1d24fd2970ee4015681fb8c739907ebe6d064f1dc8ece05c83fb24cdc55a92cf152c4c0bbc6a34e9f680aeeecc26d29b7cb7d45cf43b43ccd09101ad24c7e06ca470d7cec837c60305060da858095a19f14bc19e2d8c41d298a7ac312a64c20b7b4bee852c46a2ad5e38d3f65512ae6aa1ac111079e60cf73d9be438b3a2297bde0b0dfd8ff478ab0b68d2169db4365c77c6b363516944b575dfd6cf3080f585638ea9669b9e24a14366ce21d5619fff2f028eecdb492ecf81380f76cfe4a2f80132f811167adf6caeb792b49e0e00d63c380622ce3532d485df9e9434aa014687894d399a48d8cec709bfebe10049bdf8efb05cbac9c0d0c1d1916be3802ba2541f24608cf4f860f9db81cbfd45f2352187204e020865cae21cee71659cc40bb7104f972c9b4ee31c1045745e32a653c1102a56f29bb1107a47d0fb709eb8fd3403c9f8c6b70f01239880ea69e1b86969f304339de8de3a100f879caa255489e1b20a1fa10ac7c2f76e59a0922e980727f98f369adbe11082939e5a981cf4cb6821b2ed631cafa6843da5f1bdae2c4a40c6a179ef466e1798d26ae5c1cae1fb0ff2a600f549ec19788e1f7895f02ded293412413676685b0c6ed9aa7feecb466706396f8a7e3994ca18aa40221c48c25ea37a63542a434225bfd8c29bf82ae9146acf730fe75e273f4c93a4aad9018fea39234aa8fcff6ad3ffeed59119a62a10b2cf6056b4732a8d7b16351c839bb2b8593672f33fdbd3b6169b7528d03e10d054cefa0550751738b61dfe8a85012b13b21df1362a0d59bf257f0ec5b2e2f1af31e35f3dcf1d1b1076aa0090caf7b93f5a19044325321a8729d496df07ebd59e672c7521de0e3649d8d6b12d28d3b19020cfd2fc81575bbe2c3c2efb24fdad3363f54ba0dfb5d79121826a716aa861833c8eb728a6e9704785dacac9ae1ac0bb288579a1b549632d967ac2ff2bd4d346d190d38d371c84b114cf49ed67fba93907c94e87e923c693d0652ebd1e496cf27826a35587657720be516df25b9826dd6c90fa57ccd54eaaf7d67676d25492bfc7de10ec44acd407161bd425905e651e939fbed8cdae42c1a221b4373108d53caf9faab98583f4628cf1e619bf7bace5a06a5cfdd2ac8a9b48db397339b67a48e6878d2f48350af6c75a42a88bcb98a450fba84a0ef8c4637f11500f0f70ebd16f8eae190eafdeecb1d29d80bc7d5bd853baa6093b962be618f5d1ecc14d0d5cbea52e7d97a8e053385a4c5df1348ad1dfc7ec6e4b64737c03908a619188becd6dcae7e751e0302f722cf2f93a67ec654d35556e37b80d18c86034bc820784c3cf6c13528fff6972b52324e843b5c68540f131de44fa13f30ab56168856f2392b84e641a6909b65a322afd4bb1e9a19eb56589c0053df9b4c6b00f1c1e95e8ed7ed68030b5e47e2115ed983168cd549565c8c36ad86e1562168ea1d4537d77a920d4d6354128aaa1ab4c9192f2776fdb660f1a28f31a4e0d1cdd14026281da405003ce873114c23a640b77219e22dad5185997748d6f64578a6bf51baa1bb5c1c7ab94a54969ccc44244b269b539819ea0cfe5628c392d4a02f6ff112c7f25a50ed6bde5e51f4c42719e2eb21ae21d622ba8ba8ef2aed1a66136d4c15f1c484cefc0fe167ba523a8eb02564d449327f0b0bcf8b6f47d00a6c972bdcdf0e3a7368e51788a90423f36fd6f4f4c9857a5ebf0348df160c639425976505dbc0545e75513fdc33590b8302f39b096663292979803ef43d0409ad7dc9cac67e4237cee1d6c8e20a985758f8f9179bd26ef511172e888358a2912049bd8dcc4164c14362639560a776d1f3a21607c09dffca68f727f5ccf6907bc8b16da09afec5f79d7f21954a18e6a4b0c5e7acf6f9a895f36e15a5b9b6c7fcfca00da82498630d2a2b32945ec1151667a636e81957a1f2a4961867462438c3b7ee6067be3728a76313e5b897ae6809bba4be900ae8cd964c61f6bc490926faa852dbb016868952af3f9b8d7f2b3fda5a900b3df609ce7b0a938980b0d0f300892ba4b1165ce3074977f6ec5f756c369c27957037a3b4cbbfaf1345ab410cc38582ccf4c0089a5a454912eb2259a5119719c95c4418246e715bf41823937a90cbbd0b99b521f14fff0527feb412400601cf4df85d6dfc098ba2372dab5d8a69e4dffc45dfbc4bbb3107d964b1824f3abc737c0b12079dcd155276817ab049b5029ff82c90169039f6edde689c5c91f51eeb60415cb999dfe3f3d7bd969ef881f11bc6d86de058376ce1d619b117fdaa0d5a7a91bfb16eac6386b76841e4a36c38d090532e512f1c85b1e47bbc58afe3dd6cb77997e5ad265ec3058747c95349db8876feb63305719c4d9dde2f5b5549a1e9094ecaf8b437a435d812d55621845201505df797c52b98854dd3d4476dbf44ae76ca4c6af5fdf156754c15220841d6cb968682fe950f1cad1af1a4fc36d1eb9f64b8166f29707c00d4bada4d47bf78aa87157135dda83c6d6ad67fdde6b41f7ce3706efe54705b0ad5b36dfce34a7398fb29d76ca7707171b9bfd6af817dd9bad3f00e6436a97a3450b87abde6e35f53d881e7d35bfc42679152b4d3bbcdb8f53a0293f33fbab2762cd2a6a0663f73e7b627bf9ef067c0b9bcbac72ef6517aea3362abdbd5694e9b6a5a7154a81df3cbe846d32372b10ec71c1810b7b5960f4ed851f12d1c9813aca7b0714cd477954a0d52785ddd4ba57f594fa02e6d040fc2346cf85fc8f9dfb1f35694f75752eaaf922ee62d05de62d6ca36d4eb6d892b89ea69b5998a69c1b0ed93f70d0a25aea415340275115810d70e0cfb7d2cc3e5955ba16f4f94e271126a64facaf6df23c64f7a3f9fc2d9af178e54e51a27a25084e77d1f40b1e83bc5ee1ba773de70dfc32df9cc52069de851f73428da327f72090832cc8c37671f84b76401e3720700a5ae94f9a8be7cf38c2072121fcf7dfc28af1c9a0b41cd573780b5e62e64868ac38ef02384433fc0da75e1e5e6a7670ec0e01494bca77c09f8e667175197da31772f121ff696067128ff1bdcc18e659070d7fb4e71f08804844996c85a6db736087b686781671285f215430d0342f263f58b690c113cc03f7d3cefee99b05e20d69ba24d509635dbb6caa46e92a165ac644051df54da69651a3f0b1a7757a65abbdc18bae4b5101ba52ba9eca6f1e892651ead1ab09b6f1b165e55d64ec7074c5b9412d475c1302f0ff09abf501497c82d141a73f3d6660f872a64ab069f7aa3a0e2df15e46c496d8898c3621533221e568e7963c14ff8f35d9d0c57301b084a09908b31629b54143a765b6037b45da6655dc40422193b7dc746fbbf5adf4828843e215277b47e3ac20d0092cce383026d33fdef77f59e49958de2ddc8311a000aeab7803b2c19edc3b7bd1799cf709405683e7655a0103bc1e07ad9c3a5edb869f1beceaa6d33ef95d7fd6a832725ac710a0e5ca73b1a89b1c5bbe37342b6da191c4b07fc79fd7afb38041de4ea2b495338467e22bae5d045103cf817af953095aa14755106e831813250c3cf0e66f5330ccd46d67cc9bdc2569df5c01e86339fb8970af8fb41ef7565fe834353d6ca80c88c719d6ea1e22266859116a2fe465b5bfa4779d1383cd9befe4f1890ca038e0a9778a04e2df95a1c90d16c3ae1c7348a90ee751960cf016a998a84f4019da6abffdac6440d667e9e71255717d723f6e09c64c6fcc9520b1c2b16e6fc30cc0f015d62035fef4429ddb473713cc2463067ff4ff514ddef40cab6bd0f48a423083db743b8a24b9da528b9a08aa0d016439a61e735d2939d5b34f39aa841a21568868cca1077c56a704abe2cce0ab2e83b612d939fe6fbf5fe92aaa28adb5176ba2db008af7983f560635056b5be1ca27965573d15282b0dd061edfd867c40060790f98566d90a6d7a18faaa3186446f709b744fade901bcd20663a038b3817cbf08c4a847b83bbf2c64549734a273ac652315dd07d24a57acc6d417337b4f6287ad3a4f22e237537ce5d875a7beeb86e0a6c47b2eb069d325030837c255cc47e6e1a5408ae534762d5740e8518b405c32b880749bf7731c57185dc13aefe004381053903a2c0b517c6fc732b560a0d0aeee1742ce4dcd78ddec3fc9a7945a18d4a9cbc09fee083b8c4d22e6d81792aeb3936e19df0cb785140089f154e8463574089e8400704f5be356f34e79f169265489d8037e8eb1887770dd8a0f520d201c3850a5883d2f9182e17073d4a5db5b6172adec34c86747ad1d7be9262652210ab8dcaddd2563edee4a3ab0a27434aaf8c55fa3f399c8a04577827ed25633b5797ff71b8bc872b3818ee9d6e3ee8d9a990a10c022443236f7308238825febc6e4aca13898eda38f67e9bfebc7c9abe40d9b238b550a14b985cca9a7830eb31e93aeec9bf8f76d2c29c2f9c95549886bff7dec9d3ccbd4a9dc2cdb843b2755c125be2a1de33dd99682dcaa746438363b603258cc627369e50f7abfe0c280642eda4567b890fc4627956dbeac04895b8fa3659840d9ffbd09a526d7a6dad9b53959b36e355eed7236248526e0082c0c3c16116c6480cac35b770e6cda4ba9bd7828b1ebdc636ed2db652ce44ec7d2983d881b8845b9662c705b399e7fbb78c9e49918b5668f80660c6f66be0589f63c95bc6c9f117f71c2bf21e1e4e3f2458a9c3084906f1ab80339eb03a45188853e6e17a613960286bd71462c3074b2346548c74a13bf3aa53a939a478737f69e01652b3ce9b661c4fa73f054e6466708d0b3740621896460788ed18077da2ec87d24ba07fd9a85fab340328d63327cd7c54774c3263356778a000e30c30f26aed4bbe43b9c32f02e94865d56f4deefb39abde99a827aaf99c6e6cbe8f0669fae0744d59fc19568fad06b2b9ea48101d0d0427049a523250e76eb60e60e29311b36e7f2da280a2cd209ca4e814760cfe830444d6aa1a7918c1b40cb3f40223beb7a6c673ff4ba2a30e7b0c8a5f68be222eb6de753db2733c2a1b9bd7e1f76974e277d780732957246067a0df85812eed02cb19e5af0a082cfcca61515305ed45b6bde2609870efecc417ba9c88eb3a396a65ba7674b9cd432184052b69f051a8d90c6ba75364887a1ece7b11531ad5e49c00c1d08eac7dcc5b1e8be2b0589ba9cb2c879d3a914222d00be0654fe4a30617ef6a4b2238863f8ad35ce1c6446200a725e528484487888ad81319068466e1175b9678674341f93bdfc6f1c42bca89b98a8590c26d885c3534cb3748f747553cc9af2c23bb98dd627fa2e2567faca8a3cd0c05de6e2eefab753173b6a495187dc5ca61cf80b4706688ca7f9f5ac9805249077a537041bfa722bbb8a2003a39f1a55b2cff784b670577c1d8651fa153eb18ed28094b527f1cb47df9524fa504d878130e63d9182e57c2a0033d9603efa0d42c30abf716a462a44b482f07b0891d4939012e6ea7cd1a7a6a88e1756853cd32e7630ad050200a27479f0365b7ee37129df70dbc5c8edad5c4e6f1bbba39bdf7d78bc1a6a389f84d3caa20ef7ce4538e34c0943c4cd2666ebc2aaa587d06fcf959db749260f2069f461ff91167b86523aa86544beeeb21b48c9b8c85fe47077a1f5513cd5f91907ae515663aac5784e0cae7a958a38fd5224cc2a4ebe3df27787a2f05dc1b3411759879158e3d290d2b194e6913c5978fbc684db4b90f82542c198434ee839dc8cc5e39bd8e55f33c30d2bf91fe69ee2e13d13acf1bfb1aae4f0f47464607e87dc831ac20753cbe68122d778a3bac39edc2c2dedbe55158735795b58f169638cafcbac4794a8496f3f5aac64b251fd8687f684f5a42b6782fe3bd284cc101a63816f4b9e19fa7871aaba825258e1c7a4b95ff29967cda9a560ea3112054e0ccf67bb54a681098bd04c7dd8685d9c3905459ae9fa01e2533a235eedd31742900ea210b4515e481d76ca77fce9541d582761bcab0104aca40b4d0cafdfadcb60db9acd5dfa6527a8a57d94a9e018199aaa02c5d957e01e467840c8e0588fb8b839bc5879cb757f1fbbe81c39c679c0b96176e576ebd779ee44ee2436192f09c507fa2c57ed21baa26ddeaa470c776d7cf7d9fce225588081f7db1c1a51d1a4aaf12e94b2a32067127e44d7b2302df237a5810aa981bdd1de07b6417fbe5a91b47bf2f468973710ddf2e3dc965364396fcc1856c5a2f32dae6d00b600e369cd4c70b24281a4f847cb81d7b10aca08838172e09ff59d982f392a007c3a16077fd293eb99f51694b81b312691d06ea3883388fa68ee2d07c00499130f8897d9c7e3644afa1cd976097427cdb371d3be941337b54a9ecca7e485f1a541a7aaef561dfb9cdbade15c828f15352c7c8ba476b90e38e83c78b509c28722f551c34a51b81f7ecd67e84faf637e5b8dd1241c5cde1f257e021e5345efef5186d482ec88e12355d8e5080152ff407e978a7ad81ebce14fc4e51f4c062a190ed4fb84e1708783a62a5245cf1df9d0048a97afdc09a2fc16fbbf01615d598a06e7c70ff1e1334eff089b01658f61b0b94b2810fab40aaf4176d0b328303520b37c1fe43c9e15fc91fbf29d885360727b2baf1fca07af2dadc6ee7364aaf1af72cc256f2b870a5df6fa61fcf16415ba4cd7f5ddd0cb1eafc01987b36caa3f50ab81e9c1d80615e254a7af83d6503043f4c0743ae9d74e6a5acfefc104dd8c7263a0383de4d9f894a601e9b8c71f552fab2793ff8bb6fbd75b8e7414af0628f000673e82d9b04621c98c8fbe8141d90f05fa5eae608357feb967c869caa2e987dd4961e966ac6b8030d9cf606771bcba664d6f28a044b042df00daeab4a55e4c4c2e76384538fa56aeacbf4b47f4aca8aeb8b4149d7c1b8a498082326415953a98e5e3266794435e548fc73480801942a73fad40cfaa42aa3476f4727a53d450d5ef64581abfbc05dc9863f26eca9d13cafa889752b995eff874214a1e094b3c8f957d80c475f8dec15f690fda7728368624fc5361632c8c689f7c1ececf6ccbfccc96506e854710a428b1bec3499c232c41d54efa48d22d391949a3b085be30faf4a4dd08354701addb73e708d05f63246e6a41c1654cd8339c9e82e7004a55ace63e9b7f5d4ae77150a509cdca374e82d0d5e20a0c394089b7ba967e86daed1e8d92377644e7a2f8d6413e723ec9b63b4f1d1f7d79e420cacea67645ec6261fb0df85e7fbe3f4c1d8ce2366d44bb9379c9b91bafff46323fea257454097ccf9dff7cfe66569c9a57b168d1e2c794f1c76909ff8346b468dd57ad1a7a70706ac87bc299c9b0ce98831a7ef5c57a9452e85f693c77d7a00cc9c1b8aff999e4ace8c67e6a07da3c3c1a4bbaf06718da4fc62745598a67710fda8060cb6c33012e1e4e33ee3595b12c9403a1e1ae307f251725dd91057935888674dcd9eff96a4f9f4b2611ec104464292bb7d2f710f8395ca9146ee5b862f5c79b4ed891fa80d1304add96c8ccc342d2959990e6fcbb962da1c30f679d0d0a00f80411b30c1ae2d06b92aee81fef8de7383a91e7afcacfad93c77b0fc5ae4271e797461bfeb12d57738d01f8750e8a21b4876d969a1b0d898e0d83157a969adb92a1913c9535bbfab84b93ccf5200fbfcea8a7b52e1881cafbaedc81bd5455021f1a3273cb4e723a285370aceec6e441acb8158b372ad6b837a362de79f3ad995d04339b23c6e1805e98af75712e4f", 0x2000, &(0x7f0000004d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 41.628992534s ago: executing program 1 (id=6305): r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)={0x1c, 0x4a, 0x201, 0x0, 0x0, {0xa, 0x0, 0x300}, [@generic="c0179a2870"]}, 0x1c}}, 0x0) 41.057522144s ago: executing program 2 (id=6306): r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)="390000001300034700a965e1c3e4ffff0100000001000000d500000025000000190004000400000007fdd411efc40800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f0000000340)=[{&(0x7f0000000400)="390000001300034700bb5be1c3e4feff06000000010000004500000025000000190004000400ad000200000000000006040000000000f93132", 0x39}], 0x1) 39.663891025s ago: executing program 0 (id=6307): mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x458002, 0x55) unlinkat(0xffffffffffffff9c, &(0x7f0000000380)='./file1\x00', 0x200) 30.564664732s ago: executing program 0 (id=6308): r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='task\x00') read$FUSE(0xffffffffffffffff, &(0x7f0000006380)={0x2020}, 0x2020) getdents64(r0, 0x0, 0x0) 26.551159788s ago: executing program 1 (id=6309): mprotect(&(0x7f0000000000/0x2000)=nil, 0x2000, 0xc) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) connect$bt_sco(r0, &(0x7f00000000c0), 0x8) 20.681958757s ago: executing program 32 (id=6303): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000000)={'veth0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}) 17.203813176s ago: executing program 33 (id=6306): r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)="390000001300034700a965e1c3e4ffff0100000001000000d500000025000000190004000400000007fdd411efc40800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f0000000340)=[{&(0x7f0000000400)="390000001300034700bb5be1c3e4feff06000000010000004500000025000000190004000400ad000200000000000006040000000000f93132", 0x39}], 0x1) 16.717452483s ago: executing program 0 (id=6312): r0 = socket$netlink(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100)="c10e000018001f06b9409b0dffff110d0207be040205060506100a044300050018000000fa", 0x25, 0x0, 0x0, 0x0) sendmsg$netlink(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001d40)=[{&(0x7f0000000100)=ANY=[@ANYBLOB="2c00000011000100000000000080000000000000", @ANYRES32=0x0, @ANYBLOB="0a043cbf", @ANYRES32, @ANYBLOB="0a001b"], 0x2c}], 0x1}, 0x0) 8.913419969s ago: executing program 34 (id=6309): mprotect(&(0x7f0000000000/0x2000)=nil, 0x2000, 0xc) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) connect$bt_sco(r0, &(0x7f00000000c0), 0x8) 0s ago: executing program 35 (id=6312): r0 = socket$netlink(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100)="c10e000018001f06b9409b0dffff110d0207be040205060506100a044300050018000000fa", 0x25, 0x0, 0x0, 0x0) sendmsg$netlink(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001d40)=[{&(0x7f0000000100)=ANY=[@ANYBLOB="2c00000011000100000000000080000000000000", @ANYRES32=0x0, @ANYBLOB="0a043cbf", @ANYRES32, @ANYBLOB="0a001b"], 0x2c}], 0x1}, 0x0) kernel console output (not intermixed with test programs): udit: type=1400 audit(186.386:9314): avc: denied { read write } for pid=491 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 191.846539][ T36] audit: type=1400 audit(186.395:9315): avc: denied { read write } for pid=492 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 191.878955][ T36] audit: type=1400 audit(186.395:9316): avc: denied { read write open } for pid=492 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 191.905824][ T36] audit: type=1400 audit(186.395:9317): avc: denied { ioctl } for pid=492 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 191.969048][ T36] audit: type=1400 audit(186.395:9318): avc: denied { read write } for pid=494 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 192.009728][ T36] audit: type=1400 audit(186.395:9319): avc: denied { read write open } for pid=494 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 192.067281][ T36] audit: type=1400 audit(186.395:9320): avc: denied { ioctl } for pid=494 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 192.093994][ T36] audit: type=1400 audit(186.424:9321): avc: denied { read write open } for pid=491 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 192.119100][ T36] audit: type=1400 audit(186.424:9322): avc: denied { ioctl } for pid=491 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 192.204560][ T36] audit: type=1400 audit(186.424:9323): avc: denied { read write } for pid=493 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 192.341674][ T9371] overlayfs: option "volatile" is meaningless in a non-upper mount, ignoring it. [ 192.353260][ T9371] overlayfs: missing 'lowerdir' [ 192.505190][ T9389] netlink: 'syz.3.4504': attribute type 3 has an invalid length. [ 192.760872][ T9418] »»»»»»: renamed from veth0_vlan (while UP) [ 192.806945][ T9422] netlink: 36 bytes leftover after parsing attributes in process `syz.0.4519'. [ 192.863768][ T9428] random: crng reseeded on system resumption [ 192.886512][ T45] usb 3-1: new high-speed USB device number 79 using dummy_hcd [ 193.020282][ T9441] netlink: 4 bytes leftover after parsing attributes in process `syz.0.4527'. [ 193.058099][ T45] usb 3-1: Using ep0 maxpacket: 32 [ 193.067445][ T45] usb 3-1: unable to get BOS descriptor or descriptor too short [ 193.101274][ T45] usb 3-1: config 1 interface 0 altsetting 0 endpoint 0x6 has invalid maxpacket 1024, setting to 64 [ 193.138369][ T45] usb 3-1: New USB device found, idVendor=0582, idProduct=0156, bcdDevice= 0.40 [ 193.158701][ T45] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 193.170919][ T45] usb 3-1: Product: syz [ 193.175900][ T45] usb 3-1: Manufacturer: syz [ 193.182199][ T45] usb 3-1: SerialNumber: syz [ 193.252110][ T9459] netlink: 5 bytes leftover after parsing attributes in process `syz.1.4537'. [ 193.437491][ T45] usb 3-1: MIDIStreaming interface descriptor not found [ 193.462549][ T45] usb 3-1: USB disconnect, device number 79 [ 193.544342][ T8496] udevd[8496]: error opening ATTR{/sys/devices/platform/dummy_hcd.2/usb3/3-1/3-1:1.0/sound/card0/controlC0/../uevent} for writing: No such file or directory [ 193.725726][ T9497] netlink: 57 bytes leftover after parsing attributes in process `syz.0.4555'. [ 193.813302][ T9504] xt_NFQUEUE: number of total queues is 0 [ 194.614738][ T9591] netlink: 12 bytes leftover after parsing attributes in process `syz.0.4604'. [ 195.060559][ T9639] overlayfs: "xino=on" is useless with all layers on same fs, ignore. [ 195.077794][ T9639] overlayfs: overlapping lowerdir path [ 195.457586][ T9680] kernel profiling enabled (shift: 16) [ 195.699596][ T9705] netlink: 'syz.2.4660': attribute type 4 has an invalid length. [ 195.723528][ T9705] netlink: 'syz.2.4660': attribute type 21 has an invalid length. [ 195.764354][ T9705] netlink: 3657 bytes leftover after parsing attributes in process `syz.2.4660'. [ 196.633148][ T9805] netlink: 'syz.3.4709': attribute type 30 has an invalid length. [ 196.745463][ T9817] netlink: 4 bytes leftover after parsing attributes in process `syz.0.4715'. [ 196.951707][ T9840] SELinux: policydb string does not match my string SE Linux [ 196.990117][ T9840] SELinux: failed to load policy [ 197.128940][ T36] kauditd_printk_skb: 989 callbacks suppressed [ 197.128960][ T36] audit: type=1400 audit(191.396:10313): avc: denied { read } for pid=9853 comm="syz.3.4733" dev="nsfs" ino=4026532578 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 197.170226][ T36] audit: type=1400 audit(191.396:10314): avc: denied { read open } for pid=9853 comm="syz.3.4733" path="pid:[4026532578]" dev="nsfs" ino=4026532578 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 197.196956][ T36] audit: type=1400 audit(191.405:10315): avc: denied { write } for pid=9856 comm="syz.2.4735" name="001" dev="devtmpfs" ino=120 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 197.223043][ T36] audit: type=1400 audit(191.405:10316): avc: denied { write } for pid=9856 comm="syz.2.4735" path="/dev/bus/usb/009/001" dev="devtmpfs" ino=120 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 197.298220][ T36] audit: type=1400 audit(191.415:10317): avc: denied { read write } for pid=494 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 197.322215][ T36] audit: type=1400 audit(191.415:10318): avc: denied { read write open } for pid=494 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 197.374795][ T36] audit: type=1400 audit(191.415:10319): avc: denied { ioctl } for pid=494 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 197.414674][ T36] audit: type=1400 audit(191.424:10320): avc: denied { create } for pid=9855 comm="syz.1.4734" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 197.428163][ T9882] cgroup: No subsys list or none specified [ 197.434856][ T36] audit: type=1400 audit(191.434:10321): avc: denied { ioctl } for pid=9853 comm="syz.3.4733" path="pid:[4026532578]" dev="nsfs" ino=4026532578 ioctlcmd=0xb709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 197.465374][ T36] audit: type=1400 audit(191.434:10322): avc: denied { connect } for pid=9855 comm="syz.1.4734" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 197.491874][ T9881] SELinux: failed to load policy [ 197.983720][ T9937] netlink: 4 bytes leftover after parsing attributes in process `syz.3.4774'. [ 198.023517][ T9941] netlink: 37 bytes leftover after parsing attributes in process `syz.1.4784'. [ 198.301983][ T9966] netlink: 5 bytes leftover after parsing attributes in process `syz.3.4788'. [ 198.339359][ T9972] ªªªªªª: renamed from lo (while UP) [ 198.680517][T10009] netlink: 57 bytes leftover after parsing attributes in process `syz.1.4810'. [ 198.751287][T10016] netlink: 'syz.1.4814': attribute type 12 has an invalid length. [ 199.032774][T10047] binfmt_misc: register: failed to install interpreter file ./cgroup.cpu/cpuset.cpus [ 199.084974][T10049] netlink: 8 bytes leftover after parsing attributes in process `syz.1.4830'. [ 199.099248][T10049] erspan0: default FDB implementation only supports local addresses [ 199.369415][T10066] netlink: 'syz.1.4839': attribute type 9 has an invalid length. [ 199.411664][T10069] netlink: 'syz.2.4840': attribute type 27 has an invalid length. [ 199.681334][T10094] netlink: 'syz.2.4852': attribute type 1 has an invalid length. [ 199.690649][T10094] netlink: 'syz.2.4852': attribute type 3 has an invalid length. [ 199.942863][T10123] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=44 sclass=netlink_audit_socket pid=10123 comm=syz.1.4867 [ 200.263862][T10160] EXT4-fs: Value of option "test_dummy_encryption" is unrecognized [ 200.667995][T10205] netlink: 228 bytes leftover after parsing attributes in process `syz.3.4908'. [ 201.036094][T10246] veth0_to_batadv: mtu greater than device maximum [ 201.293313][T10275] netlink: 'syz.2.4942': attribute type 16 has an invalid length. [ 201.314022][T10275] netlink: 64138 bytes leftover after parsing attributes in process `syz.2.4942'. [ 201.509277][T10295] netlink: 104 bytes leftover after parsing attributes in process `syz.3.4953'. [ 201.740742][T10319] netlink: 'syz.1.4965': attribute type 13 has an invalid length. [ 201.748933][T10319] erspan0: refused to change device tx_queue_len [ 202.122427][T10361] netlink: 'syz.1.4985': attribute type 30 has an invalid length. [ 202.438535][T10395] netlink: 'syz.2.5003': attribute type 9 has an invalid length. [ 202.446331][T10395] netlink: 'syz.2.5003': attribute type 2 has an invalid length. [ 202.474614][ T36] kauditd_printk_skb: 906 callbacks suppressed [ 202.474635][ T36] audit: type=1400 audit(196.406:11229): avc: denied { read write } for pid=491 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 202.519068][ T36] audit: type=1400 audit(196.406:11230): avc: denied { read write open } for pid=491 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 202.562236][ T36] audit: type=1400 audit(196.406:11231): avc: denied { ioctl } for pid=491 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 202.593466][ T36] audit: type=1400 audit(196.415:11232): avc: denied { read write } for pid=494 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 202.624676][ T36] audit: type=1400 audit(196.415:11233): avc: denied { read write open } for pid=494 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 202.650054][ T36] audit: type=1400 audit(196.415:11234): avc: denied { ioctl } for pid=494 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 202.675166][ T36] audit: type=1400 audit(196.443:11235): avc: denied { read write } for pid=494 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 202.699664][ T36] audit: type=1400 audit(196.443:11236): avc: denied { read write open } for pid=494 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 202.724229][ T36] audit: type=1400 audit(196.443:11237): avc: denied { ioctl } for pid=494 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 202.813815][ T36] audit: type=1400 audit(196.472:11238): avc: denied { read write } for pid=493 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 202.840709][T10425] netlink: 12 bytes leftover after parsing attributes in process `syz.0.5016'. [ 203.553847][T10497] netlink: 20 bytes leftover after parsing attributes in process `syz.3.5053'. [ 204.239454][T10571] validate_nla: 2 callbacks suppressed [ 204.239478][T10571] netlink: 'syz.0.5089': attribute type 11 has an invalid length. [ 204.266838][T10571] netlink: 'syz.0.5089': attribute type 2 has an invalid length. [ 204.395070][T10588] tc_dump_action: action bad kind [ 204.624921][T10614] netlink: 'syz.2.5109': attribute type 4 has an invalid length. [ 205.251140][T10676] netlink: 'syz.2.5140': attribute type 10 has an invalid length. [ 205.260697][T10676] netlink: 5 bytes leftover after parsing attributes in process `syz.2.5140'. [ 205.273161][T10676] bridge_slave_1: left promiscuous mode [ 205.279917][T10676] bridge0: port 2(bridge_slave_1) entered disabled state [ 205.548200][T10710] netlink: 4 bytes leftover after parsing attributes in process `syz.0.5158'. [ 205.605964][T10717] overlayfs: missing 'lowerdir' [ 205.789834][T10735] netlink: 12 bytes leftover after parsing attributes in process `syz.3.5168'. [ 206.018791][T10762] rust_binder: Write failure EFAULT in pid:2551 [ 206.201252][T10783] .N: renamed from veth0_to_bond (while UP) [ 206.275911][T10790] netlink: 16 bytes leftover after parsing attributes in process `syz.1.5195'. [ 206.604901][T10825] netlink: 1072 bytes leftover after parsing attributes in process `syz.3.5212'. [ 206.618166][T10825] netlink: 280 bytes leftover after parsing attributes in process `syz.3.5212'. [ 207.237332][T10884] netlink: 28 bytes leftover after parsing attributes in process `syz.3.5242'. [ 207.407257][T10894] SELinux: syz.0.5247 (10894) set checkreqprot to 1. This is no longer supported. [ 207.435720][T10896] sit0: entered promiscuous mode [ 207.455509][T10896] netlink: 'syz.3.5248': attribute type 1 has an invalid length. [ 207.465330][T10896] netlink: 1 bytes leftover after parsing attributes in process `syz.3.5248'. [ 207.550355][T10904] netlink: 'syz.3.5252': attribute type 14 has an invalid length. [ 207.615366][T10909] netlink: 288 bytes leftover after parsing attributes in process `syz.3.5255'. [ 207.733332][T10918] x_tables: unsorted underflow at hook 2 [ 207.830924][ T36] kauditd_printk_skb: 821 callbacks suppressed [ 207.830942][ T36] audit: type=1400 audit(201.435:12060): avc: denied { read write } for pid=492 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 207.876449][ T36] audit: type=1400 audit(201.435:12061): avc: denied { read write } for pid=494 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 207.907896][ T36] audit: type=1400 audit(201.435:12062): avc: denied { read write open } for pid=494 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 207.967966][ T36] audit: type=1400 audit(201.435:12063): avc: denied { ioctl } for pid=494 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 208.000055][ T36] audit: type=1400 audit(201.463:12064): avc: denied { read write open } for pid=492 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 208.039698][ T36] audit: type=1400 audit(201.463:12065): avc: denied { ioctl } for pid=492 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 208.087551][ T36] audit: type=1400 audit(201.463:12066): avc: denied { read write } for pid=494 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 208.141155][ T36] audit: type=1400 audit(201.463:12067): avc: denied { read write open } for pid=494 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 208.192404][ T36] audit: type=1400 audit(201.463:12068): avc: denied { ioctl } for pid=494 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 208.222024][T10952] netlink: 'syz.2.5275': attribute type 10 has an invalid length. [ 208.267583][ T36] audit: type=1400 audit(201.482:12069): avc: denied { read write } for pid=493 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 208.531734][T10983] netlink: 'syz.1.5291': attribute type 10 has an invalid length. [ 208.539826][T10983] veth1: entered promiscuous mode [ 208.561799][T10987] netlink: 'syz.3.5292': attribute type 4 has an invalid length. [ 208.698527][T11000] netlink: 'syz.2.5298': attribute type 12 has an invalid length. [ 209.222294][T11058] __nla_validate_parse: 4 callbacks suppressed [ 209.222319][T11058] netlink: 64 bytes leftover after parsing attributes in process `syz.1.5328'. [ 209.318218][T11067] gretap0: left promiscuous mode [ 209.354275][T11067] +$<¶: port 2(bridge_slave_1) entered disabled state [ 209.361517][T11067] +$<¶: port 1(bridge_slave_0) entered disabled state [ 209.390769][T11067] veth1: left promiscuous mode [ 209.427705][T11067] vlan0: left allmulticast mode [ 209.432707][T11067] veth0_vlan: left allmulticast mode [ 209.563751][T11083] netlink: 68 bytes leftover after parsing attributes in process `syz.1.5342'. [ 209.790768][T11110] netlink: 4 bytes leftover after parsing attributes in process `syz.3.5355'. [ 210.358752][T11145] netlink: 16 bytes leftover after parsing attributes in process `syz.2.5373'. [ 212.065838][T11258] validate_nla: 1 callbacks suppressed [ 212.065861][T11258] netlink: 'syz.3.5429': attribute type 27 has an invalid length. [ 212.746030][T11305] netlink: 200 bytes leftover after parsing attributes in process `syz.1.5452'. [ 212.775698][T11305] tc_dump_action: action bad kind [ 212.923484][T11316] netlink: 16 bytes leftover after parsing attributes in process `syz.3.5458'. [ 213.187296][ T36] kauditd_printk_skb: 13803 callbacks suppressed [ 213.187314][ T36] audit: type=1400 audit(206.454:25858): avc: denied { read write } for pid=491 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 213.238908][ T36] audit: type=1400 audit(206.454:25859): avc: denied { read write } for pid=494 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 213.287282][ T36] audit: type=1400 audit(206.454:25860): avc: denied { read write open } for pid=494 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 213.351220][ T36] audit: type=1400 audit(206.454:25861): avc: denied { ioctl } for pid=494 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 213.369087][T11355] netlink: 40 bytes leftover after parsing attributes in process `syz.2.5476'. [ 213.401641][ T36] audit: type=1400 audit(206.463:25862): avc: denied { read write } for pid=493 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 213.417446][T11360] netlink: 'syz.3.5477': attribute type 4 has an invalid length. [ 213.439959][ T36] audit: type=1400 audit(206.463:25863): avc: denied { read write open } for pid=493 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 213.440244][T11361] netlink: 'syz.1.5478': attribute type 3 has an invalid length. [ 213.464481][ T36] audit: type=1400 audit(206.463:25864): avc: denied { ioctl } for pid=493 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 213.491089][T11360] netlink: 'syz.3.5477': attribute type 2 has an invalid length. [ 213.506115][ T36] audit: type=1400 audit(206.463:25865): avc: denied { read write open } for pid=491 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 213.541578][ T36] audit: type=1400 audit(206.463:25866): avc: denied { ioctl } for pid=491 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 213.555904][T11363] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 213.573721][T11363] IPv6: NLM_F_CREATE should be set when creating new route [ 213.580999][T11363] IPv6: NLM_F_CREATE should be set when creating new route [ 213.585716][ T36] audit: type=1400 audit(206.492:25867): avc: denied { read write } for pid=492 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 213.687255][T11373] netlink: 'syz.2.5483': attribute type 27 has an invalid length. [ 213.854956][T11391] netlink: 'syz.0.5494': attribute type 7 has an invalid length. [ 213.909269][T11397] netlink: 'syz.2.5497': attribute type 3 has an invalid length. [ 213.956702][T11397] netlink: 8 bytes leftover after parsing attributes in process `syz.2.5497'. [ 213.984385][T11405] bridge0: port 3(veth1_to_bridge) entered blocking state [ 214.005164][T11405] bridge0: port 3(veth1_to_bridge) entered disabled state [ 214.019626][T11405] veth1_to_bridge: entered allmulticast mode [ 214.026173][T11405] veth1_to_bridge: entered promiscuous mode [ 214.038253][T11405] bridge0: adding interface veth1_to_bridge with same address as a received packet (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 214.076070][T11405] bridge0: port 3(veth1_to_bridge) entered blocking state [ 214.083263][T11405] bridge0: port 3(veth1_to_bridge) entered forwarding state [ 214.179669][T11420] netlink: 32 bytes leftover after parsing attributes in process `syz.0.5508'. [ 214.221507][T11427] netlink: 4 bytes leftover after parsing attributes in process `syz.3.5512'. [ 214.578669][T11465] __nla_validate_parse: 1 callbacks suppressed [ 214.578691][T11465] netlink: 288 bytes leftover after parsing attributes in process `syz.3.5531'. [ 215.312802][T11549] netlink: 12 bytes leftover after parsing attributes in process `syz.1.5572'. [ 215.504825][T11568] netlink: 124 bytes leftover after parsing attributes in process `syz.2.5583'. [ 215.777814][T11597] netlink: 37 bytes leftover after parsing attributes in process `syz.2.5596'. [ 215.864330][T11601] netlink: 'syz.0.5597': attribute type 4 has an invalid length. [ 215.882135][T11601] netlink: 17 bytes leftover after parsing attributes in process `syz.0.5597'. [ 216.110372][T11627] netlink: 4 bytes leftover after parsing attributes in process `syz.0.5610'. [ 216.564421][T11678] x_tables: duplicate entry at hook 2 [ 216.701384][T11693] netlink: 51 bytes leftover after parsing attributes in process `syz.3.5642'. [ 218.284412][T11856] netlink: 'syz.1.5723': attribute type 46 has an invalid length. [ 218.421063][T11864] netlink: 'syz.2.5724': attribute type 27 has an invalid length. [ 218.449200][T11864] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 218.520743][ T36] kauditd_printk_skb: 808 callbacks suppressed [ 218.520762][ T36] audit: type=1400 audit(211.445:26672): avc: denied { read write } for pid=491 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 218.574856][ T36] audit: type=1400 audit(211.464:26677): avc: denied { read write open } for pid=491 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 218.618315][ T36] audit: type=1400 audit(211.464:26678): avc: denied { ioctl } for pid=491 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 218.624052][T11888] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 218.646040][ T36] audit: type=1400 audit(211.492:26679): avc: denied { read write open } for pid=493 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 218.677762][ T36] audit: type=1400 audit(211.492:26680): avc: denied { ioctl } for pid=493 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 218.718013][ T36] audit: type=1400 audit(211.492:26681): avc: denied { read write } for pid=491 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 218.742255][ T36] audit: type=1400 audit(211.492:26682): avc: denied { read write open } for pid=491 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 218.767003][ T36] audit: type=1400 audit(211.492:26683): avc: denied { ioctl } for pid=491 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 218.811933][ T36] audit: type=1400 audit(211.502:26684): avc: denied { read write } for pid=494 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 218.857573][ T36] audit: type=1400 audit(211.502:26685): avc: denied { read write open } for pid=494 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 218.978507][T11914] overlayfs: conflicting lowerdir path [ 219.484228][T11969] netlink: 'syz.3.5775': attribute type 19 has an invalid length. [ 219.492193][T11969] netlink: 5 bytes leftover after parsing attributes in process `syz.3.5775'. [ 220.225567][T12033] netlink: 92 bytes leftover after parsing attributes in process `syz.1.5806'. [ 221.162596][ T13] Bluetooth: hci0: Frame reassembly failed (-84) [ 223.317147][T12130] Bluetooth: hci0: command 0x1003 tx timeout [ 223.323304][ T54] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 223.635284][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 223.647397][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 223.659577][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 223.671620][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 223.683764][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 223.695810][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 223.707932][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 223.719968][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 223.786077][ C1] net_ratelimit: 1344 callbacks suppressed [ 223.786101][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 223.803971][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 223.816121][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 223.828188][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 223.840314][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 223.852345][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 223.864451][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 223.871453][ T36] kauditd_printk_skb: 695 callbacks suppressed [ 223.871472][ T36] audit: type=1400 audit(216.483:27381): avc: denied { read write open } for pid=492 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 223.876466][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 223.918945][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 223.920301][ T36] audit: type=1400 audit(216.493:27382): avc: denied { ioctl } for pid=492 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 223.931046][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 224.016269][ T36] audit: type=1400 audit(216.512:27383): avc: denied { read write } for pid=494 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 224.040863][ T36] audit: type=1400 audit(216.512:27384): avc: denied { read write open } for pid=494 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 224.104701][ T36] audit: type=1400 audit(216.512:27385): avc: denied { ioctl } for pid=494 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 224.255130][ T36] audit: type=1400 audit(216.559:27386): avc: denied { read write } for pid=493 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 224.353904][ T36] audit: type=1400 audit(216.559:27387): avc: denied { read write open } for pid=493 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 224.461988][ T36] audit: type=1400 audit(216.559:27388): avc: denied { ioctl } for pid=493 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 224.557996][ T36] audit: type=1400 audit(216.605:27389): avc: denied { read write } for pid=491 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 224.629574][ T36] audit: type=1400 audit(216.605:27390): avc: denied { read write open } for pid=491 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 224.870583][T12391] netlink: 8 bytes leftover after parsing attributes in process `syz.3.5976'. [ 225.378690][T12412] netlink: 4 bytes leftover after parsing attributes in process `syz.3.5986'. [ 229.126077][ C1] net_ratelimit: 119376 callbacks suppressed [ 229.126100][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 229.144277][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 229.156429][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 229.168661][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 229.180806][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 229.192903][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 229.205128][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 229.217293][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 229.224902][ T36] kauditd_printk_skb: 286 callbacks suppressed [ 229.224920][ T36] audit: type=1400 audit(221.503:27677): avc: denied { read write } for pid=491 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 229.229415][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 229.251638][ T36] audit: type=1400 audit(221.512:27678): avc: denied { read write open } for pid=491 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 229.259039][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 229.310040][ T36] audit: type=1400 audit(221.512:27679): avc: denied { ioctl } for pid=491 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 229.399134][ T36] audit: type=1400 audit(221.512:27680): avc: denied { read write } for pid=492 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 229.476407][ T36] audit: type=1400 audit(221.512:27681): avc: denied { read write open } for pid=492 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 229.563946][ T36] audit: type=1400 audit(221.512:27682): avc: denied { ioctl } for pid=492 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 229.648404][ T36] audit: type=1400 audit(221.634:27683): avc: denied { read write } for pid=491 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 229.798618][ T36] audit: type=1400 audit(221.634:27684): avc: denied { read write open } for pid=491 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 229.899867][ T36] audit: type=1400 audit(221.634:27685): avc: denied { ioctl } for pid=491 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 230.033377][ T36] audit: type=1400 audit(221.644:27686): avc: denied { read write } for pid=492 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 231.855691][T12662] netlink: 'syz.3.6103': attribute type 4 has an invalid length. [ 231.863475][T12662] netlink: 17 bytes leftover after parsing attributes in process `syz.3.6103'. [ 232.211116][T12678] can0: slcan on ttynull. [ 232.612505][T12693] netlink: 8 bytes leftover after parsing attributes in process `syz.2.6109'. [ 233.698832][T12730] netlink: 'syz.0.6128': attribute type 4 has an invalid length. [ 233.714869][T12730] netlink: 3649 bytes leftover after parsing attributes in process `syz.0.6128'. [ 233.955168][T12738] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=12738 comm=syz.0.6131 [ 234.466115][ C1] net_ratelimit: 118228 callbacks suppressed [ 234.466140][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 234.484268][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 234.496484][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 234.508606][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 234.520638][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 234.532687][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 234.544815][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 234.556961][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 234.569072][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 234.581188][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 234.707862][ T36] kauditd_printk_skb: 456 callbacks suppressed [ 234.707883][ T36] audit: type=1400 audit(226.644:28143): avc: denied { read write } for pid=491 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 234.791535][ T36] audit: type=1400 audit(226.672:28144): avc: denied { read write open } for pid=491 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 234.856118][ T36] audit: type=1400 audit(226.672:28145): avc: denied { ioctl } for pid=491 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 234.936323][T12761] kvm_intel: L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 234.986975][ T36] audit: type=1400 audit(226.841:28146): avc: denied { read } for pid=12760 comm="syz.3.6142" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 235.102754][ T36] audit: type=1400 audit(226.841:28147): avc: denied { read open } for pid=12760 comm="syz.3.6142" path="/dev/kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 235.176021][T12766] EXT4-fs: Conflicting test_dummy_encryption options [ 235.224394][ T36] audit: type=1400 audit(226.841:28148): avc: denied { read write } for pid=494 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 235.311694][ T36] audit: type=1400 audit(226.841:28149): avc: denied { read write open } for pid=494 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 235.393458][ T36] audit: type=1400 audit(226.841:28150): avc: denied { ioctl } for pid=494 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 235.458975][ T36] audit: type=1400 audit(226.860:28151): avc: denied { ioctl } for pid=12760 comm="syz.3.6142" path="/dev/kvm" dev="devtmpfs" ino=13 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 235.542296][ T36] audit: type=1400 audit(226.944:28152): avc: denied { read write } for pid=492 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 236.121693][T12799] netlink: 'syz.0.6160': attribute type 13 has an invalid length. [ 236.963354][T12828] netlink: 'syz.0.6173': attribute type 16 has an invalid length. [ 236.981591][T12828] netlink: 'syz.0.6173': attribute type 2 has an invalid length. [ 237.001134][T12828] netlink: 64110 bytes leftover after parsing attributes in process `syz.0.6173'. [ 237.864297][T12871] netlink: 'syz.3.6190': attribute type 12 has an invalid length. [ 238.020916][T12873] process 'syz.0.6193' launched './file0' with NULL argv: empty string added [ 238.364361][T12884] GUP no longer grows the stack in syz.3.6197 (12884): 200000005000-200000008000 (200000004000) [ 238.426670][T12884] CPU: 0 UID: 0 PID: 12884 Comm: syz.3.6197 Not tainted syzkaller #0 ea8366dfa2e562e213f3551e28da65e141ad079f [ 238.426714][T12884] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 238.426730][T12884] Call Trace: [ 238.426738][T12884] [ 238.426747][T12884] __dump_stack+0x21/0x30 [ 238.426783][T12884] dump_stack_lvl+0x140/0x1c0 [ 238.426812][T12884] ? __cfi_dump_stack_lvl+0x10/0x10 [ 238.426839][T12884] ? futex_lock_pi_atomic+0xe3/0xcd0 [ 238.426870][T12884] dump_stack+0x19/0x20 [ 238.426895][T12884] fixup_user_fault+0x62a/0x6b0 [ 238.426931][T12884] fault_in_user_writeable+0x75/0xe0 [ 238.426955][T12884] futex_lock_pi+0x2d7/0xa70 [ 238.426985][T12884] ? __cfi_futex_lock_pi+0x10/0x10 [ 238.427015][T12884] ? __cfi_futex_wake_mark+0x10/0x10 [ 238.427045][T12884] ? futex_setup_timer+0xb4/0xd0 [ 238.427068][T12884] ? __cfi_futex_wake_mark+0x10/0x10 [ 238.427098][T12884] ? __cfi_userfaultfd_unmap_complete+0x10/0x10 [ 238.427127][T12884] ? mas_find+0x358/0x5f0 [ 238.427158][T12884] do_futex+0x270/0x510 [ 238.427181][T12884] ? do_vmi_munmap+0x245/0x2e0 [ 238.427211][T12884] ? __cfi_do_futex+0x10/0x10 [ 238.427235][T12884] ? __vm_munmap+0x2de/0x390 [ 238.427265][T12884] __se_sys_futex+0x13c/0x320 [ 238.427290][T12884] ? __x64_sys_futex+0x110/0x110 [ 238.427315][T12884] ? __kasan_check_write+0x18/0x20 [ 238.427352][T12884] __x64_sys_futex+0xe9/0x110 [ 238.427378][T12884] x64_sys_call+0x227f/0x2ee0 [ 238.427409][T12884] do_syscall_64+0x57/0xf0 [ 238.427430][T12884] ? clear_bhb_loop+0x50/0xa0 [ 238.427453][T12884] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 238.427486][T12884] RIP: 0033:0x7f055f39c799 [ 238.427507][T12884] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 238.427526][T12884] RSP: 002b:00007f0560313028 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 238.427551][T12884] RAX: ffffffffffffffda RBX: 00007f055f615fa0 RCX: 00007f055f39c799 [ 238.427570][T12884] RDX: 0000000000000000 RSI: 000000000000008d RDI: 0000200000004000 [ 238.427587][T12884] RBP: 00007f055f432bd9 R08: 0000000000000000 R09: 0000000000000000 [ 238.427602][T12884] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 238.427617][T12884] R13: 00007f055f616038 R14: 00007f055f615fa0 R15: 00007fffb741bf38 [ 238.427637][T12884] [ 239.806130][ C1] net_ratelimit: 117663 callbacks suppressed [ 239.806153][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 239.824286][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 239.836348][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 239.848489][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 239.860523][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 239.872567][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 239.884687][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 239.896815][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 239.908841][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 239.920994][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 240.290734][ T36] kauditd_printk_skb: 257 callbacks suppressed [ 240.290755][ T36] audit: type=1400 audit(231.879:28410): avc: denied { read write } for pid=493 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 240.340619][ T36] audit: type=1400 audit(231.917:28411): avc: denied { read write open } for pid=493 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 240.408933][ T36] audit: type=1400 audit(231.917:28412): avc: denied { ioctl } for pid=493 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 240.493811][ T36] audit: type=1400 audit(232.029:28413): avc: denied { read write } for pid=493 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 240.581135][ T36] audit: type=1400 audit(232.029:28414): avc: denied { read write open } for pid=493 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 240.733473][ T36] audit: type=1400 audit(232.029:28415): avc: denied { ioctl } for pid=493 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 240.857105][ T36] audit: type=1400 audit(232.039:28416): avc: denied { read write } for pid=494 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 240.977527][ T36] audit: type=1400 audit(232.058:28417): avc: denied { read write open } for pid=494 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 241.059845][ T36] audit: type=1400 audit(232.058:28418): avc: denied { ioctl } for pid=494 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 241.166138][ T36] audit: type=1400 audit(232.217:28419): avc: denied { read write } for pid=492 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 241.217170][T12963] tipc: Enabling of bearer rejected, failed to enable media [ 241.339786][T12967] 9pnet_fd: p9_fd_create_tcp (12967): problem binding to privport [ 241.540606][ T592] hid-generic 007D:0008:0081.0001: unknown main item tag 0x6 [ 241.552513][ T592] hid-generic 007D:0008:0081.0001: hidraw0: HID v0.08 Device [syz1] on syz0 [ 241.871454][T12980] bridge0: port 1(bridge_slave_0) entered disabled state [ 241.944517][T12980] bridge0: port 1(bridge_slave_0) entered disabled state [ 242.042413][T12977] fido_id[12977]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 243.712865][T13049] netlink: 'syz.0.6275': attribute type 11 has an invalid length. [ 245.146124][ C1] net_ratelimit: 127327 callbacks suppressed [ 245.146150][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 245.146184][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 245.152229][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 245.164230][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 245.176224][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 245.188191][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 245.200078][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 245.211964][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 245.223939][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 245.235914][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 247.232101][ T36] kauditd_printk_skb: 215 callbacks suppressed [ 247.232123][ T36] audit: type=1400 audit(238.390:28635): avc: denied { read write } for pid=491 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 248.301086][ C0] sched: DL replenish lagged too much [ 250.486120][ C0] net_ratelimit: 226388 callbacks suppressed [ 250.486146][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 250.486156][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 250.486219][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 250.492314][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 250.504335][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 250.516230][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 250.528119][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 250.540148][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 250.552160][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 250.564018][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 250.617595][ T36] audit: type=1400 audit(238.390:28636): avc: denied { read write open } for pid=491 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 251.990876][ T36] audit: type=1400 audit(238.390:28637): avc: denied { ioctl } for pid=491 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 252.948898][ T36] audit: type=1400 audit(243.701:28638): avc: denied { read write } for pid=493 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 255.826137][ C0] net_ratelimit: 225064 callbacks suppressed [ 255.826163][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 255.826191][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 255.832231][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 255.844225][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 255.856225][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 255.868293][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 255.880261][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 255.892166][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 255.904049][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 255.915941][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 257.756334][ T36] audit: type=1400 audit(243.701:28639): avc: denied { read write open } for pid=493 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 260.158206][ T36] audit: type=1400 audit(243.701:28640): avc: denied { ioctl } for pid=493 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 260.280713][T13085] audit: audit_backlog=65 > audit_backlog_limit=64 [ 260.502599][ T491] audit: audit_backlog=65 > audit_backlog_limit=64 [ 260.575371][T13085] audit: audit_lost=8 audit_rate_limit=0 audit_backlog_limit=64 [ 260.623287][ T491] audit: audit_lost=9 audit_rate_limit=0 audit_backlog_limit=64 [ 260.631032][ T36] audit: type=1400 audit(244.526:28641): avc: denied { search } for pid=13078 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 260.656125][ T491] audit: backlog limit exceeded [ 260.661640][ T491] audit: audit_backlog=65 > audit_backlog_limit=64 [ 260.891845][T13085] audit: backlog limit exceeded [ 260.960117][ T491] audit: audit_lost=10 audit_rate_limit=0 audit_backlog_limit=64 [ 261.166145][ C0] net_ratelimit: 220087 callbacks suppressed [ 261.166171][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 261.166211][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 261.172276][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 261.184241][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 261.196136][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 261.208028][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 261.219907][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 261.231787][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 261.243791][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 261.255684][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 266.506164][ C0] net_ratelimit: 224376 callbacks suppressed [ 266.506189][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 266.506195][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 266.506264][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 266.512283][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 266.524183][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 266.536065][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 266.547958][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 266.559855][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 266.571835][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 266.583748][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 267.192433][ T36] kauditd_printk_skb: 135 callbacks suppressed [ 267.192454][ T36] audit: type=1400 audit(257.126:28731): avc: denied { search } for pid=13095 comm="sed" name="resolv.conf" dev="tmpfs" ino=426 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 268.096098][T13099] netlink: 'syz.1.6295': attribute type 16 has an invalid length. [ 268.103975][T13099] netlink: 'syz.1.6295': attribute type 2 has an invalid length. [ 269.396366][T13099] netlink: 64086 bytes leftover after parsing attributes in process `syz.1.6295'. [ 269.561895][ T36] audit: type=1400 audit(257.305:28732): avc: denied { read } for pid=13095 comm="sed" name="eth0.dhcp" dev="tmpfs" ino=435 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 271.846160][ C1] net_ratelimit: 222223 callbacks suppressed [ 271.846183][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 271.846188][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 271.846246][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 271.852257][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 271.864268][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 271.876246][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 271.888211][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 271.900101][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 271.911980][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 271.923958][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 273.148801][ T36] audit: type=1400 audit(257.305:28733): avc: denied { read open } for pid=13095 comm="sed" path="/run/dhcpcd/hook-state/resolv.conf/eth0.dhcp" dev="tmpfs" ino=435 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 275.761121][ T36] audit: type=1400 audit(257.305:28734): avc: denied { getattr } for pid=13095 comm="sed" path="/run/dhcpcd/hook-state/resolv.conf/eth0.dhcp" dev="tmpfs" ino=435 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 277.186179][ C1] net_ratelimit: 224820 callbacks suppressed [ 277.186205][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 277.186228][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 277.192269][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 277.204169][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 277.216174][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 277.228131][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 277.240023][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 277.251993][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 277.263905][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 277.275792][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 278.681170][ T36] audit: type=1400 audit(258.421:28735): avc: denied { search } for pid=13100 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 280.213415][ T36] audit: type=1400 audit(258.421:28736): avc: denied { search } for pid=13100 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=421 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 281.795466][ T36] audit: type=1400 audit(258.421:28737): avc: denied { search } for pid=13100 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=425 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 282.253747][ T36] audit: type=1400 audit(258.421:28738): avc: denied { search } for pid=13100 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=426 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 282.526209][ C0] net_ratelimit: 216098 callbacks suppressed [ 282.526231][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 282.526283][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 282.532328][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 282.544311][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 282.556278][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 282.568169][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 282.580045][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 282.591941][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 282.603903][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 282.615814][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 285.745988][ T36] audit: type=1400 audit(258.477:28739): avc: denied { read write } for pid=493 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 286.628265][T13078] audit: audit_backlog=65 > audit_backlog_limit=64 [ 287.090926][ T36] audit: type=1400 audit(258.477:28740): avc: denied { read write open } for pid=493 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 287.866208][ C0] net_ratelimit: 217599 callbacks suppressed [ 287.866233][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 287.866275][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 287.872306][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 287.884288][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 287.896154][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 287.908047][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 287.920095][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 287.932066][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 287.943928][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 287.955911][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 288.317094][T13078] audit: audit_lost=26 audit_rate_limit=0 audit_backlog_limit=64 [ 288.871702][T13078] audit: backlog limit exceeded [ 288.877085][T13078] audit: audit_backlog=65 > audit_backlog_limit=64 [ 288.883612][T13078] audit: audit_lost=27 audit_rate_limit=0 audit_backlog_limit=64 [ 288.891396][T13078] audit: backlog limit exceeded [ 288.969645][ T36] audit: type=1400 audit(258.477:28741): avc: denied { ioctl } for pid=493 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 289.780147][T13078] audit: audit_backlog=65 > audit_backlog_limit=64 [ 293.206212][ C0] net_ratelimit: 219397 callbacks suppressed [ 293.206238][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 293.206276][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 293.212319][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 293.224313][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 293.236296][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 293.248304][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 293.260380][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 293.272362][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 293.284262][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 293.296160][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 293.479360][ T36] kauditd_printk_skb: 91 callbacks suppressed [ 293.479385][ T36] audit: type=1400 audit(281.735:28807): avc: denied { read write } for pid=492 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 296.916375][ T36] audit: type=1400 audit(281.735:28808): avc: denied { read write open } for pid=492 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 298.546244][ C1] net_ratelimit: 225816 callbacks suppressed [ 298.546268][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 298.546282][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 298.546336][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 298.552357][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 298.564338][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 298.576241][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 298.588209][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 298.600195][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 298.612158][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 298.624049][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 299.628435][ T36] audit: type=1400 audit(281.735:28809): avc: denied { ioctl } for pid=492 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 301.377309][ T36] audit: type=1400 audit(282.026:28810): avc: denied { search } for pid=13125 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 303.545628][ T36] audit: type=1400 audit(282.683:28811): avc: denied { read } for pid=13125 comm="cmp" name="resolv.conf" dev="tmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 303.886234][ C1] net_ratelimit: 228510 callbacks suppressed [ 303.886257][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 303.886271][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 303.892327][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 303.904325][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 303.916230][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 303.928217][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 303.940112][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 303.951998][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 303.963888][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 303.975854][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 306.841180][ T36] audit: type=1400 audit(282.683:28812): avc: denied { read open } for pid=13125 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 307.461595][ T36] audit: type=1400 audit(282.936:28813): avc: denied { search } for pid=13125 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 308.941171][ T36] audit: type=1400 audit(282.936:28814): avc: denied { search } for pid=13125 comm="cmp" name="dhcpcd" dev="tmpfs" ino=421 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 309.226229][ C0] net_ratelimit: 225531 callbacks suppressed [ 309.226254][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 309.226268][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 309.232311][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 309.244269][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 309.256189][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 309.268087][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 309.280055][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 309.292034][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 309.303905][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 309.315878][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 311.455922][ T36] audit: type=1400 audit(282.936:28815): avc: denied { search } for pid=13125 comm="cmp" name="hook-state" dev="tmpfs" ino=425 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 314.566241][ C1] net_ratelimit: 240515 callbacks suppressed [ 314.566265][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 314.566271][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 314.566320][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 314.572339][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 314.584492][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 314.596377][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 314.608252][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 314.620143][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 314.632100][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 314.643993][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 315.094028][ T36] audit: type=1400 audit(282.936:28816): avc: denied { read } for pid=13125 comm="cmp" name="resolv.conf.can0.ipv4ll" dev="tmpfs" ino=5311 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 315.641282][ T36] audit: type=1400 audit(282.936:28817): avc: denied { read open } for pid=13125 comm="cmp" path="/run/dhcpcd/hook-state/resolv.conf.can0.ipv4ll" dev="tmpfs" ino=5311 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 316.493592][ T36] audit: type=1400 audit(282.936:28818): avc: denied { getattr } for pid=13125 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 317.734888][ T36] audit: type=1400 audit(282.936:28819): avc: denied { getattr } for pid=13125 comm="cmp" path="/run/dhcpcd/hook-state/resolv.conf.can0.ipv4ll" dev="tmpfs" ino=5311 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 319.906287][ C0] net_ratelimit: 233133 callbacks suppressed [ 319.906312][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 319.906323][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 319.906379][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 319.912387][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 319.924393][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 319.936274][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 319.948182][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 319.960153][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 319.972132][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 319.984104][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 321.488760][ T36] audit: type=1400 audit(287.862:28820): avc: denied { read write } for pid=491 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 322.521521][ T36] audit: type=1400 audit(287.862:28821): avc: denied { read write open } for pid=491 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 323.447282][ T36] audit: type=1400 audit(287.862:28822): avc: denied { ioctl } for pid=491 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 324.150245][T13130] netlink: 'syz.2.6306': attribute type 4 has an invalid length. [ 324.164435][ T36] audit: type=1400 audit(291.793:28823): avc: denied { search } for pid=13132 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 325.246262][ C0] net_ratelimit: 243995 callbacks suppressed [ 325.246287][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:1a:8e:eb:44:34:a6, vlan:0) [ 325.246291][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 325.246343][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 325.252346][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 325.264354][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 325.276264][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 325.288251][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 325.300215][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 325.312203][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 325.324084][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 325.496467][ T36] audit: type=1400 audit(291.793:28824): avc: denied { search } for pid=13132 comm="rm" name="dhcpcd" dev="tmpfs" ino=421 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 329.255333][ T36] audit: type=1400 audit(291.793:28825): avc: denied { search } for pid=13132 comm="rm" name="hook-state" dev="tmpfs" ino=425 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 329.712885][ T36] audit: type=1400 audit(291.793:28826): avc: denied { getattr } for pid=13132 comm="rm" path="/run/dhcpcd/hook-state/resolv.conf.can0.ipv4ll" dev="tmpfs" ino=5311 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 330.586280][ C1] net_ratelimit: 241455 callbacks suppressed [ 330.586304][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 330.586332][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 330.592360][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 330.604268][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 330.616176][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 330.628168][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:1a:8e:eb:44:34:a6, vlan:0) [ 330.640051][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 330.652009][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 330.663986][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 330.675879][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 332.336859][ T36] audit: type=1400 audit(291.793:28827): avc: denied { search } for pid=13132 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 332.566026][ T36] audit: type=1400 audit(291.793:28828): avc: denied { search } for pid=13132 comm="rm" name="dhcpcd" dev="tmpfs" ino=421 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 335.926287][ C0] net_ratelimit: 251899 callbacks suppressed [ 335.926311][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 335.926320][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 335.926377][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 335.932362][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 335.944305][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 335.956187][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:1a:8e:eb:44:34:a6, vlan:0) [ 335.968164][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 335.980056][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 335.991947][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 336.003914][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 338.439519][ T36] audit: type=1400 audit(291.793:28829): avc: denied { search } for pid=13132 comm="rm" name="hook-state" dev="tmpfs" ino=425 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 338.915879][ T36] audit: type=1400 audit(291.802:28830): avc: denied { write search } for pid=13132 comm="rm" name="hook-state" dev="tmpfs" ino=425 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 339.598985][ T36] audit: type=1400 audit(291.802:28831): avc: denied { remove_name search } for pid=13132 comm="rm" name="resolv.conf.can0.ipv4ll" dev="tmpfs" ino=5311 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 340.906684][ T36] audit: type=1400 audit(291.802:28832): avc: denied { unlink } for pid=13132 comm="rm" name="resolv.conf.can0.ipv4ll" dev="tmpfs" ino=5311 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 341.266300][ C0] net_ratelimit: 242941 callbacks suppressed [ 341.266325][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 341.266347][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 341.272396][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 341.284400][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 341.296292][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 341.308280][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 341.320254][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 341.332131][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 341.344033][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:1a:8e:eb:44:34:a6, vlan:0) [ 341.355905][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 343.292894][ T36] audit: type=1400 audit(294.429:28833): avc: denied { execmem } for pid=13133 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 343.870148][T13131] netlink: 'syz.2.6306': attribute type 4 has an invalid length. [ 344.518670][ T36] audit: type=1400 audit(294.720:28834): avc: denied { execmem } for pid=13135 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 344.562264][ T36] audit: type=1400 audit(294.729:28835): avc: denied { read write } for pid=492 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 344.756305][T13139] netlink: 'syz.0.6312': attribute type 27 has an invalid length. [ 345.691816][ T36] audit: type=1400 audit(294.729:28836): avc: denied { read write open } for pid=492 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 346.606309][ C1] net_ratelimit: 239232 callbacks suppressed [ 346.606332][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 346.606355][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 346.612401][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 346.624315][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 346.636296][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 346.648284][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 346.660296][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 346.672128][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 346.684096][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 346.696161][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 351.946354][ C1] net_ratelimit: 245950 callbacks suppressed [ 351.946377][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 351.946384][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 351.946436][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 351.952447][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 351.964352][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:1a:8e:eb:44:34:a6, vlan:0) [ 351.976227][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 351.988114][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 352.000082][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 352.012060][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 352.023958][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 352.520480][ T36] audit: type=1400 audit(294.729:28837): avc: denied { ioctl } for pid=492 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 353.742322][ T36] audit: type=1400 audit(296.746:28838): avc: denied { search } for pid=13137 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 356.169593][ T36] audit: type=1400 audit(296.746:28839): avc: denied { search } for pid=13137 comm="rm" name="dhcpcd" dev="tmpfs" ino=421 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 356.806189][ T36] audit: type=1400 audit(296.746:28840): avc: denied { search } for pid=13137 comm="rm" name="hook-state" dev="tmpfs" ino=425 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 357.286353][ C1] net_ratelimit: 243383 callbacks suppressed [ 357.286378][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 357.286415][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 357.292447][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 357.304487][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 357.316428][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 357.328319][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 357.340280][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 357.352244][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 357.364217][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 357.376103][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 357.804714][ T36] audit: type=1400 audit(302.554:28841): avc: denied { search } for pid=13078 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 358.886905][ T36] audit: type=1400 audit(302.723:28842): avc: denied { read } for pid=13141 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 361.518223][ T36] audit: type=1400 audit(302.723:28843): avc: denied { read open } for pid=13141 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 362.626335][ C1] net_ratelimit: 244671 callbacks suppressed [ 362.626361][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 362.626398][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:1a:8e:eb:44:34:a6, vlan:0) [ 362.632437][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 362.644333][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 362.656329][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 362.668387][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 362.680259][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 362.692381][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 362.704311][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 362.716174][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 363.935039][ T36] audit: type=1400 audit(302.723:28844): avc: denied { mounton } for pid=13141 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 365.073211][ T36] audit: type=1400 audit(303.164:28845): avc: denied { sys_module } for pid=13141 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 366.559871][ T36] audit: type=1400 audit(303.314:28846): avc: denied { read } for pid=13143 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 367.966349][ C0] net_ratelimit: 242337 callbacks suppressed [ 367.966374][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 367.966393][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 367.972460][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 367.984369][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 367.996247][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 368.008137][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 368.020116][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 368.032088][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 368.043973][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 368.055944][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 368.202632][ T36] audit: type=1400 audit(303.314:28847): avc: denied { read open } for pid=13143 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 368.256096][ T36] audit: type=1400 audit(303.314:28848): avc: denied { mounton } for pid=13143 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 369.407756][ T36] audit: type=1400 audit(303.342:28849): avc: denied { execmem } for pid=13142 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 369.790711][ T36] audit: type=1400 audit(303.483:28850): avc: denied { sys_module } for pid=13143 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 370.356387][ T36] audit: type=1400 audit(310.866:28851): avc: denied { execmem } for pid=13144 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 371.482488][ T36] audit: type=1400 audit(311.195:28852): avc: denied { read } for pid=13145 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 373.306372][ C1] net_ratelimit: 240903 callbacks suppressed [ 373.306396][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 373.306427][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 373.312636][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 373.324623][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 373.336544][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 373.348426][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:1a:8e:eb:44:34:a6, vlan:0) [ 373.360302][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 373.372195][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 373.384185][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 373.396149][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 374.202684][ T36] audit: type=1400 audit(311.195:28853): avc: denied { read open } for pid=13145 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 374.523113][ T36] audit: type=1400 audit(311.457:28854): avc: denied { mounton } for pid=13145 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 374.704966][ T36] audit: type=1400 audit(311.457:28855): avc: denied { sys_module } for pid=13145 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 376.057989][ T36] audit: type=1400 audit(329.752:28856): avc: denied { read } for pid=13148 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 377.075085][ T36] audit: type=1400 audit(329.752:28857): avc: denied { read open } for pid=13148 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 377.794509][ T36] audit: type=1400 audit(329.752:28858): avc: denied { mounton } for pid=13148 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 378.646370][ C1] net_ratelimit: 234916 callbacks suppressed [ 378.646395][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 378.646423][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 378.652479][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 378.664438][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 378.676444][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 378.688438][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 378.700365][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 378.712239][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:1a:8e:eb:44:34:a6, vlan:0) [ 378.724113][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 378.736015][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 379.425243][ T36] audit: type=1400 audit(329.921:28859): avc: denied { sys_module } for pid=13141 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 381.962952][ T36] audit: type=1400 audit(329.931:28860): avc: denied { sys_module } for pid=13141 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 382.340688][ T36] audit: type=1400 audit(329.949:28861): avc: denied { sys_module } for pid=13141 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 383.004570][ T36] audit: type=1400 audit(329.996:28862): avc: denied { sys_module } for pid=13143 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 383.986390][ C1] net_ratelimit: 242837 callbacks suppressed [ 383.986414][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 383.986440][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 383.992484][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 384.004505][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 384.016469][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 384.028426][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 384.040434][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 384.052370][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 384.064312][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 384.076333][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 384.885202][ T36] audit: type=1400 audit(330.006:28863): avc: denied { sys_module } for pid=13143 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 388.596143][ T36] audit: type=1400 audit(330.015:28864): avc: denied { sys_module } for pid=13148 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 389.326385][ C0] net_ratelimit: 245524 callbacks suppressed [ 389.326410][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 389.326419][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 389.326477][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 389.332463][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 389.344387][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 389.344436][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 389.356344][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:1a:8e:eb:44:34:a6, vlan:0) [ 389.368316][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 389.380185][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 389.392095][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 391.014061][ T36] audit: type=1400 audit(338.628:28865): avc: denied { sys_module } for pid=13148 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 393.964554][ T36] audit: type=1400 audit(339.951:28866): avc: denied { sys_module } for pid=13145 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 394.666404][ C0] net_ratelimit: 249366 callbacks suppressed [ 394.666430][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 394.666465][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 394.672500][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 394.684493][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 394.696456][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 394.708443][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 394.720418][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 394.732317][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 394.744170][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:1a:8e:eb:44:34:a6, vlan:0) [ 394.756061][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 396.140632][ T36] audit: type=1400 audit(340.148:28867): avc: denied { sys_module } for pid=13143 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 396.751399][ T36] audit: type=1400 audit(353.902:28868): avc: denied { execmem } for pid=13149 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 398.911266][ T36] audit: type=1400 audit(357.926:28869): avc: denied { execmem } for pid=13150 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 399.571888][ T36] audit: type=1400 audit(359.231:28870): avc: denied { read } for pid=13151 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 400.006429][ C0] net_ratelimit: 240905 callbacks suppressed [ 400.006453][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 400.006491][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 400.012521][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 400.024523][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 400.036495][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 400.048475][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 400.060347][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 400.072339][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 400.084226][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 400.096112][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 404.206555][ T36] audit: type=1400 audit(359.231:28871): avc: denied { read open } for pid=13151 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 405.346437][ C0] net_ratelimit: 250541 callbacks suppressed [ 405.346465][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 405.346489][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 405.352534][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 405.364436][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 405.376331][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 405.388303][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 405.400276][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 405.412256][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 405.424275][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 405.436191][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 408.327989][ T36] audit: type=1400 audit(359.231:28872): avc: denied { mounton } for pid=13151 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 408.816888][ T36] audit: type=1400 audit(359.381:28873): avc: denied { sys_module } for pid=13151 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 410.686453][ C0] net_ratelimit: 247437 callbacks suppressed [ 410.686477][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 410.686496][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 410.692548][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:1a:8e:eb:44:34:a6, vlan:0) [ 410.704458][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 410.716454][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 410.728428][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 410.740302][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 410.752202][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 410.764084][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 410.775974][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 411.049813][ T36] audit: type=1400 audit(364.935:28874): avc: denied { sys_module } for pid=13148 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 416.026464][ C1] net_ratelimit: 248210 callbacks suppressed [ 416.026489][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 416.026515][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 416.032567][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 416.044561][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 416.056642][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 416.068521][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 416.080497][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 416.092570][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 416.104492][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 416.116452][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:1a:8e:eb:44:34:a6, vlan:0) [ 416.370410][ T36] audit: type=1400 audit(365.113:28875): avc: denied { read } for pid=13152 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 418.640688][ T36] audit: type=1400 audit(365.113:28876): avc: denied { read open } for pid=13152 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 421.366457][ C0] net_ratelimit: 242106 callbacks suppressed [ 421.366483][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 421.366493][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 421.366546][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 421.372542][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 421.384459][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 421.396459][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:1a:8e:eb:44:34:a6, vlan:0) [ 421.408405][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 421.420290][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 421.432193][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 421.444175][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 421.689543][ T36] audit: type=1400 audit(365.132:28877): avc: denied { mounton } for pid=13152 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 422.587930][ T36] audit: type=1400 audit(365.207:28878): avc: denied { sys_module } for pid=13152 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 425.589953][ T36] audit: type=1400 audit(365.592:28879): avc: denied { sys_module } for pid=13151 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 426.706465][ C0] net_ratelimit: 250257 callbacks suppressed [ 426.706489][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 426.706532][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 426.712615][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 426.724534][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 426.736482][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 426.748372][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 426.760261][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 426.772234][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 426.784205][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 426.796164][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 427.359333][ T36] audit: type=1400 audit(365.601:28880): avc: denied { sys_module } for pid=13148 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 428.392067][ T36] audit: type=1400 audit(365.601:28881): avc: denied { sys_module } for pid=13152 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 429.427894][ T36] audit: type=1400 audit(365.610:28882): avc: denied { sys_module } for pid=13152 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 430.438740][ T36] audit: type=1400 audit(365.610:28883): avc: denied { sys_module } for pid=13151 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 431.419823][ T36] audit: type=1400 audit(365.620:28884): avc: denied { sys_module } for pid=13151 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 432.046474][ C1] net_ratelimit: 241330 callbacks suppressed [ 432.046500][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 432.046511][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 432.052651][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 432.064594][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 432.076484][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 432.088371][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:1a:8e:eb:44:34:a6, vlan:0) [ 432.100255][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 432.112224][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 432.124181][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 432.136261][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 433.113388][ T36] audit: type=1400 audit(365.695:28885): avc: denied { execmem } for pid=13153 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 435.586971][ T36] audit: type=1400 audit(366.549:28886): avc: denied { sys_module } for pid=13152 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 437.293021][ T36] audit: type=1400 audit(374.711:28887): avc: denied { execmem } for pid=13154 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 437.386484][ C0] net_ratelimit: 249310 callbacks suppressed [ 437.386508][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 437.386511][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 437.386576][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 437.392572][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 437.404576][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 437.416545][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 437.428535][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 437.440485][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 437.452363][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 437.464266][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:1a:8e:eb:44:34:a6, vlan:0) [ 438.210500][ T37] INFO: task syz.3.6303:13117 blocked for more than 122 seconds. [ 438.251847][ T36] audit: type=1400 audit(381.316:28888): avc: denied { read } for pid=13155 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 438.315899][ T37] Not tainted syzkaller #0 [ 438.320896][ T37] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 438.343121][ T37] task:syz.3.6303 state:D stack:0 pid:13117 tgid:13117 ppid:493 flags:0x00004004 SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 438.863678][ T37] Call Trace: [ 438.867061][ T37] [ 438.870049][ T37] __schedule+0x134f/0x1ea0 [ 438.870324][ T36] audit: type=1400 audit(381.316:28889): avc: denied { read open } for pid=13155 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 438.874583][ T37] ? __sched_text_start+0x10/0x10 [ 438.903024][ T37] ? rcu_segcblist_entrain+0x69/0x2b0 [ 438.908417][ T37] ? _raw_spin_unlock+0x45/0x60 [ 438.913290][ T37] ? __kasan_check_write+0x18/0x20 [ 438.918414][ T37] schedule+0xc5/0x240 [ 438.922529][ T37] schedule_timeout+0xc7/0x3b0 [ 438.927306][ T37] ? __cfi_schedule_timeout+0x10/0x10 [ 438.932698][ T37] ? __cfi__raw_spin_lock_irq+0x10/0x10 [ 438.938331][ T37] ? __smp_call_single_queue+0xd8/0x380 [ 438.943895][ T37] ? generic_exec_single+0x1fd/0x500 [ 438.949203][ T37] wait_for_common+0x369/0x650 [ 438.953985][ T37] ? wait_for_completion+0x40/0x40 [ 438.959108][ T37] ? _raw_spin_lock_irqsave+0xc1/0x160 [ 438.964588][ T37] wait_for_completion+0x1c/0x40 [ 438.969532][ T37] rcu_barrier+0x415/0x540 [ 438.973949][ T37] netdev_run_todo+0x118/0xce0 [ 438.978733][ T37] ? kvfree+0x39/0x50 [ 438.982721][ T37] ? netdev_state_change+0xaa/0x240 [ 438.987939][ T37] ? __cfi_netdev_run_todo+0x10/0x10 [ 438.993232][ T37] rtnl_unlock+0x12/0x20 [ 438.997495][ T37] tun_chr_close+0xc5/0x150 [ 439.002017][ T37] ? __cfi_tun_chr_close+0x10/0x10 [ 439.007148][ T37] __fput+0x1fb/0xa00 [ 439.011134][ T37] ? __cfi__raw_spin_lock_irq+0x10/0x10 [ 439.016687][ T37] ____fput+0x20/0x30 [ 439.020685][ T37] task_work_run+0x1e5/0x260 [ 439.025308][ T37] ? __cfi_task_work_run+0x10/0x10 [ 439.030437][ T37] ? __kasan_check_read+0x15/0x20 [ 439.035467][ T37] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 439.041553][ T37] resume_user_mode_work+0x35/0x50 [ 439.046674][ T37] syscall_exit_to_user_mode+0x63/0xb0 [ 439.052153][ T37] do_syscall_64+0x63/0xf0 [ 439.056570][ T37] ? clear_bhb_loop+0x50/0xa0 [ 439.061263][ T37] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 439.067171][ T37] RIP: 0033:0x7f055f39c799 [ 439.071599][ T37] RSP: 002b:00007fffb741c098 EFLAGS: 00000246 ORIG_RAX: 00000000000001b4 [ 439.080018][ T37] RAX: 0000000000000000 RBX: 00007fffb741c180 RCX: 00007f055f39c799 [ 439.088009][ T37] RDX: 0000000000000000 RSI: 000000000000001e RDI: 0000000000000003 [ 439.095991][ T37] RBP: 00000000000422bc R08: 0000000000000001 R09: 0000000000000000 [ 439.103975][ T37] R10: 0000001b32a20000 R11: 0000000000000246 R12: 00007fffb741c1c0 [ 439.111945][ T37] R13: 00007f055f615fac R14: 0000000000042636 R15: 00007f055f615fa0 [ 439.119928][ T37] [ 439.128733][T13158] syz-executor: vmalloc error: size 4194304, failed to allocated page array size 8192, mode:0xdc2(GFP_KERNEL|__GFP_HIGHMEM|__GFP_ZERO), nodemask=(null),cpuset=/,mems_allowed=0 [ 439.136481][ T37] NMI backtrace for cpu 0 [ 439.136496][ T37] CPU: 0 UID: 0 PID: 37 Comm: khungtaskd Not tainted syzkaller #0 ea8366dfa2e562e213f3551e28da65e141ad079f [ 439.136522][ T37] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 439.136533][ T37] Call Trace: [ 439.136539][ T37] [ 439.136547][ T37] __dump_stack+0x21/0x30 [ 439.136575][ T37] dump_stack_lvl+0x140/0x1c0 [ 439.136598][ T37] ? __cfi_dump_stack_lvl+0x10/0x10 [ 439.136623][ T37] dump_stack+0x19/0x20 [ 439.136645][ T37] nmi_cpu_backtrace+0x2ba/0x2d0 [ 439.136664][ T37] ? rcu_read_unlock_special+0xb7/0x420 [ 439.136688][ T37] ? __cfi_nmi_cpu_backtrace+0x10/0x10 [ 439.136706][ T37] ? sched_show_task+0x371/0x530 [ 439.136728][ T37] ? __rcu_read_unlock+0xc0/0xc0 [ 439.136750][ T37] ? __cfi_nmi_raise_cpu_backtrace+0x10/0x10 [ 439.136773][ T37] ? __cfi_nmi_raise_cpu_backtrace+0x10/0x10 [ 439.136795][ T37] nmi_trigger_cpumask_backtrace+0x142/0x2c0 [ 439.136815][ T37] arch_trigger_cpumask_backtrace+0x14/0x20 [ 439.136837][ T37] watchdog+0xdad/0xf00 [ 439.136864][ T37] ? __kasan_check_write+0x18/0x20 [ 439.136889][ T37] ? __cfi_watchdog+0x10/0x10 [ 439.136915][ T37] ? __kasan_check_read+0x15/0x20 [ 439.136937][ T37] ? __kthread_parkme+0x137/0x180 [ 439.136963][ T37] ? schedule+0xc5/0x240 [ 439.136983][ T37] kthread+0x2c9/0x370 [ 439.137001][ T37] ? __cfi_watchdog+0x10/0x10 [ 439.137027][ T37] ? __cfi_kthread+0x10/0x10 [ 439.137046][ T37] ret_from_fork+0x64/0xa0 [ 439.137070][ T37] ? __cfi_kthread+0x10/0x10 [ 439.137088][ T37] ret_from_fork_asm+0x1a/0x30 [ 439.137115][ T37] [ 439.137123][ T37] Sending NMI from CPU 0 to CPUs 1: [ 439.367385][ C1] NMI backtrace for cpu 1 [ 439.367401][ C1] CPU: 1 UID: 0 PID: 33 Comm: rcuop/1 Not tainted syzkaller #0 ea8366dfa2e562e213f3551e28da65e141ad079f [ 439.367424][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 439.367435][ C1] RIP: 0010:ip_route_input_rcu+0x131c/0x2700 [ 439.367459][ C1] Code: 48 8b 5c 24 18 88 84 24 12 01 00 00 66 89 8c 24 32 01 00 00 66 89 94 24 30 01 00 00 48 81 c3 d4 04 00 00 48 89 d8 48 c1 e8 03 <42> 0f b6 04 30 84 c0 0f 85 1a 10 00 00 80 3b 01 75 28 e8 6d d5 cd [ 439.367474][ C1] RSP: 0018:ffffc90000230100 EFLAGS: 00000a07 [ 439.367490][ C1] RAX: 1ffff11025b6d50a RBX: ffff88812db6a854 RCX: 0000000000000000 [ 439.367504][ C1] RDX: 0000000000000000 RSI: 0000000000000000 RDI: fffff52000046010 [ 439.367516][ C1] RBP: ffffc900002302d0 R08: ffff888103678000 R09: 0000000000000000 [ 439.367528][ C1] R10: fffff52000045f88 R11: 0000000000000100 R12: 1ffff9200004602c [ 439.367541][ C1] R13: f8f8f8f8f1f1f1f1 R14: dffffc0000000000 R15: 00000000aa1414ac [ 439.367554][ C1] FS: 0000000000000000(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 439.367569][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 439.367582][ C1] CR2: 00007fdfd61e5300 CR3: 000000019d1f8000 CR4: 00000000003526b0 [ 439.367600][ C1] Call Trace: [ 439.367605][ C1] [ 439.367614][ C1] ? ip_route_input_noref+0x150/0x150 [ 439.367633][ C1] ? __asan_memcpy+0x5a/0x80 [ 439.367653][ C1] ? arpt_do_table+0x1ba7/0x1d80 [ 439.367681][ C1] ip_route_input_noref+0xd4/0x150 [ 439.367697][ C1] ? __cfi_ip_route_input_noref+0x10/0x10 [ 439.367714][ C1] ? __asan_memcpy+0x5a/0x80 [ 439.367732][ C1] arp_process+0x908/0x1790 [ 439.367753][ C1] ? __cfi_arp_process+0x10/0x10 [ 439.367773][ C1] ? __cfi_arp_process+0x10/0x10 [ 439.367791][ C1] NF_HOOK+0x17e/0x1e0 [ 439.367809][ C1] ? __cfi_arp_process+0x10/0x10 [ 439.367828][ C1] ? arp_xmit+0x210/0x210 [ 439.367846][ C1] ? __cfi_arp_process+0x10/0x10 [ 439.367864][ C1] ? br_dev_queue_push_xmit+0x55c/0x700 [ 439.367889][ C1] arp_rcv+0x2f8/0x490 [ 439.367908][ C1] ? __cfi_arp_rcv+0x10/0x10 [ 439.367927][ C1] netif_receive_skb+0x22d/0x7b0 [ 439.367949][ C1] ? __cfi_netif_receive_skb+0x10/0x10 [ 439.367970][ C1] ? br_flood+0x67e/0x730 [ 439.367994][ C1] br_pass_frame_up+0x126/0x1b0 [ 439.368010][ C1] br_handle_frame_finish+0x1317/0x1760 [ 439.368028][ C1] ? __cfi_br_handle_frame_finish+0x10/0x10 [ 439.368046][ C1] ? arch_scale_cpu_capacity+0x1c/0xb0 [ 439.368068][ C1] ? update_group_capacity+0x2c7/0x9f0 [ 439.368088][ C1] ? __irq_exit_rcu+0x53/0xb0 [ 439.368111][ C1] br_handle_frame+0x5a6/0xba0 [ 439.368128][ C1] ? __cfi_br_handle_frame+0x10/0x10 [ 439.368143][ C1] __netif_receive_skb_core+0xfb1/0x3ab0 [ 439.368167][ C1] ? qdisc_run_end+0x120/0x120 [ 439.368187][ C1] ? sched_balance_update_blocked_averages+0x1360/0x1360 [ 439.368212][ C1] ? __cfi_update_misfit_status+0x10/0x10 [ 439.368230][ C1] ? __kasan_check_write+0x18/0x20 [ 439.368249][ C1] ? _raw_spin_lock_irq+0x93/0x120 [ 439.368265][ C1] ? __cfi__raw_spin_lock_irq+0x10/0x10 [ 439.368280][ C1] ? _raw_spin_lock_irqsave+0xc1/0x160 [ 439.368296][ C1] ? __cfi__raw_spin_lock_irqsave+0x10/0x10 [ 439.368312][ C1] process_backlog+0x3e5/0xad0 [ 439.368341][ C1] __napi_poll+0xd0/0x610 [ 439.368361][ C1] net_rx_action+0x5ea/0xd80 [ 439.368383][ C1] ? __cfi_net_rx_action+0x10/0x10 [ 439.368408][ C1] ? timer_expire_remote+0xa0/0xa0 [ 439.368429][ C1] ? irqtime_account_irq+0x51/0x1c0 [ 439.368454][ C1] handle_softirqs+0x1aa/0x630 [ 439.368483][ C1] __do_softirq+0xf/0x16 [ 439.368505][ C1] do_softirq+0xb8/0x110 [ 439.368531][ C1] [ 439.368538][ C1] [ 439.368545][ C1] ? __cfi_do_softirq+0x10/0x10 [ 439.368572][ C1] ? dst_destroy+0x37d/0x460 [ 439.368592][ C1] ? __cfi_dst_destroy_rcu+0x10/0x10 [ 439.368612][ C1] __local_bh_enable_ip+0x74/0x80 [ 439.368639][ C1] rcu_do_batch+0x5d9/0xd40 [ 439.368668][ C1] ? rcu_core+0xd30/0xd30 [ 439.368701][ C1] ? __kasan_check_write+0x18/0x20 [ 439.368724][ C1] ? _raw_spin_lock+0x92/0x120 [ 439.368744][ C1] ? _raw_spin_unlock_irqrestore+0x4a/0x70 [ 439.368764][ C1] ? __kasan_check_read+0x15/0x20 [ 439.368787][ C1] ? rcu_nocb_cb_kthread+0x50f/0xb30 [ 439.368814][ C1] rcu_nocb_cb_kthread+0x524/0xb30 [ 439.368843][ C1] ? __cfi_rcu_nocb_cb_kthread+0x10/0x10 [ 439.368871][ C1] ? __kasan_check_write+0x18/0x20 [ 439.368894][ C1] ? _raw_spin_lock_irqsave+0xc1/0x160 [ 439.368913][ C1] ? __cfi__raw_spin_lock_irqsave+0x10/0x10 [ 439.368932][ C1] ? _raw_spin_lock_irqsave+0xc1/0x160 [ 439.368952][ C1] ? set_cpus_allowed_ptr+0xa1/0xf0 [ 439.368980][ C1] ? __cfi_set_cpus_allowed_ptr+0x10/0x10 [ 439.369007][ C1] ? __kasan_check_read+0x15/0x20 [ 439.369030][ C1] ? __kthread_parkme+0x137/0x180 [ 439.369056][ C1] ? schedule+0xc5/0x240 [ 439.369077][ C1] kthread+0x2c9/0x370 [ 439.369095][ C1] ? __cfi_rcu_nocb_cb_kthread+0x10/0x10 [ 439.369124][ C1] ? __cfi_kthread+0x10/0x10 [ 439.369143][ C1] ret_from_fork+0x64/0xa0 [ 439.369167][ C1] ? __cfi_kthread+0x10/0x10 [ 439.369186][ C1] ret_from_fork_asm+0x1a/0x30 [ 439.369215][ C1] [ 439.876382][T13158] CPU: 1 UID: 0 PID: 13158 Comm: syz-executor Not tainted syzkaller #0 ea8366dfa2e562e213f3551e28da65e141ad079f [ 439.876422][T13158] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 439.876436][T13158] Call Trace: [ 439.876445][T13158] [ 439.876455][T13158] __dump_stack+0x21/0x30 [ 439.876488][T13158] dump_stack_lvl+0x140/0x1c0 [ 439.876514][T13158] ? __cfi_dump_stack_lvl+0x10/0x10 [ 439.876541][T13158] ? _raw_spin_unlock_irqrestore+0x4a/0x70 [ 439.876566][T13158] dump_stack+0x19/0x20 [ 439.876590][T13158] warn_alloc+0x1e7/0x2c0 [ 439.876613][T13158] ? kasan_save_free_info+0x4a/0x60 [ 439.876637][T13158] ? __cfi_warn_alloc+0x10/0x10 [ 439.876659][T13158] ? __get_vm_area_node+0x201/0x3d0 [ 439.876682][T13158] ? kcov_ioctl+0x5d/0x5a0 [ 439.876712][T13158] __vmalloc_node_range_noprof+0x6aa/0x1480 [ 439.876749][T13158] ? locks_remove_posix+0x358/0x570 [ 439.876778][T13158] ? __cfi___vmalloc_node_range_noprof+0x10/0x10 [ 439.876802][T13158] ? expand_files+0xd5/0x6e0 [ 439.876834][T13158] vmalloc_user_noprof+0x77/0x90 [ 439.876858][T13158] ? kcov_ioctl+0x5d/0x5a0 [ 439.876886][T13158] kcov_ioctl+0x5d/0x5a0 [ 439.876913][T13158] ? bpf_lsm_file_ioctl+0xd/0x20 [ 439.876933][T13158] ? security_file_ioctl+0x3e/0x110 [ 439.876954][T13158] ? __cfi_kcov_ioctl+0x10/0x10 [ 439.876983][T13158] __se_sys_ioctl+0x135/0x1b0 [ 439.877012][T13158] __x64_sys_ioctl+0x7f/0xa0 [ 439.877040][T13158] x64_sys_call+0x1878/0x2ee0 [ 439.877068][T13158] do_syscall_64+0x57/0xf0 [ 439.877089][T13158] ? clear_bhb_loop+0x50/0xa0 [ 439.877111][T13158] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 439.877144][T13158] RIP: 0033:0x7f4db6d9c42b [ 439.877164][T13158] Code: 00 48 89 44 24 18 31 c0 48 8d 44 24 60 c7 04 24 10 00 00 00 48 89 44 24 08 48 8d 44 24 20 48 89 44 24 10 b8 10 00 00 00 0f 05 <89> c2 3d 00 f0 ff ff 77 1c 48 8b 44 24 18 64 48 2b 04 25 28 00 00 [ 439.877183][T13158] RSP: 002b:00007ffe2ccded20 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 439.877207][T13158] RAX: ffffffffffffffda RBX: 0000000000080000 RCX: 00007f4db6d9c42b [ 439.877225][T13158] RDX: 0000000000080000 RSI: ffffffff80086301 RDI: 00000000000000dc [ 439.877241][T13158] RBP: 00007f4db70163f8 R08: 0000000000000000 R09: 0000000000000000 [ 439.877255][T13158] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 439.877271][T13158] R13: 0000000000000003 R14: 00007ffe2ccdefd8 R15: 0000000000000000 [ 439.877288][T13158] [ 439.877297][T13158] Mem-Info: [ 440.192168][ T36] audit: type=1400 audit(381.316:28890): avc: denied { mounton } for pid=13155 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 440.192206][ T36] audit: type=1400 audit(381.381:28891): avc: denied { sys_module } for pid=13155 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 440.192234][ T36] audit: type=1400 audit(404.161:28892): avc: denied { read } for pid=13156 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 440.192261][ T36] audit: type=1400 audit(404.161:28893): avc: denied { read open } for pid=13156 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 440.192289][ T36] audit: type=1400 audit(404.161:28894): avc: denied { mounton } for pid=13156 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 440.192316][ T36] audit: type=1400 audit(408.383:28895): avc: denied { sys_module } for pid=13156 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 440.343227][T13158] active_anon:5476 inactive_anon:9 isolated_anon:0 [ 440.343227][T13158] active_file:12865 inactive_file:13409 isolated_file:0 [ 440.343227][T13158] unevictable:0 dirty:65 writeback:0 [ 440.343227][T13158] slab_reclaimable:4089 slab_unreclaimable:648667 [ 440.343227][T13158] mapped:41984 shmem:164 pagetables:591 [ 440.343227][T13158] sec_pagetables:0 bounce:0 [ 440.343227][T13158] kernel_misc_reclaimable:0 [ 440.343227][T13158] free:902828 free_pcp:6888 free_cma:0 [ 440.394225][T13158] Node 0 active_anon:21904kB inactive_anon:36kB active_file:51460kB inactive_file:53636kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:167936kB dirty:260kB writeback:0kB shmem:656kB shmem_thp:0kB shmem_pmdmapped:0kB anon_thp:0kB writeback_tmp:0kB kernel_stack:4936kB pagetables:2364kB sec_pagetables:0kB all_unreclaimable? no [ 440.435542][T13158] DMA32 free:2958164kB boost:0kB min:19080kB low:23848kB high:28616kB reserved_highatomic:0KB free_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2963368kB mlocked:0kB bounce:0kB free_pcp:5204kB local_pcp:5136kB free_cma:0kB [ 440.468682][T13158] lowmem_reserve[]: 0 3921 3921 [ 440.473604][T13158] Normal free:653148kB boost:0kB min:25972kB low:32464kB high:38956kB reserved_highatomic:0KB free_highatomic:0KB active_anon:21904kB inactive_anon:36kB active_file:51460kB inactive_file:53636kB unevictable:0kB writepending:260kB present:5242880kB managed:4015864kB mlocked:0kB bounce:0kB free_pcp:20044kB local_pcp:8172kB free_cma:0kB [ 440.520161][T13158] lowmem_reserve[]: 0 0 0 [ 440.532643][T13158] DMA32: 5*4kB (M) 2*8kB (M) 3*16kB (M) 4*32kB (M) 4*64kB (M) 5*128kB (M) 5*256kB (M) 5*512kB (M) 4*1024kB (UM) 4*2048kB (M) 718*4096kB (M) = 2958164kB [ 440.573557][T13158] Normal: 61*4kB (UME) 78*8kB (UE) 285*16kB (ME) 394*32kB (ME) 316*64kB (ME) 53*128kB (ME) 15*256kB (ME) 30*512kB (UME) 9*1024kB (ME) 5*2048kB (ME) 139*4096kB (M) = 653044kB [ 440.628640][T13158] 26466 total pagecache pages [ 440.633358][T13158] 32 pages in swap cache [ 440.640809][T13158] Free swap = 124460kB [ 440.644994][T13158] Total swap = 124996kB [ 440.659870][T13158] 2097051 pages RAM [ 440.663716][T13158] 0 pages HighMem/MovableOnly [ 440.668408][T13158] 352243 pages reserved [ 440.690726][T13158] 0 pages cma reserved [ 440.697040][T13158] Memory allocations: [ 440.714132][T13158] 0 B 0 init/main.c:1477 func:do_initcalls [ 440.721366][T13158] 0 B 0 init/do_mounts.c:186 func:mount_root_generic [ 440.755437][T13158] 0 B 0 init/do_mounts.c:158 func:do_mount_root [ 440.763135][T13158] 0 B 0 init/do_mounts.c:352 func:mount_nodev_root [ 440.799133][T13158] 0 B 0 init/do_mounts_rd.c:241 func:rd_load_image [ 440.807095][T13158] 0 B 0 init/do_mounts_rd.c:72 func:identify_ramdisk_image [ 440.841908][T13158] 0 B 0 init/initramfs.c:507 func:unpack_to_rootfs [ 440.849869][T13158] 0 B 0 init/initramfs.c:508 func:unpack_to_rootfs [ 441.752755][T13158] 0 B 0 init/initramfs.c:509 func:unpack_to_rootfs [ 442.726500][ C0] net_ratelimit: 207389 callbacks suppressed [ 442.726525][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 442.726551][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 442.732599][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 442.744498][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 442.756388][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 442.768376][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 442.780334][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 442.792326][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 442.804201][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 442.816167][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 443.378924][T13158] 0 B 0 init/initramfs.c:101 func:find_link [ 448.066515][ C1] net_ratelimit: 241150 callbacks suppressed [ 448.066539][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 448.066575][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 448.072613][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 448.084597][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:1a:8e:eb:44:34:a6, vlan:0) [ 448.096483][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 448.108355][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 448.120344][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 448.132205][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 448.144102][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 448.156060][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)