last executing test programs: 45.468734383s ago: executing program 0 (id=6050): r0 = syz_usb_connect$hid(0x3, 0x36, &(0x7f0000000240)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x28bd, 0x1903, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x3, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x0, 0x2, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x2}}, {{{0x9, 0x5, 0x81, 0x3, 0x200, 0x9, 0x9}}}}}]}}]}}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000000)={0x24, 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x22, 0x2, {[@main=@item_012={0x1, 0x0, 0x0, ')'}]}}, 0x0}, 0x0) 44.877531043s ago: executing program 0 (id=6060): fremovexattr(0xffffffffffffffff, &(0x7f0000000040)=@known='system.posix_acl_access\x00') r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="200000001800090200ffe6000000000002"], 0x20}}, 0x0) 44.764590054s ago: executing program 0 (id=6064): r0 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x201, &(0x7f00000001c0)={0x0}) 44.649874286s ago: executing program 0 (id=6068): r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1fd2, 0x6007, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x5}}}}]}}]}}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, &(0x7f0000000040)={0x2c, &(0x7f0000000100)=ANY=[@ANYBLOB="000f16000000090282"], 0x0, 0x0, 0x0, 0x0}, 0x0) 44.566576198s ago: executing program 1 (id=6070): capset(&(0x7f0000000140)={0x19980330}, &(0x7f0000000100)={0x0, 0x4, 0x6, 0x0, 0x80010, 0xfffffffd}) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$FITHAW(r0, 0xc0045878) 44.449469809s ago: executing program 2 (id=6073): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x4020aeb2, &(0x7f0000000300)={0x0, 0x12c, @pic={0x81, 0x5, 0xfc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1}}) 44.42294784s ago: executing program 1 (id=6075): r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000100)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100030010651fbe117b2c2b00000c000180080001"], 0x20}, 0x1, 0x0, 0x0, 0x1}, 0x0) 44.38816641s ago: executing program 3 (id=6076): r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f00000009c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @empty}}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'syztnl1\x00', &(0x7f0000000640)={'ip6tnl0\x00', r1, 0x4, 0x2, 0x81, 0xcf57, 0xff00, @ipv4={'\x00', '\xff\xff', @local}, @loopback={0x300}, 0x8000, 0x0, 0x0, 0x300}}) 44.35770171s ago: executing program 2 (id=6077): timer_create(0x3, 0x0, &(0x7f0000000300)=0x0) timer_settime(r0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_delete(r0) 44.294322811s ago: executing program 1 (id=6078): r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000280)={@multicast2, @local, @remote}, 0xc) setsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000000100)={@multicast2, @local}, 0xc) 44.248877622s ago: executing program 3 (id=6079): fchdir(0xffffffffffffffff) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/mnt\x00') ioctl$BTRFS_IOC_BALANCE(r0, 0x5000940c, 0x0) 44.233069872s ago: executing program 2 (id=6080): r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_VENDOR(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000140)={0x28, r0, 0x701, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0xa}, @void, @val={0xc, 0x99, {0x9, 0x58}}}}}, 0x28}, 0x1, 0x0, 0x0, 0x8080}, 0x0) 44.171726093s ago: executing program 1 (id=6081): socket$inet6(0xa, 0x2, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, 0x0, &(0x7f0000000140)) 44.159682204s ago: executing program 3 (id=6082): mount$tmpfs(0x0, &(0x7f0000000080)='.\x00', &(0x7f00000000c0), 0x8, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) openat2$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x2d}, 0x18) 44.093789455s ago: executing program 3 (id=6083): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x101201, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x4020aeb2, &(0x7f0000000080)={0x3, 0x0, @ioapic={0x100010000, 0x9, 0x0, 0x0, 0x0, [{0x6, 0x7, 0x8, '\x00', 0xab}, {0x2, 0x0, 0x2, '\x00', 0x5b}, {0x60, 0x4, 0x8, '\x00', 0x3}, {0x5, 0x6, 0x3, '\x00', 0xf1}, {0xc, 0xc, 0x9, '\x00', 0x43}, {0x4, 0x79, 0x81, '\x00', 0x6}, {0x94, 0x5, 0x9, '\x00', 0xfe}, {0xf, 0x4, 0x6, '\x00', 0xfc}, {0x1, 0x4, 0x8, '\x00', 0x33}, {0x1, 0xf, 0x57, '\x00', 0x9}, {0x5, 0x4, 0x1, '\x00', 0x6}, {0x81, 0x6, 0x6, '\x00', 0x48}, {0x7, 0x3, 0x8, '\x00', 0xff}, {0x6, 0x3, 0xa3, '\x00', 0x2}, {0x7, 0x0, 0x3, '\x00', 0x50}, {0xd, 0x2, 0xd, '\x00', 0x6}, {0x8, 0x80, 0x80, '\x00', 0xb}, {0x3, 0x89, 0x1, '\x00', 0xe}, {0x78, 0x7, 0x2, '\x00', 0x7}, {0x3, 0x3, 0xc1, '\x00', 0x7}, {0x5, 0x26, 0x5, '\x00', 0x9}, {0x7, 0x9, 0xe2, '\x00', 0x6}, {0xf9, 0xd, 0x81, '\x00', 0x81}, {0xfd, 0x3, 0x80, '\x00', 0x6}]}}) 44.093230415s ago: executing program 2 (id=6084): sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x118}}, 0x0) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) setitimer(0x2, &(0x7f00000000c0)={{0x0, 0xea60}, {0xffffffff}}, 0x0) 44.072943255s ago: executing program 1 (id=6085): sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x500, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="020100030a0000000600000000000000030006000000000002000000ffffffff"], 0x50}}, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000021c0)=[{&(0x7f0000000200)=ANY=[@ANYBLOB="a0000000250001002bbd7000fcdbdf2526dd18751300"], 0xa0}], 0x1, 0x0, 0x0, 0x4050}, 0x40) 44.019618136s ago: executing program 0 (id=6086): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000800), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000a40)={&(0x7f0000000000)={0x28, r1, 0x1, 0x70bd2d, 0x25dfdbff, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x10, 0x2, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0xa}]}]}, @ETHTOOL_A_STRSET_HEADER={0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x880}, 0x0) 44.014180516s ago: executing program 2 (id=6087): r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) ptrace$pokeuser(0x6, r0, 0x358, 0xffff8881f6e0f000) 43.08717269s ago: executing program 3 (id=6088): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={0x14, r1, 0x1}, 0x14}}, 0x0) 40.020230347s ago: executing program 0 (id=6089): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f00000003c0), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000007c0)={0x80, r1, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_PEERS={0x34, 0x8, 0x0, 0x1, [{0x30, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @c_g}, @WGPEER_A_ALLOWEDIPS={0x8, 0x9, 0x0, 0x1, [{0x4}]}]}]}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @b}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg0\x00'}]}, 0x80}, 0x1, 0x0, 0x0, 0x4004840}, 0x40000) 39.933929398s ago: executing program 1 (id=6090): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x11) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000000)=0x7d) 36.520444241s ago: executing program 3 (id=6091): prctl$PR_SET_VMA(0x53564d41, 0x0, &(0x7f0000ffb000/0x4000)=nil, 0xfffffd00, &(0x7f0000000000)='}\x00') prctl$PR_SET_VMA(0x53564d41, 0x0, &(0x7f0000ffc000/0x3000)=nil, 0x3000, &(0x7f00000000c0)='/dev/uinput\x00') prctl$PR_SET_VMA(0x53564d41, 0x0, &(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) 35.089853133s ago: executing program 2 (id=6092): io_setup(0x8, &(0x7f00000001c0)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/disk', 0x1, 0x20) io_submit(r0, 0x1, &(0x7f0000000400)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x8, 0x0, r1, &(0x7f0000000040)="2a22cab1fd28", 0x6, 0x8, 0x0, 0x2}]) 21.104706927s ago: executing program 32 (id=6089): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f00000003c0), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000007c0)={0x80, r1, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_PEERS={0x34, 0x8, 0x0, 0x1, [{0x30, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @c_g}, @WGPEER_A_ALLOWEDIPS={0x8, 0x9, 0x0, 0x1, [{0x4}]}]}]}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @b}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg0\x00'}]}, 0x80}, 0x1, 0x0, 0x0, 0x4004840}, 0x40000) 18.858530631s ago: executing program 33 (id=6090): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x11) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000000)=0x7d) 15.469293143s ago: executing program 34 (id=6092): io_setup(0x8, &(0x7f00000001c0)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/disk', 0x1, 0x20) io_submit(r0, 0x1, &(0x7f0000000400)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x8, 0x0, r1, &(0x7f0000000040)="2a22cab1fd28", 0x6, 0x8, 0x0, 0x2}]) 0s ago: executing program 35 (id=6091): prctl$PR_SET_VMA(0x53564d41, 0x0, &(0x7f0000ffb000/0x4000)=nil, 0xfffffd00, &(0x7f0000000000)='}\x00') prctl$PR_SET_VMA(0x53564d41, 0x0, &(0x7f0000ffc000/0x3000)=nil, 0x3000, &(0x7f00000000c0)='/dev/uinput\x00') prctl$PR_SET_VMA(0x53564d41, 0x0, &(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) kernel console output (not intermixed with test programs): 867] asix 2-1:0.0: probe with driver asix failed with error -71 [ 112.298392][ T867] usb 2-1: USB disconnect, device number 45 [ 112.493304][ T5670] erofs: (device loop2): erofs_read_superblock: cannot find valid erofs superblock [ 112.627948][ T5687] netlink: 32 bytes leftover after parsing attributes in process `syz.3.2717'. [ 112.897478][ T36] audit: type=1400 audit(111.799:13145): avc: denied { read } for pid=5740 comm="syz.3.2743" path="socket:[21689]" dev="sockfs" ino=21689 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 112.981892][ T36] audit: type=1400 audit(111.874:13146): avc: denied { connect } for pid=5758 comm="syz.1.2753" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 113.078260][ T5784] netlink: 57 bytes leftover after parsing attributes in process `syz.1.2764'. [ 113.160832][ T36] audit: type=1400 audit(112.042:13147): avc: denied { connect } for pid=5801 comm="syz.2.2774" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 113.272670][ T867] usb 4-1: new high-speed USB device number 44 using dummy_hcd [ 113.319284][ T36] audit: type=1400 audit(112.192:13148): avc: denied { append } for pid=5828 comm="syz.2.2787" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 113.337327][ T866] usb 1-1: new high-speed USB device number 43 using dummy_hcd [ 113.378740][ T5835] O3c: renamed from bridge_slave_0 (while UP) [ 113.399161][ T36] audit: type=1400 audit(112.266:13149): avc: denied { accept } for pid=5836 comm="syz.1.2791" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 113.439034][ T867] usb 4-1: config 1 interface 0 altsetting 0 endpoint 0x1 has invalid wMaxPacketSize 0 [ 113.449088][ T867] usb 4-1: config 1 interface 0 altsetting 0 bulk endpoint 0x1 has invalid maxpacket 0 [ 113.465457][ T867] usb 4-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 113.481118][ T5843] netlink: 'syz.1.2794': attribute type 16 has an invalid length. [ 113.487198][ T867] usb 4-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 113.498196][ T867] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 113.506485][ T867] usb 4-1: Product: syz [ 113.507839][ T866] usb 1-1: Using ep0 maxpacket: 16 [ 113.510706][ T867] usb 4-1: Manufacturer: syz [ 113.520430][ T867] usb 4-1: SerialNumber: syz [ 113.523618][ T866] usb 1-1: config 9 has an invalid interface number: 4 but max is 0 [ 113.533624][ T866] usb 1-1: config 9 has no interface number 0 [ 113.536254][ T867] hub 4-1:1.0: bad descriptor, ignoring hub [ 113.539742][ T866] usb 1-1: config 9 interface 4 has no altsetting 0 [ 113.547910][ T867] hub 4-1:1.0: probe with driver hub failed with error -5 [ 113.554475][ T866] usb 1-1: New USB device found, idVendor=0403, idProduct=da72, bcdDevice=40.fa [ 113.568868][ T866] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 113.577219][ T866] usb 1-1: Product: syz [ 113.581557][ T866] usb 1-1: Manufacturer: syz [ 113.586404][ T866] usb 1-1: SerialNumber: syz [ 113.743057][ T9] usb 3-1: new high-speed USB device number 40 using dummy_hcd [ 113.754150][ T867] usblp 4-1:1.0: usblp0: USB Unidirectional printer dev 44 if 0 alt 0 proto 1 vid 0x0525 pid 0xA4A8 [ 113.810714][ T866] usb 1-1: NDI device with a latency value of 1 [ 113.817224][ T866] ftdi_sio 1-1:9.4: FTDI USB Serial Device converter detected [ 113.825096][ T866] ftdi_sio ttyUSB0: unknown device type: 0x40fa [ 113.832788][ T866] usb 1-1: USB disconnect, device number 43 [ 113.839419][ T866] ftdi_sio 1-1:9.4: device disconnected [ 113.904416][ T9] usb 3-1: config 0 has an invalid interface number: 64 but max is 0 [ 113.912708][ T9] usb 3-1: config 0 has no interface number 0 [ 113.920481][ T9] usb 3-1: New USB device found, idVendor=046d, idProduct=0823, bcdDevice= 0.07 [ 113.929885][ T9] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 113.937943][ T9] usb 3-1: Product: syz [ 113.942266][ T9] usb 3-1: Manufacturer: syz [ 113.946906][ T9] usb 3-1: SerialNumber: syz [ 113.952182][ T9] usb 3-1: config 0 descriptor?? [ 114.031675][ T31] usb 2-1: new full-speed USB device number 46 using dummy_hcd [ 114.085216][ T867] usb 4-1: USB disconnect, device number 44 [ 114.092040][ T867] usblp0: removed [ 114.176284][ T9] usb 3-1: Found UVC 0.08 device syz (046d:0823) [ 114.182774][ T9] usb 3-1: No valid video chain found. [ 114.189011][ T9] usb 3-1: USB disconnect, device number 40 [ 114.203809][ T31] usb 2-1: config 0 has an invalid interface number: 41 but max is 0 [ 114.211988][ T31] usb 2-1: config 0 has no interface number 0 [ 114.218274][ T31] usb 2-1: config 0 interface 41 has no altsetting 0 [ 114.226598][ T31] usb 2-1: New USB device found, idVendor=0fe6, idProduct=9800, bcdDevice=d1.9a [ 114.235683][ T31] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 114.243668][ T31] usb 2-1: Product: syz [ 114.247849][ T31] usb 2-1: Manufacturer: syz [ 114.252451][ T31] usb 2-1: SerialNumber: syz [ 114.257759][ T31] usb 2-1: config 0 descriptor?? [ 114.694499][ T31] CoreChips 2-1:0.41 (unnamed net_device) (uninitialized): set LINK LED failed : -71 [ 114.704634][ T31] CoreChips 2-1:0.41: probe with driver CoreChips failed with error -71 [ 114.714133][ T31] usb 2-1: USB disconnect, device number 46 [ 114.755967][ T5912] x_tables: arp_tables: CLASSIFY target: used from hooks INPUT, but only usable from FORWARD/OUTPUT [ 114.758783][ T36] audit: type=1400 audit(113.539:13150): avc: denied { map } for pid=5913 comm="syz.2.2828" path="socket:[20976]" dev="sockfs" ino=20976 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 114.790080][ T36] audit: type=1400 audit(113.539:13151): avc: denied { read } for pid=5913 comm="syz.2.2828" path="socket:[20976]" dev="sockfs" ino=20976 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 114.849316][ T5925] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2834'. [ 114.865050][ T5928] netlink: 300 bytes leftover after parsing attributes in process `syz.3.2836'. [ 115.093387][ T36] audit: type=1400 audit(113.857:13152): avc: denied { connect } for pid=5974 comm="syz.2.2859" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 115.147915][ T5985] cgroup: subsys name conflicts with all [ 115.370319][ T6022] netlink: 8 bytes leftover after parsing attributes in process `syz.3.2881'. [ 115.494159][ T6050] netlink: 8 bytes leftover after parsing attributes in process `syz.2.2896'. [ 115.581412][ T6070] netlink: 4 bytes leftover after parsing attributes in process `syz.3.2906'. [ 115.590549][ T6072] IPv6: NLM_F_CREATE should be specified when creating new route [ 115.659566][ T36] audit: type=1400 audit(114.380:13153): avc: denied { map } for pid=6082 comm="syz.2.2913" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=22273 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 115.736896][ T6099] rust_binder: Write failure EFAULT in pid:1120 [ 116.242179][ T6202] 9p: Unknown access argument : -22 [ 116.363892][ T6226] netlink: 160 bytes leftover after parsing attributes in process `syz.3.2984'. [ 116.373283][ T866] usb 2-1: new high-speed USB device number 47 using dummy_hcd [ 116.379239][ T6228] netlink: 5 bytes leftover after parsing attributes in process `syz.2.2985'. [ 116.391396][ T6228] 0M: renamed from gretap0 (while UP) [ 116.398191][ T6228] 0M: entered allmulticast mode [ 116.403937][ T6228] A link change request failed with some changes committed already. Interface 30M may have been left with an inconsistent configuration, please check. [ 116.464588][ T6244] IPv6: NLM_F_CREATE should be specified when creating new route [ 116.543974][ T866] usb 2-1: Using ep0 maxpacket: 32 [ 116.552316][ T866] usb 2-1: config 4 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 116.563785][ T866] usb 2-1: config 4 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 116.581099][ T866] usb 2-1: New USB device found, idVendor=046d, idProduct=c314, bcdDevice= 0.40 [ 116.599890][ T866] usb 2-1: New USB device strings: Mfr=255, Product=255, SerialNumber=0 [ 116.608711][ T866] usb 2-1: Product: syz [ 116.613636][ T866] usb 2-1: Manufacturer: syz [ 116.621892][ T866] hub 2-1:4.0: USB hub found [ 116.841178][ T866] hub 2-1:4.0: config failed, can't read hub descriptor (err -22) [ 116.875752][ T866] usb 2-1: USB disconnect, device number 47 [ 116.982298][ T867] usb 3-1: new full-speed USB device number 41 using dummy_hcd [ 117.064040][ T6371] xt_CONNSECMARK: only valid in 'mangle' or 'security' table, not 'filter' [ 117.143419][ T867] usb 3-1: not running at top speed; connect to a high speed hub [ 117.152161][ T867] usb 3-1: config 16 has an invalid interface number: 83 but max is 0 [ 117.160702][ T867] usb 3-1: config 16 has no interface number 0 [ 117.167090][ T867] usb 3-1: config 16 interface 83 has no altsetting 0 [ 117.175505][ T867] usb 3-1: New USB device found, idVendor=1a0a, idProduct=0108, bcdDevice=c1.03 [ 117.184755][ T867] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 117.192889][ T867] usb 3-1: Product: syz [ 117.197218][ T867] usb 3-1: Manufacturer: syz [ 117.201819][ T867] usb 3-1: SerialNumber: syz [ 117.337068][ T6389] incfs: Options parsing error. -22 [ 117.342639][ T6389] incfs: mount failed -22 [ 117.427462][ T867] usb_ehset_test 3-1:16.83: probe with driver usb_ehset_test failed with error -32 [ 117.447429][ T867] usb 3-1: USB disconnect, device number 41 [ 117.592494][ T6441] 8021q: VLANs not supported on vcan0 [ 117.656991][ T6459] random: crng reseeded on system resumption [ 117.887437][ T6510] netlink: 140 bytes leftover after parsing attributes in process `syz.0.3125'. [ 117.923374][ T36] kauditd_printk_skb: 10 callbacks suppressed [ 117.923393][ T36] audit: type=1400 audit(116.504:13164): avc: denied { ioctl } for pid=6517 comm="syz.3.3130" path="socket:[23086]" dev="sockfs" ino=23086 ioctlcmd=0x8946 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 118.005581][ T36] audit: type=1400 audit(116.579:13165): avc: denied { set_context_mgr } for pid=6534 comm="syz.3.3138" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 118.048520][ T36] audit: type=1400 audit(116.607:13166): avc: denied { compute_member } for pid=6540 comm="syz.2.3141" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 118.082376][ T6548] netlink: 'syz.2.3145': attribute type 5 has an invalid length. [ 118.097955][ T6548] netlink: 3657 bytes leftover after parsing attributes in process `syz.2.3145'. [ 118.193288][ T6575] netlink: 4 bytes leftover after parsing attributes in process `syz.3.3158'. [ 118.249926][ T6587] 9pnet_fd: Insufficient options for proto=fd [ 118.264457][ T6592] netlink: 36 bytes leftover after parsing attributes in process `syz.0.3166'. [ 118.274798][ T6593] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 118.282128][ T6593] IPv6: NLM_F_CREATE should be set when creating new route [ 118.372984][ T6619] netlink: 'syz.3.3178': attribute type 29 has an invalid length. [ 118.382786][ T6619] netlink: 8 bytes leftover after parsing attributes in process `syz.3.3178'. [ 118.419503][ T6627] netlink: 44 bytes leftover after parsing attributes in process `syz.3.3184'. [ 118.562903][ T6666] netlink: 'syz.2.3201': attribute type 30 has an invalid length. [ 118.588917][ T6673] netlink: 40 bytes leftover after parsing attributes in process `syz.2.3206'. [ 118.731562][ T6705] netlink: 'syz.3.3222': attribute type 11 has an invalid length. [ 118.743121][ T6705] netlink: 3657 bytes leftover after parsing attributes in process `syz.3.3222'. [ 118.756277][ T36] audit: type=1400 audit(117.280:13167): avc: denied { connect } for pid=6710 comm="syz.2.3225" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 118.826068][ T6727] mmap: syz.0.3232 (6727) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 118.884858][ T36] audit: type=1400 audit(117.392:13168): avc: denied { mounton } for pid=6738 comm="syz.0.3239" path="mnt:[4026532294]" dev="nsfs" ino=4026532294 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 118.938935][ T6751] netlink: 28 bytes leftover after parsing attributes in process `syz.2.3245'. [ 119.002809][ T31] usb 2-1: new high-speed USB device number 48 using dummy_hcd [ 119.069863][ T6784] usb usb9: usbfs: process 6784 (syz.0.3261) did not claim interface 6 before use [ 119.175101][ T31] usb 2-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 119.185836][ T31] usb 2-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 119.195788][ T31] usb 2-1: New USB device found, idVendor=08b7, idProduct=0000, bcdDevice= 0.00 [ 119.205245][ T31] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=3 [ 119.213821][ T31] usb 2-1: SerialNumber: syz [ 119.247707][ T36] audit: type=1400 audit(117.738:13169): avc: denied { getattr } for pid=6813 comm="syz.2.3276" path="cgroup:[4026532648]" dev="nsfs" ino=4026532648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 119.387704][ T867] usb 1-1: new high-speed USB device number 44 using dummy_hcd [ 119.439721][ T31] usb 2-1: 0:2 : does not exist [ 119.445906][ T31] usb 2-1: unit 5 not found! [ 119.453787][ T31] usb 2-1: USB disconnect, device number 48 [ 119.558755][ T867] usb 1-1: Using ep0 maxpacket: 16 [ 119.565159][ T867] usb 1-1: config 0 has an invalid interface number: 105 but max is 0 [ 119.573453][ T867] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 119.583990][ T867] usb 1-1: config 0 has no interface number 0 [ 119.592171][ T867] usb 1-1: New USB device found, idVendor=046c, idProduct=14e8, bcdDevice= b.28 [ 119.601590][ T867] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 119.609746][ T867] usb 1-1: Product: syz [ 119.614194][ T867] usb 1-1: Manufacturer: syz [ 119.619592][ T867] usb 1-1: SerialNumber: syz [ 119.625521][ T867] usb 1-1: config 0 descriptor?? [ 119.626144][ T36] audit: type=1400 audit(118.094:13170): avc: denied { getopt } for pid=6856 comm="syz.2.3297" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 119.635191][ T867] usb 1-1: Found UVC 0.00 device syz (046c:14e8) [ 119.656841][ T867] usb 1-1: No valid video chain found. [ 119.703140][ T6865] netlink: 'syz.2.3301': attribute type 4 has an invalid length. [ 119.711017][ T6865] netlink: 17 bytes leftover after parsing attributes in process `syz.2.3301'. [ 119.820113][ T6876] SELinux: Context system_u:object_r:system_dbusd_var_lib_t:s0 is not valid (left unmapped). [ 119.831683][ T36] audit: type=1400 audit(118.281:13171): avc: denied { relabelto } for pid=6875 comm="syz.2.3306" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:system_dbusd_var_lib_t:s0" [ 119.852982][ T867] usb 1-1: USB disconnect, device number 44 [ 119.875184][ T36] audit: type=1400 audit(118.281:13172): avc: denied { associate } for pid=6875 comm="syz.2.3306" name="kvm" dev="devtmpfs" ino=13 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 srawcon="system_u:object_r:system_dbusd_var_lib_t:s0" [ 119.918767][ T6880] netlink: 5 bytes leftover after parsing attributes in process `syz.2.3308'. [ 120.364155][ T6971] rust_binder: Write failure EFAULT in pid:1298 [ 120.511582][ T7001] SELinux: Context /dev/kvm is not valid (left unmapped). [ 120.511671][ T36] audit: type=1400 audit(118.926:13173): avc: denied { relabelfrom } for pid=7000 comm="syz.1.3368" name="" dev="pipefs" ino=24934 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 120.937807][ T867] usb 2-1: new high-speed USB device number 49 using dummy_hcd [ 120.943826][ T7101] new mount options do not match the existing superblock, will be ignored [ 121.038266][ T7119] bridge_slave_1: left allmulticast mode [ 121.044002][ T7119] bridge_slave_1: left promiscuous mode [ 121.050070][ T7119] bridge0: port 2(bridge_slave_1) entered disabled state [ 121.058346][ T7119] bridge_slave_0: left allmulticast mode [ 121.064170][ T7119] bridge_slave_0: left promiscuous mode [ 121.070266][ T7119] bridge0: port 1(bridge_slave_0) entered disabled state [ 121.073109][ T7123] fuse: blksize only supported for fuseblk [ 121.108853][ T867] usb 2-1: Using ep0 maxpacket: 32 [ 121.115187][ T867] usb 2-1: config 1 has an invalid interface number: 3 but max is 0 [ 121.123525][ T867] usb 2-1: config 1 has no interface number 0 [ 121.129984][ T867] usb 2-1: config 1 interface 3 has no altsetting 0 [ 121.139046][ T867] usb 2-1: New USB device found, idVendor=d084, idProduct=c487, bcdDevice=f4.ce [ 121.148380][ T867] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 121.156778][ T867] usb 2-1: Product: syz [ 121.161138][ T867] usb 2-1: Manufacturer: syz [ 121.166084][ T867] usb 2-1: SerialNumber: syz [ 121.358867][ T7157] netlink: 'syz.2.3446': attribute type 64 has an invalid length. [ 121.397665][ T867] usb 2-1: USB disconnect, device number 49 [ 121.429584][ T9] usb 4-1: new high-speed USB device number 45 using dummy_hcd [ 121.589964][ T9] usb 4-1: Using ep0 maxpacket: 8 [ 121.596427][ T9] usb 4-1: unable to get BOS descriptor or descriptor too short [ 121.604936][ T9] usb 4-1: config 0 interface 0 altsetting 0 has an endpoint descriptor with address 0xEE, changing to 0x8E [ 121.616929][ T9] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x8E has an invalid bInterval 0, changing to 7 [ 121.627953][ T9] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x3 has invalid wMaxPacketSize 0 [ 121.637759][ T9] usb 4-1: config 0 interface 0 altsetting 0 bulk endpoint 0xC has invalid maxpacket 1 [ 121.647540][ T9] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0xF has invalid wMaxPacketSize 0 [ 121.657336][ T9] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x7 has invalid wMaxPacketSize 0 [ 121.667126][ T9] usb 4-1: config 0 interface 0 altsetting 0 bulk endpoint 0x7 has invalid maxpacket 0 [ 121.678529][ T9] usb 4-1: New USB device found, idVendor=0763, idProduct=1002, bcdDevice=5f.84 [ 121.687699][ T9] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 121.695911][ T9] usb 4-1: Product: syz [ 121.700227][ T9] usb 4-1: Manufacturer: syz [ 121.705001][ T9] usb 4-1: SerialNumber: syz [ 121.710638][ T9] usb 4-1: config 0 descriptor?? [ 121.717947][ T7135] raw-gadget.1 gadget.3: fail, usb_ep_enable returned -22 [ 121.731363][ T9] snd-usb-audio 4-1:0.0: probe with driver snd-usb-audio failed with error -12 [ 121.750839][ T868] udevd[868]: error opening ATTR{/sys/devices/platform/dummy_hcd.3/usb4/4-1/4-1:0.0/sound/card0/controlC0/../uevent} for writing: No such file or directory [ 121.878307][ T7196] netlink: 'syz.0.3465': attribute type 27 has an invalid length. [ 121.964434][ T31] usb 4-1: USB disconnect, device number 45 [ 122.058436][ T7232] bridge0: port 3(vlan0) entered blocking state [ 122.065300][ T7232] bridge0: port 3(vlan0) entered disabled state [ 122.072228][ T7232] vlan0: entered allmulticast mode [ 122.077541][ T7232] veth0_vlan: entered allmulticast mode [ 122.083833][ T7232] vlan0: entered promiscuous mode [ 122.089498][ T7232] bridge0: port 3(vlan0) entered blocking state [ 122.095819][ T7232] bridge0: port 3(vlan0) entered forwarding state [ 122.158501][ T7249] netlink: 'syz.0.3491': attribute type 4 has an invalid length. [ 122.720510][ T7391] incfs: Error accessing: ./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa [ 122.720809][ T7391] incfs: mount failed -36 [ 122.922859][ T7430] rust_binder: Write failure EFAULT in pid:1851 [ 123.009357][ T7454] binfmt_misc: register: failed to install interpreter file ./cgroup [ 123.078542][ T7470] netlink: 'syz.3.3600': attribute type 12 has an invalid length. [ 123.172820][ T7490] IPv6: NLM_F_CREATE should be specified when creating new route [ 123.488970][ T7560] kvm_intel: L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 123.714812][ T7599] __nla_validate_parse: 8 callbacks suppressed [ 123.714832][ T7599] netlink: 220 bytes leftover after parsing attributes in process `syz.2.3663'. [ 124.147412][ T7681] netlink: 4 bytes leftover after parsing attributes in process `syz.2.3706'. [ 124.167400][ T7684] 9pnet_fd: Insufficient options for proto=fd [ 124.230544][ T9] usb 4-1: new high-speed USB device number 46 using dummy_hcd [ 124.298262][ T36] kauditd_printk_skb: 12 callbacks suppressed [ 124.298282][ T36] audit: type=1400 audit(122.462:13186): avc: denied { relabelto } for pid=7709 comm="syz.1.3719" name="file0" dev="tmpfs" ino=3707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=fifo_file permissive=1 trawcon="system_u:object_r:public_content_t:s0" [ 124.343108][ T36] audit: type=1400 audit(122.490:13187): avc: denied { unlink } for pid=466 comm="syz-executor" name="file0" dev="tmpfs" ino=3707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=fifo_file permissive=1 trawcon="system_u:object_r:public_content_t:s0" [ 124.404121][ T9] usb 4-1: New USB device found, idVendor=07fd, idProduct=0004, bcdDevice=b9.bf [ 124.413293][ T9] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 124.413379][ T36] audit: type=1400 audit(122.565:13188): avc: denied { mounton } for pid=7727 comm="syz.1.3728" path="/735/file3" dev="tmpfs" ino=3723 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=sock_file permissive=1 [ 124.421560][ T9] usb 4-1: Product: syz [ 124.421579][ T9] usb 4-1: Manufacturer: syz [ 124.469637][ T9] usb 4-1: SerialNumber: syz [ 124.483219][ T7737] netlink: 12 bytes leftover after parsing attributes in process `syz.0.3732'. [ 124.486521][ T9] usb 4-1: config 0 descriptor?? [ 124.493425][ T7737] netlink: 8 bytes leftover after parsing attributes in process `syz.0.3732'. [ 124.498014][ T7735] netlink: 'syz.2.3731': attribute type 46 has an invalid length. [ 124.519169][ T7735] netlink: 44 bytes leftover after parsing attributes in process `syz.2.3731'. [ 124.526251][ T9] usb 4-1: Waiting for MOTU Microbook II to boot up... [ 124.535273][ T9] usb 4-1: failed setting the sample rate for Motu MicroBook II: -22 [ 124.548035][ T9] snd-usb-audio 4-1:0.0: probe with driver snd-usb-audio failed with error -22 [ 124.576101][ T7745] cgroup: Bad value for 'name' [ 124.617148][ T36] audit: type=1400 audit(122.752:13189): avc: denied { connect } for pid=7756 comm="syz.0.3742" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 124.689699][ T36] audit: type=1401 audit(122.827:13190): op=security_bounded_transition seresult=denied oldcontext=root:sysadm_r:sysadm_t newcontext=system_u:object_r:hugetlbfs_t [ 124.782317][ T9] usb 4-1: USB disconnect, device number 46 [ 124.815796][ T7801] tmpfs: Unexpected value for 'inode32' [ 124.831169][ T7803] netlink: 8 bytes leftover after parsing attributes in process `syz.2.3765'. [ 124.880538][ T7817] raw_sendmsg: syz.1.3772 forgot to set AF_INET. Fix it! [ 124.979110][ T36] audit: type=1400 audit(123.098:13191): avc: denied { name_bind } for pid=7840 comm="syz.0.3785" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 125.097308][ T7869] netlink: 8 bytes leftover after parsing attributes in process `syz.0.3798'. [ 125.209866][ T7900] 9pnet_fd: p9_fd_create_tcp (7900): problem connecting socket to 127.0.0.1 [ 125.276012][ T7914] netlink: 36 bytes leftover after parsing attributes in process `syz.0.3820'. [ 125.309825][ T7924] SELinux: Context o}xd is not valid (left unmapped). [ 125.396565][ T7942] netlink: 24 bytes leftover after parsing attributes in process `syz.3.3834'. [ 125.444048][ T7954] TCP: TCP_TX_DELAY enabled [ 125.470599][ T36] audit: type=1400 audit(123.557:13192): avc: denied { read } for pid=7957 comm="syz.1.3842" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 125.505406][ T7966] cgroup: Invalid name [ 125.511622][ T36] audit: type=1400 audit(123.585:13193): avc: denied { accept } for pid=7963 comm="syz.1.3846" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 125.540997][ T7973] netlink: 'syz.1.3850': attribute type 28 has an invalid length. [ 125.620725][ T7994] netlink: 80 bytes leftover after parsing attributes in process `syz.2.3860'. [ 125.932604][ T8077] netlink: 'syz.2.3901': attribute type 4 has an invalid length. [ 125.940445][ T8077] netlink: 'syz.2.3901': attribute type 7 has an invalid length. [ 125.948722][ T8079] netlink: 'syz.1.3902': attribute type 4 has an invalid length. [ 126.122777][ T9] usb 1-1: new high-speed USB device number 45 using dummy_hcd [ 126.147320][ T8119] kernel profiling enabled (shift: 63) [ 126.152870][ T8119] profiling shift: 63 too large [ 126.169257][ T36] audit: type=1404 audit(124.211:13194): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 126.199297][ T36] audit: type=1400 audit(124.240:13195): avc: denied { ioctl } for pid=8059 comm="syz.0.3893" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 126.710728][ T9] usb 1-1: device not accepting address 45, error -71 [ 126.760325][ T8240] netlink: 'syz.1.3981': attribute type 46 has an invalid length. [ 128.899128][ T8721] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=52 sclass=netlink_audit_socket pid=8721 comm=syz.1.4218 [ 129.207781][ T8796] SELinux: security_context_str_to_sid (E) failed with errno=-22 [ 129.260531][ T8814] __nla_validate_parse: 9 callbacks suppressed [ 129.260556][ T8814] netlink: 4 bytes leftover after parsing attributes in process `syz.1.4266'. [ 129.619882][ T8870] netlink: 16 bytes leftover after parsing attributes in process `syz.0.4291'. [ 129.681847][ T36] kauditd_printk_skb: 492 callbacks suppressed [ 129.681866][ T36] audit: type=1400 audit(127.495:13688): avc: denied { read write } for pid=468 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 129.729132][ T36] audit: type=1400 audit(127.532:13689): avc: denied { read write } for pid=465 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 129.771724][ T36] audit: type=1400 audit(127.541:13690): avc: denied { write } for pid=8874 comm="syz.2.4294" name="001" dev="devtmpfs" ino=120 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=0 [ 129.800537][ T36] audit: type=1400 audit(127.560:13691): avc: denied { read write } for pid=466 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 129.824742][ T8879] netlink: 'syz.1.4296': attribute type 4 has an invalid length. [ 129.834399][ T36] audit: type=1400 audit(127.570:13692): avc: denied { read write } for pid=468 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 129.873606][ T36] audit: type=1400 audit(127.616:13693): avc: denied { read write } for pid=465 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 129.915425][ T36] audit: type=1400 audit(127.672:13694): avc: denied { create } for pid=8881 comm="syz.0.4298" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=0 [ 129.948174][ T36] audit: type=1400 audit(127.691:13695): avc: denied { read write } for pid=466 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 129.984468][ T8888] netlink: 4 bytes leftover after parsing attributes in process `syz.2.4301'. [ 130.001272][ T36] audit: type=1400 audit(127.710:13696): avc: denied { read write } for pid=465 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 130.046231][ T36] audit: type=1400 audit(127.729:13697): avc: denied { read write } for pid=468 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 131.278393][ T9008] tc_dump_action: action bad kind [ 132.004697][ T9080] netlink: 32 bytes leftover after parsing attributes in process `syz.2.4396'. [ 132.555222][ T9146] netlink: 'syz.1.4427': attribute type 27 has an invalid length. [ 134.395935][ T9333] netlink: 'syz.2.4521': attribute type 4 has an invalid length. [ 134.420280][ T9333] netlink: 3657 bytes leftover after parsing attributes in process `syz.2.4521'. [ 134.531182][ T9345] netlink: 8 bytes leftover after parsing attributes in process `syz.3.4528'. [ 134.757184][ T9364] tc_dump_action: action bad kind [ 135.007170][ T9390] netlink: 5 bytes leftover after parsing attributes in process `syz.1.4550'. [ 135.039057][ T36] kauditd_printk_skb: 356 callbacks suppressed [ 135.039076][ T36] audit: type=1400 audit(132.518:14054): avc: denied { read } for pid=9392 comm="syz.2.4551" dev="nsfs" ino=4026532804 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 135.069457][ T36] audit: type=1400 audit(132.518:14055): avc: denied { read write } for pid=467 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 135.114742][ T36] audit: type=1400 audit(132.527:14056): avc: denied { read write } for pid=465 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 135.155953][ T36] audit: type=1400 audit(132.546:14057): avc: denied { read write } for pid=466 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 135.220456][ T36] audit: type=1400 audit(132.574:14058): avc: denied { create } for pid=9394 comm="syz.3.4552" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 135.247961][ T36] audit: type=1400 audit(132.574:14059): avc: denied { read write } for pid=468 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 135.313700][ T36] audit: type=1400 audit(132.593:14060): avc: denied { read write } for pid=467 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 135.343787][ T36] audit: type=1400 audit(132.611:14061): avc: denied { read write } for pid=466 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 135.402205][ T36] audit: type=1400 audit(132.621:14062): avc: denied { read write } for pid=465 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 135.444953][ T36] audit: type=1400 audit(132.658:14063): avc: denied { read write } for pid=468 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 135.651693][ T9445] netlink: 37 bytes leftover after parsing attributes in process `syz.0.4577'. [ 135.680277][ T9445] IPv6: Can't replace route, no match found [ 136.402693][ T9527] netlink: 12 bytes leftover after parsing attributes in process `syz.2.4618'. [ 136.571603][ T9546] netlink: 'syz.0.4627': attribute type 12 has an invalid length. [ 136.645191][ T9552] xt_NFQUEUE: number of total queues is 0 [ 137.184812][ T9612] syz.1.4660: attempt to access beyond end of device [ 137.184812][ T9612] loop0: rw=2048, sector=0, nr_sectors = 8 limit=0 [ 137.186228][ T9613] netlink: 393 bytes leftover after parsing attributes in process `syz.0.4658'. [ 137.664900][ T9657] netlink: 16 bytes leftover after parsing attributes in process `syz.3.4681'. [ 137.885687][ T9670] netlink: 'syz.3.4688': attribute type 4 has an invalid length. [ 137.903373][ T9670] netlink: 17 bytes leftover after parsing attributes in process `syz.3.4688'. [ 138.116498][ T9690] netlink: 16 bytes leftover after parsing attributes in process `syz.0.4698'. [ 139.118710][ T9785] netlink: 3657 bytes leftover after parsing attributes in process `syz.0.4745'. [ 139.809306][ T9859] netlink: 'syz.2.4782': attribute type 30 has an invalid length. [ 140.090027][ T9888] netlink: 'syz.3.4796': attribute type 4 has an invalid length. [ 140.113332][ T9888] netlink: 3657 bytes leftover after parsing attributes in process `syz.3.4796'. [ 140.398166][ T36] kauditd_printk_skb: 356 callbacks suppressed [ 140.398187][ T36] audit: type=1400 audit(137.522:14420): avc: denied { read write } for pid=467 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 140.448167][ T36] audit: type=1400 audit(137.550:14421): avc: denied { read write } for pid=466 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 140.498084][ T36] audit: type=1400 audit(137.560:14422): avc: denied { read write } for pid=468 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 140.553545][ T36] audit: type=1400 audit(137.560:14423): avc: denied { read write } for pid=465 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 140.612647][ T36] audit: type=1400 audit(137.578:14424): avc: denied { read write } for pid=467 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 140.678046][ T36] audit: type=1400 audit(137.625:14425): avc: denied { read } for pid=9925 comm="syz.1.4813" dev="nsfs" ino=4026532480 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 140.703387][ T36] audit: type=1400 audit(137.653:14426): avc: denied { read write } for pid=467 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 140.738157][ T36] audit: type=1400 audit(137.653:14427): avc: denied { read write } for pid=466 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 140.783702][ T36] audit: type=1400 audit(137.663:14428): avc: denied { write } for pid=9931 comm="syz.0.4816" name="001" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=0 [ 140.824965][ T36] audit: type=1400 audit(137.663:14429): avc: denied { read write } for pid=468 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 143.456177][T10222] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'filter' [ 144.883250][T10368] netlink: 'syz.3.5033': attribute type 64 has an invalid length. [ 144.906143][T10368] netlink: 5 bytes leftover after parsing attributes in process `syz.3.5033'. [ 145.760087][ T36] kauditd_printk_skb: 357 callbacks suppressed [ 145.760106][ T36] audit: type=1400 audit(142.536:14787): avc: denied { execmem } for pid=10449 comm="syz.3.5072" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 145.804584][ T36] audit: type=1400 audit(142.555:14788): avc: denied { create } for pid=10453 comm="syz.2.5074" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 145.857607][ T36] audit: type=1400 audit(142.564:14789): avc: denied { execmem } for pid=10449 comm="syz.3.5072" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 145.896565][ T36] audit: type=1400 audit(142.564:14790): avc: denied { read write } for pid=468 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 145.938660][ T36] audit: type=1400 audit(142.601:14791): avc: denied { read write } for pid=466 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 145.982936][ T36] audit: type=1400 audit(142.611:14792): avc: denied { read write } for pid=467 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 146.006671][ T36] audit: type=1400 audit(142.620:14793): avc: denied { read write } for pid=465 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 146.045542][ T36] audit: type=1400 audit(142.620:14794): avc: denied { sys_module } for pid=10455 comm="syz.2.5075" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=0 [ 146.067084][ T36] audit: type=1400 audit(142.629:14795): avc: denied { read write } for pid=468 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 146.098417][ T36] audit: type=1400 audit(142.667:14796): avc: denied { create } for pid=10457 comm="syz.0.5077" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 148.602589][T10726] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=10726 comm=syz.2.5205 [ 150.045419][T10875] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=10875 comm=syz.2.5278 [ 151.111603][ T36] kauditd_printk_skb: 405 callbacks suppressed [ 151.111622][ T36] audit: type=1400 audit(2000000001.524:15202): avc: denied { read write } for pid=467 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 151.167342][ T36] audit: type=1400 audit(2000000001.534:15203): avc: denied { read write } for pid=10955 comm="syz.3.5318" name="uinput" dev="devtmpfs" ino=194 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=0 [ 151.214029][ T36] audit: type=1400 audit(2000000001.562:15204): avc: denied { read write } for pid=467 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 151.238994][ T36] audit: type=1400 audit(2000000001.608:15205): avc: denied { read write } for pid=466 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 151.295783][ T36] audit: type=1400 audit(2000000001.618:15206): avc: denied { read write } for pid=467 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 151.352251][ T36] audit: type=1400 audit(2000000001.646:15207): avc: denied { create } for pid=10960 comm="syz.1.5320" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 151.383451][ T36] audit: type=1400 audit(2000000001.674:15208): avc: denied { execmem } for pid=10951 comm="syz.2.5316" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 151.411971][ T36] audit: type=1400 audit(2000000001.674:15209): avc: denied { create } for pid=10962 comm="syz.3.5321" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=0 [ 151.439332][ T36] audit: type=1400 audit(2000000001.674:15210): avc: denied { read write } for pid=466 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 151.463557][ T36] audit: type=1400 audit(2000000001.683:15211): avc: denied { read write } for pid=467 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 152.618497][T11100] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11100 comm=syz.2.5387 [ 154.465653][T11262] SELinux: security_context_str_to_sid (E) failed with errno=-22 [ 154.600037][T11275] netlink: 'syz.3.5469': attribute type 10 has an invalid length. [ 154.746500][T11288] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 154.875403][T11301] netlink: 8 bytes leftover after parsing attributes in process `syz.2.5482'. [ 155.064986][T11324] netlink: 1 bytes leftover after parsing attributes in process `syz.1.5492'. [ 155.125505][T11332] netlink: 8 bytes leftover after parsing attributes in process `syz.2.5497'. [ 156.096375][T11436] bridge0: port 4(veth0_to_bridge) entered blocking state [ 156.103650][T11436] bridge0: port 4(veth0_to_bridge) entered disabled state [ 156.114279][T11436] veth0_to_bridge: entered allmulticast mode [ 156.124235][T11436] veth0_to_bridge: entered promiscuous mode [ 156.134704][T11436] bridge0: port 4(veth0_to_bridge) entered blocking state [ 156.141899][T11436] bridge0: port 4(veth0_to_bridge) entered forwarding state [ 156.475433][ T36] kauditd_printk_skb: 397 callbacks suppressed [ 156.475453][ T36] audit: type=1400 audit(2000000007.544:15609): avc: denied { read write } for pid=465 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 156.534510][ T36] audit: type=1400 audit(2000000007.544:15610): avc: denied { read write } for pid=468 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 156.558757][ T36] audit: type=1400 audit(2000000007.572:15611): avc: denied { sys_module } for pid=11466 comm="syz.2.5563" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=0 [ 156.587795][ T36] audit: type=1400 audit(2000000007.590:15612): avc: denied { read write } for pid=468 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 156.614475][ T36] audit: type=1400 audit(2000000007.609:15613): avc: denied { read write } for pid=467 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 156.639480][ T36] audit: type=1400 audit(2000000007.656:15614): avc: denied { read } for pid=11471 comm="syz.3.5566" dev="nsfs" ino=4026532726 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 156.661703][ T36] audit: type=1400 audit(2000000007.675:15615): avc: denied { read write } for pid=467 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 156.692793][ T36] audit: type=1400 audit(2000000007.712:15616): avc: denied { read write } for pid=466 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 156.720594][ T36] audit: type=1400 audit(2000000007.740:15617): avc: denied { read write } for pid=465 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 156.745936][ T36] audit: type=1400 audit(2000000007.778:15618): avc: denied { read write } for pid=11474 comm="syz.3.5567" name="uhid" dev="devtmpfs" ino=199 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=0 [ 158.217390][T11581] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=11581 comm=syz.0.5619 [ 159.073027][T11645] devpts: called with bogus options [ 161.835573][ T36] kauditd_printk_skb: 309 callbacks suppressed [ 161.835593][ T36] audit: type=1400 audit(2000000012.557:15928): avc: denied { read write } for pid=465 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 161.913521][ T36] audit: type=1400 audit(2000000012.623:15929): avc: denied { read write } for pid=465 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 161.975356][ T36] audit: type=1400 audit(2000000012.688:15930): avc: denied { create } for pid=11882 comm="syz.0.5764" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 162.032251][ T36] audit: type=1400 audit(2000000012.716:15931): avc: denied { read write } for pid=465 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 162.062887][ T36] audit: type=1400 audit(2000000012.716:15932): avc: denied { read write } for pid=466 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 162.095452][ T36] audit: type=1400 audit(2000000012.735:15933): avc: denied { read write } for pid=468 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 162.139398][ T36] audit: type=1400 audit(2000000012.735:15934): avc: denied { name_bind } for pid=11884 comm="syz.0.5765" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=0 [ 162.170386][ T36] audit: type=1400 audit(2000000012.763:15935): avc: denied { read write } for pid=465 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 162.214240][ T36] audit: type=1400 audit(2000000012.791:15936): avc: denied { read write } for pid=11888 comm="syz.2.5767" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 162.266039][ T36] audit: type=1400 audit(2000000012.791:15937): avc: denied { create } for pid=11890 comm="syz.0.5768" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 163.034596][T11982] netlink: 124 bytes leftover after parsing attributes in process `syz.1.5814'. [ 163.341101][T12021] can0: slcan on ptm1. [ 163.412334][T12020] can0 (unregistered): slcan off ptm1. [ 165.442795][T12014] Bluetooth: hci0: command 0x1003 tx timeout [ 165.442807][ T53] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 167.185457][ T36] kauditd_printk_skb: 6575 callbacks suppressed [ 167.185476][ T36] audit: type=1400 audit(2000000017.562:22513): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 167.234467][ T148] audit: audit_backlog=65 > audit_backlog_limit=64 [ 167.242636][ T36] audit: type=1400 audit(2000000017.562:22514): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 167.244131][ T148] audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 [ 167.267889][ T36] audit: type=1400 audit(2000000017.562:22515): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 167.283325][ T148] audit: backlog limit exceeded [ 167.293423][ T36] audit: type=1400 audit(2000000017.562:22516): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 167.310111][ T148] audit: audit_backlog=65 > audit_backlog_limit=64 [ 167.326269][ T148] audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 [ 167.333927][ T148] audit: backlog limit exceeded [ 168.484891][T12279] netlink: 8 bytes leftover after parsing attributes in process `syz.2.5955'. [ 169.382957][T12344] netlink: 8 bytes leftover after parsing attributes in process `syz.1.5987'. [ 169.950767][T12383] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12383 comm=syz.3.6006 [ 172.076726][T12492] netlink: 4 bytes leftover after parsing attributes in process `syz.0.6060'. [ 172.541824][ T36] kauditd_printk_skb: 8020 callbacks suppressed [ 172.541845][ T36] audit: type=1400 audit(2000000022.576:30438): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 172.596587][ T36] audit: type=1400 audit(2000000022.576:30439): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 172.610225][ T148] audit: audit_backlog=65 > audit_backlog_limit=64 [ 172.625919][ T467] audit: audit_backlog=65 > audit_backlog_limit=64 [ 172.636788][ T148] audit: audit_lost=36 audit_rate_limit=0 audit_backlog_limit=64 [ 172.651144][ T148] audit: backlog limit exceeded [ 172.652831][ T468] audit: audit_backlog=65 > audit_backlog_limit=64 [ 172.657131][T12530] audit: audit_backlog=65 > audit_backlog_limit=64 [ 172.663046][ T467] audit: audit_lost=37 audit_rate_limit=0 audit_backlog_limit=64 [ 172.669783][ T468] audit: audit_lost=38 audit_rate_limit=0 audit_backlog_limit=64 [ 172.884371][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 172.896625][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 172.908733][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 172.920822][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 172.932897][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 172.944980][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 172.957055][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 172.969347][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 172.981420][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 172.993504][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 173.297163][T12544] netlink: 124 bytes leftover after parsing attributes in process `syz.1.6085'. [ 177.964660][ T36] kauditd_printk_skb: 457 callbacks suppressed [ 177.964679][ T36] audit: type=1400 audit(2000000027.645:30893): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 178.239452][ C0] net_ratelimit: 80906 callbacks suppressed [ 178.239474][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 178.257535][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 178.269639][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 178.282200][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 178.294284][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 178.306354][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 178.318438][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 178.330569][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 178.342692][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 178.354777][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 179.661387][ T36] audit: type=1400 audit(2000000027.645:30894): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 181.190605][ T36] audit: type=1400 audit(2000000027.645:30895): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 183.595445][ C1] net_ratelimit: 102443 callbacks suppressed [ 183.595466][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 183.595494][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 183.601732][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 183.613471][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 183.625643][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 183.637348][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 183.649538][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 183.661231][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 183.673372][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 183.685058][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 185.382326][ T36] audit: type=1400 audit(2000000027.645:30896): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 188.951464][ C0] net_ratelimit: 125692 callbacks suppressed [ 188.951486][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 188.951498][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 188.957688][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 188.969956][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 188.981829][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 188.993802][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 189.005780][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 189.017872][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 189.029822][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 189.041988][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 190.485193][ T36] audit: type=1400 audit(2000000027.645:30897): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 191.946662][ T36] audit: type=1400 audit(2000000028.525:30898): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 194.307444][ C0] net_ratelimit: 127072 callbacks suppressed [ 194.307466][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 194.307667][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 194.313645][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 194.325684][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 194.337550][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 194.349549][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 194.361454][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 194.373569][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 194.385373][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 194.397341][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 195.988194][ T36] audit: type=1400 audit(2000000028.534:30899): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 197.030986][ T36] audit: type=1400 audit(2000000028.534:30900): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 197.570778][ T36] audit: type=1400 audit(2000000028.534:30901): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 197.604711][ T148] audit: audit_backlog=65 > audit_backlog_limit=64 [ 197.758916][T12554] audit: audit_backlog=65 > audit_backlog_limit=64 [ 197.857141][T12555] can0: slcan on ptm0. [ 197.903042][ T148] audit: audit_lost=40 audit_rate_limit=0 audit_backlog_limit=64 [ 198.094041][ T148] audit: backlog limit exceeded [ 198.099418][ T148] audit: audit_backlog=65 > audit_backlog_limit=64 [ 198.178105][ T36] audit: type=1400 audit(2000000028.534:30902): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 199.663469][ C1] net_ratelimit: 119104 callbacks suppressed [ 199.663496][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 199.663547][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 199.669653][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 199.681756][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 199.694326][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 199.706064][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 199.718086][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 199.729955][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 199.742118][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 199.754039][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 201.275146][T12554] audit: audit_lost=41 audit_rate_limit=0 audit_backlog_limit=64 [ 201.388150][ T148] audit: audit_lost=42 audit_rate_limit=0 audit_backlog_limit=64 [ 201.406096][ T36] audit: type=1400 audit(2000000028.534:30903): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 204.155292][ T148] audit_log_start: 2 callbacks suppressed [ 204.155320][ T148] audit: audit_backlog=65 > audit_backlog_limit=64 [ 204.170786][ T36] audit: type=1400 audit(2000000028.534:30904): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 205.019427][ C0] net_ratelimit: 126673 callbacks suppressed [ 205.019451][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 205.019463][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 205.019552][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 205.025675][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 205.037825][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 205.049508][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 205.061936][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 205.073932][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 205.085876][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 205.097860][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 210.375416][ C1] net_ratelimit: 128163 callbacks suppressed [ 210.375441][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 210.375461][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 210.381594][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 210.393470][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 210.405736][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 210.417543][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 210.429640][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 210.441599][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 210.453560][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 210.465414][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 210.740908][ T36] audit: type=1400 audit(2000000028.534:30905): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 210.912438][ T148] audit: audit_lost=43 audit_rate_limit=0 audit_backlog_limit=64 [ 212.338256][ T148] audit: backlog limit exceeded [ 212.387699][ T36] audit: type=1400 audit(2000000028.534:30906): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 214.837802][ T148] audit: audit_backlog=65 > audit_backlog_limit=64 [ 214.917298][ T467] audit: audit_backlog=65 > audit_backlog_limit=64 [ 214.942617][ T36] audit: type=1400 audit(2000000028.534:30907): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 214.985201][ T148] audit: audit_lost=44 audit_rate_limit=0 audit_backlog_limit=64 [ 215.054825][ T467] audit: audit_lost=45 audit_rate_limit=0 audit_backlog_limit=64 [ 215.165928][ T148] audit: backlog limit exceeded [ 215.731403][ C0] net_ratelimit: 120673 callbacks suppressed [ 215.731424][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 215.731599][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 215.737518][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 215.749516][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 215.761509][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 215.773568][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 215.785422][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 215.797532][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 215.809370][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 215.821324][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 216.460357][ T36] kauditd_printk_skb: 1 callbacks suppressed [ 216.460381][ T36] audit: type=1400 audit(2000000028.534:30908): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 216.568664][ T148] audit: audit_backlog=65 > audit_backlog_limit=64 [ 216.575216][ T148] audit: audit_lost=46 audit_rate_limit=0 audit_backlog_limit=64 [ 218.330958][ T36] audit: type=1400 audit(2000000028.534:30909): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 218.359597][ T148] audit: backlog limit exceeded [ 218.876469][ T148] audit: audit_backlog=65 > audit_backlog_limit=64 [ 218.883283][ T148] audit: audit_lost=47 audit_rate_limit=0 audit_backlog_limit=64 [ 218.972127][ T36] audit: type=1400 audit(2000000029.067:30910): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 221.087428][ C0] net_ratelimit: 126066 callbacks suppressed [ 221.087450][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 221.087516][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 221.093914][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 221.105883][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 221.117864][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 221.129856][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 221.141764][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 221.154757][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 221.166659][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 221.178626][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 223.184553][ T36] audit: type=1400 audit(2000000029.067:30911): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 223.635143][ T148] audit: backlog limit exceeded [ 223.715225][ T148] audit: audit_backlog=65 > audit_backlog_limit=64 [ 225.624885][ T36] audit: type=1400 audit(2000000029.067:30912): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 226.443400][ C1] net_ratelimit: 125090 callbacks suppressed [ 226.443425][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 226.443437][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 226.443512][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 226.449531][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 226.461433][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 226.473548][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 226.485585][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 226.497732][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 226.509500][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 226.521531][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 228.564440][ T148] audit: audit_lost=48 audit_rate_limit=0 audit_backlog_limit=64 [ 228.786500][ T148] audit: backlog limit exceeded [ 230.453477][ T36] audit: type=1400 audit(2000000029.161:30913): avc: denied { create } for pid=12548 comm="syz.3.6088" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 231.358218][ T148] audit: audit_backlog=65 > audit_backlog_limit=64 [ 231.799386][ C0] net_ratelimit: 124859 callbacks suppressed [ 231.799409][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 231.799464][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 231.805560][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 231.817544][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 231.829437][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 231.841440][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 231.853662][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 231.865829][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 231.877616][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 231.889622][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 236.323346][ T148] audit: audit_lost=49 audit_rate_limit=0 audit_backlog_limit=64 [ 236.331116][ T148] audit: backlog limit exceeded [ 236.558632][ T36] audit: type=1400 audit(2000000029.161:30914): avc: denied { create } for pid=12548 comm="syz.3.6088" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 237.155413][ C0] net_ratelimit: 130613 callbacks suppressed [ 237.155437][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 237.155474][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 237.161531][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 237.173724][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 237.185572][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 237.197710][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 237.209514][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 237.221479][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 237.233375][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 237.245542][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 238.334601][ T36] audit: type=1400 audit(2000000029.441:30915): avc: denied { read write } for pid=467 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 238.493707][ T148] audit: audit_backlog=65 > audit_backlog_limit=64 [ 238.500257][ T148] audit: audit_lost=50 audit_rate_limit=0 audit_backlog_limit=64 [ 238.837099][ T36] audit: type=1400 audit(2000000029.975:30916): avc: denied { read write } for pid=468 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 239.455420][ T148] audit: backlog limit exceeded [ 239.901164][ T148] audit: audit_backlog=65 > audit_backlog_limit=64 [ 239.968886][ T36] audit: type=1400 audit(2000000030.096:30917): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 242.511390][ C0] net_ratelimit: 119954 callbacks suppressed [ 242.511413][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 242.511478][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 242.517542][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 242.529709][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 242.541484][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 242.553700][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 242.565654][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 242.577596][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 242.589487][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 242.601671][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 242.614113][ T148] audit_log_start: 8 callbacks suppressed [ 242.614131][ T148] audit: audit_backlog=65 > audit_backlog_limit=64 [ 242.673507][ T36] audit: type=1400 audit(2000000030.096:30918): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 243.859490][ T148] audit: audit_lost=54 audit_rate_limit=0 audit_backlog_limit=64 [ 243.867285][ T148] audit: backlog limit exceeded [ 244.962006][ T36] audit: type=1400 audit(2000000030.096:30919): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 245.499423][ T148] audit: audit_backlog=65 > audit_backlog_limit=64 [ 245.585866][ T148] audit: audit_lost=55 audit_rate_limit=0 audit_backlog_limit=64 [ 245.648649][T12563] audit: audit_backlog=65 > audit_backlog_limit=64 [ 246.064564][ T36] audit: type=1400 audit(2000000030.096:30920): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 246.175101][ T148] audit: backlog limit exceeded [ 247.867383][ C1] net_ratelimit: 117560 callbacks suppressed [ 247.867405][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 247.867443][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 247.873700][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 247.885824][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 247.897948][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 247.909860][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 247.921829][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 247.933730][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 247.945798][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 247.958309][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 249.750765][ T36] kauditd_printk_skb: 77 callbacks suppressed [ 249.750786][ T36] audit: type=1400 audit(2000000094.788:30996): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 250.402803][ T36] audit: type=1400 audit(2000000094.788:30997): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 250.436909][ T36] audit: type=1400 audit(2000000095.294:30998): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 252.599154][ T36] audit: type=1400 audit(2000000095.294:30999): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 253.223379][ C0] net_ratelimit: 124918 callbacks suppressed [ 253.223401][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 253.223409][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 253.223669][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 253.229495][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 253.241596][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 253.253624][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 253.265587][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 253.277573][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 253.289946][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 253.301479][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 253.897862][ T36] audit: type=1400 audit(2000000095.527:31000): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 255.779886][ T36] audit: type=1400 audit(2000000097.108:31001): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 257.757968][ T36] audit: type=1400 audit(2000000097.108:31002): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 258.579383][ C0] net_ratelimit: 122201 callbacks suppressed [ 258.579407][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 258.579535][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 258.585523][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 258.597538][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 258.609430][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 258.621588][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 258.633552][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 258.645721][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 258.657518][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 258.669499][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 263.935365][ C0] net_ratelimit: 127789 callbacks suppressed [ 263.935386][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 263.935391][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 263.935468][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 263.941522][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 263.953704][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 263.965425][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 263.977411][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 263.989379][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 264.001327][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 264.013293][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 264.086632][ T36] audit: type=1400 audit(2000000097.108:31003): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 264.553400][ T36] audit: type=1400 audit(2000000097.220:31004): avc: denied { execmem } for pid=12565 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 264.774930][ T36] audit: type=1400 audit(2000000097.482:31005): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 265.587963][ T36] audit: type=1400 audit(2000000097.482:31006): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 266.616365][ T36] audit: type=1400 audit(2000000097.492:31007): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 269.291352][ C0] net_ratelimit: 123455 callbacks suppressed [ 269.291375][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 269.291547][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 269.297487][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 269.309575][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 269.321438][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 269.333386][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 269.345285][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 269.357391][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 269.369299][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 269.381271][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 270.426637][ T36] audit: type=1400 audit(2000000097.492:31008): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 270.682643][ T148] audit: audit_backlog=65 > audit_backlog_limit=64 [ 270.689206][ T148] audit: audit_lost=57 audit_rate_limit=0 audit_backlog_limit=64 [ 271.826625][ T36] audit: type=1400 audit(2000000097.987:31009): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 272.375702][ T148] audit: backlog limit exceeded [ 272.523476][ T148] audit: audit_backlog=65 > audit_backlog_limit=64 [ 272.878756][T12570] audit: audit_backlog=65 > audit_backlog_limit=64 [ 272.898062][ T148] audit: audit_lost=58 audit_rate_limit=0 audit_backlog_limit=64 [ 272.908118][ T36] audit: type=1400 audit(2000000098.586:31010): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 273.602149][T12570] audit: audit_lost=59 audit_rate_limit=0 audit_backlog_limit=64 [ 274.647376][ C0] net_ratelimit: 121888 callbacks suppressed [ 274.647398][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 274.647421][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 274.653515][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 274.665501][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 274.677404][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 274.689467][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 274.701293][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 274.713452][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 274.725351][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 274.737346][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 277.610271][ T148] audit_log_start: 4 callbacks suppressed [ 277.610293][ T148] audit: audit_backlog=65 > audit_backlog_limit=64 [ 278.518419][T12570] audit: backlog limit exceeded [ 278.550294][ T36] audit: type=1400 audit(2000000098.586:31011): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 278.710919][ T148] audit: audit_lost=61 audit_rate_limit=0 audit_backlog_limit=64 [ 278.718692][ T148] audit: backlog limit exceeded [ 280.003361][ C0] net_ratelimit: 132475 callbacks suppressed [ 280.003382][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 280.003428][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 280.009477][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 280.021612][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 280.033448][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 280.045661][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 280.057552][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 280.069720][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 280.081581][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 280.093725][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 281.255172][ T36] audit: type=1400 audit(2000000098.698:31012): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 284.156611][ T148] audit: audit_backlog=65 > audit_backlog_limit=64 [ 284.205481][ T36] audit: type=1400 audit(2000000098.698:31013): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 284.333939][ T148] audit: audit_lost=62 audit_rate_limit=0 audit_backlog_limit=64 [ 285.234724][ T148] audit: backlog limit exceeded [ 285.357294][T12573] audit: audit_backlog=65 > audit_backlog_limit=64 [ 285.359447][ C1] net_ratelimit: 125243 callbacks suppressed [ 285.359470][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 285.363893][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 285.369957][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 285.381965][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 285.393931][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 285.405931][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 285.418316][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 285.430098][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 285.442152][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 285.454067][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 285.535912][ T148] audit: audit_backlog=65 > audit_backlog_limit=64 [ 285.628206][ T36] audit: type=1400 audit(2000000098.698:31014): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 286.174503][ T148] audit: audit_lost=63 audit_rate_limit=0 audit_backlog_limit=64 [ 286.185284][T12573] audit: audit_lost=64 audit_rate_limit=0 audit_backlog_limit=64 [ 286.196314][ T148] audit: backlog limit exceeded [ 290.715338][ C0] net_ratelimit: 127508 callbacks suppressed [ 290.715360][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 290.715405][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 290.721471][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 290.733554][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 290.745486][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 290.757489][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 290.769357][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 290.781467][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 290.793284][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 290.805301][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 293.399616][ T36] kauditd_printk_skb: 10 callbacks suppressed [ 293.399637][ T36] audit: type=1400 audit(2000000098.839:31015): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 293.468844][ T148] audit: audit_backlog=65 > audit_backlog_limit=64 [ 295.227708][ T148] audit: audit_lost=68 audit_rate_limit=0 audit_backlog_limit=64 [ 295.236552][ T148] audit: backlog limit exceeded [ 295.313123][ T36] audit: type=1400 audit(2000000098.839:31016): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 295.835753][ T148] audit: audit_backlog=65 > audit_backlog_limit=64 [ 296.071340][ C1] net_ratelimit: 127438 callbacks suppressed [ 296.071366][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 296.071399][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 296.077680][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 296.089508][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 296.101592][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 296.113518][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 296.125521][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 296.137919][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 296.150082][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 296.161879][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 297.069278][ T36] audit: type=1400 audit(2000000098.839:31017): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 297.101545][ T148] audit: audit_lost=69 audit_rate_limit=0 audit_backlog_limit=64 [ 297.976566][ T148] audit: backlog limit exceeded [ 298.200354][ T148] audit: audit_backlog=65 > audit_backlog_limit=64 [ 299.336228][ T36] kauditd_printk_skb: 67 callbacks suppressed [ 299.336251][ T36] audit: type=1400 audit(2000000141.175:31083): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 301.427318][ C0] net_ratelimit: 122020 callbacks suppressed [ 301.427339][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 301.427391][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 301.433438][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 301.445451][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 301.457636][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 301.469539][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 301.481257][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 301.493247][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 301.505115][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 301.517167][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 304.476919][ T36] audit: type=1400 audit(2000000141.586:31084): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 306.783384][ C0] net_ratelimit: 115876 callbacks suppressed [ 306.783419][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 306.783441][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 306.789683][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 306.801791][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 306.813708][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 306.825875][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 306.837883][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 306.850023][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 306.861847][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 306.873856][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 309.072970][ T36] audit: type=1400 audit(2000000141.615:31085): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 311.756099][ T36] audit: type=1400 audit(2000000141.652:31086): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 312.139314][ C0] net_ratelimit: 113996 callbacks suppressed [ 312.139338][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 312.139465][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 312.145427][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 312.157411][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 312.169411][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 312.181560][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 312.193303][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 312.205500][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 312.217358][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 312.229322][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 312.996244][ T36] audit: type=1400 audit(2000000143.008:31087): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 316.255408][ T36] audit: type=1400 audit(2000000143.018:31088): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 317.495336][ C0] net_ratelimit: 116977 callbacks suppressed [ 317.495361][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 317.495528][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 317.501531][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 317.513844][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 317.525652][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 317.537737][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 317.549650][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 317.561830][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 317.573684][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 317.585782][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 318.705779][ T36] audit: type=1400 audit(2000000143.981:31089): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 320.585079][ T36] audit: type=1400 audit(2000000147.077:31090): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 320.757023][ T36] audit: type=1400 audit(2000000150.276:31091): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 321.954341][ T36] audit: type=1400 audit(2000000150.276:31092): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 322.851328][ C1] net_ratelimit: 111283 callbacks suppressed [ 322.851355][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 322.851512][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 322.857505][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 322.869506][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 322.882318][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 322.894231][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 322.906593][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 322.918386][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 322.930539][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 322.942382][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 322.981255][ T36] audit: type=1400 audit(2000000150.622:31093): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 323.996131][ T36] audit: type=1400 audit(2000000150.622:31094): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 324.476584][ T36] audit: type=1400 audit(2000000152.671:31095): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 324.900093][ T36] audit: type=1400 audit(2000000152.671:31096): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 325.301863][ T36] audit: type=1400 audit(2000000152.821:31097): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 325.856217][ T36] audit: type=1400 audit(2000000152.924:31098): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 326.584384][ T36] audit: type=1400 audit(2000000153.784:31099): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 327.951619][ T36] audit: type=1400 audit(2000000153.793:31100): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 328.207342][ C1] net_ratelimit: 110038 callbacks suppressed [ 328.207367][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 328.207409][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 328.213696][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 328.225517][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 328.238014][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 328.249831][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 328.261816][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 328.273736][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 328.285882][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 328.297703][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 328.636218][ T36] audit: type=1400 audit(2000000153.859:31101): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 329.022463][ T148] audit: audit_backlog=65 > audit_backlog_limit=64 [ 329.029033][ T148] audit: audit_lost=71 audit_rate_limit=0 audit_backlog_limit=64 [ 329.213922][ T36] audit: type=1400 audit(2000000153.859:31102): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 329.287251][ T148] audit: backlog limit exceeded [ 329.466871][ T148] audit: audit_backlog=65 > audit_backlog_limit=64 [ 329.499600][ T148] audit: audit_lost=72 audit_rate_limit=0 audit_backlog_limit=64 [ 329.565886][ T36] audit: type=1400 audit(2000000154.645:31103): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 329.629558][ T148] audit: backlog limit exceeded [ 333.563331][ C0] net_ratelimit: 115829 callbacks suppressed [ 333.563358][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 333.563433][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 333.569486][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 333.581525][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 333.593517][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 333.605508][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 333.617394][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 333.629361][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 333.641373][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 333.653443][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 333.697722][ T36] kauditd_printk_skb: 85 callbacks suppressed [ 333.697745][ T36] audit: type=1400 audit(2000000173.315:31186): avc: denied { execmem } for pid=12579 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 334.997841][ T36] audit: type=1400 audit(2000000173.381:31187): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 336.781264][ T36] audit: type=1400 audit(2000000173.418:31188): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 337.330581][ T36] audit: type=1400 audit(2000000173.474:31189): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 338.685991][ T36] audit: type=1400 audit(2000000173.474:31190): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 338.919317][ C0] net_ratelimit: 120164 callbacks suppressed [ 338.919343][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 338.919361][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 338.925465][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 338.937590][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 338.949368][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 338.961775][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 338.973955][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 338.985949][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 338.997864][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 339.010171][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 339.090820][ T36] audit: type=1400 audit(2000000173.568:31191): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 339.666033][ T36] audit: type=1400 audit(2000000173.568:31192): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 339.839577][ T36] audit: type=1400 audit(2000000174.587:31193): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 340.480728][ T36] audit: type=1400 audit(2000000176.009:31194): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 340.801638][ T36] audit: type=1400 audit(2000000176.112:31195): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 340.840861][ T148] audit: audit_backlog=65 > audit_backlog_limit=64 [ 340.930323][ T148] audit: audit_lost=74 audit_rate_limit=0 audit_backlog_limit=64 [ 340.938119][ T148] audit: backlog limit exceeded [ 340.948923][T12582] audit: audit_backlog=65 > audit_backlog_limit=64 [ 340.971163][T12583] audit: audit_backlog=65 > audit_backlog_limit=64 [ 344.275337][ C0] net_ratelimit: 103689 callbacks suppressed [ 344.275362][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 344.275411][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 344.281490][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 344.293727][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 344.305561][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 344.317637][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 344.329476][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 344.341503][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 344.353381][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 344.365368][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 344.447416][ T36] kauditd_printk_skb: 1052 callbacks suppressed [ 344.447436][ T36] audit: type=1400 audit(2000000183.371:32244): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 344.895847][ T36] audit: type=1400 audit(2000000183.408:32245): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 344.997853][ T148] audit: audit_backlog=65 > audit_backlog_limit=64 [ 345.036047][ T148] audit: audit_lost=77 audit_rate_limit=0 audit_backlog_limit=64 [ 345.043848][ T148] audit: backlog limit exceeded [ 345.051297][ T36] audit: type=1400 audit(2000000183.408:32246): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 345.131978][ T148] audit: audit_backlog=65 > audit_backlog_limit=64 [ 345.138542][ T148] audit: audit_lost=78 audit_rate_limit=0 audit_backlog_limit=64 [ 345.241474][T12609] audit: audit_backlog=65 > audit_backlog_limit=64 [ 345.250719][ T36] audit: type=1400 audit(2000000183.408:32247): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 349.631325][ C0] net_ratelimit: 98545 callbacks suppressed [ 349.631346][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 349.631393][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 349.637390][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 349.649514][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 349.661344][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 349.673472][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 349.685303][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 349.697274][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 349.709203][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 349.721212][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 349.804558][ T36] kauditd_printk_skb: 2213 callbacks suppressed [ 349.804578][ T36] audit: type=1400 audit(2000000188.385:34329): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 349.890976][ T36] audit: type=1400 audit(2000000188.413:34330): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 349.938309][ T148] audit: audit_backlog=65 > audit_backlog_limit=64 [ 349.963128][ T148] audit: audit_lost=123 audit_rate_limit=0 audit_backlog_limit=64 [ 349.971001][ T148] audit: backlog limit exceeded [ 349.980773][ T36] audit: type=1400 audit(2000000188.413:34331): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 350.019112][ T148] audit: audit_backlog=65 > audit_backlog_limit=64 [ 350.025674][ T148] audit: audit_lost=124 audit_rate_limit=0 audit_backlog_limit=64 [ 350.049429][ T36] audit: type=1400 audit(2000000188.413:34332): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 350.082073][ T148] audit: backlog limit exceeded [ 351.484554][ T37] INFO: task syz.1.6090:12553 blocked for more than 122 seconds. [ 351.494551][ T37] Not tainted 6.12.30-syzkaller-g1ccb219f8cda #0 [ 351.501432][ T37] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 351.580604][ T37] task:syz.1.6090 state:D stack:0 pid:12553 tgid:12553 ppid:466 flags:0x00004006 [ 351.625087][ T37] Call Trace: [ 351.628522][ T37] [ 351.656444][ T37] __schedule+0x145b/0x1f10 [ 351.661039][ T37] ? __sched_text_start+0x10/0x10 [ 351.699116][ T37] ? rcu_segcblist_entrain+0x69/0x2b0 [ 351.722863][ T37] ? _raw_spin_unlock+0x45/0x60 [ 351.743925][ T37] ? __kasan_check_write+0x18/0x20 [ 351.777188][ T37] schedule+0xc6/0x240 [ 351.795903][ T37] schedule_timeout+0xb2/0x3a0 [ 351.800757][ T37] ? __cfi_schedule_timeout+0x10/0x10 [ 351.830113][ T37] ? __cfi__raw_spin_lock_irq+0x10/0x10 [ 351.871035][ T37] ? __smp_call_single_queue+0xd5/0x390 [ 351.898044][ T37] ? generic_exec_single+0x201/0x500 [ 351.903416][ T37] wait_for_common+0x359/0x630 [ 351.936371][ T37] ? wait_for_completion+0x40/0x40 [ 351.946554][ T37] ? _raw_spin_lock_irqsave+0xaf/0x150 [ 351.985436][ T37] wait_for_completion+0x1c/0x40 [ 351.990832][ T37] rcu_barrier+0x415/0x530 [ 352.029658][ T37] netdev_run_todo+0x10e/0xcb0 [ 352.034619][ T37] ? task_work_run+0x1e0/0x250 [ 352.080760][ T37] ? do_exit+0x9b4/0x2630 [ 352.085167][ T37] ? __cfi_netdev_run_todo+0x10/0x10 [ 352.117684][ T37] ? mutex_lock+0x92/0x1c0 [ 352.131695][ T37] rtnl_unlock+0x12/0x20 [ 352.162711][ T37] unregister_netdev+0x156/0x1c0 [ 352.184595][ T37] ? __cfi_unregister_netdev+0x10/0x10 [ 352.215381][ T37] unregister_candev+0x19/0x30 [ 352.226801][ T37] slcan_close+0x82/0x150 [ 352.252777][ T37] ? __cfi_slcan_close+0x10/0x10 [ 352.257792][ T37] tty_ldisc_release+0x2ad/0x600 [ 352.295995][ T37] tty_release_struct+0x2d/0xe0 [ 352.301115][ T37] tty_release+0xc0a/0x1230 [ 352.350007][ T37] ? __cfi_tty_release+0x10/0x10 [ 352.355031][ T37] __fput+0x1fe/0xa00 [ 352.382418][ T37] ? __cfi__raw_spin_lock_irq+0x10/0x10 [ 352.388053][ T37] ____fput+0x20/0x30 [ 352.419589][ T37] task_work_run+0x1e0/0x250 [ 352.435898][ T37] ? __cfi_task_work_run+0x10/0x10 [ 352.441178][ T37] ? __kasan_check_write+0x18/0x20 [ 352.489762][ T37] do_exit+0x9b4/0x2630 [ 352.493994][ T37] ? hrtimer_try_to_cancel+0x3fe/0x6b0 [ 352.522331][ T37] ? __cfi_do_exit+0x10/0x10 [ 352.526986][ T37] ? hrtimer_cancel+0x31/0x60 [ 352.660427][ T37] ? __kasan_check_write+0x18/0x20 [ 352.665717][ T37] ? _raw_spin_lock_irq+0x8d/0x120 [ 352.703035][ T37] ? __cfi__raw_spin_lock_irq+0x10/0x10 [ 352.708667][ T37] do_group_exit+0x22a/0x300 [ 352.749195][ T37] ? __kasan_check_write+0x18/0x20 [ 352.771142][ T37] get_signal+0x139d/0x14f0 [ 352.794189][ T37] arch_do_signal_or_restart+0x96/0x720 [ 352.819987][ T37] ? __cfi_arch_do_signal_or_restart+0x10/0x10 [ 352.826481][ T37] ? __kasan_check_write+0x18/0x20 [ 353.003322][ T37] syscall_exit_to_user_mode+0x58/0xb0 [ 353.033195][ T37] do_syscall_64+0x64/0xf0 [ 353.037881][ T37] ? clear_bhb_loop+0x50/0xa0 [ 353.075643][ T37] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 353.081720][ T37] RIP: 0033:0x7f1c5eb8e929 [ 353.131085][ T37] RSP: 002b:00007fff4363f948 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 353.155940][ T37] RAX: ffffffffffffff92 RBX: 000000000002eb13 RCX: 00007f1c5eb8e929 [ 353.204221][ T37] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f1c5edb5fac [ 353.237066][ T37] RBP: 0000000000000032 R08: 7fffffffffffffff R09: 000000024363fc3f [ 353.260538][ T37] R10: 00007fff4363fa40 R11: 0000000000000246 R12: 00007f1c5edb5fac [ 353.293339][ T37] R13: 00007fff4363fa40 R14: 000000000002eb45 R15: 00007fff4363fa60 [ 353.328520][ T37] [ 353.346752][ T37] INFO: task syz.2.6092:12559 blocked for more than 124 seconds. [ 353.376007][ T37] Not tainted 6.12.30-syzkaller-g1ccb219f8cda #0 [ 353.382903][ T37] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 353.574222][ T37] task:syz.2.6092 state:D stack:0 pid:12559 tgid:12558 ppid:468 flags:0x00004004 [ 353.619949][ T37] Call Trace: [ 353.623293][ T37] [ 353.626237][ T37] __schedule+0x145b/0x1f10 [ 353.688802][ T37] ? __sched_text_start+0x10/0x10 [ 353.694008][ T37] ? __cfi_percpu_ref_switch_to_atomic_rcu+0x10/0x10 [ 353.700739][ T37] ? __call_rcu_common+0x40b/0x6f0 [ 353.705932][ T37] schedule+0xc6/0x240 [ 353.710033][ T37] schedule_timeout+0xb2/0x3a0 [ 353.714841][ T37] ? __cfi_schedule_timeout+0x10/0x10 [ 353.720275][ T37] ? __cfi__raw_spin_lock_irq+0x10/0x10 [ 353.725898][ T37] ? __percpu_ref_switch_mode+0x345/0x5f0 [ 353.731659][ T37] wait_for_common+0x359/0x630 [ 353.736490][ T37] ? __cfi__raw_spin_lock_irqsave+0x10/0x10 [ 353.742422][ T37] ? wait_for_completion+0x40/0x40 [ 353.747598][ T37] ? _raw_spin_unlock_irqrestore+0x4a/0x70 [ 353.753432][ T37] ? percpu_ref_kill_and_confirm+0xf4/0x220 [ 353.759398][ T37] ? kill_ioctx+0x2b0/0x3d0 [ 353.763942][ T37] wait_for_completion+0x1c/0x40 [ 353.768943][ T37] exit_aio+0x2df/0x3b0 [ 353.773140][ T37] ? __cfi_exit_aio+0x10/0x10 [ 353.777859][ T37] ? uprobe_clear_state+0x2cd/0x340 [ 353.783133][ T37] __mmput+0x30/0x320 [ 353.787137][ T37] ? mmput+0x4d/0x170 [ 353.791173][ T37] mmput+0x55/0x170 [ 353.795020][ T37] do_exit+0x910/0x2630 [ 353.799214][ T37] ? __cfi_do_exit+0x10/0x10 [ 353.803852][ T37] ? __cfi_handle_mm_fault+0x10/0x10 [ 353.809171][ T37] ? __kasan_check_write+0x18/0x20 [ 353.814333][ T37] ? _raw_spin_lock_irq+0x8d/0x120 [ 353.819483][ T37] ? __cfi__raw_spin_lock_irq+0x10/0x10 [ 353.825109][ T37] do_group_exit+0x22a/0x300 [ 353.829723][ T37] ? __kasan_check_write+0x18/0x20 [ 353.834887][ T37] get_signal+0x139d/0x14f0 [ 353.839420][ T37] arch_do_signal_or_restart+0x96/0x720 [ 353.845031][ T37] ? __cfi_arch_do_signal_or_restart+0x10/0x10 [ 353.851236][ T37] ? __put_user_8+0x11/0x30 [ 353.855813][ T37] ? __se_sys_io_setup+0x151/0x230 [ 353.860963][ T37] syscall_exit_to_user_mode+0x58/0xb0 [ 353.866478][ T37] do_syscall_64+0x64/0xf0 [ 353.870917][ T37] ? clear_bhb_loop+0x50/0xa0 [ 353.875653][ T37] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 353.881571][ T37] RIP: 0033:0x7f769558e929 [ 353.886150][ T37] RSP: 002b:00007f7696451038 EFLAGS: 00000246 ORIG_RAX: 00000000000000ce [ 353.894590][ T37] RAX: 0000000000000000 RBX: 00007f76957b5fa0 RCX: 00007f769558e929 [ 353.902617][ T37] RDX: 0000000000000000 RSI: 00002000000001c0 RDI: 0000000000000008 [ 353.910731][ T37] RBP: 00007f7695610b39 R08: 0000000000000000 R09: 0000000000000000 [ 353.918779][ T37] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 353.926774][ T37] R13: 0000000000000001 R14: 00007f76957b5fa0 R15: 00007fffb460fec8 [ 353.934802][ T37] [ 353.967361][ T37] NMI backtrace for cpu 1 [ 353.967385][ T37] CPU: 1 UID: 0 PID: 37 Comm: khungtaskd Not tainted 6.12.30-syzkaller-g1ccb219f8cda #0 7a2e1ed1be67dd4e5f42c8044c2ea2ca0199c2ac [ 353.967414][ T37] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 353.967428][ T37] Call Trace: [ 353.967435][ T37] [ 353.967443][ T37] __dump_stack+0x21/0x30 [ 353.967475][ T37] dump_stack_lvl+0x10c/0x190 [ 353.967500][ T37] ? __cfi_dump_stack_lvl+0x10/0x10 [ 353.967527][ T37] dump_stack+0x19/0x20 [ 353.967568][ T37] nmi_cpu_backtrace+0x2bf/0x2d0 [ 353.967620][ T37] ? rcu_read_unlock_special+0xab/0x480 [ 353.967644][ T37] ? __cfi_nmi_cpu_backtrace+0x10/0x10 [ 353.967678][ T37] ? sched_show_task+0x379/0x560 [ 353.967703][ T37] ? __rcu_read_unlock+0xc0/0xc0 [ 353.967726][ T37] ? __cfi_nmi_raise_cpu_backtrace+0x10/0x10 [ 353.967752][ T37] ? __cfi_nmi_raise_cpu_backtrace+0x10/0x10 [ 353.967778][ T37] nmi_trigger_cpumask_backtrace+0x142/0x2c0 [ 353.967814][ T37] arch_trigger_cpumask_backtrace+0x14/0x20 [ 353.967839][ T37] watchdog+0xd8f/0xed0 [ 353.967867][ T37] ? __cfi_watchdog+0x10/0x10 [ 353.967892][ T37] ? __kasan_check_read+0x15/0x20 [ 353.967920][ T37] ? __kthread_parkme+0x138/0x180 [ 353.967959][ T37] ? schedule+0xc6/0x240 [ 353.967983][ T37] kthread+0x2ca/0x370 [ 353.968016][ T37] ? __cfi_watchdog+0x10/0x10 [ 353.968042][ T37] ? __cfi_kthread+0x10/0x10 [ 353.968075][ T37] ret_from_fork+0x64/0xa0 [ 353.968102][ T37] ? __cfi_kthread+0x10/0x10 [ 353.968136][ T37] ret_from_fork_asm+0x1a/0x30 [ 353.968169][ T37] [ 353.968178][ T37] Sending NMI from CPU 1 to CPUs 0: [ 354.177312][ C0] NMI backtrace for cpu 0 [ 354.177328][ C0] CPU: 0 UID: 0 PID: 20 Comm: rcuop/0 Not tainted 6.12.30-syzkaller-g1ccb219f8cda #0 7a2e1ed1be67dd4e5f42c8044c2ea2ca0199c2ac [ 354.177353][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 354.177364][ C0] RIP: 0010:rt6_score_route+0x8/0x8a0 [ 354.177392][ C0] Code: ff e8 9c 09 fd fc e9 6a fe ff ff 0f 1f 80 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 55 48 89 e5 41 57 41 56 <41> 55 41 54 53 48 83 ec 68 41 89 ce 89 d3 41 89 f7 49 89 fd 49 bc [ 354.177408][ C0] RSP: 0018:ffffc900000071d8 EFLAGS: 00000246 [ 354.177424][ C0] RAX: ffffffff84e09fdd RBX: 0000000000000000 RCX: 0000000000000003 [ 354.177437][ C0] RDX: 0000000000000017 RSI: 0000000000000001 RDI: ffff88812f93bcc0 [ 354.177449][ C0] RBP: ffffc900000071e8 R08: ffffc90000007540 R09: ffffc90000007550 [ 354.177462][ C0] R10: ffffc900000076b0 R11: fffff52000000eda R12: 0000000000000001 [ 354.177475][ C0] R13: 1ffff11025f27798 R14: 0000000000000003 R15: 0000000000000000 [ 354.177486][ C0] FS: 0000000000000000(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 354.177500][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 354.177513][ C0] CR2: 00007ffdeccf5f6c CR3: 000000010b3ac000 CR4: 00000000003526b0 [ 354.177528][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 354.177539][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 354.177550][ C0] Call Trace: [ 354.177556][ C0] [ 354.177564][ C0] find_match+0x176/0x10f0 [ 354.177585][ C0] __find_rr_leaf+0x23c/0x790 [ 354.177604][ C0] ? rt6_check_expired+0x250/0x250 [ 354.177622][ C0] ? __siphash_unaligned+0x26e/0x3c0 [ 354.177645][ C0] fib6_table_lookup+0x2c5/0x9b0 [ 354.177668][ C0] ? __cfi_flow_hash_from_keys+0x10/0x10 [ 354.177697][ C0] ? __cfi_fib6_table_lookup+0x10/0x10 [ 354.177719][ C0] ? ipv6_rcv+0xed/0x220 [ 354.177741][ C0] ip6_pol_route+0x167/0x12c0 [ 354.177763][ C0] ? __cfi_br_dev_queue_push_xmit+0x10/0x10 [ 354.177780][ C0] ? __cfi_ip6_pol_route+0x10/0x10 [ 354.177802][ C0] ? netif_receive_skb+0x161/0x7b0 [ 354.177819][ C0] ? __cfi_netif_receive_skb+0x10/0x10 [ 354.177834][ C0] ? br_flood+0x67e/0x730 [ 354.177850][ C0] ? br_pass_frame_up+0x126/0x1c0 [ 354.177868][ C0] ip6_pol_route_input+0x5a/0x80 [ 354.177891][ C0] fib6_rule_lookup+0x4cc/0x6b0 [ 354.177910][ C0] ? __cfi_ip6_pol_route_input+0x10/0x10 [ 354.177935][ C0] ? __cfi_fib6_rule_lookup+0x10/0x10 [ 354.177955][ C0] ? ip6t_do_table+0x1dc/0x14d0 [ 354.177981][ C0] ip6_route_input+0x59f/0x8d0 [ 354.178017][ C0] ? __cfi_ip6_route_input+0x10/0x10 [ 354.178041][ C0] ? __cfi_ip6t_do_table+0x10/0x10 [ 354.178064][ C0] ? ip6_mc_input+0x4f3/0x670 [ 354.178087][ C0] ? __cfi_ip6table_mangle_hook+0x10/0x10 [ 354.178103][ C0] ip6_rcv_finish+0x15a/0x3c0 [ 354.178124][ C0] ipv6_rcv+0xed/0x220 [ 354.178144][ C0] ? __kasan_check_write+0x18/0x20 [ 354.178164][ C0] ? __cfi_ipv6_rcv+0x10/0x10 [ 354.178195][ C0] ? __cfi_ip6_rcv_finish+0x10/0x10 [ 354.178215][ C0] ? __cfi__raw_spin_lock_irq+0x10/0x10 [ 354.178242][ C0] process_backlog+0x44b/0xae0 [ 354.178260][ C0] __napi_poll+0xd0/0x610 [ 354.178285][ C0] net_rx_action+0x584/0xce0 [ 354.178302][ C0] ? __cfi_net_rx_action+0x10/0x10 [ 354.178317][ C0] ? sched_clock+0x44/0x60 [ 354.178335][ C0] ? __cfi_sched_clock_cpu+0x10/0x10 [ 354.178356][ C0] ? irqtime_account_irq+0x51/0x1c0 [ 354.178375][ C0] handle_softirqs+0x1ae/0x630 [ 354.178399][ C0] __do_softirq+0xf/0x16 [ 354.178415][ C0] do_softirq+0xa6/0x100 [ 354.178435][ C0] [ 354.178440][ C0] [ 354.178447][ C0] ? __cfi_do_softirq+0x10/0x10 [ 354.178467][ C0] ? avc_node_free+0x2b6/0x2f0 [ 354.178485][ C0] ? __cfi_avc_node_free+0x10/0x10 [ 354.178502][ C0] __local_bh_enable_ip+0x74/0x80 [ 354.178523][ C0] rcu_do_batch+0x5c6/0xd20 [ 354.178545][ C0] ? rcu_core+0xd20/0xd20 [ 354.178562][ C0] ? __kasan_check_write+0x18/0x20 [ 354.178581][ C0] ? _raw_spin_unlock_irqrestore+0x4a/0x70 [ 354.178598][ C0] ? __kasan_check_read+0x15/0x20 [ 354.178616][ C0] ? rcu_nocb_cb_kthread+0x4c7/0xac0 [ 354.178636][ C0] rcu_nocb_cb_kthread+0x4dc/0xac0 [ 354.178658][ C0] ? __cfi_rcu_nocb_cb_kthread+0x10/0x10 [ 354.178677][ C0] ? __kasan_check_write+0x18/0x20 [ 354.178696][ C0] ? _raw_spin_lock_irqsave+0xaf/0x150 [ 354.178721][ C0] ? __cfi__raw_spin_lock_irqsave+0x10/0x10 [ 354.178745][ C0] ? _raw_spin_lock_irqsave+0xaf/0x150 [ 354.178771][ C0] ? set_cpus_allowed_ptr+0x93/0xe0 [ 354.178794][ C0] ? __cfi_set_cpus_allowed_ptr+0x10/0x10 [ 354.178818][ C0] ? __kasan_check_read+0x15/0x20 [ 354.178837][ C0] ? __kthread_parkme+0x138/0x180 [ 354.178858][ C0] ? schedule+0xc6/0x240 [ 354.178874][ C0] kthread+0x2ca/0x370 [ 354.178898][ C0] ? __cfi_rcu_nocb_cb_kthread+0x10/0x10 [ 354.178918][ C0] ? __cfi_kthread+0x10/0x10 [ 354.178943][ C0] ret_from_fork+0x64/0xa0 [ 354.178962][ C0] ? __cfi_kthread+0x10/0x10 [ 354.178986][ C0] ret_from_fork_asm+0x1a/0x30 [ 354.179010][ C0] [ 354.987324][ C1] net_ratelimit: 90949 callbacks suppressed [ 354.987348][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 354.987403][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 354.993365][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 355.005353][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 355.017455][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 355.029315][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 355.041374][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 355.053159][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0) [ 355.065275][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 355.077129][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:96:40:b6:7c:02:31, vlan:0)