last executing test programs: 1m48.041947471s ago: executing program 2 (id=3509): syz_clone(0x23a40080, 0x0, 0x38, 0x0, 0x0, 0x0) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x4000000) 1m47.501602792s ago: executing program 2 (id=3519): r0 = socket$inet6(0xa, 0x800000000000002, 0x0) sendmmsg$inet6(r0, &(0x7f0000003900)=[{{&(0x7f0000000040)={0xa, 0x4e23, 0x0, @loopback, 0x8}, 0x1c, 0x0}}, {{&(0x7f0000001ac0)={0xa, 0x4e22, 0x1d04, @ipv4={'\x00', '\xff\xff', @local}, 0x7}, 0x1c, 0x0, 0x0, &(0x7f0000003a00)=ANY=[], 0x240}}], 0x2, 0x40000) 1m47.03928477s ago: executing program 2 (id=3526): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000680)="5c00000013006bcd9e3fe3dceb48aa31086b8703110000001fa1ff0000000000040014020d000a00000000009ee517d34460bc24eab556a705251e6182949a3651f60a84c9f5d1938037e786a6d00d00000000000000bb5a00f69853", 0x5c}], 0x1, 0x0, 0x0, 0x1f000801}, 0x0) 1m46.543096178s ago: executing program 2 (id=3533): r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)={0x1c, 0x1d, 0x1, 0x0, 0x25dfdbff, {0x7}, [@typed={0x8, 0x0, 0x0, 0x0, @u32=0x4}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x0) 1m32.321621819s ago: executing program 2 (id=3539): r0 = openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$selinux_user(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='system_u:object_r:auth_cache_t root'], 0x27) 1m17.397537491s ago: executing program 1 (id=3546): r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x4c, 0x0, &(0x7f0000000140)) 1m16.88624611s ago: executing program 2 (id=3547): r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000480)={0x2, 0x5, 0xb, 0xa, 0xe, 0x0, 0x70bd23, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x4e23, 0x3, @private0={0xfc, 0x0, '\x00', 0x1}, 0xbbc4}}, @sadb_sa={0x2, 0x1, 0xffffff7d, 0xb0, 0x6, 0x1}, @sadb_address={0x5, 0x5, 0x2b, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0x70}}, 0x84) 1m15.35383969s ago: executing program 3 (id=3549): r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000000)={@mcast2}, 0x14) 1m11.492035535s ago: executing program 1 (id=3550): r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000002180)=ANY=[@ANYBLOB="440000001400010000000000000000000218000004000000140004000000000600000000000000000000000115000280", @ANYBLOB="e0"], 0x44}, 0x1, 0x0, 0x0, 0x1}, 0x0) 1m7.793517741s ago: executing program 0 (id=3551): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=@updpolicy={0x23c, 0x19, 0x1, 0x0, 0x0, {{@in6=@private2, @in6=@empty, 0x0, 0x6, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8}, {0x0, 0x400, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x1d}, {0x0, 0x0, 0x0, 0x2dd}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2}, [@tmpl={0x184, 0x5, [{{@in=@dev={0xac, 0x14, 0x14, 0x3b}, 0x4d3, 0x32}, 0x0, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x0, 0x0, 0xff}, {{@in6=@private2, 0x0, 0x32}, 0x0, @in=@local, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffffff}, {{@in6=@loopback, 0x0, 0x3c}, 0x2, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x0, 0x1, 0x3, 0x0, 0x0, 0x6}, {{@in6=@mcast2, 0x0, 0x3c}, 0x2, @in6=@local, 0x0, 0x2, 0x0, 0x0, 0x0, 0x3, 0x278b6a28}, {{@in=@multicast1, 0x0, 0x3c}, 0x2, @in=@empty, 0xffffffff, 0x0, 0x3, 0x0, 0x0, 0x0, 0x400000}, {{@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x6c}, 0x2, @in=@broadcast, 0x0, 0x1}]}]}, 0x23c}}, 0x0) 1m5.908451302s ago: executing program 3 (id=3552): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000000)={'bridge0\x00', @random="0100"}) 59.843654106s ago: executing program 1 (id=3553): r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000012c0)=[{&(0x7f0000000480)=ANY=[@ANYBLOB="2c0000001000010002000000fedbdf250c0000000700000000000000040011800c00100004"], 0x2c}], 0x1}, 0x0) 58.594697679s ago: executing program 32 (id=3547): r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000480)={0x2, 0x5, 0xb, 0xa, 0xe, 0x0, 0x70bd23, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x4e23, 0x3, @private0={0xfc, 0x0, '\x00', 0x1}, 0xbbc4}}, @sadb_sa={0x2, 0x1, 0xffffff7d, 0xb0, 0x6, 0x1}, @sadb_address={0x5, 0x5, 0x2b, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local}}]}, 0x70}}, 0x84) 57.558366879s ago: executing program 0 (id=3555): r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000002d00), 0x2000) read$FUSE(r0, 0x0, 0x0) 55.971977602s ago: executing program 3 (id=3556): r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=ANY=[@ANYBLOB="540000001200010000000000000000001d00000000004e2300000000ffffffffff0700000000000000000000000000000000000009000000", @ANYRES32=0x0, @ANYBLOB="0100000003000000000000000000000008000301"], 0x54}}, 0x20004010) 46.813396627s ago: executing program 0 (id=3557): r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, 0x0, 0x0) 45.366493691s ago: executing program 1 (id=3558): r0 = syz_open_dev$loop(&(0x7f00000041c0), 0x1, 0x0) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000004200)) 42.456382771s ago: executing program 3 (id=3559): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x101000, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x81) 32.37124856s ago: executing program 1 (id=3560): r0 = socket(0xa, 0x2400000001, 0x0) getsockopt$sock_buf(r0, 0x1, 0x3d, 0x0, &(0x7f0000000100)) 31.892196998s ago: executing program 0 (id=3561): r0 = fsopen(&(0x7f00000001c0)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) 29.023744905s ago: executing program 3 (id=3562): r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, &(0x7f0000002ec0)) 25.602993185s ago: executing program 0 (id=3563): r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x5, &(0x7f0000000000)=0x800, 0x4) 21.508320514s ago: executing program 3 (id=3564): syz_clone(0x4100000, 0x0, 0x0, 0x0, 0x0, 0x0) waitid(0x0, 0x0, 0x0, 0x41000004, &(0x7f0000000040)) 20.431010727s ago: executing program 0 (id=3565): r0 = openat$binfmt_register(0xffffff9c, &(0x7f0000000000), 0x1, 0x0) write$binfmt_register(r0, &(0x7f0000000100)={0x3a, 'syz3', 0x3a, 'M', 0x3a, 0xfff, 0x3a, '^-%-\\xc5})\')&}*\xe9S\xe9\xaf\x9f\xb9\xc9\xce\xa55\x9d$]\xd0\x1e\xf5cM\xfaW\xd3m\x8d\xf4\x9c\xfalN\x9d\x05\x82\xed\'L0%\x89k\xc62+8U\xcb\xa7\x1c\x1e\xf8\xfb\xe9\x8b`H\xbf\"\xe0\xf1\x18y\x01eE\xec\xe6\x1el\xaaI\xf7\xe5\xba\xef\xcc\xa3\x1aO\x1c\xc3\xbei\xfcM\x05\xb1.e\x0f\xa8\x18\xa9G\n\x88\xe3\xe4\xfbKN\x7f\xb9\x02\xbfM\x10\x1e1\xed\xfdU\xfd\xaf/`\xeeHl\x86\x17S\xfc\xda\xe5\xf6\xb9\x82\x81vg\xf1Z\x84\xfc\n\xcb\x1a\x9f\x04', 0x3a, '', 0x3a, './file0'}, 0xbf) 16.519589115s ago: executing program 1 (id=3566): r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) sendmsg$802154_dgram(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x2, &(0x7f0000000100)={0x0}, 0x7, 0x0, 0x0, 0x4002000}, 0x4004000) 2.469204296s ago: executing program 33 (id=3564): syz_clone(0x4100000, 0x0, 0x0, 0x0, 0x0, 0x0) waitid(0x0, 0x0, 0x0, 0x41000004, &(0x7f0000000040)) 1.36373486s ago: executing program 34 (id=3565): r0 = openat$binfmt_register(0xffffff9c, &(0x7f0000000000), 0x1, 0x0) write$binfmt_register(r0, &(0x7f0000000100)={0x3a, 'syz3', 0x3a, 'M', 0x3a, 0xfff, 0x3a, '^-%-\\xc5})\')&}*\xe9S\xe9\xaf\x9f\xb9\xc9\xce\xa55\x9d$]\xd0\x1e\xf5cM\xfaW\xd3m\x8d\xf4\x9c\xfalN\x9d\x05\x82\xed\'L0%\x89k\xc62+8U\xcb\xa7\x1c\x1e\xf8\xfb\xe9\x8b`H\xbf\"\xe0\xf1\x18y\x01eE\xec\xe6\x1el\xaaI\xf7\xe5\xba\xef\xcc\xa3\x1aO\x1c\xc3\xbei\xfcM\x05\xb1.e\x0f\xa8\x18\xa9G\n\x88\xe3\xe4\xfbKN\x7f\xb9\x02\xbfM\x10\x1e1\xed\xfdU\xfd\xaf/`\xeeHl\x86\x17S\xfc\xda\xe5\xf6\xb9\x82\x81vg\xf1Z\x84\xfc\n\xcb\x1a\x9f\x04', 0x3a, '', 0x3a, './file0'}, 0xbf) 0s ago: executing program 35 (id=3566): r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) sendmsg$802154_dgram(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x2, &(0x7f0000000100)={0x0}, 0x7, 0x0, 0x0, 0x4002000}, 0x4004000) kernel console output (not intermixed with test programs): 0.2484'. [ 132.508001][ T419] usb 3-1: config index 0 descriptor too short (expected 7768, got 18) [ 132.519342][ T419] usb 3-1: config 0 has an invalid interface number: 115 but max is 0 [ 132.535640][ T419] usb 3-1: config 0 has no interface number 0 [ 132.554759][ T419] usb 3-1: too many endpoints for config 0 interface 115 altsetting 116: 101, using maximum allowed: 30 [ 132.570364][ T419] usb 3-1: config 0 interface 115 altsetting 116 has 0 endpoint descriptors, different from the interface descriptor's value: 101 [ 132.586772][ T419] usb 3-1: config 0 interface 115 has no altsetting 0 [ 132.595768][ T420] usb 4-1: config 6 has an invalid interface number: 57 but max is 0 [ 132.604419][ T419] usb 3-1: New USB device found, idVendor=0483, idProduct=3747, bcdDevice=52.4d [ 132.613594][ T420] usb 4-1: config 6 has no interface number 0 [ 132.619761][ T420] usb 4-1: config 6 interface 57 has no altsetting 0 [ 132.626549][ T419] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 132.639666][ T5423] netlink: 'syz.1.2486': attribute type 46 has an invalid length. [ 132.647765][ T5423] netlink: 'syz.1.2486': attribute type 28 has an invalid length. [ 132.656377][ T419] usb 3-1: config 0 descriptor?? [ 132.664706][ T419] ftdi_sio 3-1:0.115: FTDI USB Serial Device converter detected [ 132.672520][ T420] usb 4-1: New USB device found, idVendor=07b4, idProduct=010a, bcdDevice= 0.00 [ 132.682108][ T420] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 132.690616][ T419] ftdi_sio ttyUSB0: unknown device type: 0x524d [ 132.707583][ T420] usb 4-1: Product: syz [ 132.711825][ T420] usb 4-1: Manufacturer: syz [ 132.716516][ T420] usb 4-1: SerialNumber: syz [ 132.889443][ T5433] netlink: 'syz.0.2491': attribute type 15 has an invalid length. [ 132.929742][ T1252] usb 3-1: USB disconnect, device number 71 [ 132.936368][ T1252] ftdi_sio 3-1:0.115: device disconnected [ 132.972256][ T420] usb-storage 4-1:6.57: USB Mass Storage device detected [ 133.036942][ T5441] netlink: 8 bytes leftover after parsing attributes in process `syz.1.2494'. [ 133.069637][ T420] usb 4-1: USB disconnect, device number 73 [ 133.076411][ T5441] netlink: 8 bytes leftover after parsing attributes in process `syz.1.2494'. [ 133.113958][ T5441] A link change request failed with some changes committed already. Interface wg1 may have been left with an inconsistent configuration, please check. [ 133.359503][ T5457] SELinux: truncated policydb string identifier [ 133.365919][ T5457] SELinux: failed to load policy [ 133.481193][ T5465] rust_binder: Write failure EFAULT in pid:1309 [ 133.756667][ T5483] x_tables: duplicate underflow at hook 1 [ 133.995897][ T36] kauditd_printk_skb: 209 callbacks suppressed [ 133.995919][ T36] audit: type=1400 audit(1787155680.979:627): avc: denied { setopt } for pid=5499 comm="syz.0.2524" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 134.038103][ T36] audit: type=1400 audit(1787155680.979:628): avc: denied { read write } for pid=295 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 134.115281][ T36] audit: type=1400 audit(1787155680.979:629): avc: denied { read write open } for pid=295 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 134.177738][ T36] audit: type=1400 audit(1787155680.979:630): avc: denied { ioctl } for pid=295 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 134.260019][ T36] audit: type=1400 audit(1787155681.007:631): avc: denied { read write } for pid=294 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 134.299461][ T36] audit: type=1400 audit(1787155681.007:632): avc: denied { read write } for pid=296 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 134.325168][ T36] audit: type=1400 audit(1787155681.007:633): avc: denied { read write open } for pid=294 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 134.352412][ T5516] netlink: 164 bytes leftover after parsing attributes in process `syz.0.2531'. [ 134.379219][ T36] audit: type=1400 audit(1787155681.007:634): avc: denied { read write open } for pid=296 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 134.404207][ T36] audit: type=1400 audit(1787155681.007:635): avc: denied { ioctl } for pid=294 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 134.430501][ T36] audit: type=1400 audit(1787155681.007:636): avc: denied { ioctl } for pid=296 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 134.574303][ T5532] netlink: 85 bytes leftover after parsing attributes in process `syz.0.2539'. [ 134.907497][ T5557] overlayfs: option "workdir=./bus" is useless in a non-upper mount, ignore [ 134.951613][ T5557] overlayfs: missing 'lowerdir' [ 135.405356][ T5599] netlink: 'syz.2.2573': attribute type 1 has an invalid length. [ 135.703992][ T5622] netlink: 'syz.3.2587': attribute type 32 has an invalid length. [ 135.867509][ T5637] PM: Enabling pm_trace changes system date and time during resume. [ 135.867509][ T5637] PM: Correct system time has to be restored manually after resume. [ 135.945164][ T5641] EXT4-fs: Value of option "test_dummy_encryption" is unrecognized [ 136.105477][ T5654] netlink: 68 bytes leftover after parsing attributes in process `syz.2.2600'. [ 136.250824][ T5661] netlink: 'syz.2.2603': attribute type 1 has an invalid length. [ 136.523738][ T5686] cgroup: Invalid name [ 136.611690][ T5695] usb usb1: usbfs: interface 0 claimed by hub while 'syz.0.2620' sets config #1 [ 136.820096][ T5705] netlink: 'syz.1.2624': attribute type 19 has an invalid length. [ 136.828013][ T5705] netlink: 5 bytes leftover after parsing attributes in process `syz.1.2624'. [ 137.449456][ T5752] x_tables: arp_tables: CLASSIFY target: used from hooks INPUT, but only usable from FORWARD/OUTPUT [ 137.999337][ T5800] rust_binder: Write failure EFAULT in pid:1404 [ 138.094626][ T5808] IPv6: NLM_F_CREATE should be specified when creating new route [ 138.194270][ T5814] rust_binder: Write failure EFAULT in pid:1408 [ 138.621337][ T331] usb 2-1: new high-speed USB device number 68 using dummy_hcd [ 138.686538][ T5862] tc_dump_action: action bad kind [ 138.726174][ T5866] netlink: 4 bytes leftover after parsing attributes in process `syz.3.2703'. [ 138.774331][ T5870] netlink: 'syz.3.2705': attribute type 63 has an invalid length. [ 138.782399][ T5870] netlink: 5 bytes leftover after parsing attributes in process `syz.3.2705'. [ 138.791298][ T5870] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 138.822998][ T331] usb 2-1: config 17 interface 0 altsetting 0 has an endpoint descriptor with address 0xFF, changing to 0x8F [ 138.845153][ T331] usb 2-1: config 17 interface 0 altsetting 0 endpoint 0x8F has an invalid bInterval 0, changing to 7 [ 138.863086][ T5874] raw_sendmsg: syz.3.2707 forgot to set AF_INET. Fix it! [ 138.869846][ T331] usb 2-1: config 17 interface 0 altsetting 0 endpoint 0x8F has invalid maxpacket 59391, setting to 1024 [ 138.884117][ T331] usb 2-1: New USB device found, idVendor=0458, idProduct=5003, bcdDevice= 0.00 [ 138.893974][ T331] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 138.902114][ T447] usb 3-1: new high-speed USB device number 72 using dummy_hcd [ 138.915713][ T5830] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 139.082816][ T447] usb 3-1: New USB device found, idVendor=9710, idProduct=7730, bcdDevice=96.33 [ 139.100957][ T447] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 139.123169][ T447] usb 3-1: config 0 descriptor?? [ 139.133480][ T5892] netlink: 'syz.0.2716': attribute type 13 has an invalid length. [ 139.218021][ T5898] x_tables: unsorted underflow at hook 1 [ 139.341132][ T36] kauditd_printk_skb: 865 callbacks suppressed [ 139.341153][ T36] audit: type=1400 audit(1787155685.989:1502): avc: denied { read write } for pid=294 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 139.374987][ T331] aiptek 2-1:17.0: Aiptek using 400 ms programming speed [ 139.375003][ T36] audit: type=1400 audit(1787155685.989:1503): avc: denied { read write open } for pid=294 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 139.410901][ T331] input: Aiptek as /devices/platform/dummy_hcd.1/usb2/2-1/2-1:17.0/input/input22 [ 139.452781][ T331] usb 2-1: USB disconnect, device number 68 [ 139.452805][ C1] aiptek 2-1:17.0: aiptek_irq - usb_submit_urb failed with result -19 [ 139.459880][ T36] audit: type=1400 audit(1787155685.989:1504): avc: denied { ioctl } for pid=294 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 139.517658][ T36] audit: type=1400 audit(1787155686.064:1505): avc: denied { read } for pid=5907 comm="syz.0.2724" dev="nsfs" ino=4026532575 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 139.544997][ T36] audit: type=1400 audit(1787155686.064:1506): avc: denied { read open } for pid=5907 comm="syz.0.2724" path="cgroup:[4026532575]" dev="nsfs" ino=4026532575 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 139.615966][ T36] audit: type=1400 audit(1787155686.064:1507): avc: denied { ioctl } for pid=5907 comm="syz.0.2724" path="cgroup:[4026532575]" dev="nsfs" ino=4026532575 ioctlcmd=0x940a scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 139.645790][ T36] audit: type=1400 audit(1787155686.083:1508): avc: denied { ioctl } for pid=5856 comm="syz.2.2699" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 139.671595][ T5916] netlink: 12 bytes leftover after parsing attributes in process `syz.3.2727'. [ 139.681948][ T447] usb 3-1: Cannot set MAC address [ 139.687093][ T447] MOSCHIP usb-ethernet driver 3-1:0.0: probe with driver MOSCHIP usb-ethernet driver failed with error -71 [ 139.733313][ T447] usb 3-1: USB disconnect, device number 72 [ 139.741695][ T36] audit: type=1400 audit(1787155686.083:1509): avc: denied { ioctl } for pid=5856 comm="syz.2.2699" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 139.782355][ T36] audit: type=1400 audit(1787155686.083:1510): avc: denied { read write } for pid=296 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 139.809408][ T36] audit: type=1400 audit(1787155686.083:1511): avc: denied { read write open } for pid=296 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 139.990285][ T5932] netlink: 'syz.1.2736': attribute type 28 has an invalid length. [ 140.333552][ T5957] EXT4-fs: dax option not supported [ 140.486696][ T5968] netlink: 232 bytes leftover after parsing attributes in process `syz.1.2754'. [ 140.609461][ T5981] netlink: 4 bytes leftover after parsing attributes in process `syz.0.2760'. [ 141.041372][ T6017] netlink: 'syz.1.2778': attribute type 12 has an invalid length. [ 141.296899][ T6035] netlink: 16 bytes leftover after parsing attributes in process `syz.1.2787'. [ 142.522685][ T6132] x_tables: arp_tables: NFLOG.0 target: invalid size 80 (kernel) != (user) 0 [ 143.187430][ T6188] netlink: 132 bytes leftover after parsing attributes in process `syz.1.2865'. [ 143.368368][ T6205] netlink: 68 bytes leftover after parsing attributes in process `syz.2.2872'. [ 143.674058][ T6232] netlink: 'syz.1.2886': attribute type 27 has an invalid length. [ 144.030370][ T6264] 9pnet_fd: Insufficient options for proto=fd [ 144.330883][ T6291] +$<¶: renamed from bridge0 (while UP) [ 144.719920][ T36] kauditd_printk_skb: 826 callbacks suppressed [ 144.719940][ T36] audit: type=1400 audit(1787155691.036:2338): avc: denied { read write } for pid=294 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 144.777300][ T36] audit: type=1400 audit(1787155691.074:2339): avc: denied { read write open } for pid=294 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 144.871458][ T36] audit: type=1400 audit(1787155691.074:2340): avc: denied { ioctl } for pid=294 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 144.908189][ T6333] /dev/nbd3: Can't lookup blockdev [ 144.931257][ T36] audit: type=1400 audit(1787155691.093:2341): avc: denied { read write } for pid=296 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 144.984585][ T36] audit: type=1400 audit(1787155691.093:2342): avc: denied { read write open } for pid=296 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 145.029202][ T36] audit: type=1400 audit(1787155691.093:2343): avc: denied { ioctl } for pid=296 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 145.055506][ T36] audit: type=1400 audit(1787155691.093:2344): avc: denied { create } for pid=6325 comm="syz.3.2932" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 145.076132][ T36] audit: type=1400 audit(1787155691.121:2345): avc: denied { getopt } for pid=6325 comm="syz.3.2932" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 145.096715][ T36] audit: type=1400 audit(1787155691.139:2346): avc: denied { read write } for pid=295 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 145.122104][ T36] audit: type=1400 audit(1787155691.139:2347): avc: denied { read write open } for pid=295 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 145.227292][ T6346] netlink: 'syz.2.2942': attribute type 58 has an invalid length. [ 145.332312][ T6351] rust_binder: 1489: no such ref 3 [ 145.346953][ T331] usb 4-1: new high-speed USB device number 74 using dummy_hcd [ 145.354678][ T6351] rust_binder: 1489: no such ref 1 [ 145.365419][ T6351] rust_binder: Write failure EFAULT in pid:1489 [ 145.528146][ T331] usb 4-1: Using ep0 maxpacket: 32 [ 145.581376][ T331] usb 4-1: unable to get BOS descriptor or descriptor too short [ 145.594152][ T331] usb 4-1: config 128 has an invalid interface number: 127 but max is 3 [ 145.609659][ T331] usb 4-1: config 128 has an invalid descriptor of length 0, skipping remainder of the config [ 145.630030][ T331] usb 4-1: config 128 has 1 interface, different from the descriptor's value: 4 [ 145.650586][ T331] usb 4-1: config 128 has no interface number 0 [ 145.656932][ T331] usb 4-1: config 128 interface 127 altsetting 14 endpoint 0x5 has an invalid bInterval 0, changing to 7 [ 145.668261][ T331] usb 4-1: config 128 interface 127 altsetting 14 endpoint 0x5 has invalid wMaxPacketSize 0 [ 145.678407][ T331] usb 4-1: config 128 interface 127 has no altsetting 0 [ 145.691031][ T331] usb 4-1: language id specifier not provided by device, defaulting to English [ 145.700165][ T10] usb 3-1: new high-speed USB device number 73 using dummy_hcd [ 145.743578][ T331] usb 4-1: New USB device found, idVendor=0582, idProduct=295c, bcdDevice=d4.55 [ 145.761566][ T331] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 145.785420][ T331] usb 4-1: can't set config #128, error -71 [ 145.793119][ T331] usb 4-1: USB disconnect, device number 74 [ 145.847924][ T420] usb 2-1: new high-speed USB device number 69 using dummy_hcd [ 145.869219][ T10] usb 3-1: Using ep0 maxpacket: 16 [ 145.881906][ T10] usb 3-1: New USB device found, idVendor=05d1, idProduct=2001, bcdDevice=29.00 [ 145.891243][ T10] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 145.899262][ T10] usb 3-1: Product: syz [ 145.904734][ T10] usb 3-1: Manufacturer: syz [ 145.909377][ T10] usb 3-1: SerialNumber: syz [ 145.916890][ T10] usb 3-1: config 0 descriptor?? [ 145.930374][ T10] ftdi_sio 3-1:0.0: FTDI USB Serial Device converter detected [ 145.947294][ T10] usb 3-1: Detected FT4233HP [ 146.011732][ T420] usb 2-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 146.022361][ T420] usb 2-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 146.042451][ T420] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 146.051702][ T420] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 146.059742][ T420] usb 2-1: Product: syz [ 146.064055][ T420] usb 2-1: Manufacturer: syz [ 146.068706][ T420] usb 2-1: SerialNumber: syz [ 146.080519][ T420] cdc_ncm 2-1:1.0: NCM or ECM functional descriptors missing [ 146.088204][ T420] cdc_ncm 2-1:1.0: bind() failure [ 146.327634][ T419] usb 1-1: new high-speed USB device number 72 using dummy_hcd [ 146.367637][ T10] ftdi_sio ttyUSB0: Unable to write latency timer: -71 [ 146.384079][ T10] usb 3-1: FTDI USB Serial Device converter now attached to ttyUSB0 [ 146.399496][ T10] usb 3-1: USB disconnect, device number 73 [ 146.407697][ T6388] netlink: 'syz.3.2962': attribute type 6 has an invalid length. [ 146.415159][ T10] ftdi_sio ttyUSB0: FTDI USB Serial Device converter now disconnected from ttyUSB0 [ 146.428068][ T10] ftdi_sio 3-1:0.0: device disconnected [ 146.498097][ T419] usb 1-1: Using ep0 maxpacket: 16 [ 146.514829][ T419] usb 1-1: config 0 has 1 interface, different from the descriptor's value: 8 [ 146.536831][ T419] usb 1-1: New USB device found, idVendor=05d1, idProduct=2001, bcdDevice= 6.00 [ 146.551027][ T419] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 146.571021][ T419] usb 1-1: Product: syz [ 146.576208][ T419] usb 1-1: Manufacturer: syz [ 146.580947][ T419] usb 1-1: SerialNumber: syz [ 146.590553][ T419] usb 1-1: config 0 descriptor?? [ 146.605464][ T419] ftdi_sio 1-1:0.0: FTDI USB Serial Device converter detected [ 146.615400][ T6394] netlink: 'syz.3.2965': attribute type 1 has an invalid length. [ 146.619068][ T419] usb 1-1: Detected FT232R [ 146.947098][ T6412] netlink: 168 bytes leftover after parsing attributes in process `syz.3.2974'. [ 147.045212][ T419] ftdi_sio ttyUSB0: Unable to write latency timer: -71 [ 147.057088][ T419] ftdi_sio 1-1:0.0: GPIO initialisation failed: -71 [ 147.071783][ T419] usb 1-1: FTDI USB Serial Device converter now attached to ttyUSB0 [ 147.084052][ T419] usb 1-1: USB disconnect, device number 72 [ 147.106196][ T419] ftdi_sio ttyUSB0: FTDI USB Serial Device converter now disconnected from ttyUSB0 [ 147.128899][ T419] ftdi_sio 1-1:0.0: device disconnected [ 147.350800][ T10] usb 3-1: new high-speed USB device number 74 using dummy_hcd [ 147.513136][ T10] usb 3-1: config 0 has an invalid interface number: 64 but max is 0 [ 147.521350][ T10] usb 3-1: config 0 has an invalid descriptor of length 48, skipping remainder of the config [ 147.531523][ T10] usb 3-1: config 0 has no interface number 0 [ 147.541590][ T10] usb 3-1: New USB device found, idVendor=046d, idProduct=0823, bcdDevice=39.48 [ 147.550999][ T10] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 147.559031][ T10] usb 3-1: Product: syz [ 147.563240][ T10] usb 3-1: Manufacturer: syz [ 147.567895][ T10] usb 3-1: SerialNumber: syz [ 147.574227][ T10] usb 3-1: config 0 descriptor?? [ 147.664863][ T6448] netlink: 200 bytes leftover after parsing attributes in process `syz.3.2991'. [ 147.674063][ T6448] tc_dump_action: action bad kind [ 147.751803][ T6456] 8021q: VLANs not supported on lo [ 147.913160][ T6472] netlink: 'syz.3.3004': attribute type 5 has an invalid length. [ 147.916783][ T6473] overlayfs: missing 'lowerdir' [ 148.007316][ T6480] netlink: 36 bytes leftover after parsing attributes in process `syz.3.3007'. [ 148.043630][ T10] usb 3-1: Found UVC 0.00 device syz (046d:0823) [ 148.050061][ T10] usb 3-1: No valid video chain found. [ 148.081265][ T10] usb 3-1: USB disconnect, device number 74 [ 148.205092][ T6492] netlink: 'syz.0.3013': attribute type 3 has an invalid length. [ 148.212995][ T6492] netlink: 8 bytes leftover after parsing attributes in process `syz.0.3013'. [ 148.366497][ T6509] rust_binder: Write failure EFAULT in pid:1304 [ 148.403291][ T6513] netlink: 'syz.3.3023': attribute type 16 has an invalid length. [ 148.779456][ T331] usb 2-1: USB disconnect, device number 69 [ 148.902024][ T420] usb 3-1: new high-speed USB device number 75 using dummy_hcd [ 148.949615][ T10] usb 1-1: new high-speed USB device number 73 using dummy_hcd [ 149.090531][ T420] usb 3-1: config 220 has an invalid interface number: 76 but max is 2 [ 149.108229][ T420] usb 3-1: config 220 has an invalid descriptor of length 0, skipping remainder of the config [ 149.130996][ T420] usb 3-1: config 220 has no interface number 2 [ 149.137324][ T420] usb 3-1: config 220 interface 1 altsetting 5 has 0 endpoint descriptors, different from the interface descriptor's value: 12 [ 149.143038][ T10] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 149.162765][ T420] usb 3-1: config 220 interface 0 has no altsetting 0 [ 149.169604][ T420] usb 3-1: config 220 interface 76 has no altsetting 0 [ 149.176950][ T420] usb 3-1: config 220 interface 1 has no altsetting 0 [ 149.195584][ T6565] random: crng reseeded on system resumption [ 149.206214][ T10] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 149.207680][ T420] usb 3-1: New USB device found, idVendor=8086, idProduct=0b07, bcdDevice=6c.b9 [ 149.215996][ T10] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 149.257234][ T10] usb 1-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 149.272227][ T420] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 149.278685][ T10] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 149.299502][ T420] usb 3-1: Product: syz [ 149.310213][ T10] usb 1-1: config 0 descriptor?? [ 149.314840][ T420] usb 3-1: Manufacturer: syz [ 149.319825][ T420] usb 3-1: SerialNumber: syz [ 149.340718][ T10] hub 1-1:0.0: USB hub found [ 149.589206][ T10] hub 1-1:0.0: 9 ports detected [ 149.591766][ T420] usb 3-1: selecting invalid altsetting 0 [ 149.599887][ T10] hub 1-1:0.0: insufficient power available to use all downstream ports [ 149.619190][ T420] usb 3-1: selecting invalid altsetting 0 [ 149.632843][ T420] usb 3-1: Found UVC 7.01 device syz (8086:0b07) [ 149.639327][ T420] usb 3-1: No valid video chain found. [ 149.655727][ T420] usb 3-1: USB disconnect, device number 75 [ 149.809012][ T10] hub 1-1:0.0: hub_hub_status failed (err = -71) [ 149.820808][ T10] hub 1-1:0.0: config failed, can't get hub status (err -71) [ 149.856153][ T10] usb 1-1: USB disconnect, device number 73 [ 150.086197][ T36] kauditd_printk_skb: 774 callbacks suppressed [ 150.086216][ T36] audit: type=1400 audit(1787155696.074:3122): avc: denied { create } for pid=6601 comm="syz.3.3067" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 150.132698][ T36] audit: type=1400 audit(1787155696.093:3123): avc: denied { read write } for pid=290 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 150.169075][ T36] audit: type=1400 audit(1787155696.093:3124): avc: denied { read write open } for pid=290 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 150.233363][ T36] audit: type=1400 audit(1787155696.093:3125): avc: denied { ioctl } for pid=290 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 150.282550][ T36] audit: type=1400 audit(1787155696.103:3126): avc: denied { write } for pid=6601 comm="syz.3.3067" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 150.313960][ T36] audit: type=1400 audit(1787155696.103:3127): avc: denied { nlmsg_write } for pid=6601 comm="syz.3.3067" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 150.361816][ T36] audit: type=1400 audit(1787155696.112:3128): avc: denied { read write } for pid=294 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 150.387615][ T36] audit: type=1400 audit(1787155696.112:3129): avc: denied { read write open } for pid=294 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 150.413909][ T36] audit: type=1400 audit(1787155696.112:3130): avc: denied { ioctl } for pid=294 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 150.446972][ T36] audit: type=1400 audit(1787155696.149:3131): avc: denied { read write } for pid=295 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 150.854879][ T6650] usb usb8: usbfs: process 6650 (syz.2.3091) did not claim interface 0 before use [ 151.182167][ T6680] netlink: 'syz.3.3106': attribute type 12 has an invalid length. [ 151.451846][ T6700] cgroup: noprefix used incorrectly [ 151.787515][ T6733] block device autoloading is deprecated and will be removed. [ 152.088284][ T6757] netlink: 'syz.1.3143': attribute type 2 has an invalid length. [ 152.681824][ T6796] syz.3.3161 (6796): /proc/6792/oom_adj is deprecated, please use /proc/6792/oom_score_adj instead. [ 152.784495][ T6805] netlink: 9 bytes leftover after parsing attributes in process `syz.1.3165'. [ 152.821387][ T6805] gretap0: entered promiscuous mode [ 153.139164][ T6829] netlink: 8 bytes leftover after parsing attributes in process `syz.0.3178'. [ 153.395257][ T6847] netlink: 12 bytes leftover after parsing attributes in process `syz.2.3188'. [ 153.631430][ T6862] netlink: 'syz.3.3195': attribute type 8 has an invalid length. [ 153.997117][ T6884] Unsupported ieee802154 address type: 0 [ 155.159668][ T6967] bridge0: port 3(veth0_to_bridge) entered blocking state [ 155.174777][ T6967] bridge0: port 3(veth0_to_bridge) entered disabled state [ 155.193653][ T6967] veth0_to_bridge: entered allmulticast mode [ 155.217588][ T6967] veth0_to_bridge: entered promiscuous mode [ 155.223638][ T6967] bridge0: adding interface veth0_to_bridge with same address as a received packet (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 155.293881][ T6967] bridge0: port 3(veth0_to_bridge) entered blocking state [ 155.301122][ T6967] bridge0: port 3(veth0_to_bridge) entered forwarding state [ 155.344436][ T6975] netlink: 8 bytes leftover after parsing attributes in process `syz.0.3251'. [ 155.422529][ T36] kauditd_printk_skb: 735 callbacks suppressed [ 155.422548][ T36] audit: type=1400 audit(1787155701.084:3867): avc: denied { read write } for pid=296 comm="syz-executor" name="loop0" dev="devtmpfs" ino=1299 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 155.481747][ T36] audit: type=1400 audit(1787155701.113:3868): avc: denied { create } for pid=6978 comm="syz.3.3253" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 155.542786][ T36] audit: type=1400 audit(1787155701.113:3869): avc: denied { write } for pid=6978 comm="syz.3.3253" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 155.585113][ T36] audit: type=1400 audit(1787155701.122:3870): avc: denied { read write } for pid=290 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 155.629251][ T36] audit: type=1400 audit(1787155701.122:3871): avc: denied { read write open } for pid=290 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 155.654211][ T36] audit: type=1400 audit(1787155701.122:3873): avc: denied { ioctl } for pid=290 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 155.742398][ T36] audit: type=1400 audit(1787155701.122:3872): avc: denied { read write open } for pid=296 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1299 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 155.771243][ T420] usb 1-1: new high-speed USB device number 74 using dummy_hcd [ 155.795483][ T36] audit: type=1400 audit(1787155701.122:3874): avc: denied { ioctl } for pid=296 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1299 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 155.852463][ T6997] netlink: 76 bytes leftover after parsing attributes in process `syz.2.3261'. [ 155.876563][ T36] audit: type=1400 audit(1787155701.131:3875): avc: denied { read write } for pid=294 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 155.920389][ T36] audit: type=1400 audit(1787155701.131:3876): avc: denied { read write open } for pid=294 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 155.941852][ T420] usb 1-1: Using ep0 maxpacket: 8 [ 155.955068][ T420] usb 1-1: config 0 has an invalid interface number: 31 but max is 0 [ 155.965281][ T420] usb 1-1: config 0 has no interface number 0 [ 155.986576][ T420] usb 1-1: New USB device found, idVendor=046d, idProduct=08c3, bcdDevice=6b.16 [ 156.008308][ T420] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 156.029946][ T420] usb 1-1: Product: syz [ 156.034195][ T420] usb 1-1: Manufacturer: syz [ 156.058917][ T420] usb 1-1: SerialNumber: syz [ 156.066992][ T420] usb 1-1: config 0 descriptor?? [ 156.123918][ T7009] netlink: 4432 bytes leftover after parsing attributes in process `syz.3.3269'. [ 156.320712][ T420] usb 1-1: Found UVC 0.04 device syz (046d:08c3) [ 156.330484][ T420] usb 1-1: Failed to initialize entity for entity 6 [ 156.342648][ T420] usb 1-1: Failed to register entities (-22). [ 156.507354][ T7034] 8021q: VLANs not supported on ip_vti0 [ 156.563379][ T420] usb 1-1: USB disconnect, device number 74 [ 156.845178][ T7057] netlink: 'syz.1.3292': attribute type 1 has an invalid length. [ 157.025874][ T7069] netlink: 12 bytes leftover after parsing attributes in process `syz.3.3298'. [ 157.045870][ T7069] +$<¶: port 1(bridge_slave_0) entered disabled state [ 157.067487][ T7069] bridge_slave_0 (unregistering): left allmulticast mode [ 157.082023][ T7069] bridge_slave_0 (unregistering): left promiscuous mode [ 157.090291][ T7069] +$<¶: port 1(bridge_slave_0) entered disabled state [ 157.361448][ T7091] netlink: 'syz.2.3309': attribute type 4 has an invalid length. [ 157.369236][ T7091] netlink: 3657 bytes leftover after parsing attributes in process `syz.2.3309'. [ 157.391277][ T420] usb 2-1: new high-speed USB device number 70 using dummy_hcd [ 157.556034][ T420] usb 2-1: New USB device found, idVendor=05dc, idProduct=0001, bcdDevice= 0.01 [ 157.583107][ T420] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 157.606082][ T420] usb 2-1: config 0 descriptor?? [ 157.622666][ T420] ums-jumpshot 2-1:0.0: USB Mass Storage device detected [ 157.662301][ T420] ums-jumpshot 2-1:0.0: Quirks match for vid 05dc pid 0001: 2 [ 157.791624][ T7120] netlink: 'syz.0.3322': attribute type 28 has an invalid length. [ 157.873620][ T420] usb 2-1: USB disconnect, device number 70 [ 158.410459][ T7163] netlink: 12 bytes leftover after parsing attributes in process `syz.2.3343'. [ 159.257525][ T7194] SELinux: policydb table sizes (0,0) do not match mine (8,7) [ 159.299279][ T7194] SELinux: failed to load policy [ 159.428153][ T7197] x_tables: duplicate entry at hook 1 [ 160.138264][ T7228] netlink: 25 bytes leftover after parsing attributes in process `syz.2.3376'. [ 160.770061][ T36] kauditd_printk_skb: 626 callbacks suppressed [ 160.770085][ T36] audit: type=1400 audit(1787155706.094:4473): avc: denied { read write open } for pid=296 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1299 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 160.906487][ T36] audit: type=1400 audit(1787155706.094:4474): avc: denied { ioctl } for pid=296 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1299 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 161.047607][ T36] audit: type=1400 audit(1787155706.151:4475): avc: denied { create } for pid=7250 comm="syz.1.3388" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 161.169112][ T36] audit: type=1400 audit(1787155706.169:4476): avc: denied { unlink } for pid=290 comm="syz-executor" name="file0" dev="tmpfs" ino=4592 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 161.303032][ T36] audit: type=1400 audit(1787155706.169:4477): avc: denied { read write } for pid=290 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 161.395347][ T7272] netlink: 252 bytes leftover after parsing attributes in process `syz.2.3397'. [ 161.404991][ T7271] rust_binder: 1832: no such ref 0 [ 161.430898][ T36] audit: type=1400 audit(1787155706.169:4478): avc: denied { read write open } for pid=290 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 161.455893][ T7271] rust_binder: BC_CLEAR_DEATH_NOTIFICATION invalid ref 1 [ 161.484494][ T7271] rust_binder: BC_CLEAR_DEATH_NOTIFICATION invalid ref 1 [ 161.491593][ T7271] rust_binder: BC_CLEAR_DEATH_NOTIFICATION invalid ref 0 [ 161.569557][ T7271] rust_binder: 1832: no such ref 0 [ 161.591726][ T36] audit: type=1400 audit(1787155706.169:4479): avc: denied { ioctl } for pid=290 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 161.697364][ T36] audit: type=1400 audit(1787155706.216:4480): avc: denied { read } for pid=7253 comm="syz.0.3390" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 161.818586][ T36] audit: type=1400 audit(1787155706.216:4481): avc: denied { read open } for pid=7253 comm="syz.0.3390" path="/dev/kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 161.963834][ T36] audit: type=1400 audit(1787155706.263:4482): avc: denied { ioctl } for pid=7253 comm="syz.0.3390" path="/dev/kvm" dev="devtmpfs" ino=13 ioctlcmd=0xae03 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 162.136021][ T7290] netlink: 1072 bytes leftover after parsing attributes in process `syz.3.3409'. [ 162.179851][ T7290] netlink: 280 bytes leftover after parsing attributes in process `syz.3.3409'. [ 162.361125][ T7298] netlink: 'syz.3.3412': attribute type 1 has an invalid length. [ 164.767719][ T7387] netlink: 'syz.0.3455': attribute type 21 has an invalid length. [ 165.333990][ T7408] netlink: 4 bytes leftover after parsing attributes in process `syz.3.3463'. [ 166.182281][ T36] kauditd_printk_skb: 386 callbacks suppressed [ 166.182300][ T36] audit: type=1400 audit(1787155711.170:4845): avc: denied { read write } for pid=294 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 166.312583][ T36] audit: type=1400 audit(1787155711.236:4846): avc: denied { read write open } for pid=294 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 166.389026][ T36] audit: type=1400 audit(1787155711.236:4847): avc: denied { ioctl } for pid=294 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 166.517134][ T36] audit: type=1400 audit(1787155711.255:4848): avc: denied { read write } for pid=290 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 166.589709][ T36] audit: type=1400 audit(1787155711.255:4849): avc: denied { read write open } for pid=290 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 166.626714][ T36] audit: type=1400 audit(1787155711.255:4850): avc: denied { ioctl } for pid=290 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 166.655743][ T7453] fuse: Bad value for 'fd' [ 166.717630][ T36] audit: type=1400 audit(1787155711.273:4851): avc: denied { read } for pid=7441 comm="syz.2.3482" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 166.814465][ T36] audit: type=1400 audit(1787155711.273:4852): avc: denied { read open } for pid=7441 comm="syz.2.3482" path="/dev/kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 166.900606][ T36] audit: type=1400 audit(1787155711.283:4853): avc: denied { ioctl } for pid=7441 comm="syz.2.3482" path="/dev/kvm" dev="devtmpfs" ino=13 ioctlcmd=0xae03 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 167.046488][ T36] audit: type=1400 audit(1787155711.320:4854): avc: denied { create } for pid=7443 comm="syz.0.3483" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 168.945823][ T7536] netlink: 'syz.2.3526': attribute type 10 has an invalid length. [ 168.953695][ T7536] netlink: 40 bytes leftover after parsing attributes in process `syz.2.3526'. [ 169.039464][ T7536] veth1: entered promiscuous mode [ 169.266178][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 169.278290][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 169.290499][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 169.302537][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 169.314620][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 169.326648][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 169.338833][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 169.350848][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 169.362913][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 169.374927][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 174.605004][ C1] net_ratelimit: 90505 callbacks suppressed [ 174.605029][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 174.623537][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 174.635564][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 174.647663][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 174.659687][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 174.671766][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 174.683836][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 174.695913][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 174.707951][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 174.720030][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 175.689337][ C1] sched: DL replenish lagged too much [ 179.945010][ C1] net_ratelimit: 96542 callbacks suppressed [ 179.945033][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 179.963039][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 179.975056][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 179.987185][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 179.999214][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 180.011284][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 180.023307][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 180.035388][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 180.047418][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 180.059491][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 182.622653][ T36] kauditd_printk_skb: 209 callbacks suppressed [ 182.622675][ T36] audit: type=1400 audit(1787155726.566:5064): avc: denied { read write } for pid=294 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 183.005896][ T36] audit: type=1400 audit(1787155726.566:5065): avc: denied { read write open } for pid=294 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 184.135421][ T36] audit: type=1400 audit(1787155726.566:5066): avc: denied { ioctl } for pid=294 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 185.285070][ C1] net_ratelimit: 77454 callbacks suppressed [ 185.285094][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 185.303159][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 185.315213][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 185.327299][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 185.339329][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 185.351429][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 185.363461][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 185.375545][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 185.387584][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 185.399669][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 185.595416][ T36] audit: type=1400 audit(1787155727.120:5067): avc: denied { read write } for pid=295 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 186.468617][ T36] audit: type=1400 audit(1787155727.120:5068): avc: denied { read write open } for pid=295 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 188.557333][ T36] audit: type=1400 audit(1787155727.120:5069): avc: denied { ioctl } for pid=295 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 190.625038][ C1] net_ratelimit: 83170 callbacks suppressed [ 190.625061][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 190.643066][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 190.655092][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 190.667170][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 190.679201][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 190.691267][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 190.703270][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 190.715332][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 190.727355][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 190.739420][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 191.376212][ T36] audit: type=1400 audit(1787155727.786:5070): avc: denied { read write } for pid=290 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 191.522922][ T36] audit: type=1400 audit(1787155727.786:5071): avc: denied { read write open } for pid=290 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 194.603327][ T36] audit: type=1400 audit(1787155727.786:5072): avc: denied { ioctl } for pid=290 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 195.560812][ T36] audit: type=1400 audit(1787155728.508:5073): avc: denied { read write } for pid=296 comm="syz-executor" name="loop0" dev="devtmpfs" ino=1299 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 195.965054][ C1] net_ratelimit: 86509 callbacks suppressed [ 195.965080][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 195.983094][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 195.995192][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 196.007232][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 196.019322][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 196.031352][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 196.043529][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 196.055556][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 196.067627][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 196.079668][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 196.575508][ T36] audit: type=1400 audit(1787155728.508:5074): avc: denied { read write open } for pid=296 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1299 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 197.042608][ T36] audit: type=1400 audit(1787155728.508:5075): avc: denied { ioctl } for pid=296 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1299 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 198.141072][ T36] audit: type=1400 audit(1787155730.478:5076): avc: denied { create } for pid=7556 comm="syz.3.3538" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 198.567117][ T7573] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=7573 comm=syz.0.3544 [ 198.856225][ T36] audit: type=1400 audit(1787155730.516:5077): avc: denied { write } for pid=7556 comm="syz.3.3538" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 199.772762][ T36] audit: type=1400 audit(1787155733.800:5078): avc: denied { read write } for pid=294 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 200.465198][ T36] audit: type=1400 audit(1787155733.800:5079): avc: denied { read write open } for pid=294 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 201.305035][ C1] net_ratelimit: 88871 callbacks suppressed [ 201.305057][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 201.323100][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 201.335155][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 201.347243][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 201.359271][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 201.371417][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 201.383486][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 201.395580][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 201.407651][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 201.419757][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 202.105837][ T36] audit: type=1400 audit(1787155733.800:5080): avc: denied { ioctl } for pid=294 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 205.388138][ T36] audit: type=1400 audit(1787155738.021:5081): avc: denied { read write } for pid=290 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 206.645034][ C1] net_ratelimit: 89735 callbacks suppressed [ 206.645057][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 206.663140][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 206.675219][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 206.687301][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 206.699370][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 206.711407][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 206.723519][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 206.735547][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 206.747662][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 206.759695][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 207.098050][ T36] audit: type=1400 audit(1787155738.021:5082): avc: denied { read write open } for pid=290 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 208.960242][ T36] audit: type=1400 audit(1787155738.021:5083): avc: denied { ioctl } for pid=290 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 211.509024][ T36] audit: type=1400 audit(1787155738.969:5084): avc: denied { read write } for pid=296 comm="syz-executor" name="loop0" dev="devtmpfs" ino=1299 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 211.985005][ C1] net_ratelimit: 87816 callbacks suppressed [ 211.985031][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 212.003036][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 212.015137][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 212.027184][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 212.039271][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 212.051304][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 212.063376][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 212.075409][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 212.087514][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 212.099627][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 212.465888][ T36] audit: type=1400 audit(1787155738.969:5085): avc: denied { read write open } for pid=296 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1299 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 212.551235][ T36] audit: type=1400 audit(1787155738.969:5086): avc: denied { ioctl } for pid=296 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1299 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 213.631856][ T36] audit: type=1400 audit(1787155740.048:5087): avc: denied { read write } for pid=294 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 214.111517][ T36] audit: type=1400 audit(1787155740.048:5088): avc: denied { read write open } for pid=294 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 214.623521][ T7588] netlink: 'syz.1.3550': attribute type 4 has an invalid length. [ 214.642518][ T7588] netlink: 'syz.1.3550': attribute type 2 has an invalid length. [ 214.685620][ T36] audit: type=1400 audit(1787155740.048:5089): avc: denied { ioctl } for pid=294 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 216.315446][ T36] audit: type=1400 audit(1787155741.080:5090): avc: denied { read write } for pid=290 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 217.316426][ T36] audit: type=1400 audit(1787155741.080:5091): avc: denied { read write open } for pid=290 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 217.325109][ C1] net_ratelimit: 86408 callbacks suppressed [ 217.325164][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 217.359369][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 217.371467][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 217.383509][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 217.395602][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 217.407659][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 217.419785][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 217.431829][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 217.443928][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 217.455988][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 219.615736][ T36] audit: type=1400 audit(1787155741.080:5092): avc: denied { ioctl } for pid=290 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 222.665048][ C1] net_ratelimit: 87699 callbacks suppressed [ 222.665073][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 222.683130][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 222.695178][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 222.707385][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 222.719414][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 222.731498][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 222.743528][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 222.755600][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 222.767631][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 222.779705][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 223.183713][ T36] audit: type=1400 audit(1787155741.380:5093): avc: denied { create } for pid=7571 comm="syz.0.3544" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 225.218399][ T36] audit: type=1400 audit(1787155741.540:5094): avc: denied { write } for pid=7571 comm="syz.0.3544" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 225.265785][ T36] audit: type=1400 audit(1787155741.624:5095): avc: denied { read write } for pid=295 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 228.005031][ C1] net_ratelimit: 85478 callbacks suppressed [ 228.005056][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 228.023168][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 228.035388][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 228.047489][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 228.059545][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 228.071651][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 228.083784][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 228.096005][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 228.108096][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 228.120196][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 228.240009][ T36] audit: type=1400 audit(1787155741.624:5096): avc: denied { read write open } for pid=295 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 229.464356][ T36] audit: type=1400 audit(1787155741.624:5097): avc: denied { ioctl } for pid=295 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 232.398827][ T36] audit: type=1400 audit(1787155742.497:5098): avc: denied { append } for pid=7574 comm="syz.3.3545" name="001" dev="devtmpfs" ino=108 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 233.344996][ C1] net_ratelimit: 89379 callbacks suppressed [ 233.345020][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 233.363000][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 233.375126][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 233.387154][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 233.399227][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 233.411313][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 233.423407][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 233.435441][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 233.447539][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 233.459592][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 233.572408][ T36] audit: type=1400 audit(1787155742.497:5099): avc: denied { append } for pid=7574 comm="syz.3.3545" path="/dev/bus/usb/005/001" dev="devtmpfs" ino=108 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 237.577726][ T36] audit: type=1400 audit(1787155742.816:5100): avc: denied { read write } for pid=296 comm="syz-executor" name="loop0" dev="devtmpfs" ino=1299 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 238.685014][ C1] net_ratelimit: 94006 callbacks suppressed [ 238.685056][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 238.703044][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 238.715218][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 238.727249][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 238.739334][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 238.751353][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 238.763431][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 238.775450][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 238.787532][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 238.799562][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 238.912801][ T36] audit: type=1400 audit(1787155742.816:5101): avc: denied { read write open } for pid=296 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1299 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 239.751738][ T36] audit: type=1400 audit(1787155742.816:5102): avc: denied { ioctl } for pid=296 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1299 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 241.963158][ T36] audit: type=1400 audit(1787155743.172:5103): avc: denied { read write } for pid=294 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 243.524502][ T36] audit: type=1400 audit(1787155743.172:5104): avc: denied { read write open } for pid=294 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 244.025006][ C1] net_ratelimit: 90481 callbacks suppressed [ 244.025030][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 244.043055][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 244.055072][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 244.067145][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 244.079180][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 244.091262][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 244.103284][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 244.115368][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 244.127490][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 244.139592][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 244.174773][ T36] audit: type=1400 audit(1787155743.360:5105): avc: denied { ioctl } for pid=294 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 245.764900][ T36] audit: type=1400 audit(1787155749.167:5106): avc: denied { read write } for pid=290 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 247.405173][ T36] audit: type=1400 audit(1787155749.167:5107): avc: denied { read write open } for pid=290 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 249.035158][ T36] audit: type=1400 audit(1787155749.167:5108): avc: denied { ioctl } for pid=290 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 249.365037][ C1] net_ratelimit: 87736 callbacks suppressed [ 249.365061][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 249.383068][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 249.395093][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 249.407166][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 249.419214][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 249.431314][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 249.443345][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 249.455419][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 249.467432][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 249.482267][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 250.026213][ T36] audit: type=1400 audit(1787155750.096:5109): avc: denied { read write } for pid=296 comm="syz-executor" name="loop0" dev="devtmpfs" ino=1299 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 250.665662][ T36] audit: type=1400 audit(1787155750.096:5110): avc: denied { read write open } for pid=296 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1299 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 252.073360][ T36] audit: type=1400 audit(1787155750.096:5111): avc: denied { ioctl } for pid=296 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1299 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 252.883176][ T36] audit: type=1400 audit(1787155751.372:5112): avc: denied { read write } for pid=294 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 253.992648][ T36] audit: type=1400 audit(1787155751.372:5113): avc: denied { read write open } for pid=294 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 254.705032][ C1] net_ratelimit: 88644 callbacks suppressed [ 254.705057][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 254.723137][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 254.735211][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 254.747353][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 254.759399][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 254.771530][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 254.783591][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 254.795691][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 254.807798][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 254.819944][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 255.772308][ T36] audit: type=1400 audit(1787155751.372:5114): avc: denied { ioctl } for pid=294 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 259.384743][ T36] audit: type=1400 audit(1787155756.363:5115): avc: denied { create } for pid=7586 comm="syz.0.3551" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 259.427388][ T36] audit: type=1400 audit(1787155756.363:5116): avc: denied { write } for pid=7586 comm="syz.0.3551" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 260.045037][ C1] net_ratelimit: 92470 callbacks suppressed [ 260.045062][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 260.063097][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 260.075155][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 260.087256][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 260.099293][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 260.111375][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 260.123478][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 260.135569][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 260.147714][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 260.159807][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 260.558000][ T36] audit: type=1400 audit(1787155756.495:5117): avc: denied { nlmsg_write } for pid=7586 comm="syz.0.3551" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 263.413280][ T36] audit: type=1400 audit(1787155756.823:5118): avc: denied { read write } for pid=290 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 265.385003][ C1] net_ratelimit: 92419 callbacks suppressed [ 265.385028][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 265.403004][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 265.415170][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 265.427193][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 265.439263][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 265.451280][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 265.463398][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 265.475456][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 265.487534][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 265.499609][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 267.059115][ T36] audit: type=1400 audit(1787155756.823:5119): avc: denied { read write open } for pid=290 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 269.299038][ T36] audit: type=1400 audit(1787155757.574:5120): avc: denied { ioctl } for pid=290 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 269.586494][ T36] audit: type=1400 audit(1787155757.620:5121): avc: denied { read write } for pid=296 comm="syz-executor" name="loop0" dev="devtmpfs" ino=1299 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 270.724992][ C1] net_ratelimit: 89153 callbacks suppressed [ 270.725015][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 270.743060][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 270.755121][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 270.767208][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 270.779234][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 270.791317][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 270.803412][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 270.815508][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 270.827534][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 270.839609][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 273.281807][ T36] audit: type=1400 audit(1787155757.620:5122): avc: denied { read write open } for pid=296 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1299 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 273.955827][ T36] audit: type=1400 audit(1787155757.620:5123): avc: denied { ioctl } for pid=296 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1299 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 275.202033][ T36] audit: type=1400 audit(1787155757.705:5124): avc: denied { create } for pid=7589 comm="syz.2.3547" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 275.500304][ T36] audit: type=1400 audit(1787155757.761:5125): avc: denied { write } for pid=7589 comm="syz.2.3547" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 275.756708][ T36] audit: type=1400 audit(1787155759.319:5126): avc: denied { execmem } for pid=7594 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 276.064982][ C1] net_ratelimit: 86901 callbacks suppressed [ 276.065006][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 276.083116][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 276.095203][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 276.107233][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 276.119311][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 276.131341][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 276.143425][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 276.155449][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 276.167646][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 276.179701][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 276.388290][ T36] audit: type=1400 audit(1787155759.900:5127): avc: denied { read write } for pid=294 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 277.344197][ T36] audit: type=1400 audit(1787155759.900:5128): avc: denied { read write open } for pid=294 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 279.239877][ T36] audit: type=1400 audit(1787155759.900:5129): avc: denied { ioctl } for pid=294 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 281.405004][ C1] net_ratelimit: 92817 callbacks suppressed [ 281.405026][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 281.423071][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 281.435107][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 281.447288][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 281.459311][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 281.471383][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 281.483406][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 281.495474][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 281.507517][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 281.519619][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 282.539951][ T36] audit: type=1400 audit(1787155770.540:5130): avc: denied { read write } for pid=290 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 283.006099][ T36] audit: type=1400 audit(1787155770.540:5131): avc: denied { read write open } for pid=290 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 283.570023][ T36] audit: type=1400 audit(1787155770.540:5132): avc: denied { ioctl } for pid=290 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 285.393809][ T36] audit: type=1400 audit(1787155770.990:5133): avc: denied { read write } for pid=296 comm="syz-executor" name="loop0" dev="devtmpfs" ino=1299 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 286.745009][ C1] net_ratelimit: 85383 callbacks suppressed [ 286.745032][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 286.763020][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 286.775116][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 286.787142][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 286.799226][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 286.811255][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 286.823338][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 286.835349][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 286.847441][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 286.859490][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 287.166022][ T7599] bridge0: port 1(bridge_slave_0) entered blocking state [ 287.269503][ T36] audit: type=1400 audit(1787155770.990:5134): avc: denied { read write open } for pid=296 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1299 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 287.695218][ T7599] bridge0: port 1(bridge_slave_0) entered disabled state [ 287.702365][ T7599] bridge_slave_0: entered allmulticast mode [ 288.335334][ T36] audit: type=1400 audit(1787155771.037:5135): avc: denied { read } for pid=7599 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 288.707667][ T7599] bridge_slave_0: entered promiscuous mode [ 289.133035][ T36] audit: type=1400 audit(1787155771.037:5136): avc: denied { read open } for pid=7599 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 290.902651][ T36] audit: type=1400 audit(1787155771.037:5137): avc: denied { mounton } for pid=7599 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 292.085051][ C1] net_ratelimit: 88895 callbacks suppressed [ 292.085074][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 292.103096][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 292.115184][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 292.127285][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 292.139310][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 292.151403][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 292.163435][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 292.175514][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 292.187539][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 292.199654][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 292.375034][ T36] audit: type=1400 audit(1787155771.243:5138): avc: denied { ioctl } for pid=296 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1299 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 296.649404][ T36] audit: type=1400 audit(1787155771.403:5139): avc: denied { sys_module } for pid=7599 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 297.424994][ C1] net_ratelimit: 90137 callbacks suppressed [ 297.425019][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 297.443004][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 297.455188][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 297.467318][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 297.479403][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 297.491470][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 297.503571][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 297.515643][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 297.527741][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 297.539811][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 299.674421][ T36] audit: type=1400 audit(1787155774.367:5140): avc: denied { read write } for pid=294 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 300.964957][ T36] audit: type=1400 audit(1787155774.367:5141): avc: denied { read write open } for pid=294 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 302.489787][ T36] audit: type=1400 audit(1787155774.367:5142): avc: denied { ioctl } for pid=294 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 302.764975][ C1] net_ratelimit: 93186 callbacks suppressed [ 302.764998][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 302.782982][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 302.795203][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 302.807226][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 302.819319][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 302.831332][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 302.843413][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 302.855443][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 302.867521][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 302.879540][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 303.928361][ T36] audit: type=1400 audit(1787155779.743:5143): avc: denied { sys_module } for pid=7599 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 304.579016][ T36] audit: type=1400 audit(1787155779.753:5144): avc: denied { sys_module } for pid=7599 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 305.866863][ T36] audit: type=1400 audit(1787155779.790:5145): avc: denied { sys_module } for pid=7599 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 308.105026][ C1] net_ratelimit: 88027 callbacks suppressed [ 308.105049][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 308.123063][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 308.135082][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 308.147173][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 308.159199][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 308.171263][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 308.183292][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 308.195397][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 308.207420][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 308.222078][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 308.622759][ T36] audit: type=1400 audit(1787155780.719:5146): avc: denied { read } for pid=7602 comm="syz.0.3557" dev="nsfs" ino=4026532584 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 310.007011][ T36] audit: type=1400 audit(1787155780.719:5147): avc: denied { read open } for pid=7602 comm="syz.0.3557" path="net:[4026532584]" dev="nsfs" ino=4026532584 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 313.445028][ C1] net_ratelimit: 86756 callbacks suppressed [ 313.445052][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 313.463087][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 313.475160][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 313.487245][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 313.499272][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 313.511374][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 313.523407][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 313.535554][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 313.547589][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 313.559731][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 313.649156][ T36] audit: type=1400 audit(1787155780.719:5148): avc: denied { create } for pid=7602 comm="syz.0.3557" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 318.784974][ C1] net_ratelimit: 95450 callbacks suppressed [ 318.784997][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 318.802954][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 318.815045][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 318.827125][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 318.839164][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 318.851243][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 318.863274][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 318.875336][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 318.887343][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 318.899367][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 318.913486][ T36] audit: type=1400 audit(1787155780.719:5149): avc: denied { read } for pid=7603 comm="syz.1.3558" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 320.811840][ T36] audit: type=1400 audit(1787155780.719:5150): avc: denied { read open } for pid=7603 comm="syz.1.3558" path="/dev/loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 322.091714][ T36] audit: type=1400 audit(1787155783.149:5151): avc: denied { read write } for pid=296 comm="syz-executor" name="loop0" dev="devtmpfs" ino=1299 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 324.125016][ C1] net_ratelimit: 91535 callbacks suppressed [ 324.125039][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 324.143075][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 324.155143][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 324.167185][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 324.179293][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 324.191312][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 324.203390][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 324.215395][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 324.227430][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 324.239987][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 325.447961][ T36] audit: type=1400 audit(1787155783.149:5152): avc: denied { read write open } for pid=296 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1299 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 329.464994][ C1] net_ratelimit: 93533 callbacks suppressed [ 329.465019][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 329.483019][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 329.495120][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 329.507204][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 329.519275][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 329.531418][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 329.543459][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 329.555562][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 329.567584][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 329.579608][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 334.805042][ C1] net_ratelimit: 94722 callbacks suppressed [ 334.805068][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 334.823096][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 334.835145][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 334.847235][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 334.859405][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 334.871462][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 334.883605][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 334.895716][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 334.907745][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 334.920195][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 335.701099][ T36] audit: type=1400 audit(1787155783.149:5153): avc: denied { ioctl } for pid=296 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1299 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 336.041669][ T36] audit: type=1400 audit(1787155783.937:5154): avc: denied { read write } for pid=290 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 336.085488][ T36] audit: type=1400 audit(1787155783.937:5155): avc: denied { read write open } for pid=290 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 336.692267][ T36] audit: type=1400 audit(1787155783.937:5156): avc: denied { ioctl } for pid=290 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 337.240575][ T36] audit: type=1400 audit(1787155785.964:5157): avc: denied { read } for pid=7608 comm="syz.3.3559" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 337.486827][ T36] audit: type=1400 audit(1787155785.964:5158): avc: denied { read open } for pid=7608 comm="syz.3.3559" path="/dev/kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 338.039096][ T36] audit: type=1400 audit(1787155786.067:5159): avc: denied { ioctl } for pid=7608 comm="syz.3.3559" path="/dev/kvm" dev="devtmpfs" ino=13 ioctlcmd=0xae03 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 338.526545][ T36] audit: type=1400 audit(1787155787.183:5160): avc: denied { read write } for pid=294 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 339.017116][ T36] audit: type=1400 audit(1787155787.183:5161): avc: denied { read write open } for pid=294 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 339.829969][ T36] audit: type=1400 audit(1787155787.183:5162): avc: denied { ioctl } for pid=294 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 340.144977][ C1] net_ratelimit: 88136 callbacks suppressed [ 340.145001][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 340.163064][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 340.175064][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 340.187110][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 340.199237][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 340.211326][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 340.223382][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 340.235642][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 340.247667][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 340.259812][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 343.060574][ T36] kauditd_printk_skb: 56 callbacks suppressed [ 343.060594][ T36] audit: type=1400 audit(1787155877.119:5219): avc: denied { execmem } for pid=7641 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 343.453268][ T36] audit: type=1400 audit(1787155877.307:5220): avc: denied { sys_module } for pid=7640 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 343.642859][ T36] audit: type=1400 audit(1787155877.532:5221): avc: denied { read } for pid=7642 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 344.186431][ T36] audit: type=1400 audit(1787155877.532:5222): avc: denied { read open } for pid=7642 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 344.239111][ T36] audit: type=1400 audit(1787155877.532:5223): avc: denied { mounton } for pid=7642 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 344.292454][ T36] audit: type=1400 audit(1787155877.710:5224): avc: denied { sys_module } for pid=7642 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 345.485003][ C1] net_ratelimit: 91090 callbacks suppressed [ 345.485033][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 345.503080][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 345.516856][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 345.528975][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 345.541049][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 345.553119][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 345.565128][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 345.577351][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 345.589509][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 345.601595][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 346.309369][ T36] audit: type=1400 audit(1787155880.168:5225): avc: denied { read } for pid=7643 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 347.330263][ T36] audit: type=1400 audit(1787155880.272:5226): avc: denied { read open } for pid=7643 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 347.632332][ T36] audit: type=1400 audit(1787155880.272:5227): avc: denied { mounton } for pid=7643 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 348.491010][ T36] audit: type=1400 audit(1787155880.403:5228): avc: denied { sys_module } for pid=7643 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 350.824975][ C1] net_ratelimit: 94658 callbacks suppressed [ 350.824998][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 350.843051][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 350.855067][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 350.867086][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 350.879193][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 350.891265][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 350.903295][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 350.915380][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 350.927459][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 350.939543][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 352.659750][ T36] audit: type=1400 audit(1787155886.070:5229): avc: denied { execmem } for pid=7644 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 356.164988][ C1] net_ratelimit: 90966 callbacks suppressed [ 356.165014][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 356.183145][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 356.195166][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 356.207198][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 356.219318][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 356.231403][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 356.243460][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 356.255579][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 356.267609][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 356.279711][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 361.504966][ C1] net_ratelimit: 94706 callbacks suppressed [ 361.504990][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 361.523023][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 361.535056][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 361.547141][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 361.559167][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 361.571246][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 361.583299][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 361.595327][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 361.607434][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 361.619555][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 366.844991][ C1] net_ratelimit: 88522 callbacks suppressed [ 366.845015][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 366.863135][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 366.875279][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 366.887326][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 366.899444][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 366.911556][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 366.923584][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 366.935679][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 366.947728][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 366.959811][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 370.545403][ T36] audit: type=1400 audit(1787155902.892:5230): avc: denied { sys_module } for pid=7643 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 370.641470][ T36] audit: type=1400 audit(1787155902.901:5231): avc: denied { sys_module } for pid=7643 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 370.918156][ T36] audit: type=1400 audit(1787155902.957:5232): avc: denied { sys_module } for pid=7640 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 372.184967][ C1] net_ratelimit: 86265 callbacks suppressed [ 372.184993][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 372.203087][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 372.215177][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 372.227227][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 372.239330][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 372.251374][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 372.263458][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 372.275465][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 372.287515][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 372.299632][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 373.135286][ T36] audit: type=1400 audit(1787155902.967:5233): avc: denied { sys_module } for pid=7642 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 374.675254][ T36] audit: type=1400 audit(1787155903.051:5234): avc: denied { read } for pid=7645 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 375.609229][ T36] audit: type=1400 audit(1787155903.051:5235): avc: denied { read open } for pid=7645 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 377.525016][ C1] net_ratelimit: 86336 callbacks suppressed [ 377.525041][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 377.534017][ T36] audit: type=1400 audit(1787155903.051:5236): avc: denied { mounton } for pid=7645 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 377.543117][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 377.543183][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 377.543291][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 377.543348][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 377.543419][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 377.543515][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 377.543586][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 377.543641][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 377.543727][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 378.805211][ T37] INFO: task syz-executor:295 blocked for more than 125 seconds. [ 378.813028][ T37] Not tainted syzkaller #0 SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 378.986707][ T37] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 379.040039][ T36] audit: type=1400 audit(1787155903.061:5237): avc: denied { sys_module } for pid=7645 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 379.200431][ T37] task:syz-executor state:D stack:0 pid:295 tgid:295 ppid:1 flags:0x00004006 [ 379.693792][ T37] Call Trace: [ 379.697241][ T37] [ 379.700240][ T37] __schedule+0x134f/0x1ea0 [ 379.704809][ T37] ? __sched_text_start+0x10/0x10 [ 379.709905][ T37] ? __kasan_check_write+0x18/0x20 [ 379.715102][ T37] schedule+0xc5/0x240 [ 379.719204][ T37] schedule_timeout+0xc7/0x3b0 [ 379.724061][ T37] ? __cfi_schedule_timeout+0x10/0x10 [ 379.729477][ T37] ? __cfi__raw_spin_lock_irq+0x10/0x10 [ 379.735084][ T37] ? __smp_call_single_queue+0xd8/0x380 [ 379.740686][ T37] ? generic_exec_single+0x1fd/0x500 [ 379.746038][ T37] wait_for_common+0x369/0x650 [ 379.750854][ T37] ? wait_for_completion+0x40/0x40 [ 379.756026][ T37] ? _raw_spin_lock_irqsave+0xc1/0x160 [ 379.761539][ T37] wait_for_completion+0x1c/0x40 [ 379.766524][ T37] rcu_barrier+0x415/0x540 [ 379.770974][ T37] netdev_run_todo+0x118/0xce0 [ 379.775792][ T37] ? kvfree+0x39/0x50 [ 379.779813][ T37] ? netdev_state_change+0xaa/0x240 [ 379.785090][ T37] ? __cfi_netdev_run_todo+0x10/0x10 [ 379.790411][ T37] rtnl_unlock+0x12/0x20 [ 379.794706][ T37] tun_chr_close+0xc5/0x150 [ 379.799293][ T37] ? __cfi_tun_chr_close+0x10/0x10 [ 379.804444][ T37] __fput+0x1fb/0xa00 [ 379.808482][ T37] ? call_rcu+0x14/0x20 [ 379.812692][ T37] ____fput+0x20/0x30 [ 379.816744][ T37] task_work_run+0x1e5/0x260 [ 379.821378][ T37] ? __cfi_task_work_run+0x10/0x10 [ 379.826525][ T37] ? free_nsproxy+0x223/0x290 [ 379.831276][ T37] do_exit+0x9e3/0x2650 [ 379.835472][ T37] ? hrtimer_try_to_cancel+0x3fe/0x6b0 [ 379.840982][ T37] ? __cfi_do_exit+0x10/0x10 [ 379.845619][ T37] ? do_nanosleep+0x457/0x5b0 [ 379.850385][ T37] ? remove_wait_queue+0x132/0x150 [ 379.855549][ T37] ? __kasan_check_write+0x18/0x20 [ 379.860719][ T37] ? _raw_spin_lock_irq+0x93/0x120 [ 379.865868][ T37] ? __cfi__raw_spin_lock_irq+0x10/0x10 [ 379.871511][ T37] do_group_exit+0x229/0x2f0 [ 379.876139][ T37] ? __kasan_check_write+0x18/0x20 [ 379.881406][ T37] get_signal+0x1398/0x14e0 [ 379.885971][ T37] arch_do_signal_or_restart+0xbc/0x760 [ 379.891581][ T37] ? common_nsleep+0x93/0xb0 [ 379.896232][ T37] ? __cfi_arch_do_signal_or_restart+0x10/0x10 [ 379.902450][ T37] ? __se_sys_clock_nanosleep+0x31e/0x3b0 [ 379.908216][ T37] syscall_exit_to_user_mode+0x57/0xb0 [ 379.913734][ T37] do_syscall_64+0x63/0xf0 [ 379.918210][ T37] ? clear_bhb_loop+0x50/0xa0 [ 379.922946][ T37] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 379.928908][ T37] RIP: 0033:0x7fe5755560d7 [ 379.933383][ T37] RSP: 002b:00007fffbae2c4e0 EFLAGS: 00000202 ORIG_RAX: 00000000000000e6 [ 379.941848][ T37] RAX: 0000000000000000 RBX: 000055557d4de500 RCX: 00007fe5755560d7 [ 379.949874][ T37] RDX: 00007fffbae2c520 RSI: 0000000000000000 RDI: 0000000000000000 [ 379.957895][ T37] RBP: 00007fffbae2c58c R08: 0000000000000000 R09: 0000000000000000 [ 379.965911][ T37] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000001388 [ 379.973908][ T37] R13: 00000000000927c0 R14: 00000000000327c1 R15: 00007fffbae2c5e0 [ 379.981937][ T37] [ 379.985080][ T37] NMI backtrace for cpu 0 [ 379.985105][ T37] CPU: 0 UID: 0 PID: 37 Comm: khungtaskd Not tainted syzkaller #0 fe4377b9fb1dd84776adf13d0641004acb4d0da4 [ 379.985149][ T37] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 379.985163][ T37] Call Trace: [ 379.985171][ T37] [ 379.985180][ T37] __dump_stack+0x21/0x30 [ 379.985211][ T37] dump_stack_lvl+0x140/0x1c0 [ 379.985239][ T37] ? __cfi_dump_stack_lvl+0x10/0x10 [ 379.985268][ T37] dump_stack+0x19/0x20 [ 379.985294][ T37] nmi_cpu_backtrace+0x2ba/0x2d0 [ 379.985324][ T37] ? rcu_read_unlock_special+0xb7/0x420 [ 379.985350][ T37] ? __cfi_nmi_cpu_backtrace+0x10/0x10 [ 379.985378][ T37] ? sched_show_task+0x371/0x530 [ 379.985405][ T37] ? __rcu_read_unlock+0xc0/0xc0 [ 379.985429][ T37] ? __cfi_nmi_raise_cpu_backtrace+0x10/0x10 [ 379.985455][ T37] ? __cfi_nmi_raise_cpu_backtrace+0x10/0x10 [ 379.985481][ T37] nmi_trigger_cpumask_backtrace+0x142/0x2c0 [ 379.985513][ T37] arch_trigger_cpumask_backtrace+0x14/0x20 [ 379.985540][ T37] watchdog+0xdad/0xf00 [ 379.985570][ T37] ? __kasan_check_write+0x18/0x20 [ 379.985599][ T37] ? __cfi_watchdog+0x10/0x10 [ 379.985629][ T37] ? __kasan_check_read+0x15/0x20 [ 379.985654][ T37] ? __kthread_parkme+0x137/0x180 [ 379.985686][ T37] ? schedule+0xc5/0x240 [ 379.985705][ T37] kthread+0x2c9/0x370 [ 379.985725][ T37] ? __cfi_watchdog+0x10/0x10 [ 379.985757][ T37] ? __cfi_kthread+0x10/0x10 [ 379.985777][ T37] ret_from_fork+0x67/0xa0 [ 379.985805][ T37] ? __cfi_kthread+0x10/0x10 [ 379.985825][ T37] ret_from_fork_asm+0x1a/0x30 [ 379.985859][ T37] [ 379.985868][ T37] Sending NMI from CPU 0 to CPUs 1: [ 380.197475][ C1] NMI backtrace for cpu 1 [ 380.197497][ C1] CPU: 1 UID: 0 PID: 33 Comm: rcuop/1 Not tainted syzkaller #0 fe4377b9fb1dd84776adf13d0641004acb4d0da4 [ 380.197519][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 380.197530][ C1] RIP: 0010:__sanitizer_cov_trace_switch+0x82/0x130 [ 380.197562][ C1] Code: 00 00 b9 01 00 00 00 48 85 c0 0f 84 b7 00 00 00 55 48 89 e5 41 57 41 56 41 54 53 48 8b 55 08 65 4c 8b 05 31 48 7d 7e 45 31 c9 08 49 ff c1 4c 39 c8 74 77 4e 8b 54 ce 10 65 44 8b 1d 1f 48 7d [ 380.197577][ C1] RSP: 0018:ffffc90000230a78 EFLAGS: 00000246 [ 380.197592][ C1] RAX: 0000000000000004 RBX: 0000000000000001 RCX: 0000000000000001 [ 380.197603][ C1] RDX: ffffffff84ab999a RSI: ffffffff87cf42a0 RDI: 0000000000000001 [ 380.197615][ C1] RBP: ffffc90000230a98 R08: ffff88810367a600 R09: 0000000000000000 [ 380.197627][ C1] R10: ffffc900002308d0 R11: fffff5200004611e R12: 0000000000000001 [ 380.197640][ C1] R13: ffff88810a6a5118 R14: 0000000000000001 R15: ffff88810a6a5120 [ 380.197652][ C1] FS: 0000000000000000(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 380.197666][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 380.197677][ C1] CR2: 00007f1847347e20 CR3: 0000000125b90000 CR4: 00000000003526b0 [ 380.197693][ C1] Call Trace: [ 380.197699][ C1] [ 380.197708][ C1] nf_hook_slow+0xea/0x240 [ 380.197743][ C1] ipv6_rcv+0x1d4/0x240 [ 380.197761][ C1] ? __cfi_ipv6_rcv+0x10/0x10 [ 380.197778][ C1] ? __cfi_ip6_rcv_finish+0x10/0x10 [ 380.197795][ C1] ? __cfi__raw_spin_lock_irq+0x10/0x10 [ 380.197820][ C1] process_backlog+0x44b/0xad0 [ 380.197842][ C1] __napi_poll+0xd3/0x610 [ 380.197861][ C1] net_rx_action+0x5ea/0xd80 [ 380.197882][ C1] ? __cfi_net_rx_action+0x10/0x10 [ 380.197900][ C1] ? sched_clock+0x44/0x60 [ 380.197919][ C1] ? __cfi_sched_clock_cpu+0x10/0x10 [ 380.197941][ C1] ? irqtime_account_irq+0x51/0x1c0 [ 380.197960][ C1] handle_softirqs+0x1aa/0x630 [ 380.197991][ C1] __do_softirq+0xf/0x16 [ 380.198005][ C1] do_softirq+0xb8/0x110 [ 380.198026][ C1] [ 380.198032][ C1] [ 380.198038][ C1] ? __cfi_do_softirq+0x10/0x10 [ 380.198061][ C1] ? avc_node_free+0x2b6/0x2f0 [ 380.198082][ C1] ? __cfi_avc_node_free+0x10/0x10 [ 380.198101][ C1] __local_bh_enable_ip+0x74/0x80 [ 380.198122][ C1] rcu_do_batch+0x5d9/0xd40 [ 380.198146][ C1] ? rcu_core+0xd30/0xd30 [ 380.198166][ C1] ? __kasan_check_write+0x18/0x20 [ 380.198186][ C1] ? _raw_spin_lock+0x92/0x120 [ 380.198208][ C1] ? _raw_spin_unlock_irqrestore+0x4a/0x70 [ 380.198232][ C1] ? __kasan_check_read+0x15/0x20 [ 380.198249][ C1] ? rcu_nocb_cb_kthread+0x50f/0xb30 [ 380.198272][ C1] rcu_nocb_cb_kthread+0x524/0xb30 [ 380.198296][ C1] ? __cfi_rcu_nocb_cb_kthread+0x10/0x10 [ 380.198319][ C1] ? __kasan_check_write+0x18/0x20 [ 380.198337][ C1] ? _raw_spin_lock_irqsave+0xc1/0x160 [ 380.198359][ C1] ? __cfi__raw_spin_lock_irqsave+0x10/0x10 [ 380.198382][ C1] ? _raw_spin_lock_irqsave+0xc1/0x160 [ 380.198404][ C1] ? set_cpus_allowed_ptr+0xa1/0xf0 [ 380.198428][ C1] ? __cfi_set_cpus_allowed_ptr+0x10/0x10 [ 380.198453][ C1] ? __kasan_check_read+0x15/0x20 [ 380.198471][ C1] ? __kthread_parkme+0x137/0x180 [ 380.198493][ C1] ? schedule+0xc5/0x240 [ 380.198507][ C1] kthread+0x2c9/0x370 [ 380.198522][ C1] ? __cfi_rcu_nocb_cb_kthread+0x10/0x10 [ 380.198544][ C1] ? __cfi_kthread+0x10/0x10 [ 380.198558][ C1] ret_from_fork+0x67/0xa0 [ 380.198579][ C1] ? __cfi_kthread+0x10/0x10 [ 380.198593][ C1] ret_from_fork_asm+0x1a/0x30 [ 380.198617][ C1] [ 380.629556][ T36] audit: type=1400 audit(1787155910.773:5238): avc: denied { write } for pid=283 comm="syz-executor" path="pipe:[2568]" dev="pipefs" ino=2568 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 380.925823][ T36] audit: type=1400 audit(1787155910.773:5239): avc: denied { write } for pid=283 comm="syz-executor" path="pipe:[2568]" dev="pipefs" ino=2568 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 381.224983][ T36] audit: type=1400 audit(1787155910.773:5240): avc: denied { write } for pid=283 comm="syz-executor" path="pipe:[2568]" dev="pipefs" ino=2568 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 382.864964][ C1] net_ratelimit: 81588 callbacks suppressed [ 382.864988][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 382.883119][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 382.895217][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 382.907253][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 382.919335][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 382.931356][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 382.943434][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 382.955449][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 382.967506][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 382.979623][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 388.205014][ C1] net_ratelimit: 93702 callbacks suppressed [ 388.205038][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 388.223102][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 388.235193][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 388.247338][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 388.259440][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 388.271488][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0) [ 388.283578][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 388.295595][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 388.307628][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 388.319731][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:7e:87:52:f0:63, vlan:0)