last executing test programs: 16.526592379s ago: executing program 0 (id=2538): mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2000002, 0x4ca31, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4) 16.029150475s ago: executing program 0 (id=2543): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000340)={0x30, r1, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_FLAGS={0x8, 0x5, 0xe69b6b7cd81c52aa}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg0\x00'}]}, 0x30}}, 0x0) 15.579156537s ago: executing program 0 (id=2548): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000000)=0xfffffff7) 15.005052158s ago: executing program 3 (id=2552): r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000002c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @dev}}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'syztnl1\x00', &(0x7f0000000180)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @private0}}) 5.836003155s ago: executing program 4 (id=2565): ioperm(0x0, 0x3, 0x3e) r0 = socket$tipc(0x1e, 0x2, 0x0) getsockopt$sock_int(r0, 0x1, 0x2f, 0x0, &(0x7f0000000140)) 5.755140483s ago: executing program 3 (id=2566): syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r0 = syz_open_dev$sndpcmc(&(0x7f0000000240), 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 5.705262126s ago: executing program 0 (id=2569): r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = dup(r0) ioctl$TIOCL_SETSEL(r1, 0x541c, &(0x7f0000001900)={0x2, {0x2, 0x0, 0x0, 0x101}}) 5.306393542s ago: executing program 4 (id=2570): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4020aed2, &(0x7f00000000c0)={0x5, 0x0, &(0x7f0000003000/0x4000)=nil}) 5.209988702s ago: executing program 3 (id=2571): r0 = syz_open_dev$usbfs(&(0x7f0000000100), 0x77, 0x101301) ioctl$USBDEVFS_FREE_STREAMS(r0, 0x802c550a, &(0x7f0000000000)=ANY=[@ANYBLOB="02002303100007006000000002000020d3"]) ioctl$USBDEVFS_CONTROL(r0, 0x4008550c, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 5.129306165s ago: executing program 0 (id=2572): sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000001800090000000000000000001c140000fe"], 0x24}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 4.615643121s ago: executing program 3 (id=2575): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f00000000c0)=[{0x20, 0x0, 0x0, 0xfffff038}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000000180), 0x4000190, 0x0) 4.542613696s ago: executing program 0 (id=2578): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x5) ioctl$TCFLSH(r0, 0x8925, 0xffffffffffffffd) 4.075222025s ago: executing program 4 (id=2579): unshare(0x2c020400) syz_clone(0xc800411, 0x0, 0x0, 0x0, 0x0, 0x0) waitid(0x2, 0x0, 0x0, 0x4, 0x0) 3.463803316s ago: executing program 3 (id=2583): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000000)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "4dd308", 0x14, 0x6, 0x0, @local, @local, {[], {{0x0, 0x4001, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 3.329081409s ago: executing program 1 (id=2584): prctl$PR_SET_VMA(0x53564d41, 0x0, &(0x7f0000f1a000/0x2000)=nil, 0x2000, &(0x7f0000000000)) prctl$PR_SET_VMA(0x53564d41, 0x0, &(0x7f0000ffc000/0x3000)=nil, 0x3000, &(0x7f00000020c0)='smaps\x00') mlock(&(0x7f0000ff9000/0x7000)=nil, 0x7000) 3.274590232s ago: executing program 4 (id=2586): r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000280)=ANY=[@ANYBLOB="12010000703ac020580406709169000000010902120001000000000904"], 0x0) syz_usb_control_io$cdc_ecm(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) 3.028768911s ago: executing program 3 (id=2587): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CCA_ED_LEVEL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x20, r1, 0x1, 0x70bd29, 0x25dfdbff, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x20}, 0x1, 0x0, 0x0, 0x44004}, 0x8080) 2.94235739s ago: executing program 1 (id=2588): r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000180)=[@mask_cswp={0x58, 0x114, 0x9, {{}, &(0x7f0000000080), 0x0}}, @fadd={0x58, 0x114, 0x6, {{}, 0x0, 0x0}}], 0xb0}, 0x0) 2.922305384s ago: executing program 2 (id=2589): r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x11, @empty, 0x0, 0x0, 'lblcr\x00'}, 0x2c) syz_emit_ethernet(0x3e, &(0x7f0000000080)={@local, @empty, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x27, 0x0, 0x0, 0x0, 0x1, 0x0, @private=0xa010101, @dev}, @source_quench={0x4, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x84, 0x0, @empty, @dev}}}}}}, 0x0) 2.704944709s ago: executing program 1 (id=2590): r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) io_setup(0x5, &(0x7f0000002340)=0x0) io_submit(r1, 0x1, &(0x7f00000014c0)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 2.675287634s ago: executing program 2 (id=2591): r0 = socket$inet(0x2, 0x3, 0x4) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000000400)=0x6, 0x4) bind$inet(r0, &(0x7f0000000500)={0x2, 0x4, @local}, 0x10) 2.370493059s ago: executing program 2 (id=2592): r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0xc, &(0x7f0000000040)=0x7f, 0x4) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001a000100000000000000000002", @ANYRES32], 0x30}}, 0x0) 2.228455339s ago: executing program 2 (id=2593): r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={&(0x7f00000002c0)=@l2tp6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000340)="f40000ffffff890000000000000000000000ffffff8d00000100"/40, 0x28}], 0x1}, 0x4040010) 2.066519574s ago: executing program 1 (id=2594): r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10, 0x258a, 0x33, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x5}}, {{{0x9, 0x5, 0x81, 0x3, 0x40}}}}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, &(0x7f0000000440)={0x2c, &(0x7f0000000080)=ANY=[@ANYBLOB="000d0600000006024b00c5"], 0x0, 0x0, 0x0, 0x0}, 0x0) 1.950403803s ago: executing program 2 (id=2595): mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x0, 0x5d031, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x0) mremap(&(0x7f0000000000/0x9000)=nil, 0xa00000, 0x600000, 0x0, &(0x7f0000a00000/0x600000)=nil) 1.714951126s ago: executing program 2 (id=2596): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)={0x20, r1, 0xb03, 0x0, 0x0, {}, [@TIPC_NLA_MON={0xc, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8}]}]}, 0x20}}, 0x0) 1.259065422s ago: executing program 4 (id=2597): ioperm(0x0, 0x20, 0x10001) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) newfstatat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 990.387789ms ago: executing program 4 (id=2598): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f00000008c0), r0) sendmsg$NLBL_MGMT_C_ADD(r0, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={&(0x7f0000000940)={0x38, r1, 0x1, 0x70bd29, 0x25dfdbff, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x7}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @initdev={0xac, 0x1e, 0x1, 0x0}}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @private=0xa010102}, @NLBL_MGMT_A_DOMAIN={0xc, 0x1, 'nl80211\x00'}]}, 0x38}, 0x1, 0x0, 0x0, 0x40010}, 0x80) 117.524074ms ago: executing program 1 (id=2599): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) ioctl$TCFLSH(r0, 0x540b, 0x1) 0s ago: executing program 1 (id=2600): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x5, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) kernel console output (not intermixed with test programs): arbiter" dev="devtmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 236.145659][ C1] vkms_vblank_simulate: vblank timer overrun [ 236.260060][ T7812] netlink: 16 bytes leftover after parsing attributes in process `syz.4.1176'. [ 236.305242][ T30] audit: type=1400 audit(1727402301.397:246): avc: denied { open } for pid=7801 comm="syz.1.1173" path="/dev/vga_arbiter" dev="devtmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 236.329767][ C1] vkms_vblank_simulate: vblank timer overrun [ 236.369115][ T5308] usb 4-1: USB disconnect, device number 75 [ 236.375987][ T30] audit: type=1400 audit(1727402301.637:247): avc: denied { create } for pid=7809 comm="syz.0.1175" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 236.407982][ T30] audit: type=1400 audit(1727402301.657:248): avc: denied { getopt } for pid=7809 comm="syz.0.1175" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 236.427437][ C1] vkms_vblank_simulate: vblank timer overrun [ 237.160296][ T7846] netlink: 60 bytes leftover after parsing attributes in process `syz.4.1191'. [ 237.182506][ T7846] netlink: 60 bytes leftover after parsing attributes in process `syz.4.1191'. [ 237.193815][ T7853] netlink: 'syz.1.1197': attribute type 8 has an invalid length. [ 237.743504][ T7870] veth0_vlan: entered allmulticast mode [ 237.924966][ T7883] raw_sendmsg: syz.0.1210 forgot to set AF_INET. Fix it! [ 238.083529][ T7889] ISOFS: Unable to identify CD-ROM format. [ 238.257364][ T5224] usb 4-1: new high-speed USB device number 76 using dummy_hcd [ 238.379874][ T7901] Illegal XDP return value 2434861947 on prog (id 106) dev N/A, expect packet loss! [ 238.437686][ T5224] usb 4-1: Using ep0 maxpacket: 16 [ 238.490027][ T5224] usb 4-1: New USB device found, idVendor=17ef, idProduct=721e, bcdDevice=de.06 [ 238.526491][ T5224] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 238.534586][ T5224] usb 4-1: Product: syz [ 238.572144][ T5224] usb 4-1: Manufacturer: syz [ 238.576599][ T7909] netlink: 'syz.4.1223': attribute type 5 has an invalid length. [ 238.596431][ T5224] usb 4-1: SerialNumber: syz [ 238.618233][ T5224] r8152-cfgselector 4-1: Unknown version 0x0000 [ 238.624614][ T5224] r8152-cfgselector 4-1: config 0 descriptor?? [ 239.147128][ T5278] r8152-cfgselector 4-1: USB disconnect, device number 76 [ 239.756671][ T25] usb 1-1: new high-speed USB device number 75 using dummy_hcd [ 239.919631][ T25] usb 1-1: config 0 has an invalid interface number: 92 but max is 0 [ 239.928698][ T25] usb 1-1: config 0 has no interface number 0 [ 239.934863][ T25] usb 1-1: config 0 interface 92 altsetting 0 endpoint 0xB has invalid maxpacket 512, setting to 64 [ 239.985694][ T25] usb 1-1: config 0 interface 92 altsetting 0 has an invalid descriptor for endpoint zero, skipping [ 240.026439][ T25] usb 1-1: config 0 interface 92 altsetting 0 has an endpoint descriptor with address 0x94, changing to 0x84 [ 240.056502][ T25] usb 1-1: config 0 interface 92 altsetting 0 endpoint 0x84 has an invalid bInterval 166, changing to 7 [ 240.089965][ T30] kauditd_printk_skb: 19 callbacks suppressed [ 240.089991][ T30] audit: type=1400 audit(1727402305.507:268): avc: denied { mount } for pid=7955 comm="syz.2.1246" name="/" dev="pipefs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 240.119942][ T25] usb 1-1: config 0 interface 92 altsetting 0 endpoint 0x84 has invalid maxpacket 49879, setting to 1024 [ 240.152244][ T25] usb 1-1: config 0 interface 92 altsetting 0 has 3 endpoint descriptors, different from the interface descriptor's value: 2 [ 240.190854][ T25] usb 1-1: New USB device found, idVendor=093b, idProduct=a005, bcdDevice= d.81 [ 240.206443][ T25] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 240.226665][ T25] usb 1-1: Product: syz [ 240.232402][ T30] audit: type=1400 audit(1727402305.647:269): avc: denied { bind } for pid=7960 comm="syz.1.1247" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 240.267829][ T25] usb 1-1: Manufacturer: syz [ 240.272521][ T25] usb 1-1: SerialNumber: syz [ 240.282923][ T25] usb 1-1: config 0 descriptor?? [ 240.296562][ T7928] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 240.324693][ T25] em28xx 1-1:0.92: New device syz syz @ 480 Mbps (093b:a005, interface 92, class 92) [ 240.346581][ T25] em28xx 1-1:0.92: DVB interface 92 found: isoc [ 240.609320][ T25] em28xx 1-1:0.92: unknown em28xx chip ID (0) [ 240.739077][ T25] em28xx 1-1:0.92: reading from i2c device at 0xa0 failed (error=-5) [ 240.761855][ T25] em28xx 1-1:0.92: board has no eeprom [ 240.836525][ T25] em28xx 1-1:0.92: Identified as Plextor ConvertX PX-TV100U (card=40) [ 240.844851][ T25] em28xx 1-1:0.92: dvb set to isoc mode. [ 240.896963][ T7988] netlink: 92 bytes leftover after parsing attributes in process `syz.3.1259'. [ 240.907059][ T7988] netlink: 133 bytes leftover after parsing attributes in process `syz.3.1259'. [ 240.913106][ T5277] em28xx 1-1:0.92: Remote control support is not available for this card. [ 240.917287][ T7988] netlink: 133 bytes leftover after parsing attributes in process `syz.3.1259'. [ 240.946670][ T25] usb 1-1: USB disconnect, device number 75 [ 240.954126][ T25] em28xx 1-1:0.92: Disconnecting em28xx [ 240.973383][ T25] em28xx 1-1:0.92: Closing input extension [ 241.028031][ T25] em28xx 1-1:0.92: Freeing device [ 241.132388][ T7992] IPv6: NLM_F_CREATE should be specified when creating new route [ 241.162167][ T7992] netlink: 1 bytes leftover after parsing attributes in process `syz.2.1261'. [ 241.185290][ T5308] usb 2-1: new high-speed USB device number 72 using dummy_hcd [ 241.230720][ T30] audit: type=1400 audit(1727402306.647:270): avc: denied { write } for pid=7995 comm="syz.3.1262" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 241.306199][ T30] audit: type=1400 audit(1727402306.647:271): avc: denied { nlmsg_write } for pid=7995 comm="syz.3.1262" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 241.356585][ T5308] usb 2-1: Using ep0 maxpacket: 8 [ 241.369027][ T5308] usb 2-1: config 0 has an invalid interface number: 52 but max is 0 [ 241.377461][ T5308] usb 2-1: config 0 has an invalid descriptor of length 217, skipping remainder of the config [ 241.405517][ T5308] usb 2-1: config 0 has no interface number 0 [ 241.426154][ T5308] usb 2-1: config 0 interface 52 altsetting 1 endpoint 0x8A has an invalid bInterval 147, changing to 11 [ 241.456544][ T5308] usb 2-1: config 0 interface 52 altsetting 1 endpoint 0x8A has invalid maxpacket 58421, setting to 1024 [ 241.501135][ T5308] usb 2-1: config 0 interface 52 altsetting 1 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 241.544626][ T5308] usb 2-1: config 0 interface 52 has no altsetting 0 [ 241.606582][ T5308] usb 2-1: New USB device found, idVendor=06cb, idProduct=0003, bcdDevice=e8.00 [ 241.616011][ T5308] usb 2-1: New USB device strings: Mfr=22, Product=0, SerialNumber=0 [ 241.624259][ T5308] usb 2-1: Manufacturer: syz [ 241.634887][ T5308] usb 2-1: config 0 descriptor?? [ 241.872304][ T5308] input: syz as /devices/platform/dummy_hcd.1/usb2/2-1/2-1:0.52/input/input31 [ 242.152745][ T5224] usb 2-1: USB disconnect, device number 72 [ 242.152745][ C1] synaptics_usb 2-1:0.52: synusb_irq - usb_submit_urb failed with result: -19 [ 242.316611][ T5278] usb 1-1: new high-speed USB device number 76 using dummy_hcd [ 242.393677][ T8033] netlink: 108 bytes leftover after parsing attributes in process `syz.2.1281'. [ 242.416501][ T25] usb 5-1: new high-speed USB device number 76 using dummy_hcd [ 242.467006][ T5278] usb 1-1: Using ep0 maxpacket: 8 [ 242.497841][ T5278] usb 1-1: New USB device found, idVendor=0b95, idProduct=2790, bcdDevice=84.cd [ 242.518722][ T5278] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 242.561329][ T30] audit: type=1400 audit(1727402307.977:272): avc: denied { create } for pid=8038 comm="syz.2.1283" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 242.583231][ T25] usb 5-1: Using ep0 maxpacket: 16 [ 242.602491][ T25] usb 5-1: New USB device found, idVendor=2770, idProduct=9050, bcdDevice=11.97 [ 242.605303][ T30] audit: type=1400 audit(1727402308.017:273): avc: denied { setopt } for pid=8038 comm="syz.2.1283" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 242.611798][ T25] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 242.615320][ T25] usb 5-1: config 0 descriptor?? [ 242.647936][ T30] audit: type=1400 audit(1727402308.067:274): avc: denied { write } for pid=8040 comm="syz.3.1285" name="nvram" dev="devtmpfs" ino=623 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nvram_device_t tclass=chr_file permissive=1 [ 242.676252][ T25] gspca_main: sq905c-2.14.0 probing 2770:9050 [ 242.845537][ T8045] xt_policy: neither incoming nor outgoing policy selected [ 242.915516][ T5278] usb 1-1: string descriptor 0 read error: -71 [ 242.935701][ T5278] usb 1-1: USB disconnect, device number 76 [ 243.146800][ T25] gspca_sq905c: sq905c_read: usb_control_msg failed (-71) [ 243.154220][ T25] sq905c 5-1:0.0: Reading version command failed [ 243.172139][ T25] sq905c 5-1:0.0: probe with driver sq905c failed with error -71 [ 243.189351][ T25] usb 5-1: USB disconnect, device number 76 [ 243.398522][ T30] audit: type=1404 audit(1727402308.817:275): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 243.471303][ T30] audit: type=1400 audit(1727402308.887:276): avc: denied { read write } for pid=5227 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 243.541995][ T30] audit: type=1400 audit(1727402308.927:277): avc: denied { create } for pid=8067 comm="syz.3.1299" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 244.936559][ T8144] kAFS: unable to lookup cell '.,c¾ûL' Sep 27 01:58:30 syzkaller kern.err kernel: [ 244.936559][ T8144] kAFS: unable to lookup cell '.,c¾ûL' [ 245.059281][ T5225] Bluetooth: hci0: unexpected cc 0x042f length: 181 > 7 [ 245.066637][ T5225] Bluetooth: hci0: unexpected event for opcode 0x042f [ 245.104523][ T30] kauditd_printk_skb: 54 callbacks suppressed [ 245.104545][ T30] audit: type=1400 audit(1727402310.517:332): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Sep 27 01:58:30 syzkaller kern.warn kernel: [ 245.059281][ T5225] Bluetooth: hci0: unexpected cc 0x042f length: 181 > 7 Sep 27 01:58:30 syzkaller kern.err kernel: [ 245.066637][ T5225] Bluetooth: hci0: unexpected event for opcode 0x042f Sep 27 01:58:30 syzkaller kern.warn kernel: [ 245.104523][ T30] kauditd_printk_skb: 54 callbacks suppressed Sep 27 01:58:30 syzkaller kern.notice kernel: [ 245.104545][ [ 245.172057][ T8155] mmap: syz.0.1341 (8155) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. T30] audit: type=1400 audit(1727402310.517:332): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=sy[ 245.196670][ T30] audit: type=1400 audit(1727402310.527:333): avc: denied { read write } for pid=5226 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 stem_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l Sep 27 01:58:30 syzkaller kern.warn kernel: [ 245.172057][ T8155] mmap: syz.0.1341 (8155) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. Sep 27 01:58:30 syzkaller kern.notice kernel: [ 245.196670][ T30] audit: type=1400 audit(1727402310.527:333): avc: denied { read write } for pid=5226 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fix [ 245.268738][ T30] audit: type=1400 audit(1727402310.547:334): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Sep 27 01:58:30 syzkaller kern.notice kernel: [ 245.268738][ T30] audit: type=1400 audit(1727402310.547:334): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l [ 245.383260][ T30] audit: type=1400 audit(1727402310.547:335): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 245.416872][ T30] audit: type=1400 audit(1727402310.557:336): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 245.436127][ T8162] Cannot find add_set index 0 as target [ 245.440088][ T30] audit: type=1400 audit(1727402310.607:337): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 245.440155][ T30] audit: type=1400 audit(1727402310.637:338): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 245.440210][ T30] audit: type=1400 audit(1727402310.647:339): avc: denied { read write } for pid=5234 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 245.440268][ T30] audit: type=1400 audit(1727402310.657:340): avc: denied { read write } for pid=5221 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 245.440325][ T30] audit: type=1400 audit(1727402310.707:341): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Sep 27 01:58:30 syzkaller kern.notice kernel: [ 245.383260][ T30] audit: type=1400 audit(1727402310.547:335): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l Sep 27 01:58:30 syzkaller kern.notice kernel: [ 245.416872][ T30] audit: type=1400 audit(1727402310.557:336): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l Sep 27 01:58:30 syzkaller kern.info kernel: [ 245.436127][ T8162] Cannot find add_set index 0 as target Sep 27 01:58:30 syzkaller kern.notice kernel: [ 245.440088][ T30] audit: type=1400 audit(1727402310.607:337): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l Sep 27 01:58:30 syzkaller kern.notice kernel: [ 245.440155][ T30] audit: type=1400 audit(1727402310.637:338): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l Sep 27 01:58:30 syzkaller kern.notice kernel: [ 245.440210][ T30] audit: type=1400 audit(1727402310.647:339): avc: denied { read write } for pid=5234 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fix Sep 27 01:58:30 syzkaller kern.notice kernel: [ 245.440268][ T30] audit: type=1400 audit(1727402310.657:340): avc: denied { read write } for pid=5221 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fix Sep 27 01:58:30 syzkaller kern.notice kernel: [ 245.440325][ T30] audit: type=1400 audit(1727402310.707:341): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l Sep 27 01:58:33 syzkaller daemon[ 247.893671][ T8276] tc_dump_action: action bad kind .err dhcpcd[8273]: ps_bpf_start_bpf: bpf_open: Invalid argument Sep 27 01:58:33 syzkaller daemon.err dhcpcd[8273]: ps_root_recvmsg: Invalid argument Sep 27 01:58:33 syzkaller kern.info kernel: [ 247.893671][ T8276] tc_dump_action: action bad kind Sep 27 01:58:33 syzkaller daemon.err dhcpcd[8278]: ps_bpf_start_bpf: bpf_open: Invalid argument Sep 27 01:58:33 syzkaller daemon.err dhcpcd[8278]: ps_root_recvmsg: Invalid argument [ 248.126514][ T8285] x_tables: ip_tables: osf match: only valid for protocol 6 Sep 27 01:58:33 syzkaller daemon.err dhcpcd[8292]: ps_bpf_start_bpf: bpf_open: Invalid argument Sep 27 01:58:33 syzkaller daemon.err dhcpcd[8292]: ps_root_recvmsg: Invalid argument Sep 27 01:58:33 syzkaller kern.info kernel: [ 248.126514][ T8285] x_tables: ip_tables: osf match: only valid for protocol 6 [ 248.398606][ T8304] block device autoloading is deprecated and will be removed. [ 248.410189][ T8304] syz.4.1413: attempt to access beyond end of device [ 248.410189][ T8304] md0: rw=2048, sector=0, nr_sectors = 8 limit=0 Sep 27 01:58:33 syzkaller kern.warn kernel: [ 248.398606][ T8304] block device autoloading is deprecated and will be removed. Sep 27 01:58:33 syzkaller kern.info kernel: [ 248.410189][ T8304] syz.4.1413: attempt to access beyond end of device Sep 27 01:58:33 syzkaller kern.info kernel: [ 248.410189][ T8304] md0: rw=2048, sector=0, nr_sectors = 8 limit=0 Sep 27 01:58:33 syzkaller kern.debug kernel: [ 248.430874][ T8304] PM: Image not found (code -5) Sep 27 01:58:33 syzkaller daemon.err dhcpcd[8302]: ps_bpf_start_bpf: bpf_open: Invalid argument Sep 27 01:58:33 syzkaller daemon.err dhcpcd[8302]: ps_root_recvmsg: Invalid argument Sep 27 01:58:35 syzkaller daemon.info dhcpcd[4888]: lapb4: carrier lost [ 250.110974][ T30] kauditd_printk_skb: 229 callbacks suppressed [ 250.110999][ T30] audit: type=1400 audit(1727402315.527:571): avc: denied { create } for pid=8384 comm="syz.0.1451" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 Sep 27 01:58:35 syzkaller kern.warn kernel: [ 250.110974][ T30] kauditd_printk_skb: 229 callbacks suppressed Sep 27 01:58:35 syzkaller kern.notice kernel: [ 250.110999][ T30] audit: type=1400 audit(1727402315.527:571): avc: denied { create } for pid=8384 comm="syz.0.1451" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissi [ 250.204535][ T30] audit: type=1400 audit(1727402315.557:572): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Sep 27 01:58:35 syzkaller kern.notice kernel: [ 250.204535][ T30] audit: type=1400 audit(1727402315.557:572): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l [ 250.310850][ T30] audit: type=1400 audit(1727402315.557:573): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Sep 27 01:58:35 syzkaller daemon.info dhcpcd[4888]: lapb4: deleting route to 169.254.0.0/16 Sep 27 01:58:35 syzkaller kern.notice kernel: [ 250.310850][ T30] audit: type=1400 audit(1727402315.557:573): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l [ 250.449504][ T8398] syz.0.1455: attempt to access beyond end of device [ 250.449504][ T8398] md0: rw=2048, sector=0, nr_sectors = 8 limit=0 [ 250.474316][ T30] audit: type=1400 audit(1727402315.567:574): avc: denied { read } for pid=8389 comm="syz.1.1450" name="v4l-subdev1" dev="devtmpfs" ino=858 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 Sep 27 01:58:35 syzkaller kern.info kernel: [ 250.449504][ T8398] syz.0.1455: attempt to access beyond end of device Sep 27 01:58:35 syzkaller kern.info kernel: [ 250.449504][ T8398] md0: rw=2048, sector=0, nr_sectors = 8 limit=0 Sep 27 01:58:35 syzkal[ 250.521175][ T8360] Bluetooth: hci0: Opcode 0x0c1a failed: -4 ler kern.notice kernel: [ 250.474316][ T30] audit: type=1400 audit(1727402315.567:574): avc: denied { read } for pid=8389 comm="syz.1.1450" name="v4l-subdev1" dev="devtmpfs" ino=858 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devic [ 250.562089][ T8360] Bluetooth: hci0: Error when powering off device on rfkill (-4) Sep 27 01:58:36 [ 250.588514][ T30] audit: type=1400 audit(1727402315.597:575): avc: denied { search } for pid=8383 comm="chmod" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 syzkaller kern.err kernel: [ 250.521175][ T8360] Bluetooth: hci0: Opcode 0x0c1a failed: -4 Sep 27 01:58:36 syzkaller kern.err kernel: [ 250.562089][ T8360] Bluetooth: hci0: Error when powering off device on rfkill (-4) Sep 27 01:58:36 syzkaller kern.notice kernel: [ 250.588514][ T30] audit: type=1400 audit(1727402315.597:575): avc: denied { search } for pid=8383 comm="chmod" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir p Sep 27 01:58:36 syzkaller kern.debug kernel: [ 250.645993][ T8398] PM: Image not found (code -5) [ 250.672898][ T8360] Bluetooth: hci4: Opcode 0x0c1a failed: -4 [ 250.685693][ T8360] Bluetooth: hci4: Error when powering off device on rfkill (-4) Sep 27 01:58:36 syzkaller kern.err kernel: [ 250.672898][ T8360] Bluetooth: hci4: Opcode 0x0c1a failed: -4 Sep 27 01:58:36 syzkaller kern.err kernel: [ 250.685693][ T8360] Bluetooth: hci4: Error when powering off device on rfkill (-4) [ 250.731465][ T30] audit: type=1400 audit(1727402315.597:576): avc: denied { read write } for pid=5233 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 250.747346][ T8395] audit: audit_backlog=65 > audit_backlog_limit=64 [ 250.757687][ T4656] audit: audit_backlog=65 > audit_backlog_limit=64 [ 250.772169][ T4656] audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 [ 250.780731][ T4656] audit: backlog limit exceeded Sep 27 01:58:36 syzkaller kern.notice kernel: [ 250.731465][ T30] audit: type=1400 audit(1727402315.597:576): avc: denied { read write } for pid=5233 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fix Sep 27 01:58:36 syzkaller kern.warn kernel: [ 250.747346][ T8395] audit: audit_backlog=65 > audit_backlog_limit=64 Sep 27 01:58:36 syzkaller kern.warn kernel: [ 250.757687][ T4656] audit: audit_backlog=65 > audit_backlog_limit=64 Sep 27 01:58:36 syzkaller kern.warn kernel: [ 250.772169][ T4656] audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Sep 27 01:58:36 syzkaller kern.err kernel: [ 250.780731][ T4656] audit: backlog limit exceeded [ 251.599608][ T8449] ip6t_srh: unknown srh invflags 7863 Sep 27 01:58:37 syzkaller kern.info kernel: [ 251.599608][ T8449] ip6t_srh: unknown srh invflags 7863 Sep 27 01:58:37 syzkaller daemon.info dhcpcd[4888]: lapb5: carrier lost [ 252.166797][ T8470] xt_ecn: cannot match TCP bits for non-tcp packets Sep 27 01:58:37 syzkaller kern.info kernel: [ 252.166797][ T8470] xt_ecn: cannot match TCP bits for non-tcp packets Sep 27 01:58:37 syzkaller daemon.info dhcpcd[4888]: lapb5: deleting route to 169.254.0.0/16 Sep 27 01:58:38 syzkaller daemon.err dhcpcd[4888]: ps_sendpsmmsg: Connection refused Sep 27 01:58:38 syzkaller daemon.err dhcpcd[4888]: ps_dostop: Connection refused Sep 27 01:58:38 syzkaller daemon.err dhcpcd[4888]: ps_root_recvmsg: Connection refused Sep 27 01:58:40 syzkaller daemon.err dhcpcd[8606]: ps_bpf_start_bpf: bpf_open: Invalid argument Sep 27 01:58:40 syzkaller daemon.err dhcpcd[8606]: ps_root_recvmsg: Invalid argument [ 255.045572][ T8623] xt_CHECKSUM: CHECKSUM should be avoided. If really needed, restrict with "-p udp" and only use in OUTPUT [ 255.115055][ T8623] x_tables: ip6_tables: TCPOPTSTRIP target: only valid for protocol 6 [ 255.125197][ T30] kauditd_printk_skb: 387 callbacks suppressed [ 255.125220][ T30] audit: type=1400 audit(1727402320.537:962): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Sep 27 01:58:40 syzkaller kern.warn kernel: [ 255.045572][ T8623] xt_CHECKSUM: CHECKSUM should be avoided. If really needed, restrict with "-p udp" and only use in OUTPUT Sep 27 01:58:40 syzkaller kern.info kernel: [ 255.115055][ T8623] x_tables: ip6_t[ 255.176178][ T30] audit: type=1400 audit(1727402320.567:963): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ables: TCPOPTSTRIP target: only valid for protocol 6 Sep 27 01:58:40 syzkaller kern.warn kernel: [ 255.125197][ T30] kauditd_printk_skb: 387 callbacks suppressed Sep 27 01:58:40 syzkaller kern.notice kernel: [ 255.125220][ T30] audit: type=1400 audit(1727402320.537:962): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l Sep 27 01:58:40 syzkaller kern.notice kernel: [ 255.176178][ T30] audit: type=1400 audit(1727402320.567:963): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:v[ 255.262856][ T30] audit: type=1400 audit(1727402320.567:964): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ar_t tclass=l Sep 27 01:58:40 syzkaller kern.notice kernel: [ 255.262856][ T30] audit: type=1400 audit(1727402320.567:964): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l [ 255.349738][ T30] audit: type=1400 audit(1727402320.577:965): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Sep 27 01:58:40 syzkaller kern.notice kernel: [ 255.349738][ T30] audit: type=1400 audit(1727402320.577:965): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l [ 255.422925][ T30] audit: type=1400 audit(1727402320.587:966): avc: denied { read write } for pid=5234 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Sep 27 01:58:40 syzkaller kern.notice kernel: [ 255.422925][ T30] audit: type=1400 audit(1727402320.587:966): avc: denied { read write } for pid=5234 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fix [ 255.498352][ T30] audit: type=1400 audit(1727402320.617:967): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Sep 27 01:58:40 syzkaller kern.notice kernel: [ 255.498352][ T30] audit: type=1400 audit(1727402320.617:967): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l [ 255.566467][ T30] audit: type=1400 audit(1727402320.657:968): avc: denied { bpf } for pid=8626 comm="syz.2.1553" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 Sep 27 01:58:41 syzkaller kern.notice kernel: [ 255.566467][ T30] audit: type=1400 audit(1727402320.657:968): avc: denied { bpf } for pid=8626 comm="syz.2.1553" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissiv [ 255.619177][ T30] audit: type=1400 audit(1727402320.697:969): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Sep 27 01:58:41 syzkaller kern.notice kernel: [ 255.619177][ T30] audit: type=1400 audit(1727402320.697:969): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l [ 255.716522][ T30] audit: type=1400 audit(1727402320.707:970): avc: denied { read write } for pid=5226 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Sep 27 01:58:41 syzkaller kern.notice kernel: [ 255.716522][ T30] audit: type=1400 audit(1727402320.707:970): avc: denied { read write } for pid=5226 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fix [ 255.846428][ T30] audit: type=1400 audit(1727402320.707:971): avc: denied { read write } for pid=5227 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Sep 27 01:58:41 syzkaller kern.notice kernel: [ 255.846428][ T30] audit: type=1400 audit(1727402320.707:971): avc: denied { read write } for pid=5227 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fix [ 257.184381][ T8727] PKCS8: Unsupported PKCS#8 version Sep 27 01:58:42 syzkaller kern.warn kernel: [ 257.184381][ T8727] PKCS8: Unsupported PKCS#8 version [ 260.128846][ T30] kauditd_printk_skb: 173 callbacks suppressed [ 260.128872][ T30] audit: type=1400 audit(1727402325.547:1145): avc: denied { read write } for pid=8884 comm="syz.0.1681" name="raw-gadget" dev="devtmpfs" ino=732 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 Sep 27 01:58:45 syzkaller kern.warn kernel: [ 260.128846][ T30] kauditd_printk_skb: 173 callbacks suppressed Sep 27 01:58:45 syzkaller kern.notice kernel: [ 260.128872][ T30] audit: type=1400 audit(1727402325.547:1145): avc: denied { read write } for pid=8884 comm="syz.0.1681" name="raw-gadget" dev="devtmpfs" ino=732 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r [ 260.209082][ T30] audit: type=1400 audit(1727402325.547:1146): avc: denied { create } for pid=8887 comm="syz.4.1682" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=0 Sep 27 01:58:45 syzkaller kern.notice kernel: [ 260.209082][ T30] audit: type=1400 audit(1727402325.547:1146): avc: denied { create } for pid=8887 comm="syz.4.1682" scontext=root:sysadm_[ 260.256510][ T30] audit: type=1400 audit(1727402325.577:1147): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=0 Sep 27 01:58:45 [ 260.288836][ T30] audit: type=1400 audit(1727402325.577:1148): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.n[ 260.311500][ T30] audit: type=1400 audit(1727402325.587:1149): avc: denied { create } for pid=8887 comm="syz.4.1682" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 otice kernel: [ [ 260.333712][ T30] audit: type=1400 audit(1727402325.607:1150): avc: denied { read write } for pid=5234 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 260.256510][ [ 260.359899][ T30] audit: type=1400 audit(1727402325.657:1151): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 T30] audit: type=1400 audit(1727402325.577:1147): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:[ 260.384055][ T30] audit: type=1400 audit(1727402325.667:1152): avc: denied { read write } for pid=5233 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 syslogd_t tcontext=system_u:object_r:var_t tclass= Sep 27 01:58:45 syzkaller kern.notice kernel: [ 260.288836][ T30] audit: type=1400 audit(1727402325.577:1148): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 260.384120][ T30] audit: type=1400 audit(1727402325.697:1153): avc: denied { read write } for pid=5226 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 260.384196][ T30] audit: type=1400 audit(1727402325.707:1154): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Sep 27 01:58:45 syzkaller kern.notice kernel: [ 260.311500][ T30] audit: type=1400 audit(1727402325.587:1149): avc: denied { create } for pid=8887 comm="syz.4.1682" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissiv Sep 27 01:58:45 syzkaller kern.notice kernel: [ 260.333712][ T30] audit: type=1400 audit(1727402325.607:1150): avc: denied { read write } for pid=5234 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Sep 27 01:58:45 syzkaller kern.notice kernel: [ 260.359899][ T30] audit: type=1400 audit(1727402325.657:1151): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Sep 27 01:58:45 syzkaller kern.notice kernel: [ 260.384055][ T30] audit: type=1400 audit(1727402325.667:1152): avc: denied { read write } for pid=5233 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Sep 27 01:58:45 syzkaller kern.notice kernel: [ 260.384120][ T30] audit: type=1400 audit(1727402325.697:1153): avc: denied { read write } for pid=5226 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Sep 27 01:58:45 syzkaller kern.notice kernel: [ 260.384196][ T30] audit: type=1400 audit(1727402325.707:1154): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 260.938858][ T8921] --map-set only usable from mangle table Sep 27 01:58:46 syzkaller kern.info kernel: [ 260.938858][ T8921] --map-set only usable from mangle table [ 261.110357][ T8931] xt_CT: You must specify a L4 protocol and not use inversions on it Sep 27 01:58:46 syzkaller kern.info kernel: [ 261.110357][ T8931] xt_CT: You must specify a L4 protocol and not use inversions on it [ 261.358676][ T1270] ieee802154 phy0 wpan0: encryption failed: -22 [ 261.365107][ T1270] ieee802154 phy1 wpan1: encryption failed: -22 Sep 27 01:58:46 syzkaller kern.warn kernel: [ 261.358676][ T1270] ieee802154 phy0 wpan0: encryption failed: -22 Sep 27 01:58:46 syzkaller kern.warn kernel: [ 261.365107][ T1270] ieee802154 phy1 wpan1: encryption failed: -22 [ 262.155783][ T8989] x_tables: ip_tables: ah match: only valid for protocol 51 Sep 27 01:58:47 syzkaller kern.info kernel: [ 262.155783][ T8989] x_tables: ip_tables: ah match: only valid for protocol 51 [ 263.570364][ T9062] Cannot find del_set index 4 as target Sep 27 01:58:48 syzkaller kern.info kernel: [ 263.570364][ T9062] Cannot find del_set index 4 as target [ 263.667129][ T9066] netlink: 8 bytes leftover after parsing attributes in process `syz.1.1770'. Sep 27 01:58:49 syzkaller kern.warn kernel: [ 263.667129][ T9066] netlink: 8 bytes leftover after parsing attributes in process `syz.1.1770'. [ 264.789091][ T9124] vhci_hcd vhci_hcd.0: pdev(0) rhport(0) sockfd(3) [ 264.796199][ T9124] vhci_hcd vhci_hcd.0: devid(0) speed(3) speed_str(high-speed) Sep 27 01:58:50 syzkaller kern.info kernel: [ 264.789091][ T9124] vhci_hcd vhci_hcd.0: pdev(0) rhport(0) sockfd(3) Sep 27 01:58:50 syzkaller kern.info kernel:[ 264.818656][ T9126] mapping of prio or/and queue is allowed only from OUTPUT/FORWARD/POSTROUTING chains [ 264.796199][ T9124] vhci_hcd vhci_hcd.0: devid(0) speed(3) speed_str(high-speed) Sep 27 01:58:50 syzkaller kern.info kernel: [ 264.818656][ T9126] mapping of prio or/and queue is allowed only from OUTPUT/FORWARD/POSTROUTING chains [ 264.875719][ T9124] vhci_hcd vhci_hcd.0: Device attached Sep 27 01:58:50 syzkaller kern.info kernel: [ 264.875719][ T9124] vhci_hcd vhci_hcd.0: Device attached [ 264.911969][ T9127] vhci_hcd: connection closed [ 264.930819][ T61] vhci_hcd: stop threads [ 264.958224][ T61] vhci_hcd: release socket Sep 27 01:58:50 syzkaller kern.info kernel: [ 264.911969][ T9127] vhci_hcd: connection closed Sep 27 01:58:50 syzkaller kern.info kernel: [ 264.930819][ T61] vhci_hcd: stop threads Sep 2[ 264.984411][ T61] vhci_hcd: disconnect device 7 01:58:50 syzkaller kern.info kernel: [ 264.958224][ T61] vhci_hcd: release socket Sep 27 01:58:50 syzkaller kern.info kernel: [ 264.984411][ T61] vhci_hcd: disconnect device [ 265.026750][ T937] vhci_hcd: vhci_device speed not set Sep 27 01:58:50 syzkaller kern.err kernel: [ 265.026750][ T937] vhci_hcd: vhci_device speed not set [ 265.129008][ T9148] capability: warning: `syz.1.1809' uses deprecated v2 capabilities in a way that may be insecure [ 265.156989][ T30] kauditd_printk_skb: 191 callbacks suppressed [ 265.157011][ T30] audit: type=1400 audit(1727402330.577:1346): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Sep 27 01:58:50 syzkaller kern.info kernel: [ 265.129008][ T9148] capability: warning: `syz.1.1809' uses deprecated v2 capabilities in a way that may be insecure Sep 27 01:58:50 syzkaller kern.warn kernel: [ 265.156989][ T30] kauditd_printk_skb: 191 callbacks suppressed Sep 27 01:58:50 syzkaller k[ 265.223840][ T30] audit: type=1400 audit(1727402330.607:1347): avc: denied { read write } for pid=5226 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 ern.notice kernel: [ 265.157011][ T30] audit: type=1400 audit(1727402330.577:1346): avc: denied { read } for pid=4656 comm[ 265.258874][ T30] audit: type=1400 audit(1727402330.617:1348): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Sep 27 [ 265.292604][ T30] audit: type=1400 audit(1727402330.617:1349): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 01:58:50 syzkaller kern.notice kernel: [ 265.223840][ T30] audit: type=1400 audit(1727402330.607:1347): avc: [ 265.324857][ T30] audit: type=1400 audit(1727402330.637:1350): avc: denied { read write } for pid=5233 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 denied { read write } for pid=5226 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Sep[ 265.362963][ T30] audit: type=1400 audit(1727402330.667:1351): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 27 01:58:50 syzkaller kern.notice kernel: [ 265.258874][ T30] audit: type=1400 audit(1727402[ 265.393255][ T30] audit: type=1400 audit(1727402330.697:1352): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 330.617:1348): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Sep 27 01:58:50 syzkaller kern.notice kernel: [[ 265.435327][ T30] audit: type=1400 audit(1727402330.737:1353): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 265.292604][ T30] audit: type=1400 audit(1727402330.617:1349): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=s[ 265.471393][ T30] audit: type=1400 audit(1727402330.737:1354): avc: denied { read write } for pid=5233 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 ystem_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Sep 27 01:58:50 syzkaller kern.notice kernel: [ 265.324857][ T30] audit: type=1400 audit(1727402330.637:1350): avc: denied { read write } for pid=5233 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 sconte[ 265.520232][ T30] audit: type=1400 audit(1727402330.737:1355): avc: denied { read write } for pid=5226 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 xt=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Sep 27 01:58:50 syzkaller kern.notice kernel: [ 265.362963][ T30] audit: type=1400 audit(1727402330.667:1351): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Sep 27 01:58:50 syzkaller kern.info kernel: comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Sep 27 01:58:50 syzkaller kern.notice kernel: [ 265.435327][ T30] audit: type=1400 audit(1727402330.737:1353): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Sep 27 01:58:50 syzkaller kern.notice kernel: [ 265.471393][ T30] audit: type=1400 audit(1727402330.737:1354): avc: denied { read write } for pid=5233 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Sep 27 01:58:50 syzkaller kern.notice kernel: [ 265.520232][ T30] audit: type=1400 audit(1727402330.737:1355): avc: denied { read write } for pid=5226 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 266.266104][ T9196] x_tables: ip_tables: REDIRECT target: used from hooks POSTROUTING, but only usable from PREROUTING/OUTPUT Sep 27 01:58:51 syzkaller kern.info kernel: [ 266.266104][ T9196] x_tables: ip_tables: REDIRECT target: used from hooks POSTROUTING, but only usable from PREROUTING/OUTPUT [ 266.463539][ T9205] xt_connbytes: Forcing CT accounting to be enabled [ 266.470784][ T9205] Cannot find set identified by id 0 to match Sep 27 01:58:51 syzkaller kern.warn kernel: [ 266.463539][ T9205] xt_connbytes: Forcing CT accounting to be enabled Sep 27 01:58:51 syzkaller kern.info kernel: [ 266.470784][ T9205] Cannot find set identified by id 0 to match [ 267.007997][ T9233] veth1_macvtap: left promiscuous mode Sep 27 01:58:52 syzkaller kern.info kernel: [ 267.007997][ T9233] veth1_macvtap: left promiscuous mode [ 270.177418][ T30] kauditd_printk_skb: 159 callbacks suppressed [ 270.177444][ T30] audit: type=1400 audit(1727402335.537:1515): avc: denied { read write } for pid=5234 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Sep 27 01:58:55 syzkaller kern.warn kernel: [ 270.177418][ T30] kauditd_printk_skb: 159 callbacks suppressed Sep 27 01:58:55 syzkaller kern.notice kernel: [ 270.177444][ [ 270.295386][ T30] audit: type=1400 audit(1727402335.567:1516): avc: denied { read write } for pid=5227 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 T30] audit: type=1400 audit(1727402335.537:1515): avc: denied { read write } for pid=5234 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Sep 27 01:58:55 syzkaller kern.notice kernel: [ 270.295386][ T30] audit: type=1400 audit(1727402335.567:1516): avc: denied { read write } for pid=5227 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 270.500633][ T30] audit: type=1400 audit(1727402335.567:1517): avc: denied { read write } for pid=5226 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Sep 27 01:58:55 syzkaller kern.notice kernel: [ 270.500633][ T30] audit: type=1400 audit(1727402335.567:1517): avc: denied { read write } for pid=5226 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 270.596442][ T30] audit: type=1400 audit(1727402335.587:1518): avc: denied { bpf } for pid=9397 comm="syz.2.1931" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 Sep 27 01:58:56 syzkaller kern.notice kernel: [ 270.596442][ T30] audit: type=1400 audit(1727402335.587:1518): avc: denied { bpf } for pid=9397 comm="syz.2.1931" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissi [ 270.674918][ T30] audit: type=1400 audit(1727402335.587:1519): avc: denied { map_create } for pid=9397 comm="syz.2.1931" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Sep 27 01:58:56 syzkaller kern.notice kernel: [ 270.674918][ T30] audit: type=1400 audit(1727402335.587:1519): avc: denied { map_create } for pid=9397 comm="syz.2.1931" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 270.746306][ T30] audit: type=1400 audit(1727402335.617:1520): avc: denied { read } for pid=9399 comm="syz.4.1934" dev="nsfs" ino=4026533093 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 270.770322][ T9425] veth0_macvtap: left promiscuous mode [ 270.776614][ T30] audit: type=1400 audit(1727402335.637:1521): avc: denied { read write } for pid=5221 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 270.776679][ T30] audit: type=1400 audit(1727402335.667:1522): avc: denied { create } for pid=9401 comm="syz.3.1932" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=0 [ 270.776731][ T30] audit: type=1400 audit(1727402335.687:1523): avc: denied { read write } for pid=5226 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 270.776787][ T30] audit: type=1400 audit(1727402335.697:1524): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 270.786817][ T9425] macvtap0: entered allmulticast mode Sep 27 01:58:56 syzkaller kern.notice kernel: [ 270.746306][ T30] audit: type=1400 audit(1727402335.617:1520): avc: denied { read } for pid=9399 comm="syz.4.1934" dev="nsfs" ino=4026533093 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file p Sep 27 01:58:56 syzkaller kern.info kernel: [ 270.770322][ T9425] veth0_macvtap: left promiscuous mode Sep 27 01:58:56 syzkaller kern.notice kernel: [ 270.776614][ T30] audit: type=1400 audit(1727402335.637:1521): avc: denied { read write } for pid=5221 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Sep 27 01:58:56 syzkaller kern.notice kernel: [ 270.776679][ T30] audit: type=1400 audit(1727402335.667:1522): avc: denied { create } for pid=9401 comm="syz.3.1932" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=0 Sep 27 01:58:56 syzkaller kern.notice kernel: [ 270.776731][ T30] audit: type=1400 audit(1727402335.687:1523): avc: denied { read write } for pid=5226 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Sep 27 01:58:56 syzkaller kern.notice kernel: [ 270.776787][ T30] audit: type=1400 audit(1727402335.697:1524): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Sep 27 01:58:56 syzkaller kern.info kernel: [ 270.786817][ T9425] macvtap0: entered allmulticast mode [ 271.454039][ T9459] xt_CHECKSUM: unsupported CHECKSUM operation f4 Sep 27 01:58:56 syzkaller kern.info kernel: [ 271.454039][ T9459] xt_CHECKSUM: unsupported CHECKSUM operation f4 [ 271.796089][ T9477] ebt_among: wrong size: 1048 against expected 710676, rounded to 710680 Sep 27 01:58:57 syzkaller kern.err kernel: [ 271.796089][ T9477] ebt_among: wrong size: 1048 against expected 710676, rounded to 710680 [ 272.273120][ T9502] i2c i2c-0: Invalid block write size 65 Sep 27 01:58:57 syzkaller kern.err kernel: [ 272.273120][ T9502] i2c i2c-0: Invalid block write size 65 [ 272.353575][ T9508] netlink: 180 bytes leftover after parsing attributes in process `syz.4.1985'. Sep 27 01:58:57 syzkaller kern.warn kernel: [ 272.353575][ T9508] netlink: 180 bytes leftover after parsing attributes in process `syz.4.1985'. [ 273.125423][ T9552] warning: `syz.1.2008' uses wireless extensions which will stop working for Wi-Fi 7 hardware; use nl80211 Sep 27 01:58:58 syzkaller kern.warn kernel: [ 273.125423][ T9552] warning: `syz.1.2008' uses wireless extensions which will stop working for Wi-Fi 7 hardware; use nl80211 Sep 27 01:58:58 syzkaller kern.debug kernel: [ 273.424320][ T9566] PM: Image not found (code -6) [ 273.710232][ T9582] IPVS: length: 52 != 24 Sep 27 01:58:59 syzkaller kern.err kernel: [ 273.710232][ T9582] IPVS: length: 52 != 24 [ 274.388224][ T9618] netlink: 'syz.2.2041': attribute type 29 has an invalid length. [ 274.404542][ T9618] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2041'. Sep 27 01:58:59 syzkaller kern.warn kernel: [ 274.388224][ T9618] netlink: 'syz.2.2041': attribute type 29 has an invalid length. Sep 27 01:58:59 syzkaller kern.warn kernel: [ 274.404542][ T9618] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2041'. [ 275.249370][ T30] kauditd_printk_skb: 218 callbacks suppressed [ 275.249396][ T30] audit: type=1400 audit(1727402340.637:1743): avc: denied { read write } for pid=5226 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Sep 27 01:59:00 syzkaller kern.warn kernel: [ 275.249370][ T30] kauditd_printk_skb: 218 callbacks suppressed Sep 27 01:59:00 syzkaller kern.notice kernel: [ 275.249396][ T30] audit: type=1400 audit(1727402340.637:1743): avc: denied { read write } for pid=5226 comm="syz-executor" name="loop4" dev="devtmpfs" in[ 275.316230][ T30] audit: type=1400 audit(1727402340.677:1744): avc: denied { read write } for pid=5221 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 o=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Sep 27 01:59:00 syzkaller kern.notice kernel: [ 275.316230][ T30] audit: type=1400 audit(1727402340.677:1744): avc: denied { read write } for pid=5221 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 275.392464][ T30] audit: type=1400 audit(1727402340.687:1745): avc: denied { read write } for pid=5227 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Sep 27 01:59:00 syzkaller kern.notice kernel: [ 275.392464][ T30] audit: type=1400 audit(1727402340.687:1745): avc: denied { read write } for pid=5227 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 275.452249][ T30] audit: type=1400 audit(1727402340.697:1746): avc: denied { read write } for pid=5233 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Sep 27 01:59:00 [ 275.477740][ T30] audit: type=1400 audit(1727402340.707:1747): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.notice kernel: [ 275.452249][ T30] audit: type=1400 audit(1727402340.697:1746): avc: denied { read write } for pid=5233 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Sep 27 01:59:00 [ 275.561425][ T30] audit: type=1400 audit(1727402340.707:1748): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.notice kernel: [ 275.477740][ T30] audit: type=1400 audit(1727402340.707:1747): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Sep 27 01:59:01 [ 275.610756][ T30] audit: type=1400 audit(1727402340.707:1749): avc: denied { read write } for pid=5234 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 syzkaller kern.notice kernel: [ 275.561425][ T30] audit: type=1400 audit(1727402340.707:1748): avc: denied [ 275.644574][ T30] audit: type=1400 audit(1727402340.767:1750): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Sep 27 01:59:01 syzkaller kern.notice kernel: [ 275.610756][ T30] audit: type=1400 audit(1727402340.707:1749): avc: denied { read write } for pid=5234 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Sep 27 01:59:01 syzkaller kern.notice kernel: [ 275.644574][ T30] audit: type=1400 au[ 275.710869][ T30] audit: type=1400 audit(1727402340.767:1751): avc: denied { create } for pid=9670 comm="syz.0.2067" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=0 dit(1727402340.767:1750): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Sep 27 01:59:01 syzkaller kern.notice kernel: [ 275.710869][ T30] audit: type=1400 audit(1727402340.767:1751): avc: denied { create } for pid=9670 comm="syz.0.2067" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive [ 275.781494][ T30] audit: type=1400 audit(1727402340.807:1752): avc: denied { create } for pid=9675 comm="syz.3.2070" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 Sep 27 01:59:01 syzkaller kern.notice kernel: [ 275.781494][ T30] audit: type=1400 audit(1727402340.807:1752): avc: denied { create } for pid=9675 comm="syz.3.2070" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissiv [ 276.561031][ T9729] xt_l2tp: v2 doesn't support IP mode Sep 27 01:59:01 syzkaller kern.info kernel: [ 276.561031][ T9729] xt_l2tp: v2 doesn't support IP mode [ 277.459657][ T9771] x_tables: ip6_tables: l2tp.0 match: invalid size 16 (kernel) != (user) 56 Sep 27 01:59:02 syzkaller kern.err kernel: [ 277.459657][ T9771] x_tables: ip6_tables: l2tp.0 match: invalid size 16 (kernel) != (user) 56 [ 277.887084][ T9792] bridge0: port 3(veth0_to_bridge) entered blocking state [ 277.894354][ T9792] bridge0: port 3(veth0_to_bridge) entered disabled state [ 277.913064][ T9792] veth0_to_bridge: entered allmulticast mode [ 277.921383][ T9792] veth0_to_bridge: entered promiscuous mode [ 277.930242][ T9792] bridge0: adding interface veth0_to_bridge with same address as a received packet (addr:aa:aa:aa:aa:aa:1b, vlan:0) Sep 27 01:59:03 syzkaller kern.info kernel: [ 277.887084][ T9792] bridge0: port 3(veth0_to_bridge) entered blocking state Sep 27 01:59:03 syzkaller kern.info kernel: [ 277.894354][ T9792] bridge0: port 3(veth0_to_bridge) entered disabled state Sep 27 01:59:03 syzkaller kern.info kernel: [ 277.913064][ T9792] veth0_to_bridge: entered allmulticast mode Sep 27 01:59:03 syzkaller kern.info kernel: [ 277.921383][ T9792] veth0_to_bridge: entered promiscuous mode Sep 27 01:59:03 syzkaller kern.warn kernel:[ 277.987948][ T9792] bridge0: port 3(veth0_to_bridge) entered blocking state [ 277.930242][[ 277.996081][ T9792] bridge0: port 3(veth0_to_bridge) entered forwarding state T9792] bridge0: adding interface veth0_to_bridge with same address as a received packet (addr:aa:aa:aa:aa:aa:1b, vlan:0) Sep 27 01:59:03 syzkaller kern.info kernel: [ 277.987948][ T9792] bridge0: port 3(veth0_to_bridge) entered blocking state Sep 27 01:59:03 syzkaller kern.info kernel: [ 277.996081][ T9792] bridge0: port 3(veth0_to_bridge) entered forwarding state [ 278.906548][ T9840] xt_ecn: cannot match TCP bits for non-tcp packets Sep 27 01:59:04 syzkaller kern.info kernel: [ 278.906548][ T9840] xt_ecn: cannot match TCP bits for non-tcp packets [ 279.933744][ T9896] netlink: 4 bytes leftover after parsing attributes in process `syz.0.2179'. Sep 27 01:59:05 syzkaller kern.warn kernel: [ 279.933744][ T9896] netlink: 4 bytes leftover after parsing attributes in process `syz.0.2179'. [ 280.272097][ T30] kauditd_printk_skb: 169 callbacks suppressed [ 280.272121][ T30] audit: type=1400 audit(1727402345.687:1922): avc: denied { read write } for pid=5233 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Sep 27 01:59:05 syzkaller kern.warn kernel: [ 280.272097][ T30] kauditd_printk_skb: 169 callbacks suppressed Sep 27 01:59:05 syzkaller kern.notice kernel: [ 280.272121][ T30] audit: type=1400 audit(1727402345.687:1922): avc: denied { read write } for pid=5233 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 280.356423][ T30] audit: type=1400 audit(1727402345.717:1923): avc: denied { create } for pid=9919 comm="syz.3.2191" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 Sep 27 01:59:05 syzkaller kern.notice kernel: [ 280.356423][ T30] audit: type=1400 audit(1727402345.717:1923): avc: denied { create } for pid=9919 comm="syz.3.2191" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 280.422871][ T30] audit: type=1400 audit(1727402345.727:1924): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Sep 27 01:59:05 syzkaller kern.notice kernel: [ 280.422871][ T30] audit: type=1400 audit(1727402345.727:1924): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 280.516774][ T30] audit: type=1400 audit(1727402345.727:1925): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Sep 27 01:59:05 syzkaller kern.notice kernel: [ 280.516774][ T30] audit: type=1400 audit(1727402345.727:1925): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 280.646514][ T30] audit: type=1400 audit(1727402345.757:1926): avc: denied { read write } for pid=5226 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Sep 27 01:59:06 syzkaller kern.notice kernel: [ 280.646514][ T30] audit: type=1400 audit(1727402345.757:1926): avc: denied { read write } for pid=5226 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 280.762473][ T30] audit: type=1400 audit(1727402345.797:1927): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Sep 27 01:59:06 syzkaller kern.notice kernel: [ 280.762473][ T30] audit: type=1400 audit(1727402345.797:1927): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 280.868206][ T30] audit: type=1400 audit(1727402345.807:1928): avc: denied { read write } for pid=5221 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Sep 27 01:59:06 syzkaller kern.notice kernel: [ 280.868206][ T30] audit: type=1400 audit(1727402345.807:1928): avc: denied { read write } for pid=5221 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 280.987989][ T30] audit: type=1400 audit(1727402345.827:1929): avc: denied { read write } for pid=5227 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Sep 27 01:59:06 syzkaller kern.notice kernel: [ 280.987989][ T30] audit: type=1400 audit(1727402345.827:1929): avc: denied { read write } for pid=5227 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 281.055319][ T30] audit: type=1400 audit(1727402345.837:1930): avc: denied { read write } for pid=5234 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Sep 27 01:59:06 syzkaller kern.notice kernel: [ 281.055319][ T30] audit: type=1400 audit(1727402345.837:1930): avc: denied { read write } for pid=5234 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 281.106661][ T30] audit: type=1400 audit(1727402345.877:1931): avc: denied { read write } for pid=5233 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Sep 27 01:59:06 syzkaller kern.notice kernel: [ 281.106661][ T30] audit: type=1400 audit(1727402345.877:1931): avc: denied { read write } for pid=5233 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 282.297833][T10025] trusted_key: encrypted key: instantiation of keys using provided decrypted data is disabled since CONFIG_USER_DECRYPTED_DATA is set to false Sep 27 01:59:07 syzkaller kern.err kernel: [ 282.297833][T10025] trusted_key: encrypted key: instantiation of keys using provided decrypted data is disabled since CONFIG_USER_DECRYPTED_DATA is set to false [ 283.488598][T10087] netlink: 'syz.0.2273': attribute type 4 has an invalid length. Sep 27 01:59:08 syzkaller kern.warn kernel: [ 283.488598][T10087] netlink: 'syz.0.2273': attribute type 4 has an invalid length. [ 285.289093][ T30] kauditd_printk_skb: 193 callbacks suppressed [ 285.289117][ T30] audit: type=1400 audit(1727402350.707:2125): avc: denied { read write } for pid=5226 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Sep 27 01:59:10 syzkaller kern.warn kernel: [ 285.289093][ T30] kauditd_printk_skb: 193 callbacks suppressed Sep 27 01:59:10 syzkaller kern.notice kernel: [ 285.289117][ T30] audit: type=1400 audit(1727402350.707:2125): avc: denied { read write } for pid=5226 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 285.376592][ T30] audit: type=1400 audit(1727402350.757:2126): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Sep 27 01:59:10 syzkaller kern.notice kernel: [ 285.376592][ T30] audit: type=1400 audit(1727402350.757:2126)[ 285.416446][ T30] audit: type=1400 audit(1727402350.757:2127): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 : avc: denied [ 285.439493][ T30] audit: type=1400 audit(1727402350.767:2128): avc: denied { read write } for pid=5227 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 { read } for pi[ 285.465329][ T30] audit: type=1400 audit(1727402350.827:2129): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 d=4656 comm="sys[ 285.489351][ T30] audit: type=1400 audit(1727402350.857:2130): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 logd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Sep 27 01:59:10 syzkaller kern.notice kernel: [ 285.416446][ T30] audit: [ 285.527062][ T30] audit: type=1400 audit(1727402350.937:2131): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 type=1400 audit([ 285.550982][ T30] audit: type=1400 audit(1727402350.937:2132): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 1727402350.757:2[ 285.574322][ T30] audit: type=1400 audit(1727402350.937:2133): avc: denied { read write } for pid=5234 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 127): avc: deni[ 285.599882][ T30] audit: type=1400 audit(1727402350.937:2134): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ed { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Sep 27 01:59:10 syzkaller kern.notice kernel: [ 285.439493][ T30] audit: type=1400 audit(1727402350.767:2128): avc: denied { read write } for pid=5227 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Sep 27 01:59:10 syzkaller kern.notice kernel: [ 285.465329][ T30] audit: type=1400 audit(1727402350.827:2129): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Sep 27 01:59:10 syzkaller kern.notice kernel: [ 285.489351][ T30] audit: type=1400 audit(1727402350.857:2130): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Sep 27 01:59:10 syzkaller kern.notice kernel: [ 285.527062][ T30] audit: type=1400 audit(1727402350.937:2131): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Sep 27 01:59:10 syzkaller kern.notice kernel: [ 285.550982][ T30] audit: type=1400 audit(1727402350.937:2132): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Sep 27 01:59:11 syzkaller kern.notice kernel: [ 285.574322][ T30] audit: type=1400 audit(1727402350.937:2133): avc: denied { read write } for pid=5234 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Sep 27 01:59:11 syzkaller kern.notice kernel: [ 285.599882][ T30] audit: type=1400 audit(1727402350.937:2134): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 286.129068][T10218] x_tables: ip_tables: osf match: used from hooks OUTPUT, but only valid from PREROUTING/INPUT/FORWARD [ 286.252626][T10226] netlink: 'syz.1.2340': attribute type 23 has an invalid length. [ 286.446542][ T25] usb 3-1: new high-speed USB device number 78 using dummy_hcd [ 286.627271][ T25] usb 3-1: Using ep0 maxpacket: 32 [ 286.638886][ T25] usb 3-1: config 0 has an invalid interface number: 141 but max is 0 [ 286.660582][ T25] usb 3-1: config 0 has no interface number 0 [ 286.676622][ T25] usb 3-1: config 0 interface 141 altsetting 0 endpoint 0x9 has invalid wMaxPacketSize 0 [ 286.701080][ T25] usb 3-1: config 0 interface 141 altsetting 0 endpoint 0xD has invalid wMaxPacketSize 0 [ 286.744965][ T25] usb 3-1: New USB device found, idVendor=0e6f, idProduct=582c, bcdDevice=31.68 [ 286.779298][ T25] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 286.799168][ T25] usb 3-1: Product: syz [ 286.807803][ T25] usb 3-1: Manufacturer: syz [ 286.812577][ T25] usb 3-1: SerialNumber: syz [ 286.821076][T10246] XFS (nullb0): Invalid superblock magic number [ 286.833922][ T25] usb 3-1: config 0 descriptor?? [ 287.169471][ T5294] usb 3-1: USB disconnect, device number 78 [ 287.305082][T10269] tmpfs: Bad value for 'grpquota_inode_hardlimit' [ 287.476648][T10279] Cannot find set identified by id 0 to match [ 287.582449][T10283] usb usb9: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 288.693812][T10330] netlink: 108 bytes leftover after parsing attributes in process `syz.1.2391'. [ 288.790850][T10333] netlink: 'syz.3.2390': attribute type 1 has an invalid length. [ 288.821657][T10333] netlink: 168864 bytes leftover after parsing attributes in process `syz.3.2390'. [ 289.167408][T10348] xt_addrtype: ipv6 PROHIBIT (THROW, NAT ..) matching not supported [ 289.243459][T10352] netlink: 'syz.0.2400': attribute type 23 has an invalid length. [ 289.269843][T10352] netlink: 8 bytes leftover after parsing attributes in process `syz.0.2400'. [ 289.567995][T10366] kernel read not supported for file /sy~tnl1Þ×êR¯´@¯ ¶¹ Óz3Bí§6—_$ë½$¥fïž&Êã-eÝ–x  ;"M bÎ¥`QÓΚo¹‹;:Míž›óó}°õŒ”è{÷ Åh ¹«ÂÕ|x`‹¯3 ôE±îögÙg^jllDQ}ƒ‚ÌwmÑd:ŠÓ•wýäadkžIÚ¨.p…{ósÃNý“ (pid: 10366 comm: syz.0.2408) [ 290.450668][ T30] kauditd_printk_skb: 64 callbacks suppressed [ 290.450692][ T30] audit: type=1400 audit(1727402355.867:2199): avc: denied { write } for pid=10406 comm="syz.4.2429" name="sockstat" dev="proc" ino=4026533127 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 290.544434][ T30] audit: type=1400 audit(1727402355.957:2200): avc: denied { module_request } for pid=10409 comm="syz.0.2430" kmod="snd-timer-3" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 290.794448][ T30] audit: type=1400 audit(1727402356.207:2201): avc: denied { create } for pid=10422 comm="syz.0.2436" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 290.830400][T10423] netlink: 68 bytes leftover after parsing attributes in process `syz.0.2436'. [ 290.872007][ T30] audit: type=1400 audit(1727402356.247:2202): avc: denied { write } for pid=10422 comm="syz.0.2436" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 290.981782][ T30] audit: type=1400 audit(1727402356.247:2203): avc: denied { nlmsg_write } for pid=10422 comm="syz.0.2436" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 291.037247][ T30] audit: type=1400 audit(1727402356.457:2204): avc: denied { create } for pid=10429 comm="syz.0.2440" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 291.085449][ T30] audit: type=1400 audit(1727402356.477:2205): avc: denied { getopt } for pid=10429 comm="syz.0.2440" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 291.166898][T10434] usb usb9: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 291.174308][T10434] vhci_hcd: USB_PORT_FEAT_U1/2_TIMEOUT req not supported for USB 2.0 roothub [ 291.308586][ T30] audit: type=1400 audit(1727402356.727:2206): avc: denied { read write } for pid=5227 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 291.393424][ T30] audit: type=1400 audit(1727402356.757:2207): avc: denied { open } for pid=5221 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 291.459628][T10442] usb usb7: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 291.471490][T10440] xt_CT: You must specify a L4 protocol and not use inversions on it [ 291.511841][ T30] audit: type=1400 audit(1727402356.757:2208): avc: denied { ioctl } for pid=5221 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=649 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 292.297468][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 292.310465][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 292.323515][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 292.336099][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 292.348615][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 292.361285][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 292.373828][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 292.386511][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 292.399037][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 292.411612][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 293.691269][T10501] xt_CT: You must specify a L4 protocol and not use inversions on it [ 293.867661][T10503] netlink: 24 bytes leftover after parsing attributes in process `syz.1.2473'. [ 293.941045][T10503] netlink: 24 bytes leftover after parsing attributes in process `syz.1.2473'. [ 295.224271][T10531] dlm: Unknown command passed to DLM device : 222 [ 295.224271][T10531] [ 295.712619][ T30] kauditd_printk_skb: 41 callbacks suppressed [ 295.712645][ T30] audit: type=1400 audit(1727402361.127:2250): avc: denied { create } for pid=10540 comm="syz.0.2492" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 295.886521][ T30] audit: type=1400 audit(1727402361.177:2251): avc: denied { write } for pid=10540 comm="syz.0.2492" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 296.083541][ T30] audit: type=1400 audit(1727402361.427:2252): avc: denied { wake_alarm } for pid=10544 comm="syz.2.2494" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 297.183519][ T30] audit: type=1326 audit(1727402362.597:2253): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10567 comm="syz.1.2506" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f617637df39 code=0x7ffc0000 [ 297.306468][ C1] net_ratelimit: 13065 callbacks suppressed [ 297.306496][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 297.324972][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 297.337540][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 297.350096][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 297.362674][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 297.364638][ T30] audit: type=1326 audit(1727402362.637:2254): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10567 comm="syz.1.2506" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f617637df39 code=0x7ffc0000 [ 297.375137][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 297.410923][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 297.423466][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 297.436118][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 297.448635][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 297.556332][ C1] sched: DL replenish lagged too much [ 297.653607][ T30] audit: type=1326 audit(1727402362.667:2255): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10567 comm="syz.1.2506" exe="/root/syz-executor" sig=0 arch=c000003e syscall=187 compat=0 ip=0x7f617637df39 code=0x7ffc0000 [ 297.836710][ T30] audit: type=1326 audit(1727402362.667:2256): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10567 comm="syz.1.2506" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f617637df39 code=0x7ffc0000 [ 297.860781][ T937] usb 4-1: new high-speed USB device number 77 using dummy_hcd [ 298.026721][ T30] audit: type=1326 audit(1727402362.667:2257): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10567 comm="syz.1.2506" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f617637df39 code=0x7ffc0000 [ 298.094925][ T937] usb 4-1: config 0 descriptor has 1 excess byte, ignoring [ 298.126522][ T937] usb 4-1: config 0 has no interfaces? [ 298.162709][ T937] usb 4-1: New USB device found, idVendor=1a34, idProduct=0802, bcdDevice= 0.00 [ 298.253892][ T30] audit: type=1400 audit(1727402363.107:2258): avc: denied { create } for pid=10576 comm="syz.0.2510" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 298.273910][ T937] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 298.325813][ T937] usb 4-1: config 0 descriptor?? [ 298.414453][ T30] audit: type=1400 audit(1727402363.147:2259): avc: denied { setopt } for pid=10576 comm="syz.0.2510" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 298.606640][ T937] usb 4-1: USB disconnect, device number 77 [ 298.888788][T10599] netlink: 696 bytes leftover after parsing attributes in process `syz.2.2520'. [ 299.823637][T10620] netlink: 16 bytes leftover after parsing attributes in process `syz.1.2531'. [ 300.846459][ T30] kauditd_printk_skb: 3 callbacks suppressed [ 300.846484][ T30] audit: type=1400 audit(1727402366.257:2263): avc: denied { create } for pid=10640 comm="syz.3.2540" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 300.929785][T10642] xt_TPROXY: Can be used only with -p tcp or -p udp [ 301.066614][ T30] audit: type=1400 audit(1727402366.347:2264): avc: denied { setopt } for pid=10640 comm="syz.3.2540" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 301.846639][ T5224] usb 3-1: new high-speed USB device number 79 using dummy_hcd [ 302.026478][ T5224] usb 3-1: Using ep0 maxpacket: 8 [ 302.049651][ T5224] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 302.113116][ T5224] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 302.153136][ T5224] usb 3-1: New USB device found, idVendor=0b05, idProduct=1abe, bcdDevice= 0.00 [ 302.183172][ T5224] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 302.221517][ T5224] usb 3-1: config 0 descriptor?? [ 302.316365][ C1] net_ratelimit: 13086 callbacks suppressed [ 302.316391][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 302.334836][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 302.347541][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 302.360142][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 302.372728][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 302.385263][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 302.397864][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 302.410396][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 302.421825][ T30] audit: type=1400 audit(1727402367.837:2265): avc: denied { sys_module } for pid=10666 comm="syz.3.2552" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 302.422965][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 302.456256][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 302.743742][ T5224] asus 0003:0B05:1ABE.0001: hidraw0: USB HID v0.00 Device [HID 0b05:1abe] on usb-dummy_hcd.2-1/input0 [ 302.785083][ T5224] asus 0003:0B05:1ABE.0001: Asus input not registered [ 302.830063][ T5224] asus 0003:0B05:1ABE.0001: probe with driver asus failed with error -12 [ 302.910853][ T5224] usb 3-1: USB disconnect, device number 79 [ 302.935686][ T30] audit: type=1400 audit(1727402368.347:2266): avc: denied { write } for pid=10675 comm="syz.1.2555" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 303.275859][T10681] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=514 sclass=netlink_route_socket pid=10681 comm=syz.1.2557 [ 304.088773][ T30] audit: type=1400 audit(1727402369.507:2267): avc: denied { create } for pid=10690 comm="syz.2.2561" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 304.146439][ T30] audit: type=1400 audit(1727402369.537:2268): avc: denied { bind } for pid=10690 comm="syz.2.2561" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 304.216675][ T30] audit: type=1400 audit(1727402369.537:2269): avc: denied { write } for pid=10690 comm="syz.2.2561" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 307.326582][ C1] net_ratelimit: 15239 callbacks suppressed [ 307.326613][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 307.345120][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 307.357634][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 307.370189][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 307.382562][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 307.395151][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 307.407635][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 307.420193][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 307.432663][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 307.445200][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 311.461981][ T30] audit: type=1400 audit(1727402376.867:2270): avc: denied { create } for pid=10700 comm="syz.4.2565" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 311.596973][T10708] netlink: 209836 bytes leftover after parsing attributes in process `syz.1.2567'. [ 311.627555][ T30] audit: type=1400 audit(1727402376.917:2271): avc: denied { getopt } for pid=10700 comm="syz.4.2565" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 311.806613][ T30] audit: type=1400 audit(1727402376.917:2272): avc: denied { create } for pid=10702 comm="syz.3.2566" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 311.968811][ T30] audit: type=1400 audit(1727402377.007:2273): avc: denied { write } for pid=10707 comm="syz.2.2568" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 311.990749][T10713] kvm_intel: L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 312.104825][T10714] usb usb9: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 312.125182][ T30] audit: type=1400 audit(1727402377.377:2274): avc: denied { read } for pid=10711 comm="syz.4.2570" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 312.157112][T10718] netlink: 87 bytes leftover after parsing attributes in process `syz.0.2572'. [ 312.322839][ T30] audit: type=1400 audit(1727402377.377:2275): avc: denied { open } for pid=10711 comm="syz.4.2570" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 312.336727][ C1] net_ratelimit: 16038 callbacks suppressed [ 312.336756][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 312.364801][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 312.377347][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 312.389970][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 312.402557][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 312.415109][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 312.427669][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 312.440291][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 312.452863][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 312.465397][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 312.536442][ T30] audit: type=1400 audit(1727402377.407:2276): avc: denied { ioctl } for pid=10711 comm="syz.4.2570" path="/dev/kvm" dev="devtmpfs" ino=84 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 312.680552][T10729] Zero length message leads to an empty skb [ 312.801632][ T30] audit: type=1400 audit(1727402378.217:2277): avc: denied { read } for pid=4888 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 312.875987][T10730] mkiss: ax0: crc mode is auto. [ 312.974919][ T30] audit: type=1400 audit(1727402378.287:2278): avc: denied { search } for pid=4888 comm="dhcpcd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 313.138187][ T30] audit: type=1400 audit(1727402378.287:2279): avc: denied { read } for pid=4888 comm="dhcpcd" name="n74" dev="tmpfs" ino=7874 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 313.466696][T10737] xt_CT: No such helper "pptp" [ 314.186608][ T5224] usb 5-1: new high-speed USB device number 77 using dummy_hcd [ 314.222557][ T937] IPVS: starting estimator thread 0... [ 314.346663][T10758] IPVS: using max 14 ests per chain, 33600 per kthread [ 314.366986][ T5224] usb 5-1: Using ep0 maxpacket: 32 [ 314.382902][ T5224] usb 5-1: New USB device found, idVendor=0458, idProduct=7006, bcdDevice=69.91 [ 314.413426][ T5224] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 314.457477][ T5224] usb 5-1: config 0 descriptor?? [ 314.504397][ T5224] gspca_main: sunplus-2.14.0 probing 0458:7006 [ 315.111704][ T5224] gspca_sunplus: reg_w_riv err -71 [ 315.128442][ T5224] sunplus 5-1:0.0: probe with driver sunplus failed with error -71 [ 315.175888][ T5224] usb 5-1: USB disconnect, device number 77 [ 315.336537][ T5294] usb 2-1: new high-speed USB device number 73 using dummy_hcd [ 315.496624][ T5294] usb 2-1: Using ep0 maxpacket: 16 [ 315.508682][ T5294] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 315.526843][ T5294] usb 2-1: New USB device found, idVendor=258a, idProduct=0033, bcdDevice= 0.00 [ 315.536222][ T5294] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 315.562404][ T5294] usb 2-1: config 0 descriptor?? [ 316.069783][ T5294] glorious 0003:258A:0033.0002: unknown main item tag 0x0 [ 316.096895][ T5294] glorious 0003:258A:0033.0002: item fetching failed at offset 4/5 [ 316.118101][ T5294] glorious 0003:258A:0033.0002: probe with driver glorious failed with error -22 [ 316.296551][ T5294] usb 2-1: USB disconnect, device number 73 [ 317.346431][ C1] net_ratelimit: 13823 callbacks suppressed [ 317.346459][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 317.365012][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 317.377510][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 317.390047][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 317.402550][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 317.415213][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 317.427658][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 317.440358][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 317.452939][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 317.465327][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 322.356377][ C1] net_ratelimit: 13355 callbacks suppressed [ 322.356407][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 322.374845][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 322.387314][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 322.399745][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 322.412245][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 322.424786][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 322.437272][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 322.449707][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 322.462169][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 322.474630][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 322.940737][ T1270] ieee802154 phy0 wpan0: encryption failed: -22 [ 322.959406][ T1270] ieee802154 phy1 wpan1: encryption failed: -22 [ 327.366326][ C1] net_ratelimit: 13212 callbacks suppressed [ 327.366353][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 327.385013][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 327.397484][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 327.409914][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 327.422376][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 327.434887][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 327.447410][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 327.459852][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 327.472366][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 327.484814][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 332.376505][ C1] net_ratelimit: 13231 callbacks suppressed [ 332.376539][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 332.394965][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 332.407378][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 332.419862][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 332.432371][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 332.444840][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 332.457345][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 332.469940][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 332.482418][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 332.494905][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 337.386703][ C1] net_ratelimit: 13141 callbacks suppressed [ 337.386731][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 337.405238][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 337.417733][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 337.430257][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 337.442748][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 337.455169][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 337.467693][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 337.480116][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 337.492592][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 337.505026][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 342.396374][ C1] net_ratelimit: 13111 callbacks suppressed [ 342.396403][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 342.414793][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 342.427297][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 342.439753][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 342.452280][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 342.464811][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 342.477213][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 342.489651][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 342.502059][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 342.514694][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 347.406672][ C1] net_ratelimit: 12983 callbacks suppressed [ 347.406702][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 347.425063][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 347.437541][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 347.449957][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 347.462430][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 347.474831][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 347.487380][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 347.499798][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 347.512260][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 347.524658][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 352.416673][ C1] net_ratelimit: 13052 callbacks suppressed [ 352.416702][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 352.435085][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 352.447542][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 352.459958][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 352.472441][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 352.484888][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 352.497350][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 352.509780][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 352.522246][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 352.534663][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 357.426553][ C1] net_ratelimit: 14123 callbacks suppressed [ 357.426581][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 357.444960][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 357.457394][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 357.469827][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 357.482307][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 357.494749][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 357.507132][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 357.520012][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 357.532436][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 357.544860][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 362.436551][ C1] net_ratelimit: 13939 callbacks suppressed [ 362.436579][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 362.454975][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 362.467422][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 362.479853][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 362.492239][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 362.504653][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:28:e1:7b:3c:24, vlan:0) [ 362.517213][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 362.529967][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 362.542454][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 362.554880][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 367.446586][ C1] net_ratelimit: 13512 callbacks suppressed [ 367.446629][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 367.465118][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:28:e1:7b:3c:24, vlan:0) [ 367.477547][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 367.489942][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 367.502370][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 367.514764][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 367.527149][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 367.539551][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:28:e1:7b:3c:24, vlan:0) [ 367.551971][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 367.564368][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 372.456380][ C0] net_ratelimit: 17986 callbacks suppressed [ 372.456409][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 372.456554][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 372.463435][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 372.474758][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 372.486924][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 372.498899][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 372.511490][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 372.522748][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 372.534835][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 372.546760][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 377.466404][ C1] net_ratelimit: 19982 callbacks suppressed [ 377.466432][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 377.466456][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 377.472803][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 377.484746][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 377.496714][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:28:e1:7b:3c:24, vlan:0) [ 377.509232][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 377.520620][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 377.532702][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 377.544527][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 377.557269][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 382.476570][ C1] net_ratelimit: 20071 callbacks suppressed [ 382.476598][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:28:e1:7b:3c:24, vlan:0) [ 382.476775][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 382.482991][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 382.495081][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 382.506913][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 382.519695][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 382.531031][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 382.542927][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 382.554743][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 382.567711][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 387.486446][ C1] net_ratelimit: 19944 callbacks suppressed [ 387.486475][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 387.486658][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 387.492792][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 387.505516][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 387.516771][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:28:e1:7b:3c:24, vlan:0) [ 387.528758][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 387.540733][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 387.553461][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 387.564653][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 387.576815][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 392.496477][ C1] net_ratelimit: 19917 callbacks suppressed [ 392.496504][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 392.496799][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 392.502819][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 392.514925][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 392.527047][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 392.539976][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 392.550913][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 392.563029][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 392.574956][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 392.587541][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 397.506659][ C1] net_ratelimit: 20060 callbacks suppressed [ 397.506688][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 397.507065][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 397.513080][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:28:e1:7b:3c:24, vlan:0) [ 397.525009][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 397.537127][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 397.549867][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 397.561105][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 397.573193][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 397.585177][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 397.597703][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 402.516401][ C0] net_ratelimit: 20156 callbacks suppressed [ 402.516429][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 402.516559][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 402.523567][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 402.534974][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 402.546841][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 402.558740][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 402.571485][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 402.582800][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 402.594787][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 402.606698][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:28:e1:7b:3c:24, vlan:0) [ 407.526531][ C1] net_ratelimit: 19967 callbacks suppressed [ 407.526559][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 407.527140][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 407.533000][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 407.544937][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 407.556740][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 407.569534][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 407.580796][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 407.592758][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 407.604667][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:28:e1:7b:3c:24, vlan:0) [ 407.617570][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 412.536285][ C1] net_ratelimit: 19946 callbacks suppressed [ 412.536313][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 412.536377][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 412.542721][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 412.554672][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 412.566623][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:28:e1:7b:3c:24, vlan:0) [ 412.579265][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 412.590703][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 412.602817][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 412.614674][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 412.627371][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 417.546390][ C1] net_ratelimit: 19921 callbacks suppressed [ 417.546419][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 417.546511][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 417.553018][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:28:e1:7b:3c:24, vlan:0) [ 417.565549][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 417.576808][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 417.588869][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 417.600738][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 417.613703][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 417.625308][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 417.636953][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 422.556321][ C1] net_ratelimit: 19899 callbacks suppressed [ 422.556350][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 422.557050][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 422.562878][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:28:e1:7b:3c:24, vlan:0) [ 422.574770][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 422.586633][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 422.599629][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 422.610729][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 422.622804][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 422.634836][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 422.647479][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 427.566419][ C1] net_ratelimit: 20046 callbacks suppressed [ 427.566447][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:28:e1:7b:3c:24, vlan:0) [ 427.566529][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 427.572923][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 427.585024][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 427.596807][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 427.609654][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 427.621054][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 427.633017][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 427.644837][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 427.657589][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 432.576308][ C1] net_ratelimit: 20091 callbacks suppressed [ 432.576336][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:28:e1:7b:3c:24, vlan:0) [ 432.576502][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 432.582680][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 432.594844][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 432.606840][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 432.619684][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 432.631050][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 432.642982][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 432.654722][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 432.667487][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 433.536237][ C0] rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: [ 433.543260][ C0] rcu: Tasks blocked on level-0 rcu_node (CPUs 0-1): P4674/2:b..l [ 433.551758][ C0] rcu: (detected by 0, t=10503 jiffies, g=43633, q=337 ncpus=2) [ 433.559533][ C0] task:udevd state:R running task stack:24208 pid:4674 tgid:4674 ppid:1 flags:0x00000002 [ 433.572722][ C0] Call Trace: [ 433.576053][ C0] [ 433.579035][ C0] __schedule+0xed6/0x5920 [ 433.583556][ C0] ? __pfx_mark_lock+0x10/0x10 [ 433.588402][ C0] ? __pfx___schedule+0x10/0x10 [ 433.593330][ C0] ? hlock_class+0x4e/0x130 [ 433.597909][ C0] ? mark_held_locks+0x9f/0xe0 [ 433.602758][ C0] preempt_schedule_irq+0x51/0x90 [ 433.607872][ C0] irqentry_exit+0x36/0x90 [ 433.612356][ C0] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 433.618411][ C0] RIP: 0010:lock_release+0x3e5/0x6f0 [ 433.623791][ C0] Code: 7e 83 f8 01 0f 85 fd 01 00 00 9c 58 f6 c4 02 0f 85 e8 01 00 00 48 f7 04 24 00 02 00 00 74 01 fb 48 b8 00 00 00 00 00 fc ff df <48> 01 c3 48 c7 03 00 00 00 00 c7 43 08 00 00 00 00 48 8b 84 24 88 [ 433.643542][ C0] RSP: 0018:ffffc9000325f7a8 EFLAGS: 00000206 [ 433.649633][ C0] RAX: dffffc0000000000 RBX: 1ffff9200064bef7 RCX: ffffc9000325f7f8 [ 433.657706][ C0] RDX: 1ffff1100f97f15a RSI: ffffffff8b6ccf40 RDI: ffffffff8bd196e0 [ 433.665774][ C0] RBP: 2a43bcb40a17d4c6 R08: 0000000000000000 R09: fffffbfff20be189 [ 433.673755][ C0] R10: ffffffff905f0c4f R11: 0000000000000000 R12: 0000000000000002 [ 433.681754][ C0] R13: 0000000000000003 R14: ffff88807cbf8ad8 R15: ffff88807cbf8000 [ 433.689772][ C0] ? is_bpf_text_address+0x8a/0x1a0 [ 433.695025][ C0] ? __pfx_lock_release+0x10/0x10 [ 433.700115][ C0] ? unwind_next_frame+0xe5d/0x20c0 [ 433.705343][ C0] ? arch_stack_walk+0x74/0x100 [ 433.710245][ C0] ? bpf_ksym_find+0x127/0x1c0 [ 433.715148][ C0] ? __pfx_stack_trace_consume_entry+0x10/0x10 [ 433.721359][ C0] is_bpf_text_address+0x8f/0x1a0 [ 433.726412][ C0] kernel_text_address+0x8d/0x100 [ 433.731470][ C0] ? hlock_class+0x4e/0x130 [ 433.736032][ C0] __kernel_text_address+0xd/0x40 [ 433.741104][ C0] unwind_get_return_address+0x59/0xa0 [ 433.746590][ C0] arch_stack_walk+0xa7/0x100 [ 433.751308][ C0] stack_trace_save+0x95/0xd0 [ 433.756004][ C0] ? __pfx_stack_trace_save+0x10/0x10 [ 433.761748][ C0] save_stack+0x162/0x1f0 [ 433.766102][ C0] ? __pfx_save_stack+0x10/0x10 [ 433.770973][ C0] ? __pfx_lock_acquire+0x10/0x10 [ 433.776021][ C0] ? free_unref_page+0x5f4/0xdc0 [ 433.780970][ C0] ? __put_partials+0x14c/0x170 [ 433.785868][ C0] ? qlist_free_all+0x4e/0x120 [ 433.790653][ C0] ? kasan_quarantine_reduce+0x192/0x1e0 [ 433.796331][ C0] ? __kasan_slab_alloc+0x69/0x90 [ 433.801387][ C0] ? kmem_cache_alloc_noprof+0x121/0x2f0 [ 433.807119][ C0] ? getname_flags.part.0+0x4c/0x550 [ 433.812416][ C0] ? getname_flags+0x93/0xf0 [ 433.817024][ C0] ? vfs_fstatat+0x86/0x160 [ 433.821538][ C0] ? __do_sys_newfstatat+0xa2/0x130 [ 433.826750][ C0] ? do_syscall_64+0xcd/0x250 [ 433.831441][ C0] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 433.837563][ C0] __reset_page_owner+0x8d/0x400 [ 433.842545][ C0] free_unref_page+0x5f4/0xdc0 [ 433.847334][ C0] __put_partials+0x14c/0x170 [ 433.852041][ C0] qlist_free_all+0x4e/0x120 [ 433.856656][ C0] kasan_quarantine_reduce+0x192/0x1e0 [ 433.862146][ C0] __kasan_slab_alloc+0x69/0x90 [ 433.867183][ C0] kmem_cache_alloc_noprof+0x121/0x2f0 [ 433.872692][ C0] ? getname_flags.part.0+0x4c/0x550 [ 433.878010][ C0] getname_flags.part.0+0x4c/0x550 [ 433.883137][ C0] ? __might_fault+0x13b/0x190 [ 433.888012][ C0] getname_flags+0x93/0xf0 [ 433.892450][ C0] vfs_fstatat+0x86/0x160 [ 433.896815][ C0] __do_sys_newfstatat+0xa2/0x130 [ 433.901868][ C0] ? __pfx___do_sys_newfstatat+0x10/0x10 [ 433.907557][ C0] do_syscall_64+0xcd/0x250 [ 433.912085][ C0] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 433.918003][ C0] RIP: 0033:0x7f60b739f5f4 [ 433.922436][ C0] RSP: 002b:00007ffc71d6d5f8 EFLAGS: 00000246 ORIG_RAX: 0000000000000106 [ 433.930885][ C0] RAX: ffffffffffffffda RBX: 000055f2fda5f6e8 RCX: 00007f60b739f5f4 [ 433.939055][ C0] RDX: 00007ffc71d6d608 RSI: 000055f2fda4f893 RDI: 00000000ffffff9c [ 433.947042][ C0] RBP: 000055f3109f1fb8 R08: 00062305ed946d00 R09: 00007f60b752c080 [ 433.955040][ C0] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 433.963026][ C0] R13: 0000000000000001 R14: 00062305ed946d00 R15: 000055f2fda53dca [ 433.971037][ C0] [ 433.974070][ C0] rcu: rcu_preempt kthread starved for 10278 jiffies! g43633 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=1 [ 433.985328][ C0] rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. [ 433.995348][ C0] rcu: RCU grace-period kthread stack dump: [ 434.001283][ C0] task:rcu_preempt state:R running task stack:28400 pid:17 tgid:17 ppid:2 flags:0x00004000 [ 434.013152][ C0] Call Trace: [ 434.016473][ C0] [ 434.019444][ C0] __schedule+0xed6/0x5920 [ 434.023933][ C0] ? __pfx___lock_acquire+0x10/0x10 [ 434.029223][ C0] ? __pfx___schedule+0x10/0x10 [ 434.034237][ C0] ? schedule+0x298/0x350 [ 434.038638][ C0] ? __pfx_lock_release+0x10/0x10 [ 434.043731][ C0] ? __pfx___mod_timer+0x10/0x10 [ 434.048743][ C0] ? lock_acquire+0x1b1/0x560 [ 434.053490][ C0] ? lockdep_init_map_type+0x16d/0x7d0 [ 434.059066][ C0] schedule+0xe7/0x350 [ 434.063211][ C0] schedule_timeout+0x136/0x2a0 [ 434.068130][ C0] ? __pfx_schedule_timeout+0x10/0x10 [ 434.073577][ C0] ? __pfx_process_timeout+0x10/0x10 [ 434.079031][ C0] ? _raw_spin_unlock_irqrestore+0x3b/0x80 [ 434.084919][ C0] ? prepare_to_swait_event+0xf3/0x470 [ 434.090448][ C0] rcu_gp_fqs_loop+0x1eb/0xb00 [ 434.095294][ C0] ? __pfx_rcu_gp_fqs_loop+0x10/0x10 [ 434.100654][ C0] ? rcu_gp_init+0xc82/0x1630 [ 434.105415][ C0] ? _raw_spin_unlock_irq+0x2e/0x50 [ 434.110718][ C0] ? _raw_spin_unlock_irqrestore+0x52/0x80 [ 434.116620][ C0] rcu_gp_kthread+0x271/0x380 [ 434.121388][ C0] ? __pfx_rcu_gp_kthread+0x10/0x10 [ 434.126755][ C0] ? lockdep_hardirqs_on+0x7c/0x110 [ 434.132016][ C0] ? __kthread_parkme+0x148/0x220 [ 434.137231][ C0] ? __pfx_rcu_gp_kthread+0x10/0x10 [ 434.142540][ C0] kthread+0x2c1/0x3a0 [ 434.146673][ C0] ? _raw_spin_unlock_irq+0x23/0x50 [ 434.151944][ C0] ? __pfx_kthread+0x10/0x10 [ 434.156596][ C0] ret_from_fork+0x45/0x80 [ 434.161095][ C0] ? __pfx_kthread+0x10/0x10 [ 434.165782][ C0] ret_from_fork_asm+0x1a/0x30 [ 434.170656][ C0] [ 434.173774][ C0] rcu: Stack dump where RCU GP kthread last ran: [ 434.180151][ C0] Sending NMI from CPU 0 to CPUs 1: [ 434.185403][ C1] NMI backtrace for cpu 1 [ 434.185432][ C1] CPU: 1 UID: 0 PID: 24 Comm: ksoftirqd/1 Not tainted 6.11.0-syzkaller-11558-g075dbe9f6e3c #0 [ 434.185464][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 434.185480][ C1] RIP: 0010:mark_lock+0x1/0xc60 [ 434.185525][ C1] Code: e8 04 bc 84 00 e9 db fe ff ff 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 55 <48> 89 e5 41 57 41 56 41 89 d6 48 ba 00 00 00 00 00 fc ff df 41 55 [ 434.185551][ C1] RSP: 0018:ffffc900001e6bb0 EFLAGS: 00000046 [ 434.185573][ C1] RAX: 0000000000000000 RBX: 0000000000000001 RCX: 0000000000000002 [ 434.185590][ C1] RDX: 0000000000000008 RSI: ffff88801d6f8b58 RDI: ffff88801d6f8000 [ 434.185607][ C1] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000006 [ 434.185624][ C1] R10: ffffffff96e15c47 R11: 0000000000000002 R12: dffffc0000000000 [ 434.185643][ C1] R13: ffff88801d6f8b58 R14: 0000000000000002 R15: ffff88801d6f8000 [ 434.185661][ C1] FS: 0000000000000000(0000) GS:ffff8880b8700000(0000) knlGS:0000000000000000 [ 434.185687][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 434.185706][ C1] CR2: 00007f3cd21042d8 CR3: 000000000df7c000 CR4: 00000000003506f0 [ 434.185724][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 434.185741][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 434.185758][ C1] Call Trace: [ 434.185766][ C1] [ 434.185775][ C1] ? nmi_cpu_backtrace+0x1d8/0x390 [ 434.185817][ C1] ? nmi_cpu_backtrace_handler+0xc/0x20 [ 434.185856][ C1] ? nmi_handle+0x1a9/0x5c0 [ 434.185882][ C1] ? mark_lock+0x1/0xc60 [ 434.185926][ C1] ? default_do_nmi+0x6a/0x160 [ 434.185962][ C1] ? exc_nmi+0x170/0x1e0 [ 434.185996][ C1] ? end_repeat_nmi+0xf/0x53 [ 434.186028][ C1] ? mark_lock+0x1/0xc60 [ 434.186065][ C1] ? mark_lock+0x1/0xc60 [ 434.186104][ C1] ? mark_lock+0x1/0xc60 [ 434.186141][ C1] [ 434.186149][ C1] [ 434.186157][ C1] __lock_acquire+0x906/0x3ce0 [ 434.186206][ C1] ? mark_lock+0xb5/0xc60 [ 434.186243][ C1] ? __pfx___lock_acquire+0x10/0x10 [ 434.186284][ C1] ? __pfx_mark_lock+0x10/0x10 [ 434.186324][ C1] lock_acquire+0x1b1/0x560 [ 434.186364][ C1] ? ipv6_chk_mcast_addr+0x43/0x990 [ 434.186396][ C1] ? __pfx_lock_acquire+0x10/0x10 [ 434.186436][ C1] ? ip6_route_input+0x685/0xc10 [ 434.186462][ C1] ? __pfx_ip6_route_input+0x10/0x10 [ 434.186490][ C1] ipv6_chk_mcast_addr+0x49/0x990 [ 434.186519][ C1] ? ipv6_chk_mcast_addr+0x43/0x990 [ 434.186550][ C1] ip6_mc_input+0x392/0xfd0 [ 434.186578][ C1] ? __pfx_ip6_mc_input+0x10/0x10 [ 434.186604][ C1] ? lock_acquire+0x1b1/0x560 [ 434.186646][ C1] ? __pfx_ip6_mc_input+0x10/0x10 [ 434.186673][ C1] ip6_rcv_finish+0x3a2/0x5b0 [ 434.186698][ C1] ? __pfx_ip6_rcv_finish+0x10/0x10 [ 434.186723][ C1] ? __pfx_ip_sabotage_in+0x10/0x10 [ 434.186752][ C1] ip_sabotage_in+0x21b/0x290 [ 434.186780][ C1] nf_hook_slow+0xbb/0x200 [ 434.186818][ C1] nf_hook.constprop.0+0x42e/0x750 [ 434.186843][ C1] ? __pfx_ip6_rcv_finish+0x10/0x10 [ 434.186870][ C1] ? __pfx_nf_hook.constprop.0+0x10/0x10 [ 434.186902][ C1] ? __pfx_ip6_rcv_finish+0x10/0x10 [ 434.186932][ C1] ? __pfx_ipv6_rcv+0x10/0x10 [ 434.186956][ C1] ipv6_rcv+0xa4/0x680 [ 434.186980][ C1] ? __pfx_ipv6_rcv+0x10/0x10 [ 434.187003][ C1] __netif_receive_skb_one_core+0x12e/0x1e0 [ 434.187036][ C1] ? __pfx___netif_receive_skb_one_core+0x10/0x10 [ 434.187071][ C1] ? nf_hook_slow+0x132/0x200 [ 434.187109][ C1] __netif_receive_skb+0x1d/0x160 [ 434.187140][ C1] netif_receive_skb+0x13f/0x7b0 [ 434.187169][ C1] ? __pfx_netif_receive_skb+0x10/0x10 [ 434.187206][ C1] br_pass_frame_up+0x346/0x490 [ 434.187237][ C1] br_handle_frame_finish+0xdcf/0x1c80 [ 434.187271][ C1] ? __pfx_br_handle_frame_finish+0x10/0x10 [ 434.187304][ C1] ? ip6t_do_table+0xd20/0x1d40 [ 434.187345][ C1] ? ip6t_do_table+0xd20/0x1d40 [ 434.187382][ C1] ? __local_bh_enable_ip+0xa4/0x120 [ 434.187412][ C1] ? ip6t_do_table+0xd50/0x1d40 [ 434.187450][ C1] ? __pfx_ip6t_do_table+0x10/0x10 [ 434.187489][ C1] ? nf_hook_slow+0x132/0x200 [ 434.187526][ C1] br_nf_hook_thresh+0x303/0x410 [ 434.187576][ C1] ? __pfx_br_handle_frame_finish+0x10/0x10 [ 434.187611][ C1] ? __pfx_br_nf_hook_thresh+0x10/0x10 [ 434.187646][ C1] ? __pfx_br_handle_frame_finish+0x10/0x10 [ 434.187679][ C1] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 434.187718][ C1] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 434.187759][ C1] br_nf_pre_routing_finish_ipv6+0x76a/0xfb0 [ 434.187793][ C1] ? __pfx_br_handle_frame_finish+0x10/0x10 [ 434.187828][ C1] br_nf_pre_routing_ipv6+0x3ce/0x8c0 [ 434.187861][ C1] ? __pfx_br_nf_pre_routing_ipv6+0x10/0x10 [ 434.188042][ C1] ? __pfx_lock_release+0x10/0x10 [ 434.188091][ C1] ? __pfx_br_nf_pre_routing_finish_ipv6+0x10/0x10 [ 434.188132][ C1] br_nf_pre_routing+0x860/0x15b0 [ 434.188167][ C1] br_handle_frame+0x9eb/0x1490 [ 434.188201][ C1] ? __pfx_br_handle_frame+0x10/0x10 [ 434.188234][ C1] ? __pfx_br_handle_frame_finish+0x10/0x10 [ 434.188269][ C1] ? __pfx_br_handle_frame+0x10/0x10 [ 434.188301][ C1] __netif_receive_skb_core.constprop.0+0xa3d/0x4330 [ 434.188341][ C1] ? kasan_quarantine_put+0x60/0x240 [ 434.188386][ C1] ? kmem_cache_free+0x152/0x4b0 [ 434.188411][ C1] ? kfree_skbmem+0x1a4/0x1f0 [ 434.188442][ C1] ? __pfx___netif_receive_skb_core.constprop.0+0x10/0x10 [ 434.188475][ C1] ? hlock_class+0x4e/0x130 [ 434.188506][ C1] ? __lock_acquire+0xbdd/0x3ce0 [ 434.188553][ C1] ? __pfx___lock_acquire+0x10/0x10 [ 434.188594][ C1] ? __pfx_ip6_rcv_finish+0x10/0x10 [ 434.188626][ C1] ? lock_acquire+0x1b1/0x560 [ 434.188668][ C1] ? process_backlog+0x3f1/0x15f0 [ 434.188699][ C1] __netif_receive_skb_one_core+0xb1/0x1e0 [ 434.188733][ C1] ? __pfx___netif_receive_skb_one_core+0x10/0x10 [ 434.188766][ C1] ? process_backlog+0x3f1/0x15f0 [ 434.188796][ C1] ? __pfx_lock_release+0x10/0x10 [ 434.188838][ C1] ? do_raw_spin_lock+0x12d/0x2c0 [ 434.188868][ C1] ? __pfx_do_raw_spin_lock+0x10/0x10 [ 434.188899][ C1] ? process_backlog+0x3f1/0x15f0 [ 434.188935][ C1] __netif_receive_skb+0x1d/0x160 [ 434.188967][ C1] process_backlog+0x443/0x15f0 [ 434.189003][ C1] __napi_poll.constprop.0+0xb7/0x550 [ 434.189037][ C1] net_rx_action+0xa92/0x1010 [ 434.189074][ C1] ? __pfx_net_rx_action+0x10/0x10 [ 434.189106][ C1] ? __pfx_tmigr_handle_remote+0x10/0x10 [ 434.189152][ C1] ? run_timer_base+0x119/0x190 [ 434.189189][ C1] ? kvm_sched_clock_read+0x11/0x20 [ 434.189233][ C1] ? sched_clock+0x38/0x60 [ 434.189271][ C1] ? sched_clock_cpu+0x6d/0x4d0 [ 434.189322][ C1] handle_softirqs+0x213/0x8f0 [ 434.189354][ C1] ? __pfx_handle_softirqs+0x10/0x10 [ 434.189391][ C1] ? rcu_is_watching+0x12/0xc0 [ 434.189423][ C1] ? __pfx_run_ksoftirqd+0x10/0x10 [ 434.189450][ C1] ? smpboot_thread_fn+0x59d/0xa10 [ 434.189481][ C1] run_ksoftirqd+0x3a/0x60 [ 434.189507][ C1] smpboot_thread_fn+0x661/0xa10 [ 434.189536][ C1] ? __kthread_parkme+0x148/0x220 [ 434.189569][ C1] ? __pfx_smpboot_thread_fn+0x10/0x10 [ 434.189600][ C1] kthread+0x2c1/0x3a0 [ 434.189628][ C1] ? _raw_spin_unlock_irq+0x23/0x50 [ 434.189671][ C1] ? __pfx_kthread+0x10/0x10 [ 434.189702][ C1] ret_from_fork+0x45/0x80 [ 434.189742][ C1] ? __pfx_kthread+0x10/0x10 [ 434.189773][ C1] ret_from_fork_asm+0x1a/0x30 [ 434.189820][ C1] [ 437.586646][ C1] net_ratelimit: 16437 callbacks suppressed [ 437.586675][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:28:e1:7b:3c:24, vlan:0) [ 437.587311][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 437.593093][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 437.605174][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 437.616991][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 437.629841][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 437.641139][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 437.653056][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 437.664874][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 437.677684][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 442.596355][ C0] net_ratelimit: 19794 callbacks suppressed [ 442.596384][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 442.596523][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 442.603459][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 442.614709][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 442.626805][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 442.638703][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 442.651495][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 442.662719][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:28:e1:7b:3c:24, vlan:0) [ 442.674658][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 442.687117][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)