last executing test programs: 1m6.288608771s ago: executing program 0 (id=5388): syz_io_uring_setup(0x48ce, &(0x7f0000000140)={0x0, 0x5e99, 0x3000, 0x3, 0x19a}, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c0000001000010700000000000000000a000028060001"], 0x1c}}, 0x0) 1m5.782947852s ago: executing program 0 (id=5396): r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0xc, &(0x7f0000000640)=0x4, 0x4) sendmsg$netlink(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000340)={0x1c, 0x1e, 0x101, 0x0, 0x0, "", [@nested={0xc, 0x12, 0x0, 0x1, [@typed={0x8, 0xd2, 0x0, 0x0, @pid}]}]}, 0x1c}], 0x1}, 0x0) 1m5.699309849s ago: executing program 1 (id=5397): r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001000)=ANY=[@ANYBLOB="240000001e00050300000000000000000000000008000000", @ANYRES32=0x0, @ANYBLOB='\b\x00\t\x00', @ANYRES32], 0x24}, 0x1, 0x0, 0x0, 0x4a841}, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 1m5.677467571s ago: executing program 0 (id=5398): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080), r0) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000940)={&(0x7f0000000240)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="390200000000000000000f000000180007800800020006000000080003"], 0x2c}}, 0x0) 1m5.628620725s ago: executing program 0 (id=5399): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="1d000000", @ANYRES16=r1, @ANYBLOB="01002cbd7000fbdbdf2501"], 0x34}, 0x1, 0x0, 0x0, 0x8010}, 0x4) 1m5.599389248s ago: executing program 1 (id=5400): r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) sendto$inet(r0, &(0x7f0000000000)="ffffffff00000000", 0x8, 0x20040084, &(0x7f0000001180)={0x2, 0x4e22, @multicast1}, 0x10) 1m5.547911492s ago: executing program 0 (id=5401): setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, 0x0, 0x0) r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000200)={0x8, 0x0, &(0x7f0000000040)=[@request_death={0x400c630e, 0x2}], 0xfffffdc2, 0x0, &(0x7f0000000880)="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"}) 1m4.918816843s ago: executing program 1 (id=5402): mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x2000007, 0x401d031, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff0000/0x1000)=nil, &(0x7f0000ff9000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f00008fb000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000eb4000/0x3000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) syz_io_uring_setup(0x7688, &(0x7f0000000040)={0x0, 0x800389b, 0x4000, 0x1, 0x19e}, 0x0, 0x0) 1m3.038067387s ago: executing program 0 (id=5405): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SIGNAL_MSI(r1, 0x4020aea5, 0x0) 1m1.437113148s ago: executing program 3 (id=5406): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001280)={0x38, r1, 0xc4fc9e906872338b, 0x0, 0x25dfdc01, {{0x5}, {@val={0x8}, @val={0xc, 0x99, {0x40}}}}, [@NL80211_ATTR_TID_CONFIG={0x10, 0x11d, 0x0, 0x1, [{0xffffffffffffffde, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_RETRY_LONG={0x5, 0x4}]}, {0x0, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_AMSDU_CTRL, @NL80211_TID_CONFIG_ATTR_RETRY_SHORT={0x0, 0x7, 0x4d}, @NL80211_TID_CONFIG_ATTR_TIDS={0x0, 0x5, 0x8}, @NL80211_TID_CONFIG_ATTR_NOACK, @NL80211_TID_CONFIG_ATTR_AMPDU_CTRL={0x0, 0x9, 0x1}]}]}]}, 0x38}}, 0x44000) 1m1.04696641s ago: executing program 1 (id=5407): r0 = socket(0x10, 0x80002, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r1, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@HEADER={0x4}, @HEADER={0x4}]}, 0x1c}, 0x1, 0x0, 0x0, 0x41}, 0x48800) 57.155270167s ago: executing program 3 (id=5410): openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$bt_hidp(0x1f, 0x3, 0x6) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x7, 0x5, 0x5, 0x7, 0x3, 0x1, 0x2000000, 'syz1\x00'}) 56.679212387s ago: executing program 1 (id=5411): r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000080)=0xc) sendmsg$netlink(r0, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000000c00)=[{&(0x7f00000002c0)={0x24, 0x2c, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @uid=r1}, @nested={0xb, 0x2, 0x0, 0x1, [@generic="976b6408686030"]}]}, 0x24}], 0x1}, 0xcc000) 47.246077318s ago: executing program 32 (id=5405): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SIGNAL_MSI(r1, 0x4020aea5, 0x0) 46.806351334s ago: executing program 2 (id=5413): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180), r0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01032bbd7000ffdbdf2516000000100001800c00010069623a6873727fd04d25"], 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x4010) 46.056782765s ago: executing program 3 (id=5414): r0 = creat(&(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x182) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000004500), 0x800, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 43.894362882s ago: executing program 1 (id=5415): unshare(0x62040200) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000000c0)={'security\x00', 0x7003, [0x0, 0x0, 0x3, 0x0, 0x800]}, &(0x7f0000000080)=0x54) 40.186698845s ago: executing program 2 (id=5416): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(r0, 0x1, 0x2c, &(0x7f00000000c0)=0xffffffff, 0x4) setsockopt$sock_int(r0, 0x1, 0x1b, &(0x7f0000000000)=0x2, 0x4) 36.376796736s ago: executing program 3 (id=5417): mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x32, 0xffffffffffffffff, 0x2ec37000) r0 = socket$igmp6(0xa, 0x3, 0x2) setsockopt$inet6_buf(r0, 0x29, 0x1d, &(0x7f00000001c0)="ec003ab9", 0x4) 34.388514909s ago: executing program 2 (id=5418): r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000740)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000009080)=[{{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000001580)=""/4096, 0x1000}, {&(0x7f0000000040)=""/190, 0xbe}, {&(0x7f0000000580)=""/77, 0x4d}, {&(0x7f0000000600)=""/101, 0x65}, {&(0x7f0000002580)=""/4096, 0x1000}], 0x5}, 0x5e}, {{0x0, 0x0, 0x0}, 0x4}, {{0x0, 0x0, 0x0}, 0x2}, {{0x0, 0x0, 0x0}, 0x8}], 0x4, 0x2, 0x0) 31.964227447s ago: executing program 3 (id=5419): r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000300)=ANY=[], 0x40) getsockopt$inet6_opts(r0, 0x29, 0x3b, 0x0, &(0x7f0000000240)) 28.307223116s ago: executing program 2 (id=5420): r0 = syz_usb_connect$hid(0x2, 0x36, &(0x7f00000011c0)=ANY=[@ANYBLOB="12010001090003206d0414c340000000000109022400010000a0000904000001030101000921000800012203000905", @ANYRES64], 0x0) syz_usb_control_io$hid(r0, &(0x7f00000001c0)={0x24, &(0x7f0000001180)=ANY=[@ANYBLOB="00020c"], 0x0, 0x0, 0x0}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeed, 0x8031, 0xffffffffffffffff, 0xf6d0d000) 27.808779097s ago: executing program 33 (id=5415): unshare(0x62040200) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000000c0)={'security\x00', 0x7003, [0x0, 0x0, 0x3, 0x0, 0x800]}, &(0x7f0000000080)=0x54) 21.363141354s ago: executing program 3 (id=5422): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440), 0x141800, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CAP_MAX_VCPU_ID(r1, 0x4068aea3, &(0x7f0000000100)) 20.845246046s ago: executing program 2 (id=5423): sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x24000, &(0x7f0000000080)={0x2, 0x4e23, @remote}, 0x12) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x23, &(0x7f0000000080)=""/24, &(0x7f0000000000)=0x18) 17.066742615s ago: executing program 2 (id=5424): r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/pm_freeze_timeout', 0x200, 0x20) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x32, 0x0, 0x0) read$FUSE(r0, &(0x7f0000000480)={0x2020}, 0x2020) 4.77461763s ago: executing program 34 (id=5422): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440), 0x141800, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CAP_MAX_VCPU_ID(r1, 0x4068aea3, &(0x7f0000000100)) 0s ago: executing program 35 (id=5424): r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/pm_freeze_timeout', 0x200, 0x20) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x32, 0x0, 0x0) read$FUSE(r0, &(0x7f0000000480)={0x2020}, 0x2020) kernel console output (not intermixed with test programs): ter parsing attributes in process `syz.1.3710'. [ 137.512594][ T7757] netlink: 188 bytes leftover after parsing attributes in process `syz.3.3719'. [ 137.549315][ T36] kauditd_printk_skb: 462 callbacks suppressed [ 137.549332][ T36] audit: type=1400 audit(2000001075.928:6674): avc: denied { read } for pid=7760 comm="syz.2.3720" dev="nsfs" ino=4026532495 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 137.618378][ T36] audit: type=1400 audit(2000001075.938:6675): avc: denied { read write } for pid=470 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 137.638544][ T7768] netlink: 32 bytes leftover after parsing attributes in process `syz.3.3725'. [ 137.644745][ T36] audit: type=1400 audit(2000001075.978:6676): avc: denied { read write } for pid=473 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 137.686235][ T36] audit: type=1400 audit(2000001075.988:6677): avc: denied { read write } for pid=472 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 137.730093][ T36] audit: type=1400 audit(2000001075.998:6678): avc: denied { read write } for pid=470 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 137.756728][ T36] audit: type=1400 audit(2000001076.008:6679): avc: denied { read write } for pid=471 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 137.780842][ T36] audit: type=1400 audit(2000001076.068:6680): avc: denied { read write } for pid=7769 comm="syz.2.3726" name="rtc0" dev="devtmpfs" ino=195 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=0 [ 137.847331][ T36] audit: type=1400 audit(2000001076.098:6681): avc: denied { read write } for pid=473 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 137.875465][ T36] audit: type=1400 audit(2000001076.108:6682): avc: denied { read write } for pid=471 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 137.920548][ T36] audit: type=1400 audit(2000001076.138:6683): avc: denied { create } for pid=7775 comm="syz.3.3729" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 138.209612][ T7815] netlink: 1072 bytes leftover after parsing attributes in process `syz.3.3749'. [ 138.230278][ T7815] netlink: 280 bytes leftover after parsing attributes in process `syz.3.3749'. [ 138.403151][ T7834] netlink: 140 bytes leftover after parsing attributes in process `syz.0.3758'. [ 138.865494][ T7884] IPv6: syztnl2: Disabled Multicast RS [ 138.989233][ T7896] netlink: 'syz.2.3789': attribute type 4 has an invalid length. [ 139.025073][ T7896] netlink: 'syz.2.3789': attribute type 5 has an invalid length. [ 139.560362][ T7963] netlink: 'syz.2.3820': attribute type 12 has an invalid length. [ 139.589396][ T7967] mmap: syz.3.3823 (7967): VmData 29081600 exceed data ulimit 6. Update limits or use boot option ignore_rlimit_data. [ 140.658551][ T8101] netlink: 'syz.0.3889': attribute type 14 has an invalid length. [ 141.148502][ T8164] netlink: 'syz.3.3922': attribute type 1 has an invalid length. [ 142.030718][ T8281] netlink: 'syz.3.3979': attribute type 2 has an invalid length. [ 142.176875][ T8300] netlink: 'syz.2.3988': attribute type 1 has an invalid length. [ 142.230595][ T8305] netlink: 'syz.1.3989': attribute type 4 has an invalid length. [ 142.401047][ T8317] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'filter' [ 142.568053][ T36] kauditd_printk_skb: 2640 callbacks suppressed [ 142.568070][ T36] audit: type=1326 audit(2000001080.928:9324): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8302 comm="syz.3.3991" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f14b618eb69 code=0x50000 [ 142.587557][ T472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 142.605161][ T471] audit: audit_backlog=65 > audit_backlog_limit=64 [ 142.612054][ T471] audit: audit_lost=5 audit_rate_limit=0 audit_backlog_limit=64 [ 142.619681][ T471] audit: backlog limit exceeded [ 142.624738][ T471] audit: audit_backlog=65 > audit_backlog_limit=64 [ 142.631483][ T36] audit: type=1326 audit(2000001080.948:9325): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8302 comm="syz.3.3991" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f14b618eb69 code=0x50000 [ 142.631500][ T472] audit: audit_lost=6 audit_rate_limit=0 audit_backlog_limit=64 [ 142.654706][ T471] audit: audit_lost=7 audit_rate_limit=0 audit_backlog_limit=64 [ 142.654727][ T471] audit: backlog limit exceeded [ 143.550902][ T8405] netlink: 'syz.0.4040': attribute type 4 has an invalid length. [ 143.571524][ T8405] __nla_validate_parse: 6 callbacks suppressed [ 143.571540][ T8405] netlink: 3657 bytes leftover after parsing attributes in process `syz.0.4040'. [ 143.589184][ T8406] netlink: 'syz.2.4039': attribute type 13 has an invalid length. [ 143.641272][ T8410] cgroup: Bad value for 'name' [ 144.633081][ T8493] validate_nla: 1 callbacks suppressed [ 144.633097][ T8493] netlink: 'syz.1.4083': attribute type 32 has an invalid length. [ 144.978717][ T8516] rust_binder: BC_REQUEST_FREEZE_NOTIFICATION invalid ref 0 [ 144.996734][ T8516] rust_binder: Write failure EINVAL in pid:1986 [ 145.041138][ T510] usb 1-1: new high-speed USB device number 49 using dummy_hcd [ 145.223470][ T510] usb 1-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 145.249207][ T510] usb 1-1: config 1 interface 1 altsetting 1 endpoint 0x82 has invalid wMaxPacketSize 0 [ 145.265021][ T510] usb 1-1: config 1 interface 1 altsetting 1 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 145.281259][ T45] usb 2-1: new high-speed USB device number 53 using dummy_hcd [ 145.305541][ T510] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 145.315587][ T510] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 145.332945][ T510] usb 1-1: Product: syz [ 145.337153][ T510] usb 1-1: Manufacturer: syz [ 145.360922][ T510] usb 1-1: SerialNumber: syz [ 145.410555][ T8549] netlink: 37 bytes leftover after parsing attributes in process `syz.2.4109'. [ 145.453600][ T45] usb 2-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 18 [ 145.478484][ T45] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 145.494297][ T45] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=1 [ 145.508855][ T45] usb 2-1: SerialNumber: syz [ 145.797598][ T510] cdc_ncm 1-1:1.0: bind() failure [ 145.808587][ T510] cdc_ncm 1-1:1.1: probe with driver cdc_ncm failed with error -71 [ 145.821396][ T510] cdc_mbim 1-1:1.1: probe with driver cdc_mbim failed with error -71 [ 145.861210][ T510] usb 1-1: USB disconnect, device number 49 [ 145.951379][ T45] cdc_ether 2-1:1.0: probe with driver cdc_ether failed with error -71 [ 145.969459][ T45] usb 2-1: USB disconnect, device number 53 [ 146.033344][ T8604] netlink: 152 bytes leftover after parsing attributes in process `syz.3.4135'. [ 146.666357][ T8673] pci 0000:00:05.0: vgaarb: VGA decodes changed: olddecodes=none,decodes=io+mem:owns=io+mem [ 146.686182][ T8676] overlayfs: overlapping lowerdir path [ 146.750992][ T8681] netlink: 'syz.2.4174': attribute type 1 has an invalid length. [ 147.065894][ T8720] netlink: 1 bytes leftover after parsing attributes in process `syz.1.4191'. [ 147.131594][ T8729] netlink: 16 bytes leftover after parsing attributes in process `syz.1.4197'. [ 147.149670][ T8729] bridge0: port 2(bridge_slave_1) entered disabled state [ 147.159647][ T8729] bridge_slave_1 (unregistering): left allmulticast mode [ 147.167419][ T8729] bridge_slave_1 (unregistering): left promiscuous mode [ 147.179775][ T8729] bridge0: port 2(bridge_slave_1) entered disabled state [ 147.224540][ T8740] netlink: 'syz.0.4203': attribute type 16 has an invalid length. [ 147.580712][ T36] kauditd_printk_skb: 12426 callbacks suppressed [ 147.580729][ T36] audit: type=1400 audit(2000001085.958:21745): avc: denied { create } for pid=8783 comm="syz.3.4225" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 147.620884][ T36] audit: type=1400 audit(2000001085.978:21746): avc: denied { read write } for pid=471 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 147.670573][ T36] audit: type=1400 audit(2000001085.978:21747): avc: denied { read write open } for pid=471 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 147.741128][ T36] audit: type=1400 audit(2000001085.978:21748): avc: denied { ioctl } for pid=471 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 147.758674][ T8799] 9pnet_fd: Insufficient options for proto=fd [ 147.780577][ T36] audit: type=1400 audit(2000001085.978:21749): avc: denied { read write } for pid=470 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 147.810720][ T36] audit: type=1400 audit(2000001085.978:21750): avc: denied { read write open } for pid=470 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 147.836143][ T8803] SELinux: failed to load policy [ 147.862707][ T36] audit: type=1400 audit(2000001085.978:21751): avc: denied { ioctl } for pid=470 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 147.919380][ T36] audit: type=1400 audit(2000001085.998:21752): avc: denied { write } for pid=8783 comm="syz.3.4225" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 147.941953][ T8812] netlink: 4 bytes leftover after parsing attributes in process `syz.1.4239'. [ 147.954136][ T8818] rust_binder: BC_CLEAR_FREEZE_NOTIFICATION invalid ref 1 [ 147.954842][ T36] audit: type=1400 audit(2000001086.018:21753): avc: denied { read write } for pid=473 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 147.962751][ T8818] rust_binder: Write failure EINVAL in pid:1820 [ 148.020310][ T473] audit: audit_backlog=65 > audit_backlog_limit=64 [ 148.321046][ T8856] netlink: 'syz.2.4260': attribute type 1 has an invalid length. [ 148.639076][ T8897] syz.2.4280 (8897): /proc/8895/oom_adj is deprecated, please use /proc/8895/oom_score_adj instead. [ 148.907039][ T8934] netlink: 'syz.1.4298': attribute type 12 has an invalid length. [ 149.458025][ T8991] random: crng reseeded on system resumption [ 149.545212][ T8997] x_tables: unsorted underflow at hook 3 [ 149.891132][ T877] usb 3-1: new high-speed USB device number 51 using dummy_hcd [ 150.061127][ T877] usb 3-1: Using ep0 maxpacket: 16 [ 150.082425][ T877] usb 3-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 150.104793][ T877] usb 3-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 150.131900][ T877] usb 3-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 150.151208][ T877] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 150.161127][ T877] usb 3-1: Product: syz [ 150.165310][ T877] usb 3-1: Manufacturer: syz [ 150.169910][ T877] usb 3-1: SerialNumber: syz [ 150.232582][ T9071] netlink: 188 bytes leftover after parsing attributes in process `syz.3.4366'. [ 150.380898][ T9087] netlink: 5820 bytes leftover after parsing attributes in process `syz.1.4372'. [ 150.617773][ T877] usb 3-1: cannot find UAC_HEADER [ 150.644503][ T877] snd-usb-audio 3-1:1.0: probe with driver snd-usb-audio failed with error -22 [ 150.671208][ T877] usb 3-1: USB disconnect, device number 51 [ 150.734503][ T9120] udevd[9120]: error opening ATTR{/sys/devices/platform/dummy_hcd.2/usb3/3-1/3-1:1.0/sound/card0/controlC0/../uevent} for writing: No such file or directory [ 150.763906][ T9129] netlink: 140 bytes leftover after parsing attributes in process `syz.1.4390'. [ 150.786352][ T9129] netlink: 48 bytes leftover after parsing attributes in process `syz.1.4390'. [ 151.101685][ T9167] netlink: 104 bytes leftover after parsing attributes in process `syz.3.4409'. [ 151.360662][ T9199] netlink: 'syz.3.4425': attribute type 29 has an invalid length. [ 151.369552][ T9199] netlink: 64138 bytes leftover after parsing attributes in process `syz.3.4425'. [ 151.511254][ T45] usb 1-1: new high-speed USB device number 50 using dummy_hcd [ 151.671125][ T45] usb 1-1: Using ep0 maxpacket: 32 [ 151.688415][ T45] usb 1-1: config 0 has an invalid interface number: 148 but max is 0 [ 151.708450][ T45] usb 1-1: config 0 has no interface number 0 [ 151.715621][ T45] usb 1-1: config 0 interface 148 has no altsetting 0 [ 151.736958][ T45] usb 1-1: New USB device found, idVendor=067b, idProduct=0307, bcdDevice=dd.c8 [ 151.750755][ T45] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 151.771132][ T45] usb 1-1: Product: syz [ 151.777355][ T45] usb 1-1: Manufacturer: syz [ 151.787793][ T45] usb 1-1: SerialNumber: syz [ 151.802784][ T45] usb 1-1: config 0 descriptor?? [ 151.814716][ T45] pl2303 1-1:0.148: required interrupt-in endpoint missing [ 151.965811][ T9255] cgroup: Name too long [ 152.002699][ T9259] netlink: 188 bytes leftover after parsing attributes in process `syz.2.4455'. [ 152.038994][ T45] usb 1-1: USB disconnect, device number 50 [ 152.387796][ T9304] netlink: 25 bytes leftover after parsing attributes in process `syz.1.4478'. [ 152.546327][ T9324] IPv6: NLM_F_CREATE should be specified when creating new route [ 152.586327][ T36] kauditd_printk_skb: 1084 callbacks suppressed [ 152.586345][ T36] audit: type=1400 audit(2000001090.968:22836): avc: denied { read } for pid=9327 comm="syz.1.4489" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 152.641126][ T36] audit: type=1400 audit(2000001090.968:22837): avc: denied { read open } for pid=9327 comm="syz.1.4489" path="/dev/kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 152.685217][ T36] audit: type=1400 audit(2000001090.988:22838): avc: denied { read write } for pid=473 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 152.751136][ T36] audit: type=1400 audit(2000001090.988:22839): avc: denied { read write open } for pid=473 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 152.821127][ T36] audit: type=1400 audit(2000001090.988:22840): avc: denied { ioctl } for pid=473 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 152.865034][ T36] audit: type=1400 audit(2000001090.998:22841): avc: denied { read write open } for pid=470 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 152.896247][ T36] audit: type=1400 audit(2000001090.998:22842): avc: denied { ioctl } for pid=470 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 152.953448][ T9360] netlink: 64 bytes leftover after parsing attributes in process `syz.0.4505'. [ 152.962461][ T36] audit: type=1400 audit(2000001091.008:22843): avc: denied { read write } for pid=472 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 152.965318][ T9362] SELinux: security_context_str_to_sid () failed with errno=-22 [ 152.995342][ T36] audit: type=1400 audit(2000001091.008:22844): avc: denied { read write open } for pid=472 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 153.022320][ T9366] netlink: 'syz.2.4507': attribute type 28 has an invalid length. [ 153.026095][ T473] audit: audit_backlog=65 > audit_backlog_limit=64 [ 153.153636][ T9380] pci 0000:00:05.0: vgaarb: VGA decodes changed: olddecodes=io+mem,decodes=io+mem:owns=io+mem [ 153.678041][ T9444] netlink: 'syz.1.4546': attribute type 29 has an invalid length. [ 153.825018][ T9466] usb usb5: usbfs: process 9466 (syz.1.4556) did not claim interface 0 before use [ 153.882106][ T9472] netlink: 'syz.0.4559': attribute type 32 has an invalid length. [ 153.903647][ T9474] incfs: Backing dir is not set, filesystem can't be mounted. [ 153.913092][ T9474] incfs: mount failed -2 [ 153.935890][ T9477] x_tables: duplicate underflow at hook 1 [ 154.003043][ T9484] usb usb1: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 154.185270][ T9507] netlink: 'syz.1.4578': attribute type 12 has an invalid length. [ 154.331141][ T729] usb 3-1: new high-speed USB device number 52 using dummy_hcd [ 154.396782][ T9534] netlink: 8 bytes leftover after parsing attributes in process `syz.3.4591'. [ 154.491124][ T729] usb 3-1: Using ep0 maxpacket: 32 [ 154.502809][ T729] usb 3-1: config 0 has an invalid interface number: 184 but max is 0 [ 154.518559][ T729] usb 3-1: config 0 has no interface number 0 [ 154.541405][ T729] usb 3-1: config 0 interface 184 has no altsetting 0 [ 154.562794][ T729] usb 3-1: New USB device found, idVendor=0424, idProduct=7500, bcdDevice=69.ee [ 154.577186][ T729] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 154.585261][ T729] usb 3-1: Product: syz [ 154.589497][ T729] usb 3-1: Manufacturer: syz [ 154.594145][ T729] usb 3-1: SerialNumber: syz [ 154.601198][ T729] usb 3-1: config 0 descriptor?? [ 154.622095][ T729] smsc75xx v1.0.0 [ 155.021499][ T9594] netlink: 'syz.3.4618': attribute type 1 has an invalid length. [ 155.030192][ T9594] netlink: 'syz.3.4618': attribute type 2 has an invalid length. [ 155.039131][ T729] smsc75xx 3-1:0.184 (unnamed net_device) (uninitialized): Failed to read reg index 0x00000014: -71 [ 155.065675][ T729] smsc75xx 3-1:0.184 (unnamed net_device) (uninitialized): Failed to read PMT_CTL: -71 [ 155.075411][ T729] smsc75xx 3-1:0.184 (unnamed net_device) (uninitialized): device not ready in smsc75xx_bind [ 155.085658][ T729] smsc75xx 3-1:0.184: probe with driver smsc75xx failed with error -71 [ 155.103421][ T729] usb 3-1: USB disconnect, device number 52 [ 155.269422][ T9616] bridge0: port 2(veth0_to_bridge) entered blocking state [ 155.277580][ T9616] bridge0: port 2(veth0_to_bridge) entered disabled state [ 155.286048][ T9616] veth0_to_bridge: entered allmulticast mode [ 155.299566][ T9616] veth0_to_bridge: entered promiscuous mode [ 155.306263][ T9616] bridge0: adding interface veth0_to_bridge with same address as a received packet (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 155.319341][ T9616] bridge0: port 2(veth0_to_bridge) entered blocking state [ 155.326506][ T9616] bridge0: port 2(veth0_to_bridge) entered forwarding state [ 155.473492][ T9639] netlink: 'syz.3.4641': attribute type 1 has an invalid length. [ 155.606013][ T9658] __nla_validate_parse: 2 callbacks suppressed [ 155.606034][ T9658] netlink: 20 bytes leftover after parsing attributes in process `syz.3.4650'. [ 156.082428][ T9714] netlink: 8 bytes leftover after parsing attributes in process `syz.1.4673'. [ 156.417763][ T9753] netlink: 5 bytes leftover after parsing attributes in process `syz.2.4696'. [ 156.426952][ T9753] 0ªö»ôM: renamed from gretap0 (while UP) [ 156.437564][ T9753] 0ªö»ôM: entered allmulticast mode [ 156.446082][ T9753] A link change request failed with some changes committed already. Interface 30ªö»ôM may have been left with an inconsistent configuration, please check. [ 156.833807][ T9805] netlink: 8 bytes leftover after parsing attributes in process `syz.1.4721'. [ 156.836529][ T9806] netlink: 24 bytes leftover after parsing attributes in process `syz.3.4722'. [ 156.893523][ T9810] netlink: 4 bytes leftover after parsing attributes in process `syz.1.4724'. [ 157.086139][ T9832] rust_binder: Write failure EFAULT in pid:2223 [ 157.161128][ T877] usb 4-1: new full-speed USB device number 57 using dummy_hcd [ 157.318754][ T9860] netlink: 24 bytes leftover after parsing attributes in process `syz.2.4749'. [ 157.333546][ T877] usb 4-1: config 179 has an invalid interface number: 65 but max is 0 [ 157.352548][ T877] usb 4-1: config 179 has no interface number 0 [ 157.358838][ T877] usb 4-1: config 179 interface 65 altsetting 0 endpoint 0xF has an invalid bInterval 0, changing to 10 [ 157.380310][ T877] usb 4-1: config 179 interface 65 altsetting 0 endpoint 0xF has invalid maxpacket 1025, setting to 64 [ 157.399175][ T877] usb 4-1: config 179 interface 65 altsetting 0 endpoint 0x83 has an invalid bInterval 0, changing to 10 [ 157.426230][ T877] usb 4-1: config 179 interface 65 altsetting 0 endpoint 0x83 has invalid maxpacket 45824, setting to 64 [ 157.441112][ T877] usb 4-1: config 179 interface 65 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 23 [ 157.462335][ T877] usb 4-1: New USB device found, idVendor=12ab, idProduct=90a3, bcdDevice=1e.eb [ 157.473598][ T877] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 157.490342][ T9813] raw-gadget.0 gadget.3: fail, usb_ep_enable returned -22 [ 157.502540][ T9813] raw-gadget.0 gadget.3: fail, usb_ep_enable returned -22 [ 157.597925][ T36] kauditd_printk_skb: 1104 callbacks suppressed [ 157.597943][ T36] audit: type=1400 audit(2000001095.978:23938): avc: denied { getopt } for pid=9881 comm="syz.0.4760" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 157.661123][ T36] audit: type=1400 audit(2000001096.018:23939): avc: denied { read write } for pid=472 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 157.699381][ T9892] netlink: 20 bytes leftover after parsing attributes in process `syz.2.4764'. [ 157.708483][ T36] audit: type=1400 audit(2000001096.028:23940): avc: denied { read write } for pid=471 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 157.761121][ T36] audit: type=1400 audit(2000001096.028:23941): avc: denied { read write open } for pid=471 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 157.815802][ T36] audit: type=1400 audit(2000001096.028:23942): avc: denied { ioctl } for pid=471 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 157.827593][ T877] usb 4-1: USB disconnect, device number 57 [ 157.827632][ C0] xpad 4-1:179.65: xpad_irq_in - usb_submit_urb failed with result -19 [ 157.855821][ C0] xpad 4-1:179.65: xpad_irq_out - usb_submit_urb failed with result -19 [ 157.858978][ T36] audit: type=1400 audit(2000001096.028:23943): avc: denied { read write } for pid=470 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 157.890256][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 157.902286][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 157.903214][ T36] audit: type=1400 audit(2000001096.028:23944): avc: denied { read write open } for pid=470 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 157.914462][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 157.940802][ T36] audit: type=1400 audit(2000001096.028:23945): avc: denied { ioctl } for pid=470 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 157.951267][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 157.977857][ T36] audit: type=1400 audit(2000001096.038:23946): avc: denied { read write open } for pid=472 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 157.988751][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 158.014704][ T36] audit: type=1400 audit(2000001096.038:23947): avc: denied { ioctl } for pid=472 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 158.025555][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 158.063013][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 158.075210][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 158.087305][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 158.298436][ T9910] netlink: 8 bytes leftover after parsing attributes in process `syz.2.4775'. [ 158.697370][ T9936] netlink: 393 bytes leftover after parsing attributes in process `syz.1.4786'. [ 158.936742][ T9950] netlink: 'syz.1.4794': attribute type 28 has an invalid length. [ 159.009017][ T9952] sit0: entered promiscuous mode [ 159.022425][ T9952] netlink: 'syz.3.4796': attribute type 1 has an invalid length. [ 159.068265][ T9952] netlink: 'syz.3.4796': attribute type 3 has an invalid length. [ 159.864730][ T9996] x_tables: duplicate entry at hook 2 [ 159.884027][ T9998] netlink: 'syz.3.4818': attribute type 64 has an invalid length. [ 159.914380][T10000] x_tables: unsorted underflow at hook 4 [ 160.018312][T10006] netlink: 'syz.3.4823': attribute type 4 has an invalid length. [ 160.490586][T10035] netlink: 'syz.3.4837': attribute type 27 has an invalid length. [ 160.953459][T10066] ªªªªª$: renamed from bridge_slave_0 (while UP) [ 161.031150][ T510] usb 1-1: new full-speed USB device number 51 using dummy_hcd [ 161.195838][ T510] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 161.221215][ T510] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x82 has invalid maxpacket 512, setting to 64 [ 161.246683][ T510] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x3 has invalid maxpacket 576, setting to 64 [ 161.271163][ T510] usb 1-1: config 1 interface 0 altsetting 0 has 3 endpoint descriptors, different from the interface descriptor's value: 20 [ 161.302790][ T510] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice=da.40 [ 161.334384][ T510] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=1 [ 161.353764][ T510] usb 1-1: SerialNumber: syz [ 161.380477][T10055] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 161.390257][T10055] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 161.429559][ T510] cdc_acm 1-1:1.0: Control and data interfaces are not separated! [ 161.451112][ C1] net_ratelimit: 128795 callbacks suppressed [ 161.451132][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 161.468459][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 161.480566][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 161.491892][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 161.503977][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 161.515282][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 161.527376][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 161.538678][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 161.544575][T10094] __nla_validate_parse: 2 callbacks suppressed [ 161.544593][T10094] netlink: 4 bytes leftover after parsing attributes in process `syz.3.4867'. [ 161.550767][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 161.576975][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 161.665048][ T510] usb 1-1: USB disconnect, device number 51 [ 161.887241][T10112] netlink: 'syz.2.4874': attribute type 4 has an invalid length. [ 161.911276][T10112] netlink: 3657 bytes leftover after parsing attributes in process `syz.2.4874'. [ 162.508876][T10150] netlink: 12 bytes leftover after parsing attributes in process `syz.3.4895'. [ 162.570457][T10154] netlink: 'syz.1.4897': attribute type 16 has an invalid length. [ 162.601124][ T36] kauditd_printk_skb: 496 callbacks suppressed [ 162.601145][ T36] audit: type=1400 audit(2000001100.978:24444): avc: denied { read write open } for pid=470 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 162.677570][ T36] audit: type=1400 audit(2000001100.978:24445): avc: denied { ioctl } for pid=470 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 162.792851][ T36] audit: type=1400 audit(2000001101.038:24446): avc: denied { read write } for pid=471 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 162.862382][ T36] audit: type=1400 audit(2000001101.038:24447): avc: denied { read write open } for pid=471 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 162.927041][ T36] audit: type=1400 audit(2000001101.038:24448): avc: denied { ioctl } for pid=471 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 163.047562][ T36] audit: type=1400 audit(2000001101.048:24449): avc: denied { read } for pid=10156 comm="syz.3.4898" name="event1" dev="devtmpfs" ino=193 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 163.144726][T10187] netlink: 4 bytes leftover after parsing attributes in process `syz.0.4914'. [ 163.157248][ T36] audit: type=1400 audit(2000001101.048:24450): avc: denied { read open } for pid=10156 comm="syz.3.4898" path="/dev/input/event1" dev="devtmpfs" ino=193 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 163.231122][ T36] audit: type=1400 audit(2000001101.058:24451): avc: denied { ioctl } for pid=10156 comm="syz.3.4898" path="/dev/input/event1" dev="devtmpfs" ino=193 ioctlcmd=0x4503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 163.302413][T10195] netlink: 8 bytes leftover after parsing attributes in process `syz.3.4917'. [ 163.328000][ T470] audit: audit_backlog=65 > audit_backlog_limit=64 [ 163.340588][ T471] audit: audit_backlog=65 > audit_backlog_limit=64 [ 163.808888][T10225] netlink: 'syz.0.4918': attribute type 11 has an invalid length. [ 163.839662][T10225] netlink: 3657 bytes leftover after parsing attributes in process `syz.0.4918'. [ 164.088828][T10241] rust_binder: Write failure EFAULT in pid:2307 [ 164.988325][T10299] bpf: Bad value for 'mode' [ 165.779406][T10348] netlink: 200 bytes leftover after parsing attributes in process `syz.3.4992'. [ 165.806177][T10348] tc_dump_action: action bad kind [ 166.262042][T10376] netlink: 'syz.0.5003': attribute type 20 has an invalid length. [ 166.461105][ C1] net_ratelimit: 185762 callbacks suppressed [ 166.461124][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:7b:09:6b:10:94, vlan:0) [ 166.479215][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 166.490533][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 166.492891][T10392] netlink: 288 bytes leftover after parsing attributes in process `syz.3.5014'. [ 166.502656][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:7b:09:6b:10:94, vlan:0) [ 166.523724][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 166.535040][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 166.547119][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:7b:09:6b:10:94, vlan:0) [ 166.559220][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 166.570526][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 166.582635][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:7b:09:6b:10:94, vlan:0) [ 167.282918][T10435] netlink: 'syz.3.5035': attribute type 27 has an invalid length. [ 167.335769][T10439] netlink: 296 bytes leftover after parsing attributes in process `syz.2.5037'. [ 167.403116][T10442] IPv6: NLM_F_CREATE should be specified when creating new route [ 167.533985][T10451] netlink: 'syz.1.5040': attribute type 46 has an invalid length. [ 167.626545][ T36] kauditd_printk_skb: 582 callbacks suppressed [ 167.626564][ T36] audit: type=1400 audit(2000001106.008:25030): avc: denied { read write } for pid=471 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 167.700412][ T36] audit: type=1400 audit(2000001106.058:25031): avc: denied { read write } for pid=472 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 167.769062][ T36] audit: type=1400 audit(2000001106.058:25032): avc: denied { read write open } for pid=472 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 167.818928][T10461] netlink: 4 bytes leftover after parsing attributes in process `syz.1.5048'. [ 167.834336][ T36] audit: type=1400 audit(2000001106.058:25033): avc: denied { ioctl } for pid=472 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 167.932535][ T36] audit: type=1400 audit(2000001106.058:25034): avc: denied { read write open } for pid=471 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 168.031109][ T36] audit: type=1400 audit(2000001106.058:25035): avc: denied { ioctl } for pid=471 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 168.098124][ T36] audit: type=1400 audit(2000001106.108:25036): avc: denied { read write } for pid=473 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 168.201005][ T36] audit: type=1400 audit(2000001106.108:25037): avc: denied { read write open } for pid=473 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 168.307916][ T36] audit: type=1400 audit(2000001106.108:25038): avc: denied { ioctl } for pid=473 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 168.394347][ T36] audit: type=1400 audit(2000001106.288:25039): avc: denied { read write } for pid=471 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 168.453388][T10480] netlink: 68 bytes leftover after parsing attributes in process `syz.2.5057'. [ 168.831424][T10499] usb usb8: usbfs: process 10499 (syz.3.5067) did not claim interface 0 before use [ 169.504612][T10538] netlink: 8 bytes leftover after parsing attributes in process `syz.0.5085'. [ 169.566679][T10541] tmpfs: Cannot enable swap on remount if it was disabled on first mount [ 169.632640][T10544] kvm_intel: L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 171.443940][T10648] netlink: 72 bytes leftover after parsing attributes in process `syz.1.5138'. [ 171.471097][ C1] net_ratelimit: 191415 callbacks suppressed [ 171.471116][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:7b:09:6b:10:94, vlan:0) [ 171.489200][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 171.500603][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 171.512689][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 171.524006][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:7b:09:6b:10:94, vlan:0) [ 171.536102][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 171.547410][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 171.559500][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 171.563692][T10657] netlink: 'syz.1.5141': attribute type 27 has an invalid length. [ 171.570797][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:7b:09:6b:10:94, vlan:0) [ 171.570847][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 171.919248][T10669] netlink: 'syz.0.5146': attribute type 25 has an invalid length. [ 172.008170][T10673] netlink: 'syz.0.5149': attribute type 2 has an invalid length. [ 172.143880][T10680] netlink: 40 bytes leftover after parsing attributes in process `syz.2.5151'. [ 172.520894][T10703] netlink: 'syz.0.5163': attribute type 16 has an invalid length. [ 172.533194][T10703] netlink: 'syz.0.5163': attribute type 3 has an invalid length. [ 172.561718][T10703] netlink: 64066 bytes leftover after parsing attributes in process `syz.0.5163'. [ 172.631123][ T36] kauditd_printk_skb: 553 callbacks suppressed [ 172.631142][ T36] audit: type=1400 audit(2000001111.009:25593): avc: denied { read write open } for pid=472 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 172.720023][ T36] audit: type=1400 audit(2000001111.009:25594): avc: denied { ioctl } for pid=472 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 172.833887][ T36] audit: type=1400 audit(2000001111.049:25595): avc: denied { read write open } for pid=470 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 172.956432][ T36] audit: type=1400 audit(2000001111.059:25596): avc: denied { ioctl } for pid=470 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 173.028991][ T36] audit: type=1400 audit(2000001111.069:25597): avc: denied { read } for pid=10709 comm="syz.3.5166" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 173.076734][ T36] audit: type=1400 audit(2000001111.069:25598): avc: denied { read open } for pid=10709 comm="syz.3.5166" path="/dev/kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 173.128689][ T36] audit: type=1400 audit(2000001111.079:25599): avc: denied { ioctl } for pid=10709 comm="syz.3.5166" path="/dev/kvm" dev="devtmpfs" ino=13 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 173.256194][ T36] audit: type=1400 audit(2000001111.129:25600): avc: denied { create } for pid=10708 comm="syz.2.5167" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 173.352125][ T36] audit: type=1400 audit(2000001111.129:25601): avc: denied { write } for pid=10708 comm="syz.2.5167" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 173.360558][T10731] __vm_enough_memory: pid: 10731, comm: syz.1.5176, bytes: 18014402804453376 not enough memory for the allocation [ 173.392284][ T36] audit: type=1400 audit(2000001111.189:25602): avc: denied { read write } for pid=471 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 173.671122][ T877] usb 3-1: new high-speed USB device number 53 using dummy_hcd [ 173.823603][ T877] usb 3-1: config 0 has an invalid interface number: 199 but max is 1 [ 173.834526][ T877] usb 3-1: config 0 has no interface number 1 [ 173.847586][ T877] usb 3-1: config 0 interface 199 altsetting 0 endpoint 0xA has invalid wMaxPacketSize 0 [ 173.871406][ T877] usb 3-1: config 0 interface 0 altsetting 0 has an invalid descriptor for endpoint zero, skipping [ 173.896516][ T877] usb 3-1: New USB device found, idVendor=0002, idProduct=0000, bcdDevice= 0.00 [ 173.907808][ T877] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=3 [ 173.924894][ T877] usb 3-1: SerialNumber: syz [ 173.940416][ T877] usb 3-1: config 0 descriptor?? [ 173.961213][ T877] usb 3-1: Found UVC 0.00 device (0002:0000) [ 173.978486][ T877] usb 3-1: No valid video chain found. [ 174.177472][ T877] usb 3-1: USB disconnect, device number 53 [ 174.381613][T10781] netlink: 12 bytes leftover after parsing attributes in process `syz.0.5198'. [ 174.441593][T10783] netlink: 'syz.3.5200': attribute type 4 has an invalid length. [ 174.459076][T10783] netlink: 17 bytes leftover after parsing attributes in process `syz.3.5200'. [ 174.545239][T10787] netlink: 200 bytes leftover after parsing attributes in process `syz.0.5203'. [ 174.563583][T10787] tc_dump_action: action bad kind [ 174.633363][T10792] Invalid logical block size (1) [ 174.887151][T10807] SELinux: policydb table sizes (104,0) do not match mine (6,7) [ 174.900864][T10807] SELinux: failed to load policy [ 175.095455][T10819] tipc: Started in network mode [ 175.101963][T10819] tipc: Node identity 00000000000040000000000000000001, cluster identity 4711 [ 175.110882][T10819] tipc: Enabling of bearer rejected, failed to enable media [ 175.908825][T10863] netlink: 8 bytes leftover after parsing attributes in process `syz.1.5238'. [ 176.481107][ C1] net_ratelimit: 197390 callbacks suppressed [ 176.481126][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:7b:09:6b:10:94, vlan:0) [ 176.499223][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 176.510539][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 176.522632][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 176.533944][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:7b:09:6b:10:94, vlan:0) [ 176.546031][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 176.557335][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 176.569412][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 176.580712][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:7b:09:6b:10:94, vlan:0) [ 176.592785][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 177.651331][ T36] kauditd_printk_skb: 466 callbacks suppressed [ 177.651348][ T36] audit: type=1400 audit(2000001116.040:26069): avc: denied { read write open } for pid=473 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 177.774227][ T36] audit: type=1400 audit(2000001116.070:26070): avc: denied { ioctl } for pid=473 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 177.892714][ T36] audit: type=1400 audit(2000001116.240:26071): avc: denied { read write } for pid=473 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 178.070962][ T36] audit: type=1400 audit(2000001116.240:26072): avc: denied { read write open } for pid=473 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 178.170916][ T36] audit: type=1400 audit(2000001116.240:26073): avc: denied { ioctl } for pid=473 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 178.200920][ T510] usb 4-1: new high-speed USB device number 58 using dummy_hcd [ 178.278884][ T36] audit: type=1400 audit(2000001116.330:26074): avc: denied { read write } for pid=10914 comm="syz.3.5264" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 178.370926][ T36] audit: type=1400 audit(2000001116.330:26075): avc: denied { read write open } for pid=10914 comm="syz.3.5264" path="/dev/raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 178.430881][ T510] usb 4-1: Using ep0 maxpacket: 16 [ 178.453411][ T510] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 178.474437][ T510] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 178.485739][ T36] audit: type=1400 audit(2000001116.330:26076): avc: denied { ioctl } for pid=10914 comm="syz.3.5264" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 178.530925][ T510] usb 4-1: New USB device found, idVendor=054c, idProduct=05c4, bcdDevice= 0.00 [ 178.540003][ T510] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 178.608399][ T36] audit: type=1400 audit(2000001116.330:26077): avc: denied { ioctl } for pid=10914 comm="syz.3.5264" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5501 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 178.657583][ T510] usb 4-1: config 0 descriptor?? [ 178.750862][ T36] audit: type=1400 audit(2000001116.340:26078): avc: denied { ioctl } for pid=10914 comm="syz.3.5264" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 179.118916][ T510] playstation 0003:054C:05C4.0001: unknown global tag 0xe [ 179.146943][ T510] playstation 0003:054C:05C4.0001: item 0 4 1 14 parsing failed [ 179.200066][ T510] playstation 0003:054C:05C4.0001: Parse failed [ 179.227296][ T510] playstation 0003:054C:05C4.0001: probe with driver playstation failed with error -22 [ 179.345481][ T510] usb 4-1: USB disconnect, device number 58 [ 179.931049][T10942] sock: sock_timestamping_bind_phc: sock not bind to device [ 180.252208][T10958] kernel profiling enabled (shift: 5) [ 180.270687][ T877] usb 3-1: new high-speed USB device number 54 using dummy_hcd [ 180.389021][T10964] netlink: 79 bytes leftover after parsing attributes in process `syz.1.5286'. [ 180.430712][ T877] usb 3-1: Using ep0 maxpacket: 8 [ 180.438376][ T877] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 180.461469][ T877] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 180.477333][T10966] SELinux: policydb magic number 0x30303030 does not match expected magic number 0xf97cff8c [ 180.487634][ T877] usb 3-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 5 [ 180.501671][T10966] SELinux: failed to load policy [ 180.510612][ T877] usb 3-1: New USB device found, idVendor=04b4, idProduct=0001, bcdDevice= 0.00 [ 180.540625][ T877] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 180.582179][ T877] usb 3-1: config 0 descriptor?? [ 181.031856][ T877] cypress 0003:04B4:0001.0002: hidraw0: USB HID v0.00 Device [HID 04b4:0001] on usb-dummy_hcd.2-1/input0 [ 181.190668][ T510] usb 4-1: new high-speed USB device number 59 using dummy_hcd [ 181.230564][ T1911] usb 2-1: new full-speed USB device number 54 using dummy_hcd [ 181.248004][ T877] usb 3-1: USB disconnect, device number 54 [ 181.347824][ T510] usb 4-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 181.360012][ T510] usb 4-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 181.372976][ T510] usb 4-1: New USB device found, idVendor=08b7, idProduct=0000, bcdDevice= 0.00 [ 181.383418][ T510] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=3 [ 181.392128][ T510] usb 4-1: SerialNumber: syz [ 181.405098][ T1911] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 10 [ 181.426369][ T1911] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 181.444776][ T1911] usb 2-1: New USB device found, idVendor=10c4, idProduct=8acf, bcdDevice= 0.00 [ 181.454717][ T1911] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 181.470648][ T1911] usb 2-1: config 0 descriptor?? [ 181.490514][ C1] net_ratelimit: 196278 callbacks suppressed [ 181.490533][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:7b:09:6b:10:94, vlan:0) [ 181.508603][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 181.519901][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 181.531981][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 181.543274][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:7b:09:6b:10:94, vlan:0) [ 181.555333][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 181.566608][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 181.578678][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 181.589955][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:7b:09:6b:10:94, vlan:0) [ 181.602005][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 181.636890][T10986] netlink: 124 bytes leftover after parsing attributes in process `syz.3.5298'. [ 181.657442][ T510] usb 4-1: USB disconnect, device number 59 [ 181.823318][T10997] netlink: 12 bytes leftover after parsing attributes in process `syz.2.5304'. [ 181.922975][ T1911] hid-generic 0003:10C4:8ACF.0003: unknown main item tag 0x3 [ 181.950501][ T1911] hid-generic 0003:10C4:8ACF.0003: item fetching failed at offset 4/5 [ 181.970911][ T1911] hid-generic 0003:10C4:8ACF.0003: probe with driver hid-generic failed with error -22 [ 182.130476][ T1911] usb 2-1: USB disconnect, device number 54 [ 182.660799][ T36] kauditd_printk_skb: 335 callbacks suppressed [ 182.660817][ T36] audit: type=1400 audit(2000001121.050:26414): avc: denied { ioctl } for pid=11015 comm="syz.0.5311" path="/1390/file2" dev="tmpfs" ino=7024 ioctlcmd=0x1265 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 182.707406][ T36] audit: type=1400 audit(2000001121.080:26415): avc: denied { read write } for pid=471 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 182.733059][ T36] audit: type=1400 audit(2000001121.080:26416): avc: denied { read write open } for pid=471 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 182.758887][ T36] audit: type=1400 audit(2000001121.080:26417): avc: denied { ioctl } for pid=471 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 182.791045][ T36] audit: type=1400 audit(2000001121.160:26418): avc: denied { unlink } for pid=470 comm="syz-executor" name="file2" dev="tmpfs" ino=7024 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 182.875712][ T36] audit: type=1400 audit(2000001121.160:26419): avc: denied { read write } for pid=470 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 182.948078][ T36] audit: type=1400 audit(2000001121.160:26420): avc: denied { read write open } for pid=470 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 183.026906][ T36] audit: type=1400 audit(2000001121.160:26421): avc: denied { ioctl } for pid=470 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 183.139882][ T36] audit: type=1400 audit(2000001121.170:26422): avc: denied { create } for pid=11019 comm="syz.1.5313" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 183.227692][ T36] audit: type=1400 audit(2000001121.170:26423): avc: denied { write } for pid=11019 comm="syz.1.5313" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 183.760279][ T510] usb 4-1: new high-speed USB device number 60 using dummy_hcd [ 183.940229][ T510] usb 4-1: Using ep0 maxpacket: 16 [ 183.953011][ T510] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 183.976684][ T510] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 183.997728][ T510] usb 4-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 9 [ 184.022908][ T510] usb 4-1: New USB device found, idVendor=045e, idProduct=07da, bcdDevice= 0.00 [ 184.032873][ T510] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 184.044592][ T510] usb 4-1: config 0 descriptor?? [ 184.473325][ T510] microsoft 0003:045E:07DA.0004: unknown main item tag 0x0 [ 184.494489][ T510] microsoft 0003:045E:07DA.0004: ignoring exceeding usage max [ 184.682150][ T510] microsoft 0003:045E:07DA.0004: No inputs registered, leaving [ 184.713547][ T510] microsoft 0003:045E:07DA.0004: hidraw0: USB HID v0.00 Device [HID 045e:07da] on usb-dummy_hcd.3-1/input0 [ 184.750135][ T510] microsoft 0003:045E:07DA.0004: no inputs found [ 184.771470][ T510] microsoft 0003:045E:07DA.0004: could not initialize ff, continuing anyway [ 184.803356][ T510] usb 4-1: USB disconnect, device number 60 [ 184.857831][T11110] fido_id[11110]: Failed to open report descriptor at '/sys/devices/platform/dummy_hcd.3/usb4/report_descriptor': No such file or directory [ 186.054240][ T1911] usb 4-1: new high-speed USB device number 61 using dummy_hcd [ 186.209941][ T1911] usb 4-1: Using ep0 maxpacket: 32 [ 186.222399][ T1911] usb 4-1: config 0 has an invalid interface number: 184 but max is 0 [ 186.239031][ T1911] usb 4-1: config 0 has no interface number 0 [ 186.249826][ T1911] usb 4-1: config 0 interface 184 has no altsetting 0 [ 186.259957][ T510] usb 3-1: new high-speed USB device number 55 using dummy_hcd [ 186.282021][ T1911] usb 4-1: New USB device found, idVendor=0424, idProduct=7500, bcdDevice=69.ee [ 186.300001][ T1911] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 186.313693][ T1911] usb 4-1: Product: syz [ 186.317883][ T1911] usb 4-1: Manufacturer: syz [ 186.332656][ T1911] usb 4-1: SerialNumber: syz [ 186.346365][ T1911] usb 4-1: config 0 descriptor?? [ 186.369713][ T1911] smsc75xx v1.0.0 [ 186.452543][ T510] usb 3-1: config 1 has an invalid descriptor of length 68, skipping remainder of the config [ 186.479897][ T510] usb 3-1: config 1 has 1 interface, different from the descriptor's value: 2 [ 186.499903][ C1] net_ratelimit: 198379 callbacks suppressed [ 186.499920][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 186.500069][ T510] usb 3-1: config 1 interface 0 altsetting 0 has 0 endpoint descriptors, different from the interface descriptor's value: 1 [ 186.505955][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 186.542109][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 186.553398][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:7b:09:6b:10:94, vlan:0) [ 186.558139][ T510] usb 3-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 186.565477][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 186.585720][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 186.597794][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 186.609065][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:7b:09:6b:10:94, vlan:0) [ 186.621228][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 186.627713][ T510] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 186.632512][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 186.665248][ T510] usb 3-1: Product: syz [ 186.669433][ T510] usb 3-1: Manufacturer: syz [ 186.676961][ T510] usb 3-1: SerialNumber: syz [ 186.752738][T11199] netlink: 'syz.0.5398': attribute type 3 has an invalid length. [ 187.037660][ T1911] smsc75xx 4-1:0.184 (unnamed net_device) (uninitialized): Failed to read reg index 0x00000014: -71 [ 187.240641][ T1911] smsc75xx 4-1:0.184 (unnamed net_device) (uninitialized): Failed to read PMT_CTL: -71 [ 187.661095][ T510] cdc_ncm 3-1:1.0: CDC Union missing and no IAD found [ 187.803288][ T36] kauditd_printk_skb: 545 callbacks suppressed [ 187.803309][ T36] audit: type=1400 audit(2000001126.161:26969): avc: denied { read write open } for pid=473 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 187.905046][ T1911] smsc75xx 4-1:0.184 (unnamed net_device) (uninitialized): device not ready in smsc75xx_bind [ 188.107839][ T510] cdc_ncm 3-1:1.0: bind() failure [ 188.750499][ T510] usb 3-1: USB disconnect, device number 55 [ 188.910182][ T1911] smsc75xx 4-1:0.184: probe with driver smsc75xx failed with error -71 [ 189.272080][ T36] audit: type=1400 audit(2000001126.161:26970): avc: denied { ioctl } for pid=473 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 189.533318][ T1911] usb 4-1: USB disconnect, device number 61 [ 189.915744][ T36] audit: type=1400 audit(2000001127.291:26971): avc: denied { read write } for pid=472 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 190.755568][ T36] audit: type=1400 audit(2000001127.291:26972): avc: denied { read write open } for pid=472 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 191.405707][ T36] audit: type=1400 audit(2000001127.291:26973): avc: denied { ioctl } for pid=472 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 191.509268][ C0] net_ratelimit: 281457 callbacks suppressed [ 191.509289][ C0] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 191.509299][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:7b:09:6b:10:94, vlan:0) [ 191.509338][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 191.515331][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 191.526519][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 191.538533][ C0] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 191.549692][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 191.561655][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 191.573604][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:7b:09:6b:10:94, vlan:0) [ 191.584779][ C0] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 192.533470][ T36] audit: type=1400 audit(2000001127.801:26974): avc: denied { read write } for pid=470 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 193.989835][ T36] audit: type=1400 audit(2000001127.801:26975): avc: denied { read write open } for pid=470 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 194.239422][T11220] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11220 comm=syz.1.5407 [ 194.781444][ T36] audit: type=1400 audit(2000001127.801:26976): avc: denied { ioctl } for pid=470 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 196.192335][ T36] audit: type=1400 audit(2000001128.451:26977): avc: denied { execmem } for pid=11208 comm="syz.1.5402" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 196.518661][ C1] net_ratelimit: 296266 callbacks suppressed [ 196.518684][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 196.518696][ C0] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 196.518744][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 196.524721][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 196.535928][ C0] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 196.547098][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 196.559069][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 196.571013][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:7b:09:6b:10:94, vlan:0) [ 196.582193][ C0] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 196.593359][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 200.128213][ C1] sched: DL replenish lagged too much [ 200.380080][ T36] audit: type=1400 audit(2000001129.141:26978): avc: denied { create } for pid=11210 comm="syz.3.5403" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 201.528049][ C1] net_ratelimit: 312401 callbacks suppressed [ 201.528071][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 201.528107][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 201.534122][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 201.545331][ C0] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 201.557294][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 201.569252][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 201.580424][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:7b:09:6b:10:94, vlan:0) [ 201.591657][ C0] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 201.603601][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 201.615562][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 202.952944][ T36] audit: type=1400 audit(2000001129.141:26979): avc: denied { write } for pid=11210 comm="syz.3.5403" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 203.624765][ T36] audit: type=1400 audit(2000001129.171:26980): avc: denied { write } for pid=11210 comm="syz.3.5403" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 205.024838][ T36] audit: type=1400 audit(2000001129.281:26981): avc: denied { read write } for pid=473 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 206.388793][ T36] audit: type=1400 audit(2000001129.281:26982): avc: denied { read write open } for pid=473 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 206.537460][ C1] net_ratelimit: 301741 callbacks suppressed [ 206.537481][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 206.537503][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 206.543606][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 206.554834][ C0] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 206.566773][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 206.578753][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 206.589909][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:7b:09:6b:10:94, vlan:0) [ 206.601104][ C0] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 206.613030][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 206.625000][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 209.182770][ T36] audit: type=1400 audit(2000001129.281:26983): avc: denied { ioctl } for pid=473 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 211.178219][ T36] audit: type=1400 audit(2000001130.001:26984): avc: denied { read write } for pid=471 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 211.546831][ C0] net_ratelimit: 307228 callbacks suppressed [ 211.546854][ C0] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 211.546856][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:7b:09:6b:10:94, vlan:0) [ 211.546897][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 211.552914][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 211.564112][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 211.576078][ C0] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 211.587336][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 211.599293][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 211.611274][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:7b:09:6b:10:94, vlan:0) [ 211.622453][ C0] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 213.016969][ T36] audit: type=1400 audit(2000001130.001:26985): avc: denied { read write open } for pid=471 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 215.387718][ T36] audit: type=1400 audit(2000001130.001:26986): avc: denied { ioctl } for pid=471 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 216.416402][ T36] audit: type=1400 audit(2000001130.591:26987): avc: denied { read } for pid=11214 comm="syz.0.5405" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 216.556232][ C0] net_ratelimit: 304984 callbacks suppressed [ 216.556254][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 216.556258][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:7b:09:6b:10:94, vlan:0) [ 216.556298][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 216.562303][ C0] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 216.574282][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 216.586301][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 216.597466][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 216.608657][ C0] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 216.620598][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:7b:09:6b:10:94, vlan:0) [ 216.632608][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 216.986340][ T36] audit: type=1400 audit(2000001130.591:26988): avc: denied { read open } for pid=11214 comm="syz.0.5405" path="/dev/kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 218.030282][ T472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 218.217797][ T472] audit: audit_lost=17 audit_rate_limit=0 audit_backlog_limit=64 [ 218.225548][ T472] audit: backlog limit exceeded [ 218.316044][ T36] audit: type=1400 audit(2000001130.591:26989): avc: denied { ioctl } for pid=11214 comm="syz.0.5405" path="/dev/kvm" dev="devtmpfs" ino=13 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 219.417675][ T36] audit: type=1400 audit(2000001130.771:26990): avc: denied { read write } for pid=472 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 219.853480][T11244] audit: audit_backlog=65 > audit_backlog_limit=64 [ 219.863156][T11244] audit: audit_lost=18 audit_rate_limit=0 audit_backlog_limit=64 [ 219.886561][T11244] audit: backlog limit exceeded [ 220.106763][ T36] audit: type=1400 audit(2000001130.771:26991): avc: denied { read write open } for pid=472 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 220.353785][ T473] audit: audit_backlog=65 > audit_backlog_limit=64 [ 221.565609][ C1] net_ratelimit: 296776 callbacks suppressed [ 221.565630][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 221.565647][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 221.565695][ C0] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 221.571696][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 221.583681][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 221.595648][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:7b:09:6b:10:94, vlan:0) [ 221.606959][ C0] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 221.618155][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 221.630097][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 221.642058][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 223.403266][ T36] kauditd_printk_skb: 68 callbacks suppressed [ 223.403284][ T36] audit: type=1400 audit(2000001161.795:27058): avc: denied { read write } for pid=472 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 224.288660][ T36] audit: type=1400 audit(2000001161.795:27059): avc: denied { read write open } for pid=472 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 226.147059][ T36] audit: type=1400 audit(2000001161.795:27060): avc: denied { ioctl } for pid=472 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 226.574999][ C1] net_ratelimit: 302154 callbacks suppressed [ 226.575020][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 226.575059][ C0] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 226.581049][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:7b:09:6b:10:94, vlan:0) [ 226.592241][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 226.603414][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 226.615376][ C0] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 226.627321][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 226.638514][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 226.649702][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 226.661651][ C0] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 228.241898][ T36] audit: type=1400 audit(2000001163.815:27061): avc: denied { execmem } for pid=11247 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 229.139584][ T36] audit: type=1400 audit(2000001167.536:27062): avc: denied { read write } for pid=11248 comm="syz.2.5420" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 229.501322][ T1353] usb 3-1: new full-speed USB device number 56 using dummy_hcd [ 229.639347][ T36] audit: type=1400 audit(2000001167.566:27063): avc: denied { read write open } for pid=11248 comm="syz.2.5420" path="/dev/raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 229.858404][ T1353] usb 3-1: config 0 interface 0 altsetting 0 has an endpoint descriptor with address 0xFF, changing to 0x8F [ 229.946491][T11237] bridge0: port 1(bridge_slave_0) entered blocking state [ 229.953551][T11237] bridge0: port 1(bridge_slave_0) entered disabled state [ 230.244183][ T1353] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x8F has invalid maxpacket 65535, setting to 64 [ 230.277274][ T36] audit: type=1400 audit(2000001167.566:27064): avc: denied { ioctl } for pid=11248 comm="syz.2.5420" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 230.626327][ T1353] usb 3-1: New USB device found, idVendor=046d, idProduct=c314, bcdDevice= 0.40 [ 230.649691][T11237] bridge_slave_0: entered allmulticast mode [ 230.758173][T11237] bridge_slave_0: entered promiscuous mode [ 230.823877][ T36] audit: type=1400 audit(2000001167.566:27065): avc: denied { ioctl } for pid=11248 comm="syz.2.5420" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5501 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 230.928466][T11237] bridge0: port 2(bridge_slave_1) entered blocking state [ 230.937380][ T1353] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 230.966488][ T1353] usb 3-1: config 0 descriptor?? [ 231.094497][T11237] bridge0: port 2(bridge_slave_1) entered disabled state [ 231.124036][T11251] raw-gadget.0 gadget.2: fail, usb_ep_enable returned -22 [ 231.142333][ T1353] hub 3-1:0.0: USB hub found [ 231.152361][ T36] audit: type=1400 audit(2000001167.566:27066): avc: denied { ioctl } for pid=11248 comm="syz.2.5420" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 231.334315][ T1353] hub 3-1:0.0: config failed, can't read hub descriptor (err -22) [ 231.584418][ C1] net_ratelimit: 290535 callbacks suppressed [ 231.584440][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 231.584468][ C0] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 231.590468][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 231.601682][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 231.612871][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 231.624834][ C0] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 231.636780][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:7b:09:6b:10:94, vlan:0) [ 231.647956][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 231.659109][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 231.671092][ C0] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 231.713754][T11237] bridge_slave_1: entered allmulticast mode [ 231.898835][ T1353] usbhid 3-1:0.0: can't add hid device: -71 [ 231.906888][ T1353] usbhid 3-1:0.0: probe with driver usbhid failed with error -71 [ 232.104127][T11237] bridge_slave_1: entered promiscuous mode [ 232.168862][ T1353] usb 3-1: USB disconnect, device number 56 [ 232.193264][ T36] audit: type=1400 audit(2000001167.566:27067): avc: denied { ioctl } for pid=11248 comm="syz.2.5420" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 232.936493][ T36] audit: type=1400 audit(2000001167.686:27068): avc: denied { ioctl } for pid=11248 comm="syz.2.5420" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 233.326606][ T36] audit: type=1400 audit(2000001167.816:27069): avc: denied { ioctl } for pid=11248 comm="syz.2.5420" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 234.834207][ T36] audit: type=1400 audit(2000001168.016:27070): avc: denied { ioctl } for pid=11248 comm="syz.2.5420" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 235.614216][ T36] audit: type=1400 audit(2000001168.016:27071): avc: denied { ioctl } for pid=11248 comm="syz.2.5420" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 236.593803][ C0] net_ratelimit: 295944 callbacks suppressed [ 236.593825][ C0] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 236.593826][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:7b:09:6b:10:94, vlan:0) [ 236.593871][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 236.599931][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 236.611119][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 236.623107][ C0] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 236.634276][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 236.646230][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 236.658224][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:7b:09:6b:10:94, vlan:0) [ 236.669425][ C0] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 238.716360][ T36] audit: type=1400 audit(2000001168.016:27072): avc: denied { ioctl } for pid=11248 comm="syz.2.5420" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 239.724764][ T36] audit: type=1400 audit(2000001168.086:27073): avc: denied { ioctl } for pid=11248 comm="syz.2.5420" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 241.583900][ T36] audit: type=1400 audit(2000001168.206:27074): avc: denied { ioctl } for pid=11248 comm="syz.2.5420" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 241.608949][ C0] net_ratelimit: 306546 callbacks suppressed [ 241.608970][ C0] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 241.608989][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 241.609027][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 241.609071][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 241.609090][ C0] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 241.609116][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:7b:09:6b:10:94, vlan:0) [ 241.609146][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 241.609170][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 241.609204][ C0] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 241.609222][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 244.333881][ T36] audit: type=1400 audit(2000001168.206:27075): avc: denied { ioctl } for pid=11248 comm="syz.2.5420" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 246.381836][ T36] audit: type=1400 audit(2000001168.216:27076): avc: denied { ioctl } for pid=11248 comm="syz.2.5420" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 246.612589][ C0] net_ratelimit: 304713 callbacks suppressed [ 246.612611][ C0] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 246.612613][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 246.612654][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 246.618682][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 246.629866][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 246.641155][ C0] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 246.653079][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:7b:09:6b:10:94, vlan:0) [ 246.665045][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 246.676208][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 246.687394][ C0] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 248.082876][ T36] audit: type=1400 audit(2000001168.216:27077): avc: denied { ioctl } for pid=11248 comm="syz.2.5420" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 250.283883][ T36] audit: type=1400 audit(2000001168.256:27078): avc: denied { ioctl } for pid=11248 comm="syz.2.5420" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 251.621973][ C1] net_ratelimit: 301631 callbacks suppressed [ 251.621994][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 251.621999][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 251.622050][ C0] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 251.628031][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 251.639260][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 251.651187][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 251.662379][ C0] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 251.674323][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:7b:09:6b:10:94, vlan:0) [ 251.686287][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 251.697443][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 252.254471][ T36] audit: type=1400 audit(2000001168.256:27079): avc: denied { ioctl } for pid=11248 comm="syz.2.5420" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 254.128107][ T36] audit: type=1400 audit(2000001169.016:27080): avc: denied { read } for pid=11255 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 255.684630][ T36] audit: type=1400 audit(2000001169.016:27081): avc: denied { read open } for pid=11255 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 256.631375][ C1] net_ratelimit: 297753 callbacks suppressed [ 256.631397][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 256.631430][ C0] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 256.637430][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 256.648626][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 256.659803][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 256.671809][ C0] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 256.683743][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:7b:09:6b:10:94, vlan:0) [ 256.694917][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 256.706197][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 256.718136][ C0] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 257.622445][ T36] audit: type=1400 audit(2000001169.016:27082): avc: denied { mounton } for pid=11255 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 258.664991][ T36] audit: type=1400 audit(2000001169.076:27083): avc: denied { sys_module } for pid=11255 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 259.611073][ T36] audit: type=1400 audit(2000001169.366:27084): avc: denied { read write } for pid=473 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 261.351564][ T36] audit: type=1400 audit(2000001169.366:27085): avc: denied { read write open } for pid=473 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 261.431290][ T36] audit: type=1400 audit(2000001169.516:27086): avc: denied { ioctl } for pid=473 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 261.640786][ C1] net_ratelimit: 303004 callbacks suppressed [ 261.640808][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 261.640820][ C0] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 261.640867][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 261.646836][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 261.658058][ C0] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 261.669230][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 261.681194][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 261.693156][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:7b:09:6b:10:94, vlan:0) [ 261.704336][ C0] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 261.715481][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 262.703062][ T36] audit: type=1400 audit(2000001169.516:27087): avc: denied { ioctl } for pid=11248 comm="syz.2.5420" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x550a scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 264.813948][ T36] audit: type=1400 audit(2000001169.516:27088): avc: denied { ioctl } for pid=11248 comm="syz.2.5420" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5509 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 266.650183][ C1] net_ratelimit: 299674 callbacks suppressed [ 266.650204][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:7b:09:6b:10:94, vlan:0) [ 266.650226][ C0] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 266.656234][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 266.668221][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 266.679473][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 266.690657][ C0] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 266.702599][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 266.714572][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 266.725726][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:7b:09:6b:10:94, vlan:0) [ 266.736925][ C0] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 269.229992][ T36] audit: type=1400 audit(2000001169.516:27089): avc: denied { ioctl } for pid=11248 comm="syz.2.5420" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5505 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 271.659586][ C1] net_ratelimit: 314562 callbacks suppressed [ 271.659608][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 271.659628][ C0] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 271.665661][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:7b:09:6b:10:94, vlan:0) [ 271.676866][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 271.688054][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 271.700021][ C0] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 271.712011][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 271.723197][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 271.734366][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 271.746360][ C0] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 272.610241][ T36] audit: type=1400 audit(2000001169.536:27090): avc: denied { ioctl } for pid=11248 comm="syz.2.5420" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5504 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 274.354088][ T36] audit: type=1400 audit(2000001169.696:27091): avc: denied { read write } for pid=472 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 274.492569][ T36] audit: type=1400 audit(2000001169.696:27092): avc: denied { read write open } for pid=472 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 274.870327][ T36] audit: type=1400 audit(2000001169.696:27093): avc: denied { ioctl } for pid=472 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 276.668980][ C0] net_ratelimit: 303606 callbacks suppressed [ 276.669002][ C0] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 276.669006][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:7b:09:6b:10:94, vlan:0) [ 276.669048][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 276.675071][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 276.686258][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 276.698234][ C0] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 276.709385][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 276.721340][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 276.733294][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:7b:09:6b:10:94, vlan:0) [ 276.744473][ C0] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 277.340676][ T36] audit: type=1400 audit(2000001171.426:27094): avc: denied { read } for pid=11259 comm="syz.3.5422" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 279.000684][ T36] audit: type=1400 audit(2000001171.426:27095): avc: denied { read open } for pid=11259 comm="syz.3.5422" path="/dev/kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 279.500945][ T36] audit: type=1400 audit(2000001171.426:27096): avc: denied { ioctl } for pid=11259 comm="syz.3.5422" path="/dev/kvm" dev="devtmpfs" ino=13 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 279.589967][ T36] audit: type=1400 audit(2000001171.716:27097): avc: denied { sys_module } for pid=11255 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 279.750423][ T36] audit: type=1400 audit(2000001173.797:27098): avc: denied { read write } for pid=472 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 279.829757][ T36] audit: type=1400 audit(2000001173.797:27099): avc: denied { read write open } for pid=472 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 279.899369][ T36] audit: type=1400 audit(2000001173.797:27100): avc: denied { ioctl } for pid=472 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 279.959498][ T36] audit: type=1400 audit(2000001190.559:27101): avc: denied { execmem } for pid=11265 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 280.009194][ T36] audit: type=1400 audit(2000001193.019:27102): avc: denied { execmem } for pid=11268 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 280.049330][ T36] audit: type=1400 audit(2000001197.029:27103): avc: denied { read } for pid=11269 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 280.148628][ T36] audit: type=1400 audit(2000001197.029:27104): avc: denied { read open } for pid=11269 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 281.678380][ C1] net_ratelimit: 286584 callbacks suppressed [ 281.678405][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 281.678434][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 281.684459][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 281.695671][ C0] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 281.707675][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 281.719673][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 281.730872][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:7b:09:6b:10:94, vlan:0) [ 281.742057][ C0] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 281.753997][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 281.765960][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 285.787156][ T36] kauditd_printk_skb: 22 callbacks suppressed [ 285.787174][ T36] audit: type=1400 audit(2000001224.183:27127): avc: denied { execmem } for pid=11273 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 286.069957][ T36] audit: type=1400 audit(2000001224.473:27128): avc: denied { read } for pid=11274 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 286.189066][ T36] audit: type=1400 audit(2000001224.493:27129): avc: denied { read open } for pid=11274 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 286.238763][ T36] audit: type=1400 audit(2000001224.493:27130): avc: denied { mounton } for pid=11274 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 286.290105][ T36] audit: type=1400 audit(2000001224.513:27131): avc: denied { sys_module } for pid=11274 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 286.687779][ C0] net_ratelimit: 303441 callbacks suppressed [ 286.687801][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 286.687808][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 286.687854][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 286.693859][ C0] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 286.705831][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 286.717070][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 286.729011][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:7b:09:6b:10:94, vlan:0) [ 286.740201][ C0] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 286.751355][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 286.763337][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 291.697177][ C1] net_ratelimit: 305700 callbacks suppressed [ 291.697198][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 291.697202][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 291.697260][ C0] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 291.703239][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 291.714463][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 291.726411][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 291.737617][ C0] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 291.749550][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:7b:09:6b:10:94, vlan:0) [ 291.761509][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 291.772728][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 296.706579][ C1] net_ratelimit: 304139 callbacks suppressed [ 296.706601][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 296.706606][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 296.706657][ C0] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 296.712665][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 296.723854][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 296.735811][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 296.746979][ C0] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 296.758942][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:7b:09:6b:10:94, vlan:0) [ 296.776577][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 296.782158][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 297.220974][ T36] audit: type=1400 audit(2000001235.624:27132): avc: denied { sys_module } for pid=11274 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 297.737950][ T36] audit: type=1400 audit(2000001236.004:27133): avc: denied { sys_module } for pid=11274 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 297.847677][ T36] audit: type=1400 audit(2000001236.014:27134): avc: denied { sys_module } for pid=11274 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 301.715984][ C0] net_ratelimit: 297414 callbacks suppressed [ 301.716005][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 301.716013][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 301.716051][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 301.722060][ C0] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 301.734029][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 301.745222][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 301.757157][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:7b:09:6b:10:94, vlan:0) [ 301.768342][ C0] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 301.779504][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 301.791489][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 306.725402][ C1] net_ratelimit: 305429 callbacks suppressed [ 306.725423][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:7b:09:6b:10:94, vlan:0) [ 306.725446][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 306.731449][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 306.743452][ C0] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 306.755447][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 306.767459][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 306.778599][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:7b:09:6b:10:94, vlan:0) [ 306.789805][ C0] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 306.801720][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 306.813696][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 310.005568][ T36] audit: type=1400 audit(2000001248.386:27135): avc: denied { execmem } for pid=11275 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 311.734791][ C0] net_ratelimit: 298348 callbacks suppressed [ 311.734812][ C0] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 311.734830][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:7b:09:6b:10:94, vlan:0) [ 311.740883][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 311.752063][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 311.764036][ C0] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 311.775982][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 311.787187][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 311.798323][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 311.809555][ C0] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 311.821514][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 312.429078][ T36] audit: type=1400 audit(2000001250.836:27136): avc: denied { read } for pid=11276 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 312.818959][ T36] audit: type=1400 audit(2000001250.996:27137): avc: denied { read open } for pid=11276 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 312.909827][ T36] audit: type=1400 audit(2000001250.996:27138): avc: denied { mounton } for pid=11276 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 312.961403][ T36] audit: type=1400 audit(2000001250.996:27139): avc: denied { sys_module } for pid=11276 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 313.286569][ T36] audit: type=1400 audit(2000001251.686:27140): avc: denied { execmem } for pid=11277 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 313.759991][ T36] audit: type=1400 audit(2000001252.166:27141): avc: denied { read } for pid=11278 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 313.857330][ T36] audit: type=1400 audit(2000001252.206:27142): avc: denied { read open } for pid=11278 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 313.915036][ T36] audit: type=1400 audit(2000001252.206:27143): avc: denied { mounton } for pid=11278 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 313.976179][ T36] audit: type=1400 audit(2000001252.226:27144): avc: denied { sys_module } for pid=11278 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 316.744193][ C1] net_ratelimit: 308845 callbacks suppressed [ 316.744214][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:7b:09:6b:10:94, vlan:0) [ 316.744235][ C0] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 316.750262][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 316.762257][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 316.773431][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 316.785429][ C0] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 316.797406][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:7b:09:6b:10:94, vlan:0) [ 316.808617][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 316.819767][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 316.831789][ C0] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 321.753598][ C1] net_ratelimit: 319315 callbacks suppressed [ 321.753620][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:7b:09:6b:10:94, vlan:0) [ 321.753650][ C0] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 321.759650][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 321.771636][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 321.782808][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 321.794820][ C0] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 321.806756][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:7b:09:6b:10:94, vlan:0) [ 321.817938][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 321.829096][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 321.841061][ C0] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 326.763030][ C1] net_ratelimit: 319172 callbacks suppressed [ 326.763053][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:7b:09:6b:10:94, vlan:0) [ 326.763070][ C0] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 326.763117][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 326.769196][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 326.781244][ C0] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 326.792430][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 326.804398][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 326.815558][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 326.826737][ C0] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 326.837894][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 331.772423][ C0] net_ratelimit: 319413 callbacks suppressed [ 331.772443][ C0] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 331.772467][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 331.778552][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 331.789733][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 331.801691][ C0] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 331.813653][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:7b:09:6b:10:94, vlan:0) [ 331.824875][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 331.836051][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 331.848004][ C0] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 331.859971][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 335.105386][ T37] INFO: task kworker/0:6:1911 blocked for more than 123 seconds. [ 335.115960][ T37] Not tainted 6.12.38-syzkaller-gbf0fb8bb181b #0 SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 335.356035][ T36] audit: type=1400 audit(2000001273.659:27145): avc: denied { write } for pid=281 comm="syz-executor" path="pipe:[2738]" dev="pipefs" ino=2738 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 335.389636][ T37] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 335.602469][ T37] task:kworker/0:6 state:D stack:0 pid:1911 tgid:1911 ppid:2 flags:0x00004000 [ 335.702003][ T36] audit: type=1400 audit(2000001273.709:27146): avc: denied { write } for pid=281 comm="syz-executor" path="pipe:[2738]" dev="pipefs" ino=2738 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 335.864817][ T37] Workqueue: events xfrm_state_gc_task [ 335.870357][ T37] Call Trace: [ 335.945273][ T37] [ 335.948239][ T37] __schedule+0x1322/0x1df0 [ 336.022062][ T37] ? __sched_text_start+0x10/0x10 [ 336.027126][ T37] ? _raw_spin_lock_irq+0x8d/0x120 [ 336.035259][ T36] audit: type=1400 audit(2000001273.709:27147): avc: denied { write } for pid=281 comm="syz-executor" path="pipe:[2738]" dev="pipefs" ino=2738 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 336.092363][ T37] ? wake_up_process+0x14/0x20 [ 336.097179][ T37] ? __cfi__raw_spin_trylock+0x10/0x10 [ 336.213574][ T37] ? wq_worker_sleeping+0x1a0/0x260 [ 336.218818][ T37] schedule+0xc6/0x240 [ 336.276520][ T37] schedule_timeout+0xb2/0x3a0 [ 336.281317][ T37] ? __cfi_schedule_timeout+0x10/0x10 [ 336.302262][ T36] audit: type=1400 audit(2000001274.359:27148): avc: denied { execmem } for pid=11279 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 336.342506][ T37] ? __cfi__raw_spin_lock_irq+0x10/0x10 [ 336.348459][ T37] ? dequeue_entity+0xa9c/0x1750 [ 336.532580][ T37] ? __virt_addr_valid+0xc5/0x380 [ 336.537651][ T37] wait_for_common+0x359/0x630 [ 336.573705][ T37] ? wait_for_completion+0x40/0x40 [ 336.578861][ T37] ? calc_wheel_index+0x134/0x8e0 [ 336.632938][ T37] ? __kasan_check_write+0x18/0x20 [ 336.638093][ T37] wait_for_completion_state+0x19/0x40 [ 336.654944][ T37] __wait_rcu_gp+0x296/0x2c0 [ 336.659567][ T37] synchronize_rcu_normal+0x113/0x160 [ 336.713415][ T37] ? synchronize_rcu_expedited+0x7b0/0x7b0 [ 336.719275][ T37] ? _raw_spin_unlock_irqrestore+0x4a/0x70 [ 336.763826][ T36] audit: type=1400 audit(2000001275.169:27149): avc: denied { read } for pid=11280 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 336.781833][ C1] net_ratelimit: 302507 callbacks suppressed [ 336.781852][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:7b:09:6b:10:94, vlan:0) [ 336.785312][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 336.791307][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 336.803282][ C0] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 336.815241][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 336.826460][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 336.837617][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 336.848815][ C0] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 336.860751][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 336.872721][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 336.938571][ T37] ? __cfi_call_rcu_hurry+0x10/0x10 [ 336.947458][ T37] ? __cfi_wakeme_after_rcu+0x10/0x10 [ 336.968534][ T37] synchronize_rcu+0x98/0x2e0 [ 336.976921][ T37] ? __cfi_synchronize_rcu+0x10/0x10 [ 337.006617][ T37] ? queue_delayed_work_on+0x163/0x1e0 [ 337.024861][ T36] audit: type=1400 audit(2000001275.329:27150): avc: denied { read open } for pid=11280 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 337.064252][ T37] xfrm_state_gc_task+0xca/0x170 [ 337.069229][ T37] ? __cfi_xfrm_state_gc_task+0x10/0x10 [ 337.092778][ T37] process_scheduled_works+0x7d2/0x1020 [ 337.098381][ T37] worker_thread+0xc58/0x1250 [ 337.107096][ T36] audit: type=1400 audit(2000001275.329:27151): avc: denied { mounton } for pid=11280 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 337.131977][ T37] kthread+0x2ca/0x370 [ 337.136099][ T37] ? __cfi_worker_thread+0x10/0x10 [ 337.141229][ T37] ? __cfi_kthread+0x10/0x10 [ 337.182696][ T37] ret_from_fork+0x67/0xa0 [ 337.187154][ T37] ? __cfi_kthread+0x10/0x10 [ 337.191748][ T37] ret_from_fork_asm+0x1a/0x30 [ 337.194764][ T36] audit: type=1400 audit(2000001275.369:27152): avc: denied { sys_module } for pid=11280 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 337.234105][ T37] [ 337.237147][ T37] INFO: task syz.0.5405:11214 blocked for more than 125 seconds. [ 337.263884][ T37] Not tainted 6.12.38-syzkaller-gbf0fb8bb181b #0 [ 337.274471][ T37] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 337.302903][ T37] task:syz.0.5405 state:D stack:0 pid:11214 tgid:11214 ppid:470 flags:0x00004004 [ 337.333919][ T37] Call Trace: [ 337.337219][ T37] [ 337.340146][ T37] __schedule+0x1322/0x1df0 [ 337.364985][ T37] ? __sched_text_start+0x10/0x10 [ 337.370035][ T37] ? rcu_segcblist_entrain+0x69/0x2b0 [ 337.395571][ T37] ? __kasan_check_write+0x18/0x20 [ 337.400715][ T37] ? llist_add_batch+0x109/0x1e0 [ 337.424434][ T37] schedule+0xc6/0x240 [ 337.428533][ T37] schedule_timeout+0xb2/0x3a0 [ 337.453511][ T37] ? __cfi_schedule_timeout+0x10/0x10 [ 337.458920][ T37] ? __cfi__raw_spin_lock_irq+0x10/0x10 [ 337.493117][ T37] ? generic_exec_single+0x201/0x500 [ 337.498438][ T37] ? __cfi_rcu_barrier_handler+0x10/0x10 [ 337.522809][ T37] wait_for_common+0x359/0x630 [ 337.527602][ T37] ? wait_for_completion+0x40/0x40 [ 337.552864][ T37] ? kvm_tdp_mmu_zap_invalidated_roots+0x641/0x6a0 [ 337.559397][ T37] ? xa_find+0x145/0x170 [ 337.582408][ T37] wait_for_completion+0x1c/0x40 [ 337.587375][ T37] rcu_barrier+0x415/0x530 [ 337.613349][ T37] kvm_mmu_uninit_tdp_mmu+0x1df/0x210 [ 337.618753][ T37] kvm_mmu_uninit_vm+0x27/0x60 [ 337.642402][ T37] kvm_arch_destroy_vm+0x383/0x410 [ 337.647550][ T37] ? __cfi_kvm_arch_destroy_vm+0x10/0x10 [ 337.716488][ T37] ? __kasan_check_write+0x18/0x20 [ 337.733027][ T37] ? mmu_notifier_unregister+0x2de/0x360 [ 337.738713][ T37] kvm_put_kvm+0xb04/0x12b0 [ 337.813397][ T37] ? kvm_irqfd_release+0x1b0/0x1d0 [ 337.818568][ T37] ? __cfi_kvm_vm_release+0x10/0x10 [ 337.844815][ T37] kvm_vm_release+0x47/0x70 [ 337.849361][ T37] __fput+0x1fb/0xa00 [ 337.856372][ T37] ? __cfi__raw_spin_lock_irq+0x10/0x10 [ 337.883454][ T37] ____fput+0x20/0x30 [ 337.887482][ T37] task_work_run+0x1e0/0x250 [ 337.903606][ T37] ? __cfi_task_work_run+0x10/0x10 [ 337.908761][ T37] ? __kasan_check_read+0x15/0x20 [ 337.934130][ T37] ? fpregs_assert_state_consistent+0xb7/0xe0 [ 337.940239][ T37] resume_user_mode_work+0x36/0x50 [ 337.954309][ T37] syscall_exit_to_user_mode+0x64/0xb0 [ 337.959796][ T37] do_syscall_64+0x64/0xf0 [ 337.992872][ T37] ? clear_bhb_loop+0x50/0xa0 [ 337.997587][ T37] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 338.017637][ T37] RIP: 0033:0x7fd314f8eb69 [ 338.033223][ T37] RSP: 002b:00007ffc373d71e8 EFLAGS: 00000246 ORIG_RAX: 00000000000001b4 [ 338.063928][ T37] RAX: 0000000000000000 RBX: 000000000002ed52 RCX: 00007fd314f8eb69 [ 338.083053][ T37] RDX: 0000000000000000 RSI: 000000000000001e RDI: 0000000000000003 [ 338.091050][ T37] RBP: 00007fd3151b7ba0 R08: 0000000000000001 R09: 00000003373d74df [ 338.122781][ T37] R10: 00007fd314e00000 R11: 0000000000000246 R12: 00007fd3151b608c [ 338.130783][ T37] R13: 00007fd3151b6080 R14: ffffffffffffffff R15: 00007ffc373d7300 [ 338.163891][ T37] [ 338.166982][ T37] NMI backtrace for cpu 0 [ 338.167001][ T37] CPU: 0 UID: 0 PID: 37 Comm: khungtaskd Not tainted 6.12.38-syzkaller-gbf0fb8bb181b #0 d02c7cfa86e34ad1734bbfdc1f5f1c3ce9be47fc [ 338.167029][ T37] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 338.167041][ T37] Call Trace: [ 338.167048][ T37] [ 338.167056][ T37] __dump_stack+0x21/0x30 [ 338.167083][ T37] dump_stack_lvl+0x10c/0x190 [ 338.167105][ T37] ? __cfi_dump_stack_lvl+0x10/0x10 [ 338.167129][ T37] dump_stack+0x19/0x20 [ 338.167151][ T37] nmi_cpu_backtrace+0x2bf/0x2d0 [ 338.167176][ T37] ? rcu_read_unlock_special+0xab/0x480 [ 338.167198][ T37] ? __cfi_nmi_cpu_backtrace+0x10/0x10 [ 338.167223][ T37] ? sched_show_task+0x379/0x560 [ 338.167251][ T37] ? __rcu_read_unlock+0xc0/0xc0 [ 338.167271][ T37] ? __cfi_nmi_raise_cpu_backtrace+0x10/0x10 [ 338.167293][ T37] ? __cfi_nmi_raise_cpu_backtrace+0x10/0x10 [ 338.167314][ T37] nmi_trigger_cpumask_backtrace+0x142/0x2c0 [ 338.167341][ T37] arch_trigger_cpumask_backtrace+0x14/0x20 [ 338.167362][ T37] watchdog+0xd8f/0xed0 [ 338.167386][ T37] ? __cfi_watchdog+0x10/0x10 [ 338.167408][ T37] ? __kasan_check_read+0x15/0x20 [ 338.167432][ T37] ? __kthread_parkme+0x138/0x180 [ 338.167457][ T37] ? schedule+0xc6/0x240 [ 338.167475][ T37] kthread+0x2ca/0x370 [ 338.167492][ T37] ? __cfi_watchdog+0x10/0x10 [ 338.167514][ T37] ? __cfi_kthread+0x10/0x10 [ 338.167531][ T37] ret_from_fork+0x67/0xa0 [ 338.167554][ T37] ? __cfi_kthread+0x10/0x10 [ 338.167571][ T37] ret_from_fork_asm+0x1a/0x30 [ 338.167598][ T37] [ 338.167605][ T37] Sending NMI from CPU 0 to CPUs 1: [ 338.388578][ C1] NMI backtrace for cpu 1 [ 338.388592][ C1] CPU: 1 UID: 0 PID: 20 Comm: rcuop/0 Not tainted 6.12.38-syzkaller-gbf0fb8bb181b #0 d02c7cfa86e34ad1734bbfdc1f5f1c3ce9be47fc [ 338.388613][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 338.388623][ C1] RIP: 0010:__sanitizer_cov_trace_const_cmp1+0x33/0x90 [ 338.388647][ C1] Code: 8b 45 08 65 48 8b 14 25 80 e9 04 00 65 8b 0d ec 1a 7f 7e 81 e1 00 01 ff 00 74 11 81 f9 00 01 00 00 75 5b 83 ba ec 0b 00 00 00 <74> 52 8b 8a c8 0b 00 00 83 f9 03 75 47 48 8b 8a d0 0b 00 00 44 8b [ 338.388660][ C1] RSP: 0018:ffffc9000022ffb0 EFLAGS: 00000246 [ 338.388674][ C1] RAX: ffffffff84f544b0 RBX: 000000000000003a RCX: 0000000000000100 [ 338.388685][ C1] RDX: ffff888103660000 RSI: 000000000000003a RDI: 0000000000000000 [ 338.388696][ C1] RBP: ffffc9000022ffb0 R08: ffff888103660000 R09: 0000000000000002 [ 338.388707][ C1] R10: 000000000000dd86 R11: 0000000000000100 R12: dffffc0000000000 [ 338.388717][ C1] R13: 0000000000000010 R14: ffff888172509a00 R15: ffff88811dd69f80 [ 338.388729][ C1] FS: 0000000000000000(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 338.388742][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 338.388753][ C1] CR2: 00007fd42e84f068 CR3: 000000010aa5c000 CR4: 00000000003526b0 [ 338.388766][ C1] Call Trace: [ 338.388771][ C1] [ 338.388778][ C1] ipv6_mc_check_mld+0x330/0x2070 [ 338.388801][ C1] ? ret_from_fork_asm+0x1a/0x30 [ 338.388823][ C1] ? __cfi_ipv6_mc_check_mld+0x10/0x10 [ 338.388843][ C1] br_multicast_rcv+0x576/0x7af0 [ 338.388859][ C1] ? __kfree_skb+0x18f/0x210 [ 338.388879][ C1] ? sk_skb_reason_drop+0xd8/0x310 [ 338.388900][ C1] ? ip6_mc_input+0x4f3/0x670 [ 338.388918][ C1] ? ipv6_rcv+0xed/0x220 [ 338.388934][ C1] ? br_handle_frame_finish+0x12d9/0x1720 [ 338.388949][ C1] ? process_backlog+0x3e5/0xae0 [ 338.388976][ C1] ? __napi_poll+0xd0/0x610 [ 338.388995][ C1] ? handle_softirqs+0x1ab/0x630 [ 338.389015][ C1] ? __do_softirq+0xf/0x16 [ 338.389029][ C1] ? __local_bh_enable_ip+0x74/0x80 [ 338.389049][ C1] ? rcu_nocb_cb_kthread+0x4dc/0xac0 [ 338.389068][ C1] ? kthread+0x2ca/0x370 [ 338.389080][ C1] ? ret_from_fork+0x67/0xa0 [ 338.389099][ C1] ? ret_from_fork_asm+0x1a/0x30 [ 338.389120][ C1] ? __cfi_br_multicast_rcv+0x10/0x10 [ 338.389137][ C1] ? __kasan_slab_free+0x6a/0x80 [ 338.389158][ C1] ? kmem_cache_free+0x1c1/0x510 [ 338.389178][ C1] ? __kfree_skb+0x18f/0x210 [ 338.389199][ C1] ? __kfree_skb+0x18f/0x210 [ 338.389219][ C1] ? ip6_mc_input+0x4f3/0x670 [ 338.389237][ C1] ? sk_skb_reason_drop+0xd8/0x310 [ 338.389258][ C1] ? ip6_mc_input+0x4f3/0x670 [ 338.389276][ C1] ? __cfi_ip6_mc_input+0x10/0x10 [ 338.389294][ C1] ? __kasan_check_write+0x18/0x20 [ 338.389313][ C1] ? _raw_spin_trylock+0xaf/0x130 [ 338.389333][ C1] ? __cfi__raw_spin_trylock+0x10/0x10 [ 338.389353][ C1] ? fdb_find_rcu+0xaa/0x530 [ 338.389372][ C1] ? __asan_memcpy+0x5a/0x80 [ 338.389389][ C1] ? _raw_spin_unlock_irqrestore+0x4a/0x70 [ 338.389410][ C1] ? ___ratelimit+0x3f7/0x5a0 [ 338.389424][ C1] ? __cfi____ratelimit+0x10/0x10 [ 338.389438][ C1] ? br_fdb_find_rcu+0x50/0x50 [ 338.389457][ C1] ? net_ratelimit+0x20/0x30 [ 338.389476][ C1] ? br_fdb_update+0x413/0x680 [ 338.389495][ C1] ? __cfi_br_fdb_update+0x10/0x10 [ 338.389515][ C1] ? br_pass_frame_up+0x126/0x1c0 [ 338.389529][ C1] br_handle_frame_finish+0x5be/0x1720 [ 338.389545][ C1] ? __cfi_br_handle_frame_finish+0x10/0x10 [ 338.389560][ C1] ? arch_scale_cpu_capacity+0x1c/0xb0 [ 338.389578][ C1] ? update_group_capacity+0x2b8/0x9f0 [ 338.389597][ C1] br_handle_frame+0x5a6/0xba0 [ 338.389611][ C1] ? __cfi_br_handle_frame+0x10/0x10 [ 338.389625][ C1] __netif_receive_skb_core+0xf48/0x3940 [ 338.389648][ C1] ? qdisc_run_end+0x120/0x120 [ 338.389667][ C1] ? sched_balance_update_blocked_averages+0x1320/0x1320 [ 338.389691][ C1] ? __irq_exit_rcu+0x54/0xc0 [ 338.389710][ C1] ? irqentry_exit+0x4a/0x60 [ 338.389727][ C1] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 338.389744][ C1] ? __kasan_check_write+0x18/0x20 [ 338.389762][ C1] ? _raw_spin_lock_irq+0x8d/0x120 [ 338.389782][ C1] ? __cfi__raw_spin_lock_irq+0x10/0x10 [ 338.389804][ C1] process_backlog+0x3e5/0xae0 [ 338.389827][ C1] __napi_poll+0xd0/0x610 [ 338.389847][ C1] net_rx_action+0x584/0xce0 [ 338.389869][ C1] ? __cfi_net_rx_action+0x10/0x10 [ 338.389889][ C1] ? sched_balance_domains+0x87a/0xa10 [ 338.389913][ C1] ? sched_balance_softirq+0xbd/0x170 [ 338.389933][ C1] handle_softirqs+0x1ab/0x630 [ 338.389954][ C1] __do_softirq+0xf/0x16 [ 338.389971][ C1] do_softirq+0xa6/0x100 [ 338.389989][ C1] [ 338.389995][ C1] [ 338.390000][ C1] ? __cfi_do_softirq+0x10/0x10 [ 338.390020][ C1] ? dst_destroy+0x37d/0x460 [ 338.390035][ C1] ? __cfi_dst_destroy_rcu+0x10/0x10 [ 338.390051][ C1] __local_bh_enable_ip+0x74/0x80 [ 338.390070][ C1] rcu_do_batch+0x5c6/0xd20 [ 338.390089][ C1] ? rcu_core+0xd20/0xd20 [ 338.390105][ C1] ? _raw_spin_trylock+0xaf/0x130 [ 338.390125][ C1] ? __kasan_check_read+0x15/0x20 [ 338.390143][ C1] ? rcu_nocb_cb_kthread+0x4c7/0xac0 [ 338.390162][ C1] rcu_nocb_cb_kthread+0x4dc/0xac0 [ 338.390181][ C1] ? __cfi_rcu_nocb_cb_kthread+0x10/0x10 [ 338.390200][ C1] ? __kasan_check_write+0x18/0x20 [ 338.390219][ C1] ? _raw_spin_lock_irqsave+0xaf/0x150 [ 338.390239][ C1] ? __cfi__raw_spin_lock_irqsave+0x10/0x10 [ 338.390259][ C1] ? _raw_spin_lock_irqsave+0xaf/0x150 [ 338.390280][ C1] ? set_cpus_allowed_ptr+0x93/0xe0 [ 338.390301][ C1] ? __cfi_set_cpus_allowed_ptr+0x10/0x10 [ 338.390323][ C1] ? __kasan_check_read+0x15/0x20 [ 338.390340][ C1] ? __kthread_parkme+0x138/0x180 [ 338.390360][ C1] ? schedule+0xc6/0x240 [ 338.390373][ C1] kthread+0x2ca/0x370 [ 338.390386][ C1] ? __cfi_rcu_nocb_cb_kthread+0x10/0x10 [ 338.390404][ C1] ? __cfi_kthread+0x10/0x10 [ 338.390417][ C1] ret_from_fork+0x67/0xa0 [ 338.390434][ C1] ? __cfi_kthread+0x10/0x10 [ 338.390448][ C1] ret_from_fork_asm+0x1a/0x30 [ 338.390468][ C1] [ 341.791246][ C0] net_ratelimit: 294079 callbacks suppressed [ 341.791268][ C0] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 341.791278][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 341.791316][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 341.797317][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 341.808521][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:7b:09:6b:10:94, vlan:0) [ 341.820497][ C0] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 341.831670][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 341.843652][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 341.855596][ C1] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 341.866805][ C0] bridge0: received packet on ªªªªª$ with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)