last executing test programs: 2m12.938724043s ago: executing program 0 (id=6978): r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x4b45, 0x4) 2m11.957599582s ago: executing program 0 (id=6986): r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000002800000028000000020000000100000000000001e5ff0000400000000000000001000084080000000000000001"], 0x0, 0x42}, 0x28) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000980)={0x6, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, r0, 0x0, 0x2}, 0x48) 2m10.970921421s ago: executing program 0 (id=7005): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=@newtaction={0xe0, 0x1e, 0x109, 0x0, 0xfffffffc, {}, [{0xcc, 0x1, [@m_mirred={0xc8, 0x0, 0x0, 0x0, {{0xb, 0x9}, {0x5c, 0xe}, {0x99, 0x6, "eb21c3a9f3b3aba1edff91d7fa4d7cc1fedc1b505ae82ab65b2164a389635082aed45e38c8c53227a94fbdd814efd884e84d8b28150cac2b4e200f1bb119a51f57826027f3c5e7c6bae19a68b90e35ae2d06ad43da9beb81962e863614af2c43cecc956f301191544f37759f2a137935ec6f6b2628fde1db15bf82e6c2178ca926706ad2b682a421ea71987dda2349654eb16e8976"}, {0xc}, {0xc, 0x8, {0x1}}}}]}]}, 0xe0}, 0x1, 0x2b1e}, 0x0) 2m9.552189188s ago: executing program 0 (id=7037): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000008c0)=@dellinkprop={0x20, 0x2e, 0x1}, 0x20}}, 0x0) 2m8.703967245s ago: executing program 0 (id=7060): r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000001040)={'gre0\x00', &(0x7f0000000080)={'sit0\x00', 0x0, 0x0, 0xa000, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x3, 0x0, 0x2f, 0x0, @broadcast, @rand_addr=0x80001}}}}) 2m8.191698895s ago: executing program 0 (id=7073): r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x21, 0x3, 0x580, 0x0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x4b0, 0xffffffff, 0xffffffff, 0x4b0, 0xffffffff, 0x3, 0x0, {[{{@ipv6={@private2, @private2, [], [], 'veth0\x00', 'syzkaller1\x00'}, 0x0, 0x220, 0x248, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'sit0\x00', {0x0, 0x9, 0x0, 0x0, 0x0, 0x8, 0x5}}}, @inet=@rpfilter={{0x28}}]}, @common=@unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00', 0x3, {0x0, 0x4}}}, {{@ipv6={@empty, @mcast1, [], [], 'batadv0\x00', 'veth1\x00'}, 0x0, 0x200, 0x268, 0x0, {}, [@common=@inet=@policy={{0x158}, {[{@ipv6=@private1, [], @ipv4=@remote}, {@ipv6=@dev, [], @ipv6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {@ipv4=@multicast2, [], @ipv6=@loopback}, {@ipv6=@rand_addr=' \x01\x00', [], @ipv4=@local}]}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5e0) 1m54.203008115s ago: executing program 32 (id=7073): r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x21, 0x3, 0x580, 0x0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x4b0, 0xffffffff, 0xffffffff, 0x4b0, 0xffffffff, 0x3, 0x0, {[{{@ipv6={@private2, @private2, [], [], 'veth0\x00', 'syzkaller1\x00'}, 0x0, 0x220, 0x248, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'sit0\x00', {0x0, 0x9, 0x0, 0x0, 0x0, 0x8, 0x5}}}, @inet=@rpfilter={{0x28}}]}, @common=@unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00', 0x3, {0x0, 0x4}}}, {{@ipv6={@empty, @mcast1, [], [], 'batadv0\x00', 'veth1\x00'}, 0x0, 0x200, 0x268, 0x0, {}, [@common=@inet=@policy={{0x158}, {[{@ipv6=@private1, [], @ipv4=@remote}, {@ipv6=@dev, [], @ipv6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {@ipv4=@multicast2, [], @ipv6=@loopback}, {@ipv6=@rand_addr=' \x01\x00', [], @ipv4=@local}]}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5e0) 1m26.113036738s ago: executing program 3 (id=7562): r0 = signalfd(0xffffffffffffffff, &(0x7f0000000000)={[0x59a5]}, 0x8) fsetxattr(r0, &(0x7f0000000480)=@random={'btrfs.', '/dev/fuse\x00'}, 0x0, 0x0, 0x1) 1m22.853944981s ago: executing program 3 (id=7565): r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x540b, 0x1) 1m19.348200629s ago: executing program 3 (id=7570): sendmsg$key(0xffffffffffffffff, &(0x7f00005f5000)={0x1000000, 0x0, 0x0}, 0x0) madvise(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x19) 1m9.461664199s ago: executing program 3 (id=7584): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000500)=@setneightbl={0x24, 0x43, 0x1, 0x70bd29, 0x25dfdbfb, {0x1c}, [@NDTA_NAME={0xe, 0x1, 'syzkaller\x00'}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x88040) 1m8.777360903s ago: executing program 3 (id=7588): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_int(r0, 0x29, 0x2, 0x0, &(0x7f0000000940)) 1m3.21127182s ago: executing program 3 (id=7594): sched_setaffinity(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000a00)='./bus\x00', 0x0, &(0x7f0000000080)={[{@errors_remount}, {@resuid}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x1ff}}, {@noblock_validity}]}, 0x3, 0x488, &(0x7f0000001340)="$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") 57.895677353s ago: executing program 5 (id=7604): r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$binfmt_format(r0, &(0x7f0000000140)='0\x00', 0x2) 55.639083306s ago: executing program 2 (id=7607): r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000300)=@mangle={'mangle\x00', 0x44, 0x6, 0x3f0, 0xc0, 0x0, 0x0, 0xc0, 0xc0, 0x358, 0x358, 0x358, 0x358, 0x358, 0x6, 0x0, {[{{@uncond, 0x0, 0x98, 0xc0, 0x0, {}, [@common=@inet=@socket1={{0x28}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0x288}}, {{@uncond, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @ECN={0x28}}, {{@ip={@rand_addr, @dev, 0x0, 0x0, 'syzkaller0\x00', 'macvlan1\x00', {}, {}, 0x0, 0x0, 0x20}, 0x0, 0x70, 0x98}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x5]}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x450) 53.696466874s ago: executing program 5 (id=7609): r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x6, 0x9, &(0x7f0000000140)={{0x0, @rand_addr, 0x0, 0x0, 'sh\x00'}, {@empty}}, 0x44) 51.508046946s ago: executing program 2 (id=7612): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newsa={0x144, 0x10, 0x1, 0xfffffffe, 0x100, {{@in6=@rand_addr=' \x01\x00', @in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x1, 0x71c, 0x4e23, 0x5, 0x0, 0x20, 0x0, 0x3a}, {@in6=@mcast2, 0x4d4, 0x6c}, @in=@multicast1, {0x0, 0x192, 0x9ba3, 0xffff, 0x8251c, 0x5, 0xfffffffffffffffc}, {0xffffffffffffffff, 0x0, 0x1f, 0xfffffffffffffffe}, {0xfffffffa, 0xfffffffc}, 0x80, 0x3500, 0x2, 0x1, 0x0, 0x20}, [@algo_comp={0x48, 0x3, {{'lzs\x00'}}}, @sec_ctx={0xc, 0x8, {0xfffffffffffffe6f, 0x8, 0x0, 0x1}}]}, 0x144}, 0x1, 0x0, 0x0, 0x8805}, 0x0) 48.598649502s ago: executing program 33 (id=7594): sched_setaffinity(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000a00)='./bus\x00', 0x0, &(0x7f0000000080)={[{@errors_remount}, {@resuid}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x1ff}}, {@noblock_validity}]}, 0x3, 0x488, &(0x7f0000001340)="$eJzs3M1vFOUfAPDvTLuF/oBfq+ILL2oVjQ1qSwGVgwc1mnjAxEQPGk9NWwhSqKE1EUIUjMGTMSbejUf/BU96MUYvJl71bkiI6QXw4prZnWl3l90tLbtdYD+fZOB55qXP99uZZ/eZeXYbQN8ay/5JIrZHxB8RMVKt1u8wVv3v2vL5mevL52eSKJff+jup7Hd1+fxMsWtx3La8Mp5GpJ8lsadJu4tnz52cnp+fO5PXJ5dOfTC5ePbcsydOTR+fOz53+uCRI4cPTb3w/MHnmgc+tL48s5iu7v54Ye+u19/96o2jX9Tl35BHh4y12/hkudzh5nprR005GexhIKzLQERkp6tU6f8jMRCrJ28kXvu0p8EBXVUul8vbWm++UG6QNq4A7mBJ1Ndv6PLAXap4o8/uf4ulcRDwUveGHz135eXqDVCW97V8qW4ZjDTfp9Rwf9tJYxHxzoV/vsmW6M5zCACAOj9k459nmo3/0nigZr//53NDoxFxT0TcGxH3RcTOiLg/orLvgxHxUOXIWBk7raVxkuTG8U96+ZYSXEM2/nsxn9sazsZ/pZV2i8LoQF7bUcm/lBw7MT93IP+djEdpS1afatPGj6/+/mWrbbXjv2zJ4ijGgnkclwe31B8zO700vfGM6125GLF7sMi1dvybrMwEJBGxKyJ2b7CNE/u/29tq29r5t9GBeabytxFPVc//hViuz7+QtJ+fnNwa83MHJour4ka//HbpzVbtV/Lfv8H8OyA7///Lr/9rzfMfTWrnaxfX38alPz9veU+z0et/KHm7Ui6mgT+aXlo6MxUxlBytBl27/uDqsUW92D/Lf3xfs/zTymtc8ZvYExHZRfxwRDwSEY/msT8WEY9HxL42+f/8yhPvN92Q3uL13wFZ/rPrOv+rhaFoXNO8MHDyp+/rGh1dLeb5X29//g9XSuP5mpt5/buZuDZ2NQMAAMCdJ42I7ZGkEyvlNJ2YqH5efmdEOr+wuPT0sYUPT89WvyMwGqW0eNI1UvM8dCq/ra/WL0ZE9aMFxfZD+XPjrweGK/WJmYX52V4nD31uW4v+n/lroNfRAV3n+1rQv/R/6F/N+v/WHsQBbD7v/9C/mvT/4V7EAWy+Zu//n7Q/5N9uxQJsrob+b9oP+sj67/9/fa8rgQCbrmX/v5v/8g9Q4fk/9KXF4Vj7S/JtC8VP2uDht0shiYiO/sAo3RZ53XqhnDQ9uZFmhdLtEKFCFwq9fV0CAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADolP8CAAD//3fv18M=") 47.983575243s ago: executing program 5 (id=7615): r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@ipv4={'\x00', '\xff\xff', @broadcast}, 0xc00, 0x0, 0x3, 0x1, 0x0, 0x100}, 0x20) 47.725756788s ago: executing program 2 (id=7616): r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) sendmmsg$inet(r0, &(0x7f0000004340)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0, 0x78}, {0x0, 0x78}], 0x2}}], 0x1, 0x20040000) 43.735397985s ago: executing program 5 (id=7619): r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x20, 0x4a, 0x1, 0x0, 0x0, {0xa, 0x0, 0x6e80}, [@typed={0xc, 0xf2, 0x0, 0x0, @u64=0x200}]}, 0x20}}, 0x20000090) 43.006644509s ago: executing program 2 (id=7621): r0 = syz_init_net_socket$bt_rfcomm(0x1f, 0x3, 0x3) getpeername(r0, 0x0, 0x0) 41.555826375s ago: executing program 5 (id=7623): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x2, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000300000000000000fe020010850000000700000095"], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000005c0)={r0, 0x0, 0x2a, 0x0, @val=@uprobe_multi={0x0, 0x0}}, 0x40) 40.200551899s ago: executing program 2 (id=7624): r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/arp\x00') preadv(r0, &(0x7f0000000600)=[{&(0x7f00000004c0)=""/26, 0x1a}], 0x1, 0x4000ffe, 0xfffffffc) 39.53044953s ago: executing program 5 (id=7625): r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'batadv_slave_1\x00', {0x2, 0x4e21, @empty}}) 39.317644554s ago: executing program 4 (id=7627): r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000440)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd000000100001000b0808004149014006040800", 0x58}], 0x1) 38.918199161s ago: executing program 2 (id=7628): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@deltaction={0x2c, 0x31, 0x101, 0x0, 0x400, {}, [@TCA_ACT_TAB={0x18, 0x1, [{0xe, 0x1, 0x0, 0x0, @TCA_ACT_KIND={0xf, 0x1, 'tunnel_key\x00'}}]}, @TCA_ACT_TAB={0x0, 0x1, [{0x0, 0x0, 0x0, 0x0, @TCA_ACT_INDEX}, {0x5, 0xb, 0x0, 0x0, @TCA_ACT_INDEX={0x0, 0x3, 0x6c1}}, {0x0, 0x1f, 0x0, 0x0, @TCA_ACT_KIND={0x0, 0x1, 'ife\x00'}}, {0x0, 0xc, 0x0, 0x0, @TCA_ACT_INDEX={0x0, 0x3, 0x6}}, {0x0, 0x6, 0x0, 0x0, @TCA_ACT_INDEX={0x0, 0x3, 0xd}}, {0x0, 0x1f, 0x0, 0x0, @TCA_ACT_INDEX={0x0, 0x3, 0xffffff30}}]}]}, 0x2c}}, 0x0) 38.246671024s ago: executing program 4 (id=7629): sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x2) 37.678479435s ago: executing program 4 (id=7630): close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x6) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) 37.178219194s ago: executing program 4 (id=7631): r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/meminfo\x00', 0x0, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x8, 0x12, r0, 0x492e6000) 36.686974213s ago: executing program 4 (id=7632): mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x3, &(0x7f0000407000/0x4000)=nil) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x4008032, 0xffffffffffffffff, 0xbcb15000) 36.196029773s ago: executing program 4 (id=7633): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="4400000010003904000000000000000400000086", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012800b0001006272696467650000140002800800020001010000080003"], 0x44}, 0x1, 0x0, 0x0, 0x80}, 0x0) 25.141647724s ago: executing program 34 (id=7625): r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'batadv_slave_1\x00', {0x2, 0x4e21, @empty}}) 24.794952761s ago: executing program 1 (id=7641): r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[], 0x44f0) 24.686233003s ago: executing program 35 (id=7628): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=@deltaction={0x2c, 0x31, 0x101, 0x0, 0x400, {}, [@TCA_ACT_TAB={0x18, 0x1, [{0xe, 0x1, 0x0, 0x0, @TCA_ACT_KIND={0xf, 0x1, 'tunnel_key\x00'}}]}, @TCA_ACT_TAB={0x0, 0x1, [{0x0, 0x0, 0x0, 0x0, @TCA_ACT_INDEX}, {0x5, 0xb, 0x0, 0x0, @TCA_ACT_INDEX={0x0, 0x3, 0x6c1}}, {0x0, 0x1f, 0x0, 0x0, @TCA_ACT_KIND={0x0, 0x1, 'ife\x00'}}, {0x0, 0xc, 0x0, 0x0, @TCA_ACT_INDEX={0x0, 0x3, 0x6}}, {0x0, 0x6, 0x0, 0x0, @TCA_ACT_INDEX={0x0, 0x3, 0xd}}, {0x0, 0x1f, 0x0, 0x0, @TCA_ACT_INDEX={0x0, 0x3, 0xffffff30}}]}]}, 0x2c}}, 0x0) 22.832677918s ago: executing program 1 (id=7643): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='sys_enter\x00', r0}, 0x10) setfsuid(0x0) 22.316597229s ago: executing program 1 (id=7644): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x40, 0x0, 0xa5}, {0x20, 0x9, 0x91, 0xffeff034}, {0x6, 0x2, 0x0, 0x5}]}, 0x10) write$binfmt_aout(r0, &(0x7f0000000000)=ANY=[], 0x9ffc) 22.056807844s ago: executing program 36 (id=7633): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="4400000010003904000000000000000400000086", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012800b0001006272696467650000140002800800020001010000080003"], 0x44}, 0x1, 0x0, 0x0, 0x80}, 0x0) 21.087407452s ago: executing program 1 (id=7646): r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'bond_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="300000001c00070c000000000000000002000000", @ANYRES32=r1, @ANYBLOB="020000000a000100aaaaaaaaaabb000008000f0001"], 0x30}, 0x1, 0x0, 0x0, 0x68eaadec908dc23b}, 0x20024090) 15.333362314s ago: executing program 1 (id=7647): r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x20000, 0x0) ioctl$TCSETSW2(r0, 0x5453, &(0x7f0000000040)={0x80000003, 0x1, 0xffffffc0, 0xffff, 0x2, "83843c556dec3a9a90800124b904cfc27929a3", 0xf57, 0x10000}) 14.513597139s ago: executing program 1 (id=7648): r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000000)={0x4800}, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="200000001600012d000000000000000803000017"], 0x20}}, 0x0) 0s ago: executing program 37 (id=7648): r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000000)={0x4800}, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="200000001600012d000000000000000803000017"], 0x20}}, 0x0) kernel console output (not intermixed with test programs): [ 232.424924][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 232.485899][T14520] F2FS-fs (loop4): invalid crc value [ 232.553761][T14520] F2FS-fs (loop4): Found nat_bits in checkpoint [ 232.573933][T14554] EXT4-fs (loop3): Cannot turn on quotas: error -22 [ 232.639963][T14554] EXT4-fs error (device loop3): ext4_orphan_get:1426: comm syz.3.6861: bad orphan inode 16 [ 232.713184][T14554] ext4_test_bit(bit=15, block=18) = 1 [ 232.747075][T14554] is_bad_inode(inode)=0 [ 232.751290][T14554] NEXT_ORPHAN(inode)=0 [ 232.807388][T14520] F2FS-fs (loop4): Start checkpoint disabled! [ 232.814692][T14554] max_ino=32 [ 232.834829][T14554] i_nlink=2 [ 232.838028][T14554] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. [ 232.858321][T14520] F2FS-fs (loop4): Mounted with checkpoint version = 48b305e6 [ 233.127942][T14554] fscrypt (loop3, inode 16): Error -61 getting encryption context [ 233.236799][ T287] EXT4-fs (loop3): unmounting filesystem. [ 233.304427][ T355] kworker/u4:4: attempt to access beyond end of device [ 233.304427][ T355] loop4: rw=2049, sector=40960, nr_sectors = 16 limit=40427 [ 233.823533][T14627] netlink: 12 bytes leftover after parsing attributes in process `syz.3.6893'. [ 235.077864][T14711] x_tables: duplicate entry at hook 2 [ 235.300015][T14723] tipc: Can't bind to reserved service type 1 [ 235.505493][ T28] kauditd_printk_skb: 405 callbacks suppressed [ 235.505600][ T28] audit: type=1400 audit(2000000053.923:10053): avc: denied { read write open } for pid=283 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=119 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 238.101400][ C0] net_ratelimit: 58894 callbacks suppressed [ 238.101421][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 238.119503][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 238.131596][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 238.143817][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 238.156024][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 238.168166][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 238.168606][ T28] audit: type=1400 audit(2000000053.955:10054): avc: denied { ioctl } for pid=283 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=119 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 238.180194][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 238.217943][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 238.230048][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 238.242167][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 238.455973][ T28] audit: type=1400 audit(2000000054.009:10055): avc: denied { read write } for pid=285 comm="syz-executor" name="loop4" dev="devtmpfs" ino=122 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 238.645786][ T28] audit: type=1400 audit(2000000054.009:10056): avc: denied { open } for pid=285 comm="syz-executor" path="/dev/loop4" dev="devtmpfs" ino=122 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 238.696412][T14777] binfmt_misc: register: failed to install interpreter file ./file0/../file0 [ 238.707683][ T284] audit: audit_backlog=65 > audit_backlog_limit=64 [ 238.711444][ T283] audit: audit_backlog=65 > audit_backlog_limit=64 [ 238.731201][ T284] audit: audit_lost=155 audit_rate_limit=0 audit_backlog_limit=64 [ 238.739060][ T284] audit: backlog limit exceeded [ 238.743422][ T285] audit: audit_backlog=65 > audit_backlog_limit=64 [ 238.776820][ T284] audit: audit_backlog=65 > audit_backlog_limit=64 [ 239.029556][T14789] device bridge5 entered promiscuous mode [ 239.091899][T14793] xt_CONNSECMARK: invalid mode: 0 [ 239.177694][T14795] netlink: 96 bytes leftover after parsing attributes in process `syz.3.6975'. [ 239.529524][T14808] 8021q: VLANs not supported on lo [ 239.896883][T14822] netlink: 20 bytes leftover after parsing attributes in process `syz.3.6989'. [ 239.971392][T14822] netlink: 20 bytes leftover after parsing attributes in process `syz.3.6989'. [ 240.187438][ T28] kauditd_printk_skb: 181 callbacks suppressed [ 240.187459][ T28] audit: type=1400 audit(2000000058.944:10214): avc: denied { read write } for pid=286 comm="syz-executor" name="loop2" dev="devtmpfs" ino=120 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 240.390629][ T28] audit: type=1400 audit(2000000058.976:10215): avc: denied { read write } for pid=283 comm="syz-executor" name="loop1" dev="devtmpfs" ino=119 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 240.549171][T14851] x_tables: unsorted underflow at hook 3 [ 240.588009][T14856] loop1: detected capacity change from 0 to 256 [ 240.608527][ T28] audit: type=1400 audit(2000000058.976:10216): avc: denied { open } for pid=283 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=119 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 240.681511][T14856] FAT-fs (loop1): Directory bread(block 64) failed [ 240.696584][T14856] FAT-fs (loop1): Directory bread(block 65) failed [ 240.703173][T14856] FAT-fs (loop1): Directory bread(block 66) failed [ 240.714941][ T28] audit: type=1400 audit(2000000058.976:10217): avc: denied { ioctl } for pid=283 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=119 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 240.770939][T14856] FAT-fs (loop1): Directory bread(block 67) failed [ 240.777553][T14856] FAT-fs (loop1): Directory bread(block 68) failed [ 240.799499][T14861] netlink: 8 bytes leftover after parsing attributes in process `syz.3.7006'. [ 240.845871][T14861] netlink: 12 bytes leftover after parsing attributes in process `syz.3.7006'. [ 240.859372][T14856] FAT-fs (loop1): Directory bread(block 69) failed [ 240.882867][ T28] audit: type=1400 audit(2000000059.008:10218): avc: denied { read write open } for pid=286 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=120 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 240.920368][T14856] FAT-fs (loop1): Directory bread(block 70) failed [ 240.973162][T14856] FAT-fs (loop1): Directory bread(block 71) failed [ 241.024130][T14856] FAT-fs (loop1): Directory bread(block 72) failed [ 241.032529][T14856] FAT-fs (loop1): Directory bread(block 73) failed [ 241.043393][ T284] audit: audit_backlog=65 > audit_backlog_limit=64 [ 241.050469][ T284] audit: audit_lost=165 audit_rate_limit=0 audit_backlog_limit=64 [ 241.058583][T14856] audit: audit_backlog=65 > audit_backlog_limit=64 [ 241.058608][T14856] audit: audit_lost=166 audit_rate_limit=0 audit_backlog_limit=64 [ 241.058623][T14856] audit: backlog limit exceeded [ 241.318598][T14880] xt_TCPMSS: Only works on TCP SYN packets [ 241.819272][T14907] netlink: 76 bytes leftover after parsing attributes in process `syz.2.7030'. [ 241.954956][T14910] netlink: 'syz.0.7005': attribute type 9 has an invalid length. [ 241.966008][T14910] netlink: 92 bytes leftover after parsing attributes in process `syz.0.7005'. [ 242.765768][ C0] net_ratelimit: 76404 callbacks suppressed [ 242.765794][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 242.788619][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 242.800956][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 242.813129][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 242.825267][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 242.837449][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 242.849628][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 242.861882][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 242.874079][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 242.886319][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 242.970906][T14967] x_tables: duplicate underflow at hook 2 [ 242.985206][T14968] netlink: 28 bytes leftover after parsing attributes in process `syz.4.7061'. [ 243.067154][T14968] netlink: 24 bytes leftover after parsing attributes in process `syz.4.7061'. [ 243.266870][T14981] netlink: 28 bytes leftover after parsing attributes in process `syz.2.7066'. [ 243.417906][T14990] sock: sock_timestamping_bind_phc: sock not bind to device [ 243.652380][T15001] loop2: detected capacity change from 0 to 128 [ 243.818298][T15008] device tunl0 entered promiscuous mode [ 243.978879][T15019] xt_policy: neither incoming nor outgoing policy selected [ 244.018032][T15022] __nla_validate_parse: 1 callbacks suppressed [ 244.018051][T15022] netlink: 8 bytes leftover after parsing attributes in process `syz.2.7084'. [ 244.101361][T15026] netlink: 16 bytes leftover after parsing attributes in process `syz.3.7097'. [ 244.282227][T15035] netlink: 12 bytes leftover after parsing attributes in process `syz.2.7090'. [ 244.321674][T15037] netlink: 8 bytes leftover after parsing attributes in process `syz.3.7092'. [ 244.361982][T15034] netlink: 'syz.1.7091': attribute type 11 has an invalid length. [ 244.726053][T15058] netlink: 148 bytes leftover after parsing attributes in process `syz.2.7103'. [ 244.870137][ T28] kauditd_printk_skb: 416 callbacks suppressed [ 244.870156][ T28] audit: type=1400 audit(2000000063.954:10625): avc: denied { read write open } for pid=285 comm="syz-executor" path="/dev/loop4" dev="devtmpfs" ino=122 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 245.088389][ T28] audit: type=1400 audit(2000000063.997:10626): avc: denied { ioctl } for pid=285 comm="syz-executor" path="/dev/loop4" dev="devtmpfs" ino=122 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 245.281736][ T28] audit: type=1400 audit(2000000064.040:10627): avc: denied { read write } for pid=287 comm="syz-executor" name="loop3" dev="devtmpfs" ino=121 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 245.496275][ T28] audit: type=1400 audit(2000000064.040:10628): avc: denied { read write open } for pid=287 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=121 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 245.616875][T15102] xt_CT: You must specify a L4 protocol and not use inversions on it [ 245.690688][ T28] audit: type=1400 audit(2000000064.040:10629): avc: denied { ioctl } for pid=287 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=121 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 245.805246][ T287] audit: audit_backlog=65 > audit_backlog_limit=64 [ 245.811830][ T287] audit: audit_lost=170 audit_rate_limit=0 audit_backlog_limit=64 [ 245.834458][ T286] audit: audit_backlog=65 > audit_backlog_limit=64 [ 245.842645][ T286] audit: audit_lost=171 audit_rate_limit=0 audit_backlog_limit=64 [ 245.850482][ T286] audit: backlog limit exceeded [ 246.213751][T15132] netlink: 64 bytes leftover after parsing attributes in process `syz.4.7136'. [ 246.254406][T15134] loop2: detected capacity change from 0 to 256 [ 246.274342][T15132] netlink: 64 bytes leftover after parsing attributes in process `syz.4.7136'. [ 246.363031][T15133] netlink: 'syz.1.7135': attribute type 15 has an invalid length. [ 246.503310][T15141] device ip6tnl2 entered promiscuous mode [ 247.306161][T15187] netlink: 12 bytes leftover after parsing attributes in process `syz.3.7161'. [ 247.377859][T15187] netlink: 16 bytes leftover after parsing attributes in process `syz.3.7161'. [ 247.435161][ C0] net_ratelimit: 82002 callbacks suppressed [ 247.435183][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 247.453566][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 247.465699][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 247.477844][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 247.490022][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 247.502159][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 247.514512][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 247.526637][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 247.538703][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 247.550819][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 247.775877][T15208] netlink: 56 bytes leftover after parsing attributes in process `syz.1.7173'. [ 247.898879][T15217] xt_ecn: cannot match TCP bits for non-tcp packets [ 249.113672][T15284] __nla_validate_parse: 1 callbacks suppressed [ 249.113693][T15284] netlink: 28 bytes leftover after parsing attributes in process `syz.1.7207'. [ 249.471496][T15300] IPv6: sit1: Disabled Multicast RS [ 249.533868][ T28] kauditd_printk_skb: 425 callbacks suppressed [ 249.533886][ T28] audit: type=1400 audit(2000000068.954:11027): avc: denied { read write open } for pid=286 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=120 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 249.772678][ T28] audit: type=1400 audit(2000000069.008:11028): avc: denied { ioctl } for pid=286 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=120 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 249.989339][ T28] audit: type=1400 audit(2000000069.029:11029): avc: denied { read write } for pid=287 comm="syz-executor" name="loop3" dev="devtmpfs" ino=121 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 250.070844][T15329] netlink: 16 bytes leftover after parsing attributes in process `syz.4.7232'. [ 250.138223][ T28] audit: type=1400 audit(2000000069.029:11030): avc: denied { open } for pid=287 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=121 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 250.299506][ T285] audit: audit_backlog=65 > audit_backlog_limit=64 [ 250.307783][ T28] audit: type=1400 audit(2000000069.029:11031): avc: denied { ioctl } for pid=287 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=121 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 250.336186][T15344] audit: audit_backlog=65 > audit_backlog_limit=64 [ 250.342733][T15344] audit: audit_lost=181 audit_rate_limit=0 audit_backlog_limit=64 [ 250.371450][ T285] audit: audit_lost=182 audit_rate_limit=0 audit_backlog_limit=64 [ 250.384008][ T285] audit: backlog limit exceeded [ 250.806898][T15372] netlink: 'syz.4.7253': attribute type 6 has an invalid length. [ 250.842642][T15374] netlink: 104 bytes leftover after parsing attributes in process `syz.3.7254'. [ 250.888791][T15376] netlink: 'syz.2.7255': attribute type 1 has an invalid length. [ 251.423924][T15404] usb usb8: usbfs: process 15404 (syz.2.7267) did not claim interface 0 before use [ 251.755461][T15421] loop3: detected capacity change from 0 to 512 [ 251.859653][T15421] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. [ 251.881360][T15421] ext4 filesystem being mounted at /1516/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 251.968017][T15436] device veth1_vlan entered promiscuous mode [ 251.981296][T15421] EXT4-fs error (device loop3): ext4_add_entry:2486: inode #12: comm syz.3.7278: Directory hole found for htree leaf block 0 [ 252.083438][T15421] EXT4-fs (loop3): Remounting filesystem read-only [ 252.104400][ C0] net_ratelimit: 84058 callbacks suppressed [ 252.104420][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 252.122488][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 252.134620][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 252.146709][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 252.158868][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 252.170976][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 252.183134][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 252.195223][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 252.207371][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 252.219441][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 252.242328][ T287] EXT4-fs (loop3): unmounting filesystem. [ 252.594906][T15472] xt_TCPMSS: Only works on TCP SYN packets [ 253.427175][T15527] netlink: 'syz.3.7326': attribute type 3 has an invalid length. [ 254.117534][ T60] usb 5-1: new full-speed USB device number 64 using dummy_hcd [ 254.247211][ T28] kauditd_printk_skb: 462 callbacks suppressed [ 254.247229][ T28] audit: type=1400 audit(2000000074.018:11460): avc: denied { read write } for pid=286 comm="syz-executor" name="loop2" dev="devtmpfs" ino=120 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 254.305504][ T60] usb 5-1: config 8 has an invalid interface number: 223 but max is 0 [ 254.320453][ T60] usb 5-1: config 8 has an invalid descriptor of length 0, skipping remainder of the config [ 254.362138][T15562] netlink: 'syz.2.7344': attribute type 5 has an invalid length. [ 254.382868][ T60] usb 5-1: config 8 has no interface number 0 [ 254.401825][ T28] audit: type=1400 audit(2000000074.061:11461): avc: denied { read write open } for pid=286 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=120 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 254.430750][ T60] usb 5-1: config 8 interface 223 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 3 [ 254.507783][ T60] usb 5-1: New USB device found, idVendor=a6da, idProduct=7458, bcdDevice=2d.4d [ 254.558398][ T60] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 254.576161][ T28] audit: type=1400 audit(2000000074.061:11462): avc: denied { ioctl } for pid=286 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=120 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 254.635664][ T60] usb 5-1: Product: syz [ 254.656802][ T60] usb 5-1: Manufacturer: syz [ 254.689346][ T60] usb 5-1: SerialNumber: syz [ 254.737149][T15575] netlink: 4 bytes leftover after parsing attributes in process `syz.2.7350'. [ 254.751691][ T28] audit: type=1400 audit(2000000074.093:11463): avc: denied { ioctl } for pid=15545 comm="syz.4.7335" path="/dev/raw-gadget" dev="devtmpfs" ino=258 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 254.780136][T15575] netlink: 4 bytes leftover after parsing attributes in process `syz.2.7350'. [ 254.789804][T15575] netlink: 4 bytes leftover after parsing attributes in process `syz.2.7350'. [ 254.799588][ T28] audit: type=1400 audit(2000000074.126:11464): avc: denied { read write } for pid=283 comm="syz-executor" name="loop1" dev="devtmpfs" ino=119 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 254.840159][ T28] audit: type=1400 audit(2000000074.126:11465): avc: denied { read write open } for pid=283 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=119 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 254.916259][ T60] usb 5-1: USB disconnect, device number 64 [ 255.029662][ T28] audit: type=1400 audit(2000000074.126:11466): avc: denied { ioctl } for pid=283 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=119 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 255.125304][T15584] netlink: 8 bytes leftover after parsing attributes in process `syz.3.7356'. [ 255.211413][ T28] audit: type=1400 audit(2000000074.244:11467): avc: denied { read write } for pid=283 comm="syz-executor" name="loop1" dev="devtmpfs" ino=119 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 255.350828][T15593] loop3: detected capacity change from 0 to 512 [ 255.395101][ T28] audit: type=1400 audit(2000000074.244:11468): avc: denied { open } for pid=283 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=119 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 255.482311][ T283] audit: audit_backlog=65 > audit_backlog_limit=64 [ 255.507349][T15593] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. [ 255.543229][T15593] ext4 filesystem being mounted at /1534/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 255.727898][ T287] EXT4-fs (loop3): unmounting filesystem. [ 256.275600][T15650] netlink: 80 bytes leftover after parsing attributes in process `syz.3.7385'. [ 256.437176][T15661] netlink: 2 bytes leftover after parsing attributes in process `syz.2.7388'. [ 256.774236][ C0] net_ratelimit: 84463 callbacks suppressed [ 256.774258][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 256.792389][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 256.804584][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 256.816680][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 256.828946][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 256.841040][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 256.853362][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 256.865437][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 256.867547][T15694] netlink: 20 bytes leftover after parsing attributes in process `syz.4.7405'. [ 256.877612][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 256.898514][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 257.008549][T15694] netlink: 20 bytes leftover after parsing attributes in process `syz.4.7405'. [ 257.026833][T15701] ip6t_REJECT: TCP_RESET illegal for non-tcp [ 257.431605][T15726] loop4: detected capacity change from 0 to 128 [ 257.768339][T15743] netlink: 52 bytes leftover after parsing attributes in process `syz.2.7427'. [ 257.867754][T15743] netlink: 12 bytes leftover after parsing attributes in process `syz.2.7427'. [ 257.950458][T15743] netlink: 'syz.2.7427': attribute type 1 has an invalid length. [ 258.918029][T15761] bridge0: port 1(bridge_slave_0) entered blocking state [ 258.934540][ T28] kauditd_printk_skb: 456 callbacks suppressed [ 258.934558][ T28] audit: type=1400 audit(2000000079.050:11899): avc: denied { read write } for pid=285 comm="syz-executor" name="loop4" dev="devtmpfs" ino=122 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 259.002345][T15761] bridge0: port 1(bridge_slave_0) entered disabled state [ 259.017478][T15761] device bridge_slave_0 entered promiscuous mode [ 259.070467][T15761] bridge0: port 2(bridge_slave_1) entered blocking state [ 259.154912][T15761] bridge0: port 2(bridge_slave_1) entered disabled state [ 259.165180][ T28] audit: type=1400 audit(2000000079.104:11900): avc: denied { read write open } for pid=285 comm="syz-executor" path="/dev/loop4" dev="devtmpfs" ino=122 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 259.201354][T15761] device bridge_slave_1 entered promiscuous mode [ 259.347159][ T28] audit: type=1400 audit(2000000079.104:11901): avc: denied { ioctl } for pid=285 comm="syz-executor" path="/dev/loop4" dev="devtmpfs" ino=122 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 259.544579][ T28] audit: type=1400 audit(2000000079.115:11902): avc: denied { read write } for pid=286 comm="syz-executor" name="loop2" dev="devtmpfs" ino=120 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 259.725866][ T28] audit: type=1400 audit(2000000079.115:11903): avc: denied { open } for pid=286 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=120 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 259.759806][T15829] loop4: detected capacity change from 0 to 512 [ 259.812724][T15829] audit: audit_backlog=65 > audit_backlog_limit=64 [ 259.823411][T15761] audit: audit_backlog=65 > audit_backlog_limit=64 [ 259.829951][T15761] audit: audit_lost=203 audit_rate_limit=0 audit_backlog_limit=64 [ 259.840139][ T287] audit: audit_backlog=65 > audit_backlog_limit=64 [ 259.868476][T15829] audit: audit_lost=204 audit_rate_limit=0 audit_backlog_limit=64 [ 259.913421][T15829] EXT4-fs (loop4): encrypted files will use data=ordered instead of data journaling mode [ 259.984532][T15829] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=a00ec019, mo2=0002] [ 260.006264][T15796] loop1: detected capacity change from 0 to 40427 [ 260.034774][T15829] System zones: 1-12 [ 260.048498][T15796] F2FS-fs (loop1): Invalid log_blocksize (268), supports only 12 [ 260.079674][T15829] EXT4-fs (loop4): 1 truncate cleaned up [ 260.089723][T15842] device bridge5 entered promiscuous mode [ 260.107962][T15829] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: writeback. [ 260.118648][T15796] F2FS-fs (loop1): Can't find valid F2FS filesystem in 1th superblock [ 260.176863][T15796] F2FS-fs (loop1): invalid crc value [ 260.219082][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 260.245383][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 260.254855][T15796] F2FS-fs (loop1): Found nat_bits in checkpoint [ 260.299895][ T285] EXT4-fs (loop4): unmounting filesystem. [ 260.316690][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 260.360027][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 260.418895][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 260.425975][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 260.503034][T15796] F2FS-fs (loop1): Try to recover 1th superblock, ret: 0 [ 260.527701][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 260.540947][T15796] F2FS-fs (loop1): Mounted with checkpoint version = 48b305e5 [ 260.588621][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 260.641245][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 260.648376][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 260.728208][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 260.799654][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 260.822935][T15796] syz.1.7463: attempt to access beyond end of device [ 260.822935][T15796] loop1: rw=2049, sector=45096, nr_sectors = 8 limit=40427 [ 260.849907][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 260.927696][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 260.974167][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 261.042016][T15761] device veth0_vlan entered promiscuous mode [ 261.098248][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 261.119559][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 261.197601][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 261.249378][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 261.255937][T15761] device veth1_macvtap entered promiscuous mode [ 261.303327][T15896] loop3: detected capacity change from 0 to 16 [ 261.306529][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 261.306893][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 261.307160][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 261.311480][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 261.311798][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 261.312187][T15896] erofs: (device loop3): mounted with root inode @ nid 36. [ 261.347826][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 261.348139][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 261.443559][ C0] net_ratelimit: 83254 callbacks suppressed [ 261.443580][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 261.443677][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 261.443737][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 261.443835][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 261.443933][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 261.444064][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 261.444127][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 261.444208][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 261.444263][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 261.444350][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 262.350535][T15950] __nla_validate_parse: 1 callbacks suppressed [ 262.350559][T15950] netlink: 276 bytes leftover after parsing attributes in process `syz.5.7521'. [ 262.474382][T15957] netlink: 12 bytes leftover after parsing attributes in process `syz.1.7524'. [ 264.675654][ T28] kauditd_printk_skb: 358 callbacks suppressed [ 264.675671][ T28] audit: type=1400 audit(2000000085.209:12252): avc: denied { read write } for pid=15761 comm="syz-executor" name="loop5" dev="devtmpfs" ino=123 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 264.675841][ T28] audit: type=1400 audit(2000000085.209:12253): avc: denied { read write open } for pid=15761 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=123 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 264.675982][ T28] audit: type=1400 audit(2000000085.209:12254): avc: denied { ioctl } for pid=15761 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=123 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 266.017601][ T28] audit: type=1400 audit(2000000086.646:12255): avc: denied { read write } for pid=283 comm="syz-executor" name="loop1" dev="devtmpfs" ino=119 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 266.113480][ C0] net_ratelimit: 78633 callbacks suppressed [ 266.113502][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 266.131498][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 266.143526][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 266.155708][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 266.167732][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 266.179842][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 266.192036][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 266.204123][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 266.216231][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 266.228331][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 268.080627][T15893] tty tty25: ldisc open failed (-12), clearing slot 24 [ 268.158098][T15949] ttyS ttyS3: ldisc open failed (-12), clearing slot 3 [ 268.168682][T15966] ptm ptm0: ldisc open failed (-12), clearing slot 0 [ 270.783213][ C0] net_ratelimit: 89764 callbacks suppressed [ 270.783231][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 270.783309][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 270.789228][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 270.801725][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 270.813675][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 270.825700][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 270.837549][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 270.849658][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 270.861536][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 270.873513][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 273.600561][ T28] audit: type=1400 audit(2000000086.700:12256): avc: denied { open } for pid=283 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=119 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 275.452816][ C0] net_ratelimit: 93184 callbacks suppressed [ 275.452837][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 275.452887][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 275.458854][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 275.470983][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 275.482817][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 275.494934][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 275.506791][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 275.518785][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 275.530614][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 275.542835][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 278.271479][ T28] audit: type=1400 audit(2000000086.700:12257): avc: denied { ioctl } for pid=283 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=119 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 279.158141][ T287] audit: audit_backlog=65 > audit_backlog_limit=64 [ 279.304804][ T285] audit: audit_backlog=65 > audit_backlog_limit=64 [ 279.311447][ T285] audit: audit_lost=208 audit_rate_limit=0 audit_backlog_limit=64 [ 279.544650][ T28] audit: type=1400 audit(2000000087.612:12258): avc: denied { read write } for pid=15761 comm="syz-executor" name="loop5" dev="devtmpfs" ino=123 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 279.580366][ T285] audit: backlog limit exceeded [ 279.611711][ T287] audit: audit_lost=209 audit_rate_limit=0 audit_backlog_limit=64 [ 279.633257][ T286] audit: audit_backlog=65 > audit_backlog_limit=64 [ 279.694619][ T285] audit: audit_backlog=65 > audit_backlog_limit=64 [ 279.701186][ T285] audit: audit_lost=210 audit_rate_limit=0 audit_backlog_limit=64 [ 280.122409][ C1] net_ratelimit: 109704 callbacks suppressed [ 280.122431][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 280.122459][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 280.128718][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 280.140718][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 280.152554][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 280.164595][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 280.176597][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 280.188576][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 280.200790][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 280.212631][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 283.576079][ T286] audit_log_start: 76 callbacks suppressed [ 283.576100][ T286] audit: audit_backlog=65 > audit_backlog_limit=64 [ 283.697665][ T28] audit: type=1400 audit(2000000087.612:12259): avc: denied { open } for pid=15761 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=123 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 283.795676][ T286] audit: audit_lost=236 audit_rate_limit=0 audit_backlog_limit=64 [ 283.852560][T16022] x_tables: arp_tables: CLASSIFY target: used from hooks INPUT, but only usable from FORWARD/OUTPUT [ 283.945392][ T286] audit: backlog limit exceeded [ 284.155969][ T285] audit: audit_backlog=65 > audit_backlog_limit=64 [ 284.164992][ T286] audit: audit_backlog=66 > audit_backlog_limit=64 [ 284.227291][ T283] audit: audit_backlog=66 > audit_backlog_limit=64 [ 284.247941][ T286] audit: audit_lost=237 audit_rate_limit=0 audit_backlog_limit=64 [ 284.452126][ T287] audit: audit_backlog=66 > audit_backlog_limit=64 [ 284.461288][ T283] audit: audit_lost=238 audit_rate_limit=0 audit_backlog_limit=64 [ 284.791653][ C0] net_ratelimit: 116485 callbacks suppressed [ 284.791671][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 284.791714][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 284.797782][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 284.809754][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 284.821676][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 284.833563][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 284.845417][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 284.857810][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 284.869649][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 284.881504][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 288.282439][ T28] kauditd_printk_skb: 115 callbacks suppressed [ 288.282456][ T28] audit: type=1400 audit(2000000110.540:12354): avc: denied { bpf } for pid=16039 comm="syz.2.7573" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 288.570668][T16042] netlink: 'syz.1.7564': attribute type 4 has an invalid length. [ 289.461579][ C1] net_ratelimit: 120829 callbacks suppressed [ 289.461601][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 289.461648][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 289.467881][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 289.479973][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 289.491976][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 289.503882][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 289.515773][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 289.527627][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 289.539746][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 289.551601][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 289.707966][T16042] netlink: 2548 bytes leftover after parsing attributes in process `syz.1.7564'. [ 290.501864][ T28] audit: type=1400 audit(2000000110.701:12355): avc: denied { read write } for pid=285 comm="syz-executor" name="loop4" dev="devtmpfs" ino=122 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 294.130906][ C0] net_ratelimit: 121798 callbacks suppressed [ 294.130923][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 294.130956][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 294.137024][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 294.149174][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 294.161149][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 294.172992][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 294.184870][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 294.196867][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 294.208830][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 294.220850][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 294.338707][T16054] xt_CONNSECMARK: invalid mode: 0 [ 295.008023][ T28] audit: type=1400 audit(2000000110.701:12356): avc: denied { open } for pid=285 comm="syz-executor" path="/dev/loop4" dev="devtmpfs" ino=122 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 296.051727][ C1] ip6_tunnel: ip6tnl1 xmit: Local address not yet configured! [ 298.086738][ T28] audit: type=1400 audit(2000000110.701:12357): avc: denied { ioctl } for pid=285 comm="syz-executor" path="/dev/loop4" dev="devtmpfs" ino=122 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 298.800743][ C0] net_ratelimit: 119801 callbacks suppressed [ 298.800766][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 298.800913][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 298.806852][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 298.818918][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 298.830936][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 298.842797][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 298.854684][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 298.866663][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 298.878561][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 298.890552][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 300.918001][ T28] audit: type=1400 audit(2000000111.044:12358): avc: denied { read write } for pid=15761 comm="syz-executor" name="loop5" dev="devtmpfs" ino=123 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 302.141934][ T283] audit: audit_backlog=65 > audit_backlog_limit=64 [ 302.150834][ T28] audit: type=1400 audit(2000000111.044:12359): avc: denied { open } for pid=15761 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=123 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 302.316039][ T286] audit: audit_backlog=65 > audit_backlog_limit=64 [ 302.322612][ T286] audit: audit_lost=246 audit_rate_limit=0 audit_backlog_limit=64 [ 302.428358][ T283] audit: audit_lost=247 audit_rate_limit=0 audit_backlog_limit=64 [ 302.569668][ T287] audit: audit_backlog=65 > audit_backlog_limit=64 [ 302.663460][ T283] audit: backlog limit exceeded [ 302.690990][T15761] audit: audit_backlog=65 > audit_backlog_limit=64 [ 302.753682][ T286] audit: backlog limit exceeded [ 303.470304][ C0] net_ratelimit: 117798 callbacks suppressed [ 303.470327][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 303.470346][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 303.476424][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 303.488338][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 303.500310][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 303.512293][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 303.524361][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 303.536369][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 303.548220][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 303.560264][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 305.644004][ T28] kauditd_printk_skb: 90 callbacks suppressed [ 305.644020][ T28] audit: type=1400 audit(2000000129.165:12428): avc: denied { read write } for pid=15761 comm="syz-executor" name="loop5" dev="devtmpfs" ino=123 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 308.056759][ T28] audit: type=1400 audit(2000000129.208:12429): avc: denied { read write open } for pid=15761 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=123 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 308.139721][ C0] net_ratelimit: 120936 callbacks suppressed [ 308.139743][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 308.139745][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 308.139819][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 308.145869][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 308.157853][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 308.169684][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 308.181659][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 308.193634][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 308.205586][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 308.217465][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 308.769274][T16100] loop3: detected capacity change from 0 to 512 [ 309.449499][ T28] audit: type=1400 audit(2000000129.208:12430): avc: denied { ioctl } for pid=15761 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=123 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 309.479140][T16100] EXT4-fs (loop3): encrypted files will use data=ordered instead of data journaling mode [ 310.526700][T16109] xt_TCPMSS: Only works on TCP SYN packets [ 310.602768][T16100] EXT4-fs error (device loop3): ext4_validate_block_bitmap:438: comm syz.3.7594: bg 0: block 384: padding at end of block bitmap is not set [ 311.402586][T16100] EXT4-fs (loop3): Remounting filesystem read-only [ 311.439226][ T28] audit: type=1400 audit(2000000129.273:12431): avc: denied { read write } for pid=287 comm="syz-executor" name="loop3" dev="devtmpfs" ino=121 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 311.674785][T16100] EXT4-fs error (device loop3) in ext4_mb_clear_bb:6170: Corrupt filesystem [ 312.326070][T16100] EXT4-fs (loop3): Remounting filesystem read-only [ 312.374213][T16116] loop2: detected capacity change from 0 to 512 [ 312.697262][T16100] EXT4-fs error (device loop3): ext4_clear_blocks:883: inode #11: comm syz.3.7594: attempt to clear invalid blocks 983260 len 1 [ 312.809501][ C0] net_ratelimit: 119519 callbacks suppressed [ 312.809523][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 312.809548][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 312.815644][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 312.827507][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 312.839483][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 312.851451][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 312.863351][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 312.875265][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 312.887132][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 312.899277][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 313.022733][T16100] EXT4-fs (loop3): Remounting filesystem read-only [ 313.031478][T16100] EXT4-fs error (device loop3): __ext4_get_inode_loc:4509: comm syz.3.7594: Invalid inode table block 0 in block_group 0 [ 313.075469][T16116] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. [ 313.175827][T16116] ext4 filesystem being mounted at /1606/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 313.398640][T16100] EXT4-fs (loop3): Remounting filesystem read-only [ 313.451690][T16100] EXT4-fs error (device loop3) in ext4_reserve_inode_write:5917: Corrupt filesystem [ 314.351752][ T28] audit: type=1400 audit(2000000129.273:12432): avc: denied { read write open } for pid=287 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=121 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 314.731868][T16100] EXT4-fs (loop3): Remounting filesystem read-only [ 315.012388][T16100] EXT4-fs error (device loop3) in ext4_orphan_del:305: Corrupt filesystem [ 315.709012][T16128] netlink: 104 bytes leftover after parsing attributes in process `syz.4.7605'. [ 315.729155][ T286] EXT4-fs (loop2): unmounting filesystem. [ 316.426466][T16100] EXT4-fs (loop3): Remounting filesystem read-only [ 316.632339][ T28] audit: type=1400 audit(2000000129.273:12433): avc: denied { ioctl } for pid=287 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=121 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 316.678538][T16100] EXT4-fs error (device loop3): __ext4_get_inode_loc:4509: comm syz.3.7594: Invalid inode table block 0 in block_group 0 [ 316.887318][T15761] audit: audit_backlog=65 > audit_backlog_limit=64 [ 317.479110][ C0] net_ratelimit: 120228 callbacks suppressed [ 317.479133][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 317.479187][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 317.485296][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 317.497363][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 317.509397][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 317.521266][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 317.533154][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 317.545143][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 317.557133][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 317.569137][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 317.611159][T16100] EXT4-fs (loop3): Remounting filesystem read-only [ 317.617717][T16100] EXT4-fs error (device loop3) in ext4_reserve_inode_write:5917: Corrupt filesystem [ 317.657213][T15761] audit: audit_lost=256 audit_rate_limit=0 audit_backlog_limit=64 [ 317.665090][T15761] audit: backlog limit exceeded [ 317.782974][ T283] audit: audit_backlog=65 > audit_backlog_limit=64 [ 317.898991][ T283] audit: audit_lost=257 audit_rate_limit=0 audit_backlog_limit=64 [ 317.906950][ T283] audit: backlog limit exceeded [ 319.288754][T15761] audit: audit_backlog=65 > audit_backlog_limit=64 [ 319.295320][T15761] audit: audit_lost=258 audit_rate_limit=0 audit_backlog_limit=64 [ 319.312176][T16100] EXT4-fs (loop3): Remounting filesystem read-only [ 319.374762][ T283] audit: audit_backlog=65 > audit_backlog_limit=64 [ 319.615479][T16135] x_tables: ip_tables: socket match: used from hooks FORWARD, but only valid from PREROUTING/INPUT [ 319.628507][T16100] EXT4-fs error (device loop3): ext4_truncate:4314: inode #11: comm syz.3.7594: mark_inode_dirty error [ 319.741314][T16100] EXT4-fs (loop3): Remounting filesystem read-only [ 319.979365][T16100] EXT4-fs error (device loop3) in ext4_process_orphan:347: Corrupt filesystem [ 320.082277][T16137] xt_TCPMSS: path-MTU clamping only supported in FORWARD, OUTPUT and POSTROUTING hooks [ 320.993369][T16100] EXT4-fs (loop3): Remounting filesystem read-only [ 320.999971][T16100] EXT4-fs (loop3): 1 truncate cleaned up [ 321.507606][T16100] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: none. [ 321.585677][ T28] kauditd_printk_skb: 77 callbacks suppressed [ 321.585696][ T28] audit: type=1400 audit(2000000146.267:12505): avc: denied { read write } for pid=283 comm="syz-executor" name="loop1" dev="devtmpfs" ino=119 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 322.148649][ C0] net_ratelimit: 119083 callbacks suppressed [ 322.148671][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 322.148788][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 322.154790][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 322.166665][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 322.178836][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 322.190900][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 322.204061][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 322.215059][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 322.226895][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 322.238986][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 322.355157][ T287] EXT4-fs (loop3): unmounting filesystem. [ 324.191673][ T28] audit: type=1400 audit(2000000146.267:12506): avc: denied { open } for pid=283 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=119 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 326.818265][ C0] net_ratelimit: 120134 callbacks suppressed [ 326.818288][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 326.818439][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 326.824479][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 326.836726][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 326.849357][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 326.860631][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 326.872663][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 326.884850][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 326.896740][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 326.909013][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 327.518864][ T28] audit: type=1400 audit(2000000146.267:12507): avc: denied { ioctl } for pid=283 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=119 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 328.469602][T16158] netlink: 4 bytes leftover after parsing attributes in process `syz.5.7619'. [ 328.609928][T16160] xt_bpf: check failed: parse error [ 329.597945][ T28] audit: type=1400 audit(2000000146.611:12508): avc: denied { mount } for pid=16099 comm="syz.3.7594" name="/" dev="loop3" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 331.487228][ C0] net_ratelimit: 116663 callbacks suppressed [ 331.487251][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 331.487258][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 331.487306][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 331.493362][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 331.505327][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 331.517329][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 331.529466][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 331.541329][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 331.553439][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 331.565470][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 332.142465][ T28] audit: type=1326 audit(2000000146.772:12509): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16138 comm="syz.4.7611" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8eccf8ebe9 code=0x7ffc0000 [ 332.819973][T16176] audit: audit_backlog=65 > audit_backlog_limit=64 [ 333.178113][ T28] audit: type=1326 audit(2000000146.772:12510): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16138 comm="syz.4.7611" exe="/root/syz-executor" sig=0 arch=c000003e syscall=102 compat=0 ip=0x7f8eccf8ebe9 code=0x7ffc0000 [ 333.219335][T16176] audit: audit_lost=261 audit_rate_limit=0 audit_backlog_limit=64 [ 333.353386][T16176] audit: backlog limit exceeded [ 333.445586][ T285] audit: audit_backlog=65 > audit_backlog_limit=64 [ 333.481191][T16176] audit: audit_backlog=65 > audit_backlog_limit=64 [ 333.500720][ T285] audit: audit_lost=262 audit_rate_limit=0 audit_backlog_limit=64 [ 333.546625][ T28] audit: type=1326 audit(2000000146.772:12511): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16138 comm="syz.4.7611" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8eccf8ebe9 code=0x7ffc0000 [ 333.615459][T16176] audit: audit_lost=263 audit_rate_limit=0 audit_backlog_limit=64 [ 333.654215][ T285] audit: backlog limit exceeded [ 336.157228][ C0] net_ratelimit: 118245 callbacks suppressed [ 336.157250][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 336.157387][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 336.163419][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 336.175433][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 336.187737][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 336.199855][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 336.211802][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 336.223726][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 336.235586][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 336.247724][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 337.720395][ T28] kauditd_printk_skb: 82 callbacks suppressed [ 337.720413][ T28] audit: type=1400 audit(2000000163.584:12593): avc: denied { read write } for pid=283 comm="syz-executor" name="loop1" dev="devtmpfs" ino=119 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 338.087409][ T28] audit: type=1400 audit(2000000163.680:12594): avc: denied { read write open } for pid=283 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=119 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 338.214308][T16192] loop1: detected capacity change from 0 to 512 [ 338.260355][T16192] EXT4-fs: Ignoring removed oldalloc option [ 338.293623][ T28] audit: type=1400 audit(2000000163.680:12595): avc: denied { ioctl } for pid=283 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=119 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 338.414157][ T28] audit: type=1400 audit(2000000164.110:12596): avc: denied { read write } for pid=16191 comm="syz.1.7635" name="loop1" dev="devtmpfs" ino=119 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 338.454443][T16192] EXT4-fs (loop1): 1 truncate cleaned up [ 338.462998][T16192] EXT4-fs (loop1): mounted filesystem without journal. Quota mode: writeback. [ 338.648670][ T28] audit: type=1400 audit(2000000164.110:12597): avc: denied { open } for pid=16191 comm="syz.1.7635" path="/dev/loop1" dev="devtmpfs" ino=119 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 338.796497][ T283] EXT4-fs (loop1): unmounting filesystem. [ 339.496085][ T28] audit: type=1400 audit(2000000164.110:12598): avc: denied { ioctl } for pid=16191 comm="syz.1.7635" path="/dev/loop1" dev="devtmpfs" ino=119 ioctlcmd=0x4c00 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 340.826981][ C0] net_ratelimit: 123501 callbacks suppressed [ 340.827002][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 340.827005][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 340.827192][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 340.833080][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 340.845080][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 340.857089][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 340.869040][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 340.880926][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 340.892836][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 340.904798][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 341.956897][ T28] audit: type=1400 audit(2000000164.163:12599): avc: denied { mounton } for pid=16191 comm="syz.1.7635" path="/1545/file1" dev="tmpfs" ino=7851 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 343.606439][ T28] audit: type=1400 audit(2000000164.432:12600): avc: denied { mount } for pid=16191 comm="syz.1.7635" name="/" dev="loop1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 344.630529][ T28] audit: type=1400 audit(2000000164.432:12601): avc: denied { read write } for pid=16191 comm="syz.1.7635" name="loop1" dev="devtmpfs" ino=119 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 345.496593][ C1] net_ratelimit: 126889 callbacks suppressed [ 345.496616][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 345.496664][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 345.502706][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 345.514690][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 345.532968][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 345.538716][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 345.550566][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 345.562540][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 345.574614][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 345.586508][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 345.871445][ T28] audit: type=1400 audit(2000000164.432:12602): avc: denied { read write open } for pid=16191 comm="syz.1.7635" path="/dev/loop1" dev="devtmpfs" ino=119 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 346.392278][ T28] audit: type=1400 audit(2000000164.432:12603): avc: denied { ioctl } for pid=16191 comm="syz.1.7635" path="/dev/loop1" dev="devtmpfs" ino=119 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 347.939298][ T28] audit: type=1400 audit(2000000164.571:12604): avc: denied { write } for pid=16191 comm="syz.1.7635" name="/" dev="loop1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 348.578711][T16207] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 348.630972][T16207] SELinux: failed to load policy [ 348.648574][ T28] audit: type=1400 audit(2000000164.571:12605): avc: denied { add_name } for pid=16191 comm="syz.1.7635" name="file1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 349.142440][ T28] audit: type=1400 audit(2000000164.571:12606): avc: denied { create } for pid=16191 comm="syz.1.7635" name="file1" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 349.636605][ T28] audit: type=1400 audit(2000000164.571:12607): avc: denied { append } for pid=16191 comm="syz.1.7635" name="file1" dev="loop1" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 350.066025][ T28] audit: type=1400 audit(2000000164.571:12608): avc: denied { open } for pid=16191 comm="syz.1.7635" path="/1545/file1/file1" dev="loop1" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 350.166183][ C0] net_ratelimit: 120886 callbacks suppressed [ 350.166206][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 350.166238][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 350.172283][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 350.184345][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 350.196235][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 350.208340][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 350.220155][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 350.232128][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 350.244141][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 350.256089][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 350.746694][ T28] audit: type=1400 audit(2000000164.732:12609): avc: denied { unmount } for pid=283 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 350.972946][ T28] audit: type=1400 audit(2000000164.775:12610): avc: denied { read write } for pid=283 comm="syz-executor" name="loop1" dev="devtmpfs" ino=119 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 351.049789][ T28] audit: type=1400 audit(2000000164.775:12611): avc: denied { open } for pid=283 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=119 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 351.522711][ T28] audit: type=1400 audit(2000000164.775:12612): avc: denied { ioctl } for pid=283 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=119 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 351.691267][ T28] audit: type=1400 audit(2000000166.674:12613): avc: denied { read write } for pid=283 comm="syz-executor" name="loop1" dev="devtmpfs" ino=119 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 351.761167][ T28] audit: type=1400 audit(2000000166.674:12614): avc: denied { open } for pid=283 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=119 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 353.188312][T16178] netlink: 4 bytes leftover after parsing attributes in process `syz.2.7628'. [ 353.210249][T16178] netlink: 10 bytes leftover after parsing attributes in process `syz.2.7628'. [ 354.835764][ C0] net_ratelimit: 124326 callbacks suppressed [ 354.835786][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 354.835900][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 354.841855][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 354.853858][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 354.865864][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 354.877745][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 354.889612][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 354.901611][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 354.913491][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 354.925530][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 356.132586][ T28] kauditd_printk_skb: 46 callbacks suppressed [ 356.132604][ T28] audit: type=1400 audit(2000000183.336:12661): avc: denied { module_request } for pid=16214 comm="syz-executor" kmod="netdev-nr7" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 356.663150][ T28] audit: type=1400 audit(2000000183.454:12662): avc: denied { read write } for pid=283 comm="syz-executor" name="loop1" dev="devtmpfs" ino=119 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 357.194136][ T28] audit: type=1400 audit(2000000183.454:12663): avc: denied { read write open } for pid=283 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=119 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 357.810125][ T28] audit: type=1400 audit(2000000183.454:12664): avc: denied { ioctl } for pid=283 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=119 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 357.895420][ T28] audit: type=1400 audit(2000000184.302:12665): avc: denied { read write } for pid=283 comm="syz-executor" name="loop1" dev="devtmpfs" ino=119 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 357.971908][ T28] audit: type=1400 audit(2000000184.302:12666): avc: denied { open } for pid=283 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=119 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 358.055071][ T28] audit: type=1400 audit(2000000184.302:12667): avc: denied { ioctl } for pid=283 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=119 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 359.504772][ C0] net_ratelimit: 125158 callbacks suppressed [ 359.504795][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 359.504849][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 359.510895][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 359.522936][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 359.535105][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 359.546991][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 359.558856][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 359.570853][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 359.582840][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 359.594807][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 364.174927][ C0] net_ratelimit: 133453 callbacks suppressed [ 364.174948][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 364.174992][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 364.181013][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 364.193132][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 364.205023][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 364.217066][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 364.229041][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 364.241016][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 364.253268][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 364.265153][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 368.844489][ C1] net_ratelimit: 133870 callbacks suppressed [ 368.844511][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 368.844522][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 368.844572][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 368.850703][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 368.862612][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 368.874573][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 368.886691][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 368.898642][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 368.910637][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 368.922495][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 369.288945][ T28] audit: type=1400 audit(2000000197.445:12668): avc: denied { module_request } for pid=16176 comm="syz-executor" kmod="netdev-rose6" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 372.498567][ T28] audit: type=1400 audit(2000000200.889:12669): avc: denied { execmem } for pid=16224 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 372.949455][ T28] audit: type=1400 audit(2000000201.361:12670): avc: denied { read } for pid=16225 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 373.216809][ T28] audit: type=1400 audit(2000000201.361:12671): avc: denied { open } for pid=16225 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 373.291912][ T28] audit: type=1400 audit(2000000201.361:12672): avc: denied { mounton } for pid=16225 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 373.346567][ T28] audit: type=1400 audit(2000000201.361:12673): avc: denied { module_request } for pid=16225 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 373.514108][ C1] net_ratelimit: 120598 callbacks suppressed [ 373.514131][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 373.514171][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 373.520326][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 373.532234][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 373.548242][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 373.556130][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 373.568093][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 373.580003][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 373.591873][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 373.603746][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 377.003117][ T28] audit: type=1400 audit(2000000205.727:12674): avc: denied { module_request } for pid=16215 comm="syz-executor" kmod="netdev-rose8" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 377.095414][ T28] audit: type=1400 audit(2000000205.824:12675): avc: denied { module_request } for pid=16218 comm="syz-executor" kmod="netdev-rose9" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 377.391885][ T28] audit: type=1400 audit(2000000206.081:12676): avc: denied { module_request } for pid=16214 comm="syz-executor" kmod="netdev-rose7" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 378.183670][ C0] net_ratelimit: 125990 callbacks suppressed [ 378.183692][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 378.183850][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 378.189859][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 378.201849][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 378.213851][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 378.225740][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 378.237612][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 378.249605][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 378.261485][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 378.273521][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 379.892452][ T28] audit: type=1400 audit(2000000208.828:12677): avc: denied { execmem } for pid=16226 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 380.432486][ T28] audit: type=1400 audit(2000000209.407:12678): avc: denied { read } for pid=16227 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 380.532972][ T28] audit: type=1400 audit(2000000209.429:12679): avc: denied { open } for pid=16227 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 380.701352][ T28] audit: type=1400 audit(2000000209.429:12680): avc: denied { mounton } for pid=16227 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 380.757243][ T28] audit: type=1400 audit(2000000209.440:12681): avc: denied { module_request } for pid=16227 comm="syz-executor" kmod="netdev-nr6" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 382.853260][ C0] net_ratelimit: 126403 callbacks suppressed [ 382.853283][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 382.853384][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 382.859355][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 382.871343][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 382.883465][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 382.895377][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 382.907252][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 382.919327][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 382.931189][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 382.943174][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 386.790059][ T28] audit: type=1400 audit(2000000216.231:12682): avc: denied { module_request } for pid=16225 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 387.522834][ C1] net_ratelimit: 131008 callbacks suppressed [ 387.522856][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 387.522858][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 387.522912][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 387.528959][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 387.540888][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 387.553078][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 387.564808][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 387.576781][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 387.588891][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 387.600837][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 390.970394][ T28] audit: type=1400 audit(2000000220.705:12683): avc: denied { module_request } for pid=16214 comm="syz-executor" kmod="netdev-rose7" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 392.192438][ C1] net_ratelimit: 130542 callbacks suppressed [ 392.192459][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 392.192488][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 392.198660][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 392.210643][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 392.222486][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 392.234454][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 392.246437][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 392.258341][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 392.270200][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 392.282160][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 396.415269][ T28] audit: type=1400 audit(2000000226.552:12684): avc: denied { module_request } for pid=16227 comm="syz-executor" kmod="netdev-nr6" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 396.480906][ T28] audit: type=1400 audit(2000000226.585:12685): avc: denied { module_request } for pid=16225 comm="syz-executor" kmod="netdev-rose0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 396.862019][ C0] net_ratelimit: 126261 callbacks suppressed [ 396.862041][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 396.862206][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 396.868135][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 396.880036][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 396.892007][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 396.903988][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 396.915896][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 396.927837][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 396.939898][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 396.951989][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 401.092737][ T28] audit: type=1400 audit(2000000231.574:12686): avc: denied { module_request } for pid=16227 comm="syz-executor" kmod="netdev-rose6" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 401.531617][ C0] net_ratelimit: 131353 callbacks suppressed [ 401.531641][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 401.531723][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 401.537715][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 401.549938][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 401.561893][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 401.573790][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 401.585651][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 401.597639][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 401.609524][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 401.621554][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 403.459936][ T28] audit: type=1400 audit(2000000234.106:12687): avc: denied { execmem } for pid=16228 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 403.798655][ T28] audit: type=1400 audit(2000000234.481:12688): avc: denied { read } for pid=16229 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 403.852601][ T28] audit: type=1400 audit(2000000234.481:12689): avc: denied { open } for pid=16229 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 403.909294][ T28] audit: type=1400 audit(2000000234.481:12690): avc: denied { mounton } for pid=16229 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 403.957845][ T28] audit: type=1400 audit(2000000234.481:12691): avc: denied { module_request } for pid=16229 comm="syz-executor" kmod="netdev-nr7" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 404.823045][ T28] audit: type=1400 audit(2000000235.565:12692): avc: denied { execmem } for pid=16230 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 405.207071][ T28] audit: type=1400 audit(2000000235.994:12693): avc: denied { read } for pid=16231 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 405.242061][ T28] audit: type=1400 audit(2000000235.994:12694): avc: denied { open } for pid=16231 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 405.326300][ T28] audit: type=1400 audit(2000000235.994:12695): avc: denied { mounton } for pid=16231 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 406.201198][ C1] net_ratelimit: 126610 callbacks suppressed [ 406.201220][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 406.201247][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 406.207364][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 406.219297][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 406.231363][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 406.247452][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 406.255204][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 406.267172][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 406.279011][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 406.290900][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 406.763550][ T28] kauditd_printk_skb: 1 callbacks suppressed [ 406.763567][ T28] audit: type=1400 audit(2000000237.657:12697): avc: denied { execmem } for pid=16232 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 406.993228][ T28] audit: type=1400 audit(2000000237.904:12698): avc: denied { read } for pid=16233 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 407.078855][ T28] audit: type=1400 audit(2000000237.925:12699): avc: denied { open } for pid=16233 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 407.311684][ T28] audit: type=1400 audit(2000000237.925:12700): avc: denied { mounton } for pid=16233 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 407.376124][ T28] audit: type=1400 audit(2000000237.936:12701): avc: denied { module_request } for pid=16233 comm="syz-executor" kmod="netdev-nr9" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 410.870765][ C1] net_ratelimit: 129519 callbacks suppressed [ 410.870787][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 410.870796][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 410.870884][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 410.876879][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 410.888811][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 410.900975][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 410.912949][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 410.925062][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 410.944207][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 410.948794][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 410.998417][ T28] audit: type=1400 audit(2000000242.206:12702): avc: denied { module_request } for pid=16227 comm="syz-executor" kmod="netdev-rose6" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 411.165700][ T28] audit: type=1400 audit(2000000242.367:12703): avc: denied { module_request } for pid=16229 comm="syz-executor" kmod="netdev-nr7" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 415.540364][ C0] net_ratelimit: 130318 callbacks suppressed [ 415.540387][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 415.540426][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 415.546518][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 415.558515][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 415.577503][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 415.582476][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 415.594474][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 415.606403][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 415.618289][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 415.630291][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 416.563698][ T28] audit: type=1400 audit(2000000248.171:12704): avc: denied { module_request } for pid=16229 comm="syz-executor" kmod="netdev-rose7" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 417.649967][ T28] audit: type=1400 audit(2000000248.322:12705): avc: denied { module_request } for pid=16233 comm="syz-executor" kmod="netdev-rose9" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 420.209954][ C0] net_ratelimit: 125761 callbacks suppressed [ 420.209975][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 420.210041][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 420.216055][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 420.228032][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 420.240050][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 420.251928][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 420.263798][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 420.275790][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 420.287684][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 420.299703][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 424.879503][ C0] net_ratelimit: 126748 callbacks suppressed [ 424.879525][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 424.879582][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 424.885712][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 424.897581][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 424.909585][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 424.921727][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 424.933634][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 424.945514][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 424.957384][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 424.969608][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 429.549123][ C0] net_ratelimit: 126847 callbacks suppressed [ 429.549147][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 429.549203][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 429.555256][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 429.567233][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 429.579263][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 429.591212][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 429.603088][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 429.615081][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 429.626967][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 429.638992][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 430.154686][ T28] audit: type=1400 audit(2000000262.752:12706): avc: denied { execmem } for pid=16234 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 434.218690][ C0] net_ratelimit: 123977 callbacks suppressed [ 434.218711][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 434.218810][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 434.224821][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 434.236730][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 434.248700][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 434.260847][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 434.272744][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 434.284635][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 434.296520][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 434.308909][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 438.888269][ C0] net_ratelimit: 127282 callbacks suppressed [ 438.888292][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 438.888424][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 438.894371][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 438.906391][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 438.918391][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 438.930262][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 438.942226][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 438.954222][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 438.966157][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 438.978357][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 443.557875][ C1] net_ratelimit: 125487 callbacks suppressed [ 443.557896][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 443.557948][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 443.563989][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 443.576053][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 443.588169][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 443.600039][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 443.611906][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 443.623875][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 443.635864][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 443.647943][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 448.227433][ C0] net_ratelimit: 125873 callbacks suppressed [ 448.227454][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 448.227564][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 448.233561][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 448.245461][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 448.257530][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 448.269498][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 448.281407][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 448.293365][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 448.305388][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 448.317861][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 451.914345][ T28] audit: type=1400 audit(2000000286.098:12707): avc: denied { execmem } for pid=16235 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 452.897030][ C0] net_ratelimit: 123404 callbacks suppressed [ 452.897051][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 452.897086][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 452.903138][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 452.915139][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 452.927114][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 452.939153][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 452.950975][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 452.963018][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 452.975024][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 452.986904][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 457.566624][ C0] net_ratelimit: 125238 callbacks suppressed [ 457.566645][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 457.566703][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 457.572774][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 457.584648][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 457.596643][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 457.608611][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 457.620516][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 457.632391][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 457.644264][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 457.656435][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 458.418340][ T28] audit: type=1400 audit(2000000293.083:12708): avc: denied { read } for pid=16236 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 462.236222][ C1] net_ratelimit: 126407 callbacks suppressed [ 462.236244][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 462.236293][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 462.242316][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 462.254408][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 462.266527][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 462.278420][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 462.290496][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 462.302323][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 462.314677][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 462.326521][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 462.408020][ T28] audit: type=1400 audit(2000000293.287:12709): avc: denied { open } for pid=16236 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 464.410116][ T28] audit: type=1400 audit(2000000293.287:12710): avc: denied { mounton } for pid=16236 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 466.905785][ C0] net_ratelimit: 124757 callbacks suppressed [ 466.905806][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 466.905841][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 466.911884][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 466.923900][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 466.935793][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 466.947883][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 466.959693][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 466.971648][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 466.983648][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 466.995525][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 468.186341][ T28] audit: type=1400 audit(2000000293.287:12711): avc: denied { module_request } for pid=16236 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 471.575394][ C0] net_ratelimit: 125422 callbacks suppressed [ 471.575418][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 471.575502][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 471.581491][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 471.593570][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 471.605577][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 471.617440][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 471.629395][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 471.641385][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 471.653272][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 471.665299][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 473.163407][ T28] audit: type=1400 audit(2000000308.887:12712): avc: denied { module_request } for pid=16236 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 473.245034][ T43] device bridge_slave_0 left promiscuous mode [ 473.526514][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 474.224698][ T28] audit: type=1400 audit(2000000309.026:12713): avc: denied { execmem } for pid=16238 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 476.244981][ C0] net_ratelimit: 122805 callbacks suppressed [ 476.245002][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 476.245163][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 476.251083][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 476.263064][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 476.275071][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 476.287026][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 476.298910][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 476.310892][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 476.323041][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 476.335225][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 477.627369][ T28] audit: type=1400 audit(2000000309.080:12714): avc: denied { execmem } for pid=16237 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 478.734687][ T28] audit: type=1400 audit(2000000309.337:12715): avc: denied { execmem } for pid=16239 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 479.872226][ T43] device veth1_macvtap left promiscuous mode [ 480.914593][ C0] net_ratelimit: 124443 callbacks suppressed [ 480.914618][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 480.914620][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 480.914670][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 480.920692][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 480.932722][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 480.944709][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 480.956600][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 480.968459][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 480.980486][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 480.992429][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 481.531453][ T28] audit: type=1400 audit(2000000309.445:12716): avc: denied { read } for pid=16240 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 483.637665][ T28] audit: type=1400 audit(2000000309.445:12717): avc: denied { open } for pid=16240 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 485.584126][ C0] net_ratelimit: 117330 callbacks suppressed [ 485.584148][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 485.584231][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 485.590219][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 485.602331][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 485.614223][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 485.626245][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 485.638215][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 485.650193][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 485.662092][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 485.674144][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 486.340225][ T28] audit: type=1400 audit(2000000309.445:12718): avc: denied { mounton } for pid=16240 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 489.538882][ T28] audit: type=1400 audit(2000000309.445:12719): avc: denied { module_request } for pid=16240 comm="syz-executor" kmod="netdev-nr6" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 490.253726][ C1] net_ratelimit: 114555 callbacks suppressed [ 490.253750][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 490.253774][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 490.259825][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 490.271773][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 490.283762][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 490.295716][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 490.308156][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 490.320127][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 490.332084][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 490.344143][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 493.882037][ T28] audit: type=1400 audit(2000000329.411:12720): avc: denied { execmem } for pid=16241 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 494.923299][ C0] net_ratelimit: 113997 callbacks suppressed [ 494.923322][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 494.923414][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 494.929401][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 494.941504][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 494.960519][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 494.965966][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 494.978279][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 494.990918][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 495.002822][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 495.014814][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 495.811845][ T28] audit: type=1400 audit(2000000333.199:12721): avc: denied { read } for pid=16242 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 497.442874][ T28] audit: type=1400 audit(2000000333.231:12722): avc: denied { open } for pid=16242 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 497.832237][ T28] audit: type=1400 audit(2000000334.207:12723): avc: denied { mounton } for pid=16242 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 499.592888][ C0] net_ratelimit: 114302 callbacks suppressed [ 499.592910][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 499.592969][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 499.598997][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 499.610990][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 499.622996][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 499.635124][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 499.647000][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 499.659113][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 499.670888][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 499.682949][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 499.774297][ T28] audit: type=1400 audit(2000000334.207:12724): avc: denied { module_request } for pid=16242 comm="syz-executor" kmod="netdev-nr8" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 502.289660][ T28] audit: type=1400 audit(2000000335.023:12725): avc: denied { execmem } for pid=16243 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 503.211576][ T28] audit: type=1400 audit(2000000335.119:12726): avc: denied { read } for pid=16244 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 504.262492][ C0] net_ratelimit: 118205 callbacks suppressed [ 504.262515][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 504.262668][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 504.268582][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 504.280600][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 504.292594][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 504.304462][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 504.316509][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 504.328675][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 504.340552][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 504.352540][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 506.518056][ T28] audit: type=1400 audit(2000000335.119:12727): avc: denied { read open } for pid=16244 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 508.571069][ T28] audit: type=1400 audit(2000000335.119:12728): avc: denied { mounton } for pid=16244 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 508.932107][ C0] net_ratelimit: 119210 callbacks suppressed [ 508.932130][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 508.932192][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 508.938199][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 508.950325][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 508.962302][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 508.974169][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 508.986128][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 508.998091][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 509.010093][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 509.022061][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 511.302261][ T28] audit: type=1400 audit(2000000335.280:12729): avc: denied { module_request } for pid=16244 comm="syz-executor" kmod="netdev-nr9" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 513.601696][ C0] net_ratelimit: 120413 callbacks suppressed [ 513.601718][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 513.601761][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 513.607784][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 513.619772][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 513.631909][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 513.643782][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 513.655663][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 513.667754][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 513.679614][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 513.691756][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 514.806835][ T28] audit: type=1400 audit(2000000335.302:12730): avc: denied { read } for pid=16245 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 517.726249][ T28] audit: type=1400 audit(2000000335.302:12731): avc: denied { open } for pid=16245 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 518.271233][ C0] net_ratelimit: 119159 callbacks suppressed [ 518.271255][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 518.271292][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 518.277369][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 518.289366][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 518.301421][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 518.313598][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 518.325665][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 518.337504][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 518.349490][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 518.361584][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 518.788170][ T28] audit: type=1400 audit(2000000335.302:12732): avc: denied { mounton } for pid=16245 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 519.427816][ T28] audit: type=1400 audit(2000000335.302:12733): avc: denied { module_request } for pid=16245 comm="syz-executor" kmod="netdev-nr7" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 522.940800][ C1] net_ratelimit: 126228 callbacks suppressed [ 522.940823][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 522.940828][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 522.940901][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 522.947164][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 522.959215][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 522.971173][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 522.983095][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 522.995154][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 523.006928][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 523.018899][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 527.610401][ C0] net_ratelimit: 128610 callbacks suppressed [ 527.610422][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 527.610426][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 527.610526][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 527.616609][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 527.628514][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 527.640379][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 527.652343][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 527.664356][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 527.676504][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 527.688274][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 528.039493][ T28] audit: type=1400 audit(2000000347.436:12734): avc: denied { read } for pid=16246 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 532.280029][ C0] net_ratelimit: 127673 callbacks suppressed [ 532.280052][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 532.280052][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 532.280221][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 532.286134][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 532.298212][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 532.310203][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 532.322323][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 532.334209][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 532.346358][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 532.358521][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 535.200126][ T28] audit: type=1400 audit(2000000347.436:12735): avc: denied { open } for pid=16246 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 536.949576][ C0] net_ratelimit: 128452 callbacks suppressed [ 536.949598][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 536.949632][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 536.955704][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 536.967889][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 536.979702][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 536.991660][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 537.003661][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 537.015634][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 537.027504][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 537.039472][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 538.367825][ T28] audit: type=1400 audit(2000000347.436:12736): avc: denied { mounton } for pid=16246 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 541.352448][ T28] audit: type=1400 audit(2000000347.436:12737): avc: denied { module_request } for pid=16246 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 541.619140][ C1] net_ratelimit: 129446 callbacks suppressed [ 541.619161][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 541.619162][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 541.619237][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 541.625350][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 541.637277][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 541.649221][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 541.661206][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 541.673172][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 541.685022][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 541.696998][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 546.288744][ C0] net_ratelimit: 129673 callbacks suppressed [ 546.288765][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 546.288825][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 546.294862][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 546.306753][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 546.318798][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 546.330883][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 546.342756][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 546.354610][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 546.366592][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 546.378566][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 550.958332][ C1] net_ratelimit: 129735 callbacks suppressed [ 550.958354][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 550.958406][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 550.964606][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 550.976720][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 550.988704][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 551.000540][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 551.012517][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 551.024611][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 551.036488][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 551.048351][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 555.371670][ T28] audit: type=1400 audit(2000000397.101:12738): avc: denied { read } for pid=16249 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 555.627888][ C0] net_ratelimit: 127879 callbacks suppressed [ 555.627909][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 555.627934][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 555.634169][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 555.646059][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 555.658014][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 555.670044][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 555.681897][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 555.693781][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 555.705644][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 555.717690][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 557.474237][ T28] audit: type=1400 audit(2000000397.133:12739): avc: denied { open } for pid=16249 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 559.646992][ T28] audit: type=1400 audit(2000000401.682:12740): avc: denied { execmem } for pid=16248 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 560.297471][ C0] net_ratelimit: 129810 callbacks suppressed [ 560.297494][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 560.297501][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 560.303658][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 560.315676][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 560.327573][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 560.339523][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 560.351353][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 560.363350][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 560.375241][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 560.387268][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 564.967096][ C0] net_ratelimit: 128728 callbacks suppressed [ 564.967117][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 564.967152][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 564.973227][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 564.985095][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 564.997152][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 565.009418][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 565.021291][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 565.033123][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 565.045197][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 565.057174][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 569.636644][ C1] net_ratelimit: 128799 callbacks suppressed [ 569.636673][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 569.636667][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 569.636750][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 569.642911][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 569.654880][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 569.666757][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 569.679162][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 569.691150][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 569.703057][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 569.714908][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 570.614117][ T28] audit: type=1400 audit(2000000413.452:12741): avc: denied { execmem } for pid=16250 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 572.172397][ T28] audit: type=1400 audit(2000000413.666:12742): avc: denied { mounton } for pid=16249 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 574.306229][ C0] net_ratelimit: 127410 callbacks suppressed [ 574.306252][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 574.306314][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 574.312348][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 574.324362][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 574.336347][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 574.348452][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 574.360280][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 574.372138][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 574.384116][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 574.396108][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 578.975861][ C1] net_ratelimit: 127449 callbacks suppressed [ 578.975886][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 578.975901][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 578.975981][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 578.982109][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 578.993970][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 579.005874][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 579.018024][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 579.029965][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 579.041851][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 579.054036][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 579.496972][ T28] audit: type=1400 audit(2000000422.979:12743): avc: denied { module_request } for pid=16249 comm="syz-executor" kmod="netdev-nr6" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 583.645425][ C0] net_ratelimit: 128196 callbacks suppressed [ 583.645448][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 583.645554][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 583.651537][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 583.663532][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 583.675545][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 583.687411][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 583.699277][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 583.711265][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 583.723259][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 583.735124][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 584.106092][ T28] audit: type=1400 audit(2000000427.925:12744): avc: denied { execmem } for pid=16251 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 588.315007][ C1] net_ratelimit: 128621 callbacks suppressed [ 588.315030][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 588.315057][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 588.321113][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 588.333056][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 588.344967][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 588.356907][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 588.369128][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 588.380981][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 588.392923][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 588.404781][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 590.731215][ T29] INFO: task kworker/u4:4:355 blocked for more than 122 seconds. [ 590.878499][ T29] Not tainted syzkaller #0 [ 590.883483][ T29] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 591.397843][ T29] task:kworker/u4:4 state:D stack:21472 pid:355 ppid:2 flags:0x00004000 [ 591.407231][ T29] Workqueue: events_unbound linkwatch_event [ 591.413210][ T29] Call Trace: [ 591.416506][ T29] [ 591.419461][ T29] __schedule+0xb87/0x14e0 [ 591.423903][ T29] ? release_firmware_map_entry+0x194/0x194 [ 591.430023][ T29] ? __mutex_add_waiter+0xc7/0x270 [ 591.435169][ T29] ? __kasan_check_write+0x14/0x20 [ 591.440339][ T29] ? kthread_data+0x50/0xc0 [ 591.444880][ T29] ? wq_worker_sleeping+0x64/0x280 [ 591.450033][ T29] schedule+0xbd/0x170 [ 591.454119][ T29] schedule_preempt_disabled+0x13/0x20 [ 591.459637][ T29] __mutex_lock+0x74a/0x16d0 [ 591.464253][ T29] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 591.471136][ T29] ? __kasan_check_write+0x14/0x20 [ 591.476317][ T29] ? __switch_to+0x51f/0xe30 [ 591.480930][ T29] ? __cfi___switch_to+0x10/0x10 [ 591.485993][ T29] ? _raw_spin_unlock+0x4c/0x70 [ 591.490856][ T29] __mutex_lock_slowpath+0xe/0x10 [ 591.495911][ T29] mutex_lock+0xf8/0x1a0 [ 591.500164][ T29] ? __cfi_mutex_lock+0x10/0x10 [ 591.505045][ T29] ? __schedule+0xb8f/0x14e0 [ 591.509646][ T29] ? __cfi__raw_spin_lock_irq+0x10/0x10 [ 591.515275][ T29] rtnl_lock+0x15/0x20 [ 591.519405][ T29] linkwatch_event+0xe/0x60 [ 591.523996][ T29] process_one_work+0x71f/0xc40 [ 591.528861][ T29] worker_thread+0xa29/0x11f0 [ 591.533578][ T29] kthread+0x281/0x320 [ 591.537673][ T29] ? __cfi_worker_thread+0x10/0x10 [ 591.542809][ T29] ? __cfi_kthread+0x10/0x10 [ 591.547419][ T29] ret_from_fork+0x1f/0x30 [ 591.551982][ T29] [ 592.950898][ T29] INFO: task syz-executor:16215 blocked for more than 125 seconds. [ 592.984595][ C0] net_ratelimit: 124868 callbacks suppressed [ 592.984617][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 592.984702][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 592.990685][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 593.002662][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 593.014667][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 593.026544][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 593.038421][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 593.050748][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 593.062838][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 593.074701][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 593.424962][ T29] Not tainted syzkaller #0 [ 593.429959][ T29] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 593.438672][ T29] task:syz-executor state:D stack:25968 pid:16215 ppid:1 flags:0x00004004 [ 593.447944][ T29] Call Trace: [ 593.451270][ T29] [ 593.454220][ T29] __schedule+0xb87/0x14e0 [ 593.458837][ T29] ? release_firmware_map_entry+0x194/0x194 [ 593.464802][ T29] ? __mutex_add_waiter+0xc7/0x270 [ 593.469955][ T29] ? __kasan_check_write+0x14/0x20 [ 593.475091][ T29] ? trace_contention_begin+0xa0/0xa0 [ 593.480522][ T29] schedule+0xbd/0x170 [ 593.484605][ T29] schedule_preempt_disabled+0x13/0x20 [ 593.490102][ T29] __mutex_lock+0x74a/0x16d0 [ 593.494706][ T29] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 593.501501][ T29] ? slab_free_freelist_hook+0xc2/0x190 [ 593.507099][ T29] ? kfree_const+0x39/0x40 [ 593.511541][ T29] ? __kmem_cache_free+0xb7/0x1b0 [ 593.516598][ T29] ? __cfi_device_release+0x10/0x10 [ 593.521808][ T29] ? kobject_put+0x93/0x280 [ 593.526345][ T29] ? __cfi_device_release+0x10/0x10 [ 593.531560][ T29] ? kobject_put+0x227/0x280 [ 593.536193][ T29] ? netdev_run_todo+0xb9b/0xc00 [ 593.541151][ T29] __mutex_lock_slowpath+0xe/0x10 [ 593.546214][ T29] mutex_lock+0xf8/0x1a0 [ 593.550469][ T29] ? __cfi_mutex_lock+0x10/0x10 [ 593.555356][ T29] ? __cfi_unregister_netdevice_queue+0x10/0x10 [ 593.561611][ T29] ? mutex_lock+0xf8/0x1a0 [ 593.566078][ T29] ? __cfi_mutex_lock+0x10/0x10 [ 593.570950][ T29] rtnl_lock+0x15/0x20 [ 593.575060][ T29] ip_tunnel_delete_nets+0xca/0x390 [ 593.580282][ T29] ? __cfi_ip_tunnel_delete_nets+0x10/0x10 [ 593.586130][ T29] ? __cfi_xfrmi_exit_batch_net+0x10/0x10 [ 593.591891][ T29] ipip_exit_batch_net+0x22/0x30 [ 593.596852][ T29] ? __cfi_ipip_exit_batch_net+0x10/0x10 [ 593.602523][ T29] setup_net+0x8cb/0xcb0 [ 593.606783][ T29] ? copy_net_ns+0x5c0/0x5c0 [ 593.611416][ T29] ? kasan_save_alloc_info+0x25/0x30 [ 593.616722][ T29] ? kmalloc_trace+0x40/0xb0 [ 593.621362][ T29] copy_net_ns+0x355/0x5c0 [ 593.625793][ T29] create_new_namespaces+0x3a2/0x660 [ 593.631118][ T29] unshare_nsproxy_namespaces+0x120/0x170 [ 593.636872][ T29] ksys_unshare+0x4ac/0x7b0 [ 593.641392][ T29] ? __cfi_ksys_unshare+0x10/0x10 [ 593.646469][ T29] ? fpregs_restore_userregs+0x128/0x260 [ 593.652205][ T29] __x64_sys_unshare+0x38/0x40 [ 593.657010][ T29] x64_sys_call+0x767/0x9a0 [ 593.661530][ T29] do_syscall_64+0x4c/0xa0 [ 593.665970][ T29] ? clear_bhb_loop+0x30/0x80 [ 593.670667][ T29] ? clear_bhb_loop+0x30/0x80 [ 593.675391][ T29] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 593.681317][ T29] RIP: 0033:0x7f4acc3903e7 [ 593.685847][ T29] RSP: 002b:00007ffdb3da0a28 EFLAGS: 00000202 ORIG_RAX: 0000000000000110 [ 593.694292][ T29] RAX: ffffffffffffffda RBX: 00007f4acc5c5f40 RCX: 00007f4acc3903e7 [ 593.702393][ T29] RDX: 0000000000000005 RSI: 00007ffdb3da08f0 RDI: 0000000040000000 [ 593.710489][ T29] RBP: 00007f4acc5c67b8 R08: 00007f4acd0f7d60 R09: 0000000000000000 [ 593.718516][ T29] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000008 [ 593.726514][ T29] R13: 0000000000000003 R14: 0000000000000009 R15: 0000000000000000 [ 593.734526][ T29] [ 594.021069][ T28] audit: type=1400 audit(2000000438.568:12745): avc: denied { execmem } for pid=16252 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 594.142026][ T29] INFO: task syz-executor:16225 blocked for more than 126 seconds. [ 594.667358][ T29] Not tainted syzkaller #0 [ 594.672379][ T29] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 594.681108][ T29] task:syz-executor state:D stack:26056 pid:16225 ppid:1 flags:0x00004004 [ 594.690397][ T29] Call Trace: [ 594.693696][ T29] [ 594.696639][ T29] __schedule+0xb87/0x14e0 [ 594.701090][ T29] ? release_firmware_map_entry+0x194/0x194 [ 594.707007][ T29] ? __mutex_add_waiter+0xc7/0x270 [ 594.712157][ T29] ? __kasan_check_write+0x14/0x20 [ 594.717290][ T29] ? trace_contention_begin+0xa0/0xa0 [ 594.722718][ T29] ? kernel_text_address+0xa0/0xd0 [ 594.727866][ T29] schedule+0xbd/0x170 [ 594.731951][ T29] schedule_preempt_disabled+0x13/0x20 [ 594.737446][ T29] __mutex_lock+0x74a/0x16d0 [ 594.742060][ T29] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 594.748855][ T29] ? __stack_depot_save+0x36/0x480 [ 594.753983][ T29] ? kasan_set_track+0x60/0x70 [ 594.758782][ T29] ? kasan_save_alloc_info+0x25/0x30 [ 594.764092][ T29] ? __kasan_kmalloc+0x95/0xb0 [ 594.768882][ T29] ? __kmalloc+0xb1/0x1e0 [ 594.773233][ T29] ? unshare_nsproxy_namespaces+0x120/0x170 [ 594.779173][ T29] ? ksys_unshare+0x4ac/0x7b0 [ 594.783940][ T29] ? __x64_sys_unshare+0x38/0x40 [ 594.788905][ T29] ? x64_sys_call+0x767/0x9a0 [ 594.793616][ T29] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 594.799711][ T29] __mutex_lock_slowpath+0xe/0x10 [ 594.804772][ T29] mutex_lock+0xf8/0x1a0 [ 594.809030][ T29] ? __cfi_mutex_lock+0x10/0x10 [ 594.813940][ T29] rtnl_lock+0x15/0x20 [ 594.818030][ T29] ip_tunnel_init_net+0x2e3/0x7d0 [ 594.823095][ T29] ? __cfi_ip_tunnel_init_net+0x10/0x10 [ 594.828662][ T29] ? kasan_save_alloc_info+0x25/0x30 [ 594.833991][ T29] ? __kasan_kmalloc+0x95/0xb0 [ 594.838782][ T29] vti_init_net+0x2f/0x140 [ 594.843236][ T29] ops_init+0x1c8/0x4a0 [ 594.847409][ T29] setup_net+0x4ab/0xcb0 [ 594.851681][ T29] ? copy_net_ns+0x5c0/0x5c0 [ 594.856283][ T29] ? kasan_save_alloc_info+0x25/0x30 [ 594.861602][ T29] ? kmalloc_trace+0x40/0xb0 [ 594.866213][ T29] copy_net_ns+0x355/0x5c0 [ 594.870659][ T29] create_new_namespaces+0x3a2/0x660 [ 594.875973][ T29] unshare_nsproxy_namespaces+0x120/0x170 [ 594.881740][ T29] ksys_unshare+0x4ac/0x7b0 [ 594.886289][ T29] ? __cfi_ksys_unshare+0x10/0x10 [ 594.891340][ T29] ? fpregs_restore_userregs+0x128/0x260 [ 594.897011][ T29] __x64_sys_unshare+0x38/0x40 [ 594.901792][ T29] x64_sys_call+0x767/0x9a0 [ 594.906360][ T29] do_syscall_64+0x4c/0xa0 [ 594.910792][ T29] ? clear_bhb_loop+0x30/0x80 [ 594.915590][ T29] ? clear_bhb_loop+0x30/0x80 [ 594.920281][ T29] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 594.926292][ T29] RIP: 0033:0x7f91eff903e7 [ 594.930722][ T29] RSP: 002b:00007ffe3d51c808 EFLAGS: 00000206 ORIG_RAX: 0000000000000110 [ 594.939171][ T29] RAX: ffffffffffffffda RBX: 00007f91f01c5f40 RCX: 00007f91eff903e7 [ 594.947210][ T29] RDX: 0000000000000005 RSI: 00007ffe3d51c6d0 RDI: 0000000040000000 [ 594.955249][ T29] RBP: 00007f91f01c67b8 R08: 00007f91f0cf7d60 R09: 0000000000000000 [ 594.963266][ T29] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000008 [ 594.971278][ T29] R13: 0000000000000003 R14: 0000000000000009 R15: 0000000000000000 [ 594.979298][ T29] [ 595.249801][ T29] INFO: task syz-executor:16227 blocked for more than 127 seconds. [ 595.257758][ T29] Not tainted syzkaller #0 [ 595.962279][ T29] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 595.971072][ T29] task:syz-executor state:D stack:27072 pid:16227 ppid:1 flags:0x00004004 [ 595.980367][ T29] Call Trace: [ 595.980718][ T28] audit: type=1400 audit(2000000438.611:12746): avc: denied { execmem } for pid=16253 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 595.983659][ T29] [ 596.006357][ T29] __schedule+0xb87/0x14e0 [ 596.010899][ T29] ? release_firmware_map_entry+0x194/0x194 [ 596.016825][ T29] ? __kasan_check_write+0x14/0x20 [ 596.021968][ T29] ? _raw_spin_lock+0x8e/0xe0 [ 596.026741][ T29] ? __cfi__raw_spin_lock+0x10/0x10 [ 596.031968][ T29] ? unshare_nsproxy_namespaces+0x120/0x170 [ 596.037935][ T29] ? __x64_sys_unshare+0x38/0x40 [ 596.042933][ T29] schedule+0xbd/0x170 [ 596.047106][ T29] schedule_preempt_disabled+0x13/0x20 [ 596.052607][ T29] __mutex_lock+0x74a/0x16d0 [ 596.057215][ T29] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 596.064026][ T29] ? debug_smp_processor_id+0x17/0x20 [ 596.069435][ T29] ? kasan_quarantine_put+0x34/0x190 [ 596.074735][ T29] ? ____kasan_slab_free+0x13d/0x180 [ 596.080074][ T29] ? __kasan_slab_free+0x11/0x20 [ 596.085031][ T29] ? slab_free_freelist_hook+0xc2/0x190 [ 596.090622][ T29] __mutex_lock_slowpath+0xe/0x10 [ 596.095669][ T29] mutex_lock+0xf8/0x1a0 [ 596.100023][ T29] ? __cfi_mutex_lock+0x10/0x10 [ 596.104892][ T29] ? kfree+0x6f/0xf0 [ 596.108829][ T29] rtnl_lock+0x15/0x20 [ 596.112925][ T29] wg_netns_pre_exit+0x1e/0x180 [ 596.117823][ T29] setup_net+0x735/0xcb0 [ 596.122081][ T29] ? copy_net_ns+0x5c0/0x5c0 [ 596.126705][ T29] ? kasan_save_alloc_info+0x25/0x30 [ 596.132009][ T29] ? kmalloc_trace+0x40/0xb0 [ 596.136644][ T29] copy_net_ns+0x355/0x5c0 [ 596.141080][ T29] create_new_namespaces+0x3a2/0x660 [ 596.146407][ T29] unshare_nsproxy_namespaces+0x120/0x170 [ 596.152146][ T29] ksys_unshare+0x4ac/0x7b0 [ 596.156717][ T29] ? __cfi_ksys_unshare+0x10/0x10 [ 596.161786][ T29] ? fpregs_restore_userregs+0x128/0x260 [ 596.167492][ T29] __x64_sys_unshare+0x38/0x40 [ 596.172347][ T29] x64_sys_call+0x767/0x9a0 [ 596.176869][ T29] do_syscall_64+0x4c/0xa0 [ 596.181299][ T29] ? clear_bhb_loop+0x30/0x80 [ 596.186013][ T29] ? clear_bhb_loop+0x30/0x80 [ 596.190736][ T29] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 596.196647][ T29] RIP: 0033:0x7f33a3f903e7 [ 596.201126][ T29] RSP: 002b:00007ffd3b28b7d8 EFLAGS: 00000202 ORIG_RAX: 0000000000000110 [ 596.209582][ T29] RAX: ffffffffffffffda RBX: 00007f33a41c5f40 RCX: 00007f33a3f903e7 [ 596.217570][ T29] RDX: 0000000000000005 RSI: 00007ffd3b28b6a0 RDI: 0000000040000000 [ 596.225608][ T29] RBP: 00007f33a41c67b8 R08: 00007f33a4cf7d60 R09: 0000000000000000 [ 596.233642][ T29] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000008 [ 596.241650][ T29] R13: 0000000000000003 R14: 0000000000000009 R15: 0000000000000000 [ 596.249675][ T29] [ 596.714545][ T29] INFO: task syz-executor:16229 blocked for more than 129 seconds. [ 597.193194][ T29] Not tainted syzkaller #0 [ 597.198387][ T29] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 597.207122][ T29] task:syz-executor state:D stack:26656 pid:16229 ppid:1 flags:0x00004004 [ 597.216409][ T29] Call Trace: [ 597.219703][ T29] [ 597.222666][ T29] __schedule+0xb87/0x14e0 [ 597.227123][ T29] ? release_firmware_map_entry+0x194/0x194 [ 597.233046][ T29] ? __mutex_add_waiter+0xc7/0x270 [ 597.238297][ T29] ? __kasan_check_write+0x14/0x20 [ 597.243456][ T29] ? trace_contention_begin+0xa0/0xa0 [ 597.248894][ T29] ? kernel_text_address+0xa0/0xd0 [ 597.254040][ T29] schedule+0xbd/0x170 [ 597.258122][ T29] schedule_preempt_disabled+0x13/0x20 [ 597.263609][ T29] __mutex_lock+0x74a/0x16d0 [ 597.268223][ T29] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 597.275039][ T29] ? __stack_depot_save+0x36/0x480 [ 597.280164][ T29] ? __kasan_check_write+0x14/0x20 [ 597.285313][ T29] ? kasan_set_track+0x60/0x70 [ 597.290090][ T29] ? kasan_save_alloc_info+0x25/0x30 [ 597.295411][ T29] ? __kasan_kmalloc+0x95/0xb0 [ 597.300202][ T29] ? __kmalloc+0xb1/0x1e0 [ 597.304559][ T29] ? unshare_nsproxy_namespaces+0x120/0x170 [ 597.310489][ T29] ? ksys_unshare+0x4ac/0x7b0 [ 597.315201][ T29] ? __x64_sys_unshare+0x38/0x40 [ 597.320177][ T29] ? x64_sys_call+0x767/0x9a0 [ 597.324877][ T29] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 597.331005][ T29] __mutex_lock_slowpath+0xe/0x10 [ 597.336060][ T29] mutex_lock+0xf8/0x1a0 [ 597.340358][ T29] ? __cfi_mutex_lock+0x10/0x10 [ 597.345322][ T29] rtnl_lock+0x15/0x20 [ 597.349442][ T29] ip_tunnel_init_net+0x2e3/0x7d0 [ 597.354497][ T29] ? __cfi_ip_tunnel_init_net+0x10/0x10 [ 597.360106][ T29] ? kasan_save_alloc_info+0x25/0x30 [ 597.365440][ T29] ? __kasan_kmalloc+0x95/0xb0 [ 597.370226][ T29] ? ops_init+0x89/0x4a0 [ 597.374538][ T29] erspan_init_net+0x29/0x30 [ 597.379848][ T29] ops_init+0x1c8/0x4a0 [ 597.384085][ T29] setup_net+0x4ab/0xcb0 [ 597.388356][ T29] ? copy_net_ns+0x5c0/0x5c0 [ 597.392961][ T29] ? kasan_save_alloc_info+0x25/0x30 [ 597.398516][ T29] ? kmalloc_trace+0x40/0xb0 [ 597.403145][ T29] copy_net_ns+0x355/0x5c0 [ 597.407623][ T29] create_new_namespaces+0x3a2/0x660 [ 597.412944][ T29] unshare_nsproxy_namespaces+0x120/0x170 [ 597.418681][ T29] ksys_unshare+0x4ac/0x7b0 [ 597.423225][ T29] ? __cfi_ksys_unshare+0x10/0x10 [ 597.428374][ T29] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 597.434477][ T29] __x64_sys_unshare+0x38/0x40 [ 597.439268][ T29] x64_sys_call+0x767/0x9a0 [ 597.443819][ T29] do_syscall_64+0x4c/0xa0 [ 597.448255][ T29] ? clear_bhb_loop+0x30/0x80 [ 597.452962][ T29] ? clear_bhb_loop+0x30/0x80 [ 597.457657][ T29] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 597.463585][ T29] RIP: 0033:0x7f8087f903e7 [ 597.468023][ T29] RSP: 002b:00007ffcf7e4efc8 EFLAGS: 00000202 ORIG_RAX: 0000000000000110 [ 597.476453][ T29] RAX: ffffffffffffffda RBX: 00007f80881c5f40 RCX: 00007f8087f903e7 [ 597.484715][ T29] RDX: 0000000000000005 RSI: 00007ffcf7e4ee90 RDI: 0000000040000000 [ 597.492718][ T29] RBP: 00007f80881c67b8 R08: 00007f8088cf7d60 R09: 0000000000000000 [ 597.500837][ T29] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000008 [ 597.508836][ T29] R13: 0000000000000003 R14: 0000000000000009 R15: 0000000000000000 [ 597.516927][ T29] [ 597.533616][ T29] INFO: task syz-executor:16231 blocked for more than 130 seconds. [ 597.541545][ T29] Not tainted syzkaller #0 [ 597.561555][ T29] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 597.654157][ C0] net_ratelimit: 111278 callbacks suppressed [ 597.654178][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 597.654216][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 597.660278][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 597.672241][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 597.684035][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 597.696037][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 597.707911][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 597.719866][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 597.731755][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 597.743936][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 597.861243][ T29] task:syz-executor state:D stack:26704 pid:16231 ppid:1 flags:0x00004004 [ 598.086999][ T29] Call Trace: [ 598.090339][ T29] [ 598.093315][ T29] __schedule+0xb87/0x14e0 [ 598.097755][ T29] ? release_firmware_map_entry+0x194/0x194 [ 598.103702][ T29] ? __mutex_add_waiter+0xc7/0x270 [ 598.108833][ T29] ? __kasan_check_write+0x14/0x20 [ 598.114005][ T29] ? trace_contention_begin+0xa0/0xa0 [ 598.119397][ T29] ? kernel_text_address+0xa0/0xd0 [ 598.124824][ T29] schedule+0xbd/0x170 [ 598.128914][ T29] schedule_preempt_disabled+0x13/0x20 [ 598.134406][ T29] __mutex_lock+0x74a/0x16d0 [ 598.139245][ T29] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 598.146133][ T29] ? __stack_depot_save+0x36/0x480 [ 598.151321][ T29] ? kasan_set_track+0x60/0x70 [ 598.156112][ T29] ? kasan_save_alloc_info+0x25/0x30 [ 598.161440][ T29] ? __kasan_kmalloc+0x95/0xb0 [ 598.166223][ T29] ? __kmalloc+0xb1/0x1e0 [ 598.170620][ T29] ? unshare_nsproxy_namespaces+0x120/0x170 [ 598.176556][ T29] ? ksys_unshare+0x4ac/0x7b0 [ 598.181263][ T29] ? __x64_sys_unshare+0x38/0x40 [ 598.186275][ T29] ? x64_sys_call+0x767/0x9a0 [ 598.190973][ T29] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 598.197101][ T29] __mutex_lock_slowpath+0xe/0x10 [ 598.202176][ T29] mutex_lock+0xf8/0x1a0 [ 598.206455][ T29] ? __cfi_mutex_lock+0x10/0x10 [ 598.211322][ T29] rtnl_lock+0x15/0x20 [ 598.215427][ T29] ip_tunnel_init_net+0x2e3/0x7d0 [ 598.220469][ T29] ? __cfi_ip_tunnel_init_net+0x10/0x10 [ 598.226067][ T29] ? kasan_save_alloc_info+0x25/0x30 [ 598.231378][ T29] ? __kasan_kmalloc+0x95/0xb0 [ 598.236199][ T29] vti_init_net+0x2f/0x140 [ 598.240636][ T29] ops_init+0x1c8/0x4a0 [ 598.244826][ T29] setup_net+0x4ab/0xcb0 [ 598.249087][ T29] ? copy_net_ns+0x5c0/0x5c0 [ 598.253717][ T29] ? kasan_save_alloc_info+0x25/0x30 [ 598.259031][ T29] ? kmalloc_trace+0x40/0xb0 [ 598.263683][ T29] copy_net_ns+0x355/0x5c0 [ 598.268126][ T29] create_new_namespaces+0x3a2/0x660 [ 598.273494][ T29] unshare_nsproxy_namespaces+0x120/0x170 [ 598.279289][ T29] ksys_unshare+0x4ac/0x7b0 [ 598.283839][ T29] ? __cfi_ksys_unshare+0x10/0x10 [ 598.288911][ T29] ? fpregs_restore_userregs+0x128/0x260 [ 598.294571][ T29] __x64_sys_unshare+0x38/0x40 [ 598.299380][ T29] x64_sys_call+0x767/0x9a0 [ 598.303910][ T29] do_syscall_64+0x4c/0xa0 [ 598.308363][ T29] ? clear_bhb_loop+0x30/0x80 [ 598.313066][ T29] ? clear_bhb_loop+0x30/0x80 [ 598.317774][ T29] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 598.323691][ T29] RIP: 0033:0x7fcfeeb903e7 [ 598.328136][ T29] RSP: 002b:00007ffdbf4d0328 EFLAGS: 00000202 ORIG_RAX: 0000000000000110 [ 598.336627][ T29] RAX: ffffffffffffffda RBX: 00007fcfeedc5f40 RCX: 00007fcfeeb903e7 [ 598.344639][ T29] RDX: 0000000000000005 RSI: 00007ffdbf4d01f0 RDI: 0000000040000000 [ 598.352626][ T29] RBP: 00007fcfeedc67b8 R08: 00007fcfef8f7d60 R09: 0000000000000000 [ 598.360633][ T29] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000008 [ 598.368637][ T29] R13: 0000000000000003 R14: 0000000000000009 R15: 0000000000000000 [ 598.376638][ T29] [ 598.420059][ T29] INFO: task syz-executor:16233 blocked for more than 131 seconds. [ 599.276469][ T29] Not tainted syzkaller #0 [ 599.281473][ T29] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 599.290238][ T29] task:syz-executor state:D stack:26816 pid:16233 ppid:1 flags:0x00004004 [ 599.299601][ T29] Call Trace: [ 599.302907][ T29] [ 599.305870][ T29] __schedule+0xb87/0x14e0 [ 599.310315][ T29] ? release_firmware_map_entry+0x194/0x194 [ 599.316269][ T29] ? __mutex_add_waiter+0xc7/0x270 [ 599.321404][ T29] ? __kasan_check_write+0x14/0x20 [ 599.326557][ T29] ? trace_contention_begin+0xa0/0xa0 [ 599.331970][ T29] ? kernel_text_address+0xa0/0xd0 [ 599.337097][ T29] schedule+0xbd/0x170 [ 599.341206][ T29] schedule_preempt_disabled+0x13/0x20 [ 599.346678][ T29] __mutex_lock+0x74a/0x16d0 [ 599.351303][ T29] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 599.358080][ T29] ? __stack_depot_save+0x36/0x480 [ 599.363228][ T29] ? kasan_set_track+0x60/0x70 [ 599.368005][ T29] ? kasan_save_alloc_info+0x25/0x30 [ 599.373329][ T29] ? __kasan_kmalloc+0x95/0xb0 [ 599.378106][ T29] ? __kmalloc+0xb1/0x1e0 [ 599.382494][ T29] ? unshare_nsproxy_namespaces+0x120/0x170 [ 599.388429][ T29] ? ksys_unshare+0x4ac/0x7b0 [ 599.393126][ T29] ? __x64_sys_unshare+0x38/0x40 [ 599.398112][ T29] ? x64_sys_call+0x767/0x9a0 [ 599.402977][ T29] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 599.409349][ T29] __mutex_lock_slowpath+0xe/0x10 [ 599.414389][ T29] mutex_lock+0xf8/0x1a0 [ 599.418661][ T29] ? __cfi_mutex_lock+0x10/0x10 [ 599.423526][ T29] rtnl_lock+0x15/0x20 [ 599.427651][ T29] ip_tunnel_init_net+0x2e3/0x7d0 [ 599.432689][ T29] ? __cfi_ip_tunnel_init_net+0x10/0x10 [ 599.438266][ T29] ? kasan_save_alloc_info+0x25/0x30 [ 599.443585][ T29] ? __kasan_kmalloc+0x95/0xb0 [ 599.448362][ T29] ? ops_init+0x89/0x4a0 [ 599.452632][ T29] erspan_init_net+0x29/0x30 [ 599.457312][ T29] ops_init+0x1c8/0x4a0 [ 599.461485][ T29] setup_net+0x4ab/0xcb0 [ 599.465839][ T29] ? copy_net_ns+0x5c0/0x5c0 [ 599.470542][ T29] ? kasan_save_alloc_info+0x25/0x30 [ 599.475865][ T29] ? kmalloc_trace+0x40/0xb0 [ 599.480575][ T29] copy_net_ns+0x355/0x5c0 [ 599.485022][ T29] create_new_namespaces+0x3a2/0x660 [ 599.490356][ T29] unshare_nsproxy_namespaces+0x120/0x170 [ 599.496094][ T29] ksys_unshare+0x4ac/0x7b0 [ 599.500635][ T29] ? __cfi_ksys_unshare+0x10/0x10 [ 599.505679][ T29] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 599.511784][ T29] __x64_sys_unshare+0x38/0x40 [ 599.516569][ T29] x64_sys_call+0x767/0x9a0 [ 599.521106][ T29] do_syscall_64+0x4c/0xa0 [ 599.525532][ T29] ? clear_bhb_loop+0x30/0x80 [ 599.530255][ T29] ? clear_bhb_loop+0x30/0x80 [ 599.534945][ T29] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 599.540871][ T29] RIP: 0033:0x7fd2b47903e7 [ 599.545300][ T29] RSP: 002b:00007ffe9abecca8 EFLAGS: 00000206 ORIG_RAX: 0000000000000110 [ 599.553745][ T29] RAX: ffffffffffffffda RBX: 00007fd2b49c5f40 RCX: 00007fd2b47903e7 [ 599.561742][ T29] RDX: 0000000000000005 RSI: 00007ffe9abecb70 RDI: 0000000040000000 [ 599.569750][ T29] RBP: 00007fd2b49c67b8 R08: 00007fd2b54f7d60 R09: 0000000000000000 [ 599.577866][ T29] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000008 [ 599.585868][ T29] R13: 0000000000000003 R14: 0000000000000009 R15: 0000000000000000 [ 599.593893][ T29] [ 599.818542][ T29] INFO: task syz-executor:16236 blocked for more than 132 seconds. [ 600.457074][ T29] Not tainted syzkaller #0 [ 600.462129][ T29] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 600.470844][ T29] task:syz-executor state:D stack:27328 pid:16236 ppid:1 flags:0x00004004 [ 600.480110][ T29] Call Trace: [ 600.483411][ T29] [ 600.486362][ T29] __schedule+0xb87/0x14e0 [ 600.490858][ T29] ? release_firmware_map_entry+0x194/0x194 [ 600.496811][ T29] ? __mutex_add_waiter+0xc7/0x270 [ 600.501952][ T29] ? __kasan_check_write+0x14/0x20 [ 600.507113][ T29] ? trace_contention_begin+0xa0/0xa0 [ 600.512506][ T29] schedule+0xbd/0x170 [ 600.516630][ T29] schedule_preempt_disabled+0x13/0x20 [ 600.522111][ T29] __mutex_lock+0x74a/0x16d0 [ 600.526762][ T29] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 600.533557][ T29] ? selinux_capable+0x29c/0x380 [ 600.538556][ T29] ? __cfi_selinux_capable+0x10/0x10 [ 600.543900][ T29] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 600.550013][ T29] ? cap_capable+0x1aa/0x230 [ 600.554651][ T29] __mutex_lock_slowpath+0xe/0x10 [ 600.559694][ T29] mutex_lock+0xf8/0x1a0 [ 600.563997][ T29] ? __cfi_mutex_lock+0x10/0x10 [ 600.568960][ T29] ? ns_capable+0x8c/0xf0 [ 600.573330][ T29] ? netlink_net_capable+0x125/0x160 [ 600.578640][ T29] rtnetlink_rcv_msg+0x8c6/0xcf0 [ 600.583611][ T29] ? __cfi_rtnetlink_rcv_msg+0x10/0x10 [ 600.589082][ T29] ? kernel_text_address+0xa0/0xd0 [ 600.594240][ T29] ? __kernel_text_address+0xd/0x30 [ 600.599465][ T29] ? unwind_get_return_address+0x4d/0x90 [ 600.605115][ T29] ? memcpy+0x56/0x70 [ 600.609134][ T29] ? avc_has_perm_noaudit+0x2f4/0x460 [ 600.614530][ T29] ? __cfi_avc_has_perm_noaudit+0x10/0x10 [ 600.620296][ T29] ? slab_post_alloc_hook+0x4f/0x2d0 [ 600.625598][ T29] ? kmem_cache_alloc_node+0x181/0x340 [ 600.631102][ T29] ? __alloc_skb+0xea/0x4b0 [ 600.635621][ T29] ? avc_has_perm+0x158/0x240 [ 600.640358][ T29] ? __alloc_skb+0x236/0x4b0 [ 600.645072][ T29] ? netlink_sendmsg+0x626/0xbc0 [ 600.650102][ T29] ? __cfi_avc_has_perm+0x10/0x10 [ 600.655288][ T29] ? selinux_nlmsg_lookup+0x400/0x4c0 [ 600.660797][ T29] netlink_rcv_skb+0x1f2/0x440 [ 600.665634][ T29] ? __cfi_rtnetlink_rcv_msg+0x10/0x10 [ 600.671128][ T29] ? __cfi_netlink_rcv_skb+0x10/0x10 [ 600.676505][ T29] ? __netlink_lookup+0x387/0x3b0 [ 600.681574][ T29] rtnetlink_rcv+0x1c/0x20 [ 600.686058][ T29] netlink_unicast+0x8ab/0xa30 [ 600.690931][ T29] netlink_sendmsg+0x8aa/0xbc0 [ 600.695771][ T29] ? __cfi_netlink_sendmsg+0x10/0x10 [ 600.701081][ T29] ? call_rcu+0xb83/0xf90 [ 600.705449][ T29] ? security_socket_sendmsg+0x93/0xb0 [ 600.710928][ T29] __sys_sendto+0x464/0x5e0 [ 600.715476][ T29] ? __cfi___sys_sendto+0x10/0x10 [ 600.720533][ T29] ? blkcg_maybe_throttle_current+0x1df/0x9f0 [ 600.726625][ T29] ? __cfi_blkcg_maybe_throttle_current+0x10/0x10 [ 600.733104][ T29] ? __kasan_check_write+0x14/0x20 [ 600.738251][ T29] __x64_sys_sendto+0xe5/0x100 [ 600.743068][ T29] x64_sys_call+0x83/0x9a0 [ 600.747505][ T29] do_syscall_64+0x4c/0xa0 [ 600.751969][ T29] ? clear_bhb_loop+0x30/0x80 [ 600.756752][ T29] ? clear_bhb_loop+0x30/0x80 [ 600.761478][ T29] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 600.767413][ T29] RIP: 0033:0x7ff4db590a23 [ 600.771847][ T29] RSP: 002b:00007ffc33978048 EFLAGS: 00000202 ORIG_RAX: 000000000000002c [ 600.780331][ T29] RAX: ffffffffffffffda RBX: 00007ff4dc2f4620 RCX: 00007ff4db590a23 [ 600.788358][ T29] RDX: 000000000000002c RSI: 00007ff4dc2f4670 RDI: 0000000000000003 [ 600.796493][ T29] RBP: 0000000000000001 R08: 00007ffc33978064 R09: 000000000000000c [ 600.804517][ T29] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000003 [ 600.812523][ T29] R13: 0000000000000000 R14: 00007ff4dc2f4670 R15: 0000000000000000 [ 600.820571][ T29] [ 600.888560][ T29] INFO: task syz-executor:16240 blocked for more than 133 seconds. [ 600.896504][ T29] Not tainted syzkaller #0 [ 601.768422][ T29] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 601.777203][ T29] task:syz-executor state:D stack:27296 pid:16240 ppid:1 flags:0x00004004 [ 601.786476][ T29] Call Trace: [ 601.789771][ T29] [ 601.792831][ T29] __schedule+0xb87/0x14e0 [ 601.797267][ T29] ? avc_xperms_populate+0x28c/0x350 [ 601.802608][ T29] ? release_firmware_map_entry+0x194/0x194 [ 601.808517][ T29] ? __mutex_add_waiter+0xc7/0x270 [ 601.813716][ T29] ? __kasan_check_write+0x14/0x20 [ 601.818852][ T29] ? trace_contention_begin+0xa0/0xa0 [ 601.824276][ T29] schedule+0xbd/0x170 [ 601.828359][ T29] schedule_preempt_disabled+0x13/0x20 [ 601.833858][ T29] __mutex_lock+0x74a/0x16d0 [ 601.838480][ T29] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 601.845335][ T29] ? selinux_capable+0x29c/0x380 [ 601.850314][ T29] ? __cfi_selinux_capable+0x10/0x10 [ 601.855630][ T29] ? __x64_sys_sendto+0xe5/0x100 [ 601.860621][ T29] ? cap_capable+0x1aa/0x230 [ 601.865228][ T29] __mutex_lock_slowpath+0xe/0x10 [ 601.870284][ T29] mutex_lock+0xf8/0x1a0 [ 601.874546][ T29] ? __cfi_mutex_lock+0x10/0x10 [ 601.879521][ T29] ? ns_capable+0x8c/0xf0 [ 601.883862][ T29] ? netlink_net_capable+0x125/0x160 [ 601.889231][ T29] rtnetlink_rcv_msg+0x8c6/0xcf0 [ 601.894209][ T29] ? __cfi_rtnetlink_rcv_msg+0x10/0x10 [ 601.899723][ T29] ? kernel_text_address+0xa0/0xd0 [ 601.904887][ T29] ? __kernel_text_address+0xd/0x30 [ 601.910195][ T29] ? unwind_get_return_address+0x4d/0x90 [ 601.915871][ T29] ? memcpy+0x56/0x70 [ 601.919886][ T29] ? avc_has_perm_noaudit+0x2f4/0x460 [ 601.925326][ T29] ? __cfi_avc_has_perm_noaudit+0x10/0x10 [ 601.931075][ T29] ? avc_has_perm+0x158/0x240 [ 601.935796][ T29] ? __alloc_skb+0x236/0x4b0 [ 601.940418][ T29] ? netlink_sendmsg+0x626/0xbc0 [ 601.945402][ T29] ? __cfi_avc_has_perm+0x10/0x10 [ 601.950450][ T29] ? selinux_nlmsg_lookup+0x400/0x4c0 [ 601.955886][ T29] netlink_rcv_skb+0x1f2/0x440 [ 601.960702][ T29] ? __cfi_rtnetlink_rcv_msg+0x10/0x10 [ 601.966204][ T29] ? __cfi_netlink_rcv_skb+0x10/0x10 [ 601.971530][ T29] ? __netlink_lookup+0x387/0x3b0 [ 601.976750][ T29] rtnetlink_rcv+0x1c/0x20 [ 601.981269][ T29] netlink_unicast+0x8ab/0xa30 [ 601.986072][ T29] netlink_sendmsg+0x8aa/0xbc0 [ 601.990898][ T29] ? __cfi_netlink_sendmsg+0x10/0x10 [ 601.996229][ T29] ? security_socket_sendmsg+0x93/0xb0 [ 602.001740][ T29] __sys_sendto+0x464/0x5e0 [ 602.006262][ T29] ? __cfi___sys_sendto+0x10/0x10 [ 602.011328][ T29] ? do_user_addr_fault+0x9ac/0x1050 [ 602.016657][ T29] __x64_sys_sendto+0xe5/0x100 [ 602.021437][ T29] x64_sys_call+0x83/0x9a0 [ 602.025916][ T29] do_syscall_64+0x4c/0xa0 [ 602.030355][ T29] ? clear_bhb_loop+0x30/0x80 [ 602.035093][ T29] ? clear_bhb_loop+0x30/0x80 [ 602.039862][ T29] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 602.046013][ T29] RIP: 0033:0x7fe5b9d90a23 [ 602.050442][ T29] RSP: 002b:00007ffc3233c108 EFLAGS: 00000202 ORIG_RAX: 000000000000002c [ 602.058921][ T29] RAX: ffffffffffffffda RBX: 00007fe5baaf4620 RCX: 00007fe5b9d90a23 [ 602.067315][ T29] RDX: 0000000000000028 RSI: 00007fe5baaf4670 RDI: 0000000000000003 [ 602.075360][ T29] RBP: 0000000000000001 R08: 00007ffc3233c124 R09: 000000000000000c [ 602.083387][ T29] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000003 [ 602.091395][ T29] R13: 0000000000000000 R14: 00007fe5baaf4670 R15: 0000000000000000 [ 602.099386][ T29] [ 602.323754][ C0] net_ratelimit: 113299 callbacks suppressed [ 602.323778][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 602.323779][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 602.323836][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 602.329876][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 602.341886][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 602.353835][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 602.365684][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 602.377769][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 602.389638][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 602.401665][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 602.447271][ T29] NMI backtrace for cpu 0 [ 602.453874][ T29] CPU: 0 PID: 29 Comm: khungtaskd Not tainted syzkaller #0 [ 602.461171][ T29] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 602.467210][ T28] audit: type=1400 audit(2000000447.634:12747): avc: denied { execmem } for pid=16254 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 602.471242][ T29] Call Trace: [ 602.471252][ T29] [ 602.497106][ T29] __dump_stack+0x21/0x24 [ 602.501489][ T29] dump_stack_lvl+0xee/0x150 [ 602.506119][ T29] ? __cfi_dump_stack_lvl+0x8/0x8 [ 602.511175][ T29] dump_stack+0x15/0x24 [ 602.515346][ T29] nmi_cpu_backtrace+0x2b4/0x2c0 [ 602.520293][ T29] ? rcu_read_unlock_special+0xab/0x480 [ 602.525873][ T29] ? __cfi_nmi_cpu_backtrace+0x10/0x10 [ 602.531343][ T29] ? __rcu_read_unlock+0xa0/0xa0 [ 602.536302][ T29] ? memcpy+0x56/0x70 [ 602.540292][ T29] ? __cfi_nmi_raise_cpu_backtrace+0x10/0x10 [ 602.546461][ T29] nmi_trigger_cpumask_backtrace+0x16b/0x3a0 [ 602.552541][ T29] arch_trigger_cpumask_backtrace+0x10/0x20 [ 602.558443][ T29] watchdog+0xd44/0xe80 [ 602.562616][ T29] ? __cfi_watchdog+0x10/0x10 [ 602.567314][ T29] ? __kasan_check_read+0x11/0x20 [ 602.572444][ T29] ? __kthread_parkme+0x142/0x180 [ 602.577484][ T29] kthread+0x281/0x320 [ 602.581571][ T29] ? __cfi_watchdog+0x10/0x10 [ 602.586267][ T29] ? __cfi_kthread+0x10/0x10 [ 602.590869][ T29] ret_from_fork+0x1f/0x30 [ 602.595303][ T29] [ 602.600217][ T29] Sending NMI from CPU 0 to CPUs 1: [ 602.607310][ C1] NMI backtrace for cpu 1 [ 602.607322][ C1] CPU: 1 PID: 43 Comm: kworker/u4:2 Not tainted syzkaller #0 [ 602.607340][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 602.607350][ C1] Workqueue: netns cleanup_net [ 602.607371][ C1] RIP: 0010:update_stack_state+0x2b7/0x480 [ 602.607393][ C1] Code: 83 3e 00 74 26 44 3b 6d ac 75 20 48 8b 45 a0 48 39 45 b0 73 16 31 db 89 d8 48 81 c4 98 00 00 00 5b 41 5c 41 5d 41 5e 41 5f 5d 4c 8b 6d 80 4d 85 ed 4c 89 75 b8 74 6f 49 bc 00 00 00 00 00 fc [ 602.607405][ C1] RSP: 0018:ffffc900001afe40 EFLAGS: 00000292 [ 602.607418][ C1] RAX: 00000000001aff01 RBX: ffffc900001afec8 RCX: ffffc900001b0c01 [ 602.607429][ C1] RDX: ffffc900001b0c70 RSI: 1ffff92000035fda RDI: ffffc900001aff20 [ 602.607440][ C1] RBP: ffffc900001afeb8 R08: ffffc900001aff90 R09: ffffc900001aff88 [ 602.607451][ C1] R10: 0000000000000010 R11: 1ffff92000035fd9 R12: 0000000000000000 [ 602.607461][ C1] R13: 1ffff92000035fe4 R14: ffffc900001aff20 R15: ffffc900001b0ab0 [ 602.607472][ C1] FS: 0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 602.607486][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 602.607497][ C1] CR2: 00007fd93ffc6038 CR3: 000000012aa63000 CR4: 00000000003506a0 [ 602.607513][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 602.607522][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 602.607532][ C1] Call Trace: [ 602.607536][ C1] [ 602.607541][ C1] ? unwind_next_frame+0x3d5/0x700 [ 602.607559][ C1] ? __kernel_text_address+0xd/0x30 [ 602.607578][ C1] ? __cfi_stack_trace_consume_entry+0x10/0x10 [ 602.607596][ C1] arch_stack_walk+0x124/0x150 [ 602.607617][ C1] ? __netif_receive_skb+0x72/0x2a0 [ 602.607635][ C1] stack_trace_save+0x98/0xe0 [ 602.607652][ C1] ? __cfi_stack_trace_save+0x10/0x10 [ 602.607670][ C1] ? memset+0x35/0x40 [ 602.607690][ C1] kasan_set_track+0x4b/0x70 [ 602.607704][ C1] ? kasan_set_track+0x4b/0x70 [ 602.607718][ C1] ? kasan_save_free_info+0x31/0x50 [ 602.607736][ C1] ? ____kasan_slab_free+0x132/0x180 [ 602.607751][ C1] ? __kasan_slab_free+0x11/0x20 [ 602.607765][ C1] ? slab_free_freelist_hook+0xc2/0x190 [ 602.607784][ C1] ? kmem_cache_free+0x12d/0x300 [ 602.607800][ C1] ? kfree_skbmem+0x10c/0x180 [ 602.607819][ C1] ? kfree_skb_reason+0xdc/0x230 [ 602.607837][ C1] ? ip6_mc_input+0x518/0x690 [ 602.607853][ C1] ? ip6_rcv_finish+0x19e/0x370 [ 602.607867][ C1] ? ipv6_rcv+0xe9/0x210 [ 602.607882][ C1] ? __netif_receive_skb+0xd7/0x2a0 [ 602.607898][ C1] ? netif_receive_skb+0x98/0x3d0 [ 602.607916][ C1] ? br_pass_frame_up+0x206/0x3e0 [ 602.607935][ C1] ? br_handle_frame_finish+0x1052/0x1500 [ 602.607954][ C1] ? br_handle_frame+0x98a/0x1070 [ 602.607972][ C1] ? __netif_receive_skb_core+0xf2b/0x34a0 [ 602.607996][ C1] ? kmem_cache_free+0x12d/0x300 [ 602.608012][ C1] kasan_save_free_info+0x31/0x50 [ 602.608031][ C1] ____kasan_slab_free+0x132/0x180 [ 602.608047][ C1] __kasan_slab_free+0x11/0x20 [ 602.608062][ C1] slab_free_freelist_hook+0xc2/0x190 [ 602.608081][ C1] ? kfree_skbmem+0x10c/0x180 [ 602.608099][ C1] kmem_cache_free+0x12d/0x300 [ 602.608125][ C1] kfree_skbmem+0x10c/0x180 [ 602.608143][ C1] ? ip6_mc_input+0x518/0x690 [ 602.608158][ C1] kfree_skb_reason+0xdc/0x230 [ 602.608177][ C1] ip6_mc_input+0x518/0x690 [ 602.608193][ C1] ? __cfi_ip6_mc_input+0x10/0x10 [ 602.608209][ C1] ? __cfi_ip6table_mangle_hook+0x10/0x10 [ 602.608228][ C1] ip6_rcv_finish+0x19e/0x370 [ 602.608244][ C1] ipv6_rcv+0xe9/0x210 [ 602.608259][ C1] ? __cfi_ipv6_rcv+0x10/0x10 [ 602.608274][ C1] ? __cfi_ip6_rcv_finish+0x10/0x10 [ 602.608290][ C1] ? br_forward_finish+0x132/0x2c0 [ 602.608308][ C1] ? __cfi_ipv6_rcv+0x10/0x10 [ 602.608323][ C1] __netif_receive_skb+0xd7/0x2a0 [ 602.608341][ C1] netif_receive_skb+0x98/0x3d0 [ 602.608359][ C1] ? __cfi_netif_receive_skb+0x10/0x10 [ 602.608377][ C1] ? __br_forward+0x3cd/0x4f0 [ 602.608394][ C1] ? br_forward+0x300/0x300 [ 602.608412][ C1] br_pass_frame_up+0x206/0x3e0 [ 602.608431][ C1] ? br_multicast_is_router+0x1a0/0x1a0 [ 602.608451][ C1] ? br_flood+0x3cf/0x420 [ 602.608469][ C1] br_handle_frame_finish+0x1052/0x1500 [ 602.608490][ C1] ? __cfi_br_handle_frame_finish+0x10/0x10 [ 602.608509][ C1] ? kasan_quarantine_put+0x34/0x190 [ 602.608523][ C1] ? kmem_cache_free+0x12d/0x300 [ 602.608539][ C1] ? ____kasan_slab_free+0x13d/0x180 [ 602.608555][ C1] ? __kasan_slab_free+0x11/0x20 [ 602.608571][ C1] br_handle_frame+0x98a/0x1070 [ 602.608591][ C1] ? __cfi_br_handle_frame+0x10/0x10 [ 602.608609][ C1] ? kfree_skbmem+0x10c/0x180 [ 602.608628][ C1] ? ip6_mc_input+0x518/0x690 [ 602.608644][ C1] ? __cfi_br_handle_frame+0x10/0x10 [ 602.608662][ C1] __netif_receive_skb_core+0xf2b/0x34a0 [ 602.608682][ C1] ? qdisc_run+0x240/0x240 [ 602.608698][ C1] ? ipv6_rcv+0xe9/0x210 [ 602.608712][ C1] ? ttwu_do_activate+0x174/0x280 [ 602.608729][ C1] ? __cfi_ipv6_rcv+0x10/0x10 [ 602.608744][ C1] ? __cfi_ip6_rcv_finish+0x10/0x10 [ 602.608759][ C1] ? __kasan_check_write+0x14/0x20 [ 602.608779][ C1] ? _raw_spin_lock_irq+0x8f/0xe0 [ 602.608800][ C1] __netif_receive_skb+0x72/0x2a0 [ 602.608818][ C1] process_backlog+0x351/0x600 [ 602.608838][ C1] __napi_poll+0xd0/0x5e0 [ 602.608856][ C1] net_rx_action+0x49b/0xaa0 [ 602.608875][ C1] ? __cfi_net_rx_action+0x10/0x10 [ 602.608893][ C1] ? _raw_spin_unlock_irqrestore+0x5a/0x80 [ 602.608908][ C1] ? irqtime_account_irq+0x75/0x240 [ 602.608927][ C1] handle_softirqs+0x1d7/0x600 [ 602.608944][ C1] __do_softirq+0xb/0xd [ 602.608960][ C1] do_softirq+0xc6/0x120 [ 602.608974][ C1] [ 602.608978][ C1] [ 602.608983][ C1] ? __cfi_do_softirq+0x10/0x10 [ 602.608997][ C1] ? _raw_spin_lock_bh+0x8e/0xe0 [ 602.609010][ C1] ? __cfi__raw_spin_lock_bh+0x10/0x10 [ 602.609022][ C1] ? preempt_schedule_thunk+0x16/0x18 [ 602.609042][ C1] __local_bh_enable_ip+0x75/0x80 [ 602.609056][ C1] _raw_spin_unlock_bh+0x50/0x60 [ 602.609069][ C1] addrconf_ifdown+0x604/0x1910 [ 602.609089][ C1] ? addrconf_cleanup+0x130/0x130 [ 602.609107][ C1] ? __kasan_check_write+0x14/0x20 [ 602.609132][ C1] ? mutex_unlock+0x89/0x220 [ 602.609147][ C1] ? __cfi_mutex_unlock+0x10/0x10 [ 602.609162][ C1] ? __cfi_device_cmp+0x10/0x10 [ 602.609180][ C1] ? masq_device_event+0xd0/0xd0 [ 602.609198][ C1] addrconf_notify+0x39f/0xe40 [ 602.609217][ C1] ? ip6mr_device_event+0x1e0/0x200 [ 602.609235][ C1] raw_notifier_call_chain+0xa1/0x110 [ 602.609256][ C1] dev_close_many+0x32d/0x4d0 [ 602.609270][ C1] ? __cfi_dev_close_many+0x10/0x10 [ 602.609284][ C1] ? __kasan_slab_free+0x11/0x20 [ 602.609300][ C1] ? __kasan_check_read+0x11/0x20 [ 602.609319][ C1] unregister_netdevice_many+0x439/0x1820 [ 602.609338][ C1] ? __cfi_unregister_netdevice_many+0x10/0x10 [ 602.609355][ C1] ? unregister_netdevice_queue+0x1aa/0x360 [ 602.609372][ C1] ? __cfi_unregister_netdevice_queue+0x10/0x10 [ 602.609389][ C1] ? br_dev_delete+0xfc/0x110 [ 602.609407][ C1] default_device_exit_batch+0x9b9/0xa50 [ 602.609425][ C1] ? idr_destroy+0x21e/0x290 [ 602.609442][ C1] ? __cfi_mutex_lock+0x10/0x10 [ 602.609457][ C1] ? __cfi_default_device_exit_batch+0x10/0x10 [ 602.609476][ C1] ? __cfi_xfrmi_exit_batch_net+0x10/0x10 [ 602.609492][ C1] ? rtnl_unlock+0xe/0x10 [ 602.609509][ C1] ? __cfi_default_device_exit_batch+0x10/0x10 [ 602.609528][ C1] cleanup_net+0x62d/0xb00 [ 602.609544][ C1] ? __cfi_cleanup_net+0x10/0x10 [ 602.609561][ C1] process_one_work+0x71f/0xc40 [ 602.609577][ C1] worker_thread+0xa29/0x11f0 [ 602.609591][ C1] ? _raw_spin_lock_irqsave+0xb0/0x110 [ 602.609614][ C1] kthread+0x281/0x320 [ 602.609628][ C1] ? __cfi_worker_thread+0x10/0x10 [ 602.609642][ C1] ? __cfi_kthread+0x10/0x10 [ 602.609656][ C1] ret_from_fork+0x1f/0x30 [ 602.609674][ C1] [ 606.313347][ T28] audit: type=1400 audit(2000000451.754:12748): avc: denied { read } for pid=16255 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 606.993323][ C0] net_ratelimit: 115784 callbacks suppressed [ 606.993345][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 606.993467][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 606.999465][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 607.011421][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 607.023395][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 607.035393][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 607.047291][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 607.059150][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 607.071120][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 607.083104][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 607.155001][ T28] audit: type=1400 audit(2000000451.754:12749): avc: denied { open } for pid=16255 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 607.954220][ T28] audit: type=1400 audit(2000000451.754:12750): avc: denied { mounton } for pid=16255 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 609.130273][ T28] audit: type=1400 audit(2000000451.754:12751): avc: denied { module_request } for pid=16255 comm="syz-executor" kmod="netdev-nr8" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 609.920043][ T28] audit: type=1400 audit(2000000451.808:12752): avc: denied { read } for pid=16256 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 610.342634][ T28] audit: type=1400 audit(2000000451.808:12753): avc: denied { read open } for pid=16256 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 610.600592][ T28] audit: type=1400 audit(2000000451.808:12754): avc: denied { mounton } for pid=16256 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 611.346776][ T28] audit: type=1400 audit(2000000451.808:12755): avc: denied { module_request } for pid=16256 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 611.504800][ T28] audit: type=1400 audit(2000000452.055:12756): avc: denied { read } for pid=16257 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 611.560773][ T28] audit: type=1400 audit(2000000452.055:12757): avc: denied { open } for pid=16257 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 611.626943][ T28] audit: type=1400 audit(2000000452.055:12758): avc: denied { mounton } for pid=16257 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 611.662897][ C0] net_ratelimit: 127546 callbacks suppressed [ 611.662944][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 611.668943][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 611.681053][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 611.692925][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 611.705053][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 611.716887][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 611.728838][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 611.740820][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 611.752813][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 611.764690][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 615.554446][ T28] kauditd_printk_skb: 9 callbacks suppressed [ 615.554463][ T28] audit: type=1400 audit(2000000461.668:12768): avc: denied { execmem } for pid=16260 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 615.890564][ T28] audit: type=1400 audit(2000000462.033:12769): avc: denied { read } for pid=16261 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 615.997446][ T28] audit: type=1400 audit(2000000462.075:12770): avc: denied { open } for pid=16261 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 616.137953][ T28] audit: type=1400 audit(2000000462.075:12771): avc: denied { mounton } for pid=16261 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 616.193339][ T28] audit: type=1400 audit(2000000462.097:12772): avc: denied { module_request } for pid=16261 comm="syz-executor" kmod="netdev-nr8" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 616.332534][ C0] net_ratelimit: 133243 callbacks suppressed [ 616.332555][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 616.332614][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 616.338621][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 616.350615][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 616.362611][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 616.374482][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 616.386449][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 616.398414][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 616.410415][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 616.422287][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 621.002108][ C0] net_ratelimit: 138299 callbacks suppressed [ 621.002128][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 621.002163][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 621.008192][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 621.020300][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 621.032218][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 621.044069][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 621.056135][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 621.068127][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 621.080023][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 621.091868][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 625.671686][ C0] net_ratelimit: 137238 callbacks suppressed [ 625.671708][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 625.671742][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 625.677802][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 625.689819][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 625.701696][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 625.713743][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 625.725677][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 625.737653][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 625.749517][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 625.761468][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 629.575988][ T28] audit: type=1400 audit(2000000476.710:12773): avc: denied { execmem } for pid=16262 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 630.101063][ T29] INFO: task kworker/1:1:39 blocked for more than 124 seconds. [ 630.118615][ T29] Not tainted syzkaller #0 [ 630.123592][ T29] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 630.156442][ T28] audit: type=1400 audit(2000000477.343:12774): avc: denied { read } for pid=16263 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 630.212656][ T29] task:kworker/1:1 state:D stack:22976 pid:39 ppid:2 flags:0x00004000 [ 630.239357][ T29] Workqueue: ipv6_addrconf addrconf_verify_work [ 630.245662][ T29] Call Trace: [ 630.257862][ T28] audit: type=1400 audit(2000000477.364:12775): avc: denied { open } for pid=16263 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 630.304720][ T29] [ 630.307700][ T29] __schedule+0xb87/0x14e0 [ 630.312227][ T29] ? release_firmware_map_entry+0x194/0x194 [ 630.332632][ T29] ? _raw_spin_unlock_irq+0x4d/0x70 [ 630.337897][ T29] ? wq_worker_sleeping+0x1d9/0x280 [ 630.343143][ C0] net_ratelimit: 130008 callbacks suppressed [ 630.343157][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 630.343243][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 630.343247][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 630.343303][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 630.343307][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 630.343378][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 630.343391][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 630.343449][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 630.343510][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 630.343543][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 630.606701][ T29] schedule+0xbd/0x170 [ 630.610836][ T29] schedule_preempt_disabled+0x13/0x20 [ 630.616354][ T29] __mutex_lock+0x74a/0x16d0 [ 630.621041][ T29] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 630.629489][ T29] ? __kasan_check_write+0x14/0x20 [ 630.634674][ T29] ? __switch_to+0x51f/0xe30 [ 630.639322][ T29] ? __cfi___switch_to+0x10/0x10 [ 630.644285][ T29] ? _raw_spin_unlock+0x4c/0x70 [ 630.649189][ T29] __mutex_lock_slowpath+0xe/0x10 [ 630.654233][ T29] mutex_lock+0xf8/0x1a0 [ 630.658634][ T29] ? __cfi_mutex_lock+0x10/0x10 [ 630.663502][ T29] ? __schedule+0xb8f/0x14e0 [ 630.668144][ T29] ? __cfi__raw_spin_lock_irq+0x10/0x10 [ 630.673714][ T29] rtnl_lock+0x15/0x20 [ 630.677847][ T29] addrconf_verify_work+0x19/0x30 [ 630.680523][ T28] audit: type=1400 audit(2000000477.364:12776): avc: denied { mounton } for pid=16263 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 630.682889][ T29] process_one_work+0x71f/0xc40 [ 630.709450][ T29] worker_thread+0xa29/0x11f0 [ 630.714224][ T29] ? _raw_spin_lock_irqsave+0xb0/0x110 [ 630.719723][ T29] kthread+0x281/0x320 [ 630.723829][ T29] ? __cfi_worker_thread+0x10/0x10 [ 630.728958][ T29] ? __cfi_kthread+0x10/0x10 [ 630.733584][ T29] ret_from_fork+0x1f/0x30 [ 630.738026][ T29] [ 630.919323][ T28] audit: type=1400 audit(2000000477.364:12777): avc: denied { module_request } for pid=16263 comm="syz-executor" kmod="netdev-nr9" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 631.134778][ T29] NMI backtrace for cpu 1 [ 631.139166][ T29] CPU: 1 PID: 29 Comm: khungtaskd Not tainted syzkaller #0 [ 631.146379][ T29] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 631.156449][ T29] Call Trace: [ 631.159749][ T29] [ 631.162690][ T29] __dump_stack+0x21/0x24 [ 631.167033][ T29] dump_stack_lvl+0xee/0x150 [ 631.171640][ T29] ? __cfi_dump_stack_lvl+0x8/0x8 [ 631.176716][ T29] dump_stack+0x15/0x24 [ 631.180878][ T29] nmi_cpu_backtrace+0x2b4/0x2c0 [ 631.185828][ T29] ? rcu_read_unlock_special+0xab/0x480 [ 631.191393][ T29] ? __cfi_nmi_cpu_backtrace+0x10/0x10 [ 631.196869][ T29] ? __rcu_read_unlock+0xa0/0xa0 [ 631.201826][ T29] ? memcpy+0x56/0x70 [ 631.205818][ T29] ? __cfi_nmi_raise_cpu_backtrace+0x10/0x10 [ 631.211816][ T29] nmi_trigger_cpumask_backtrace+0x16b/0x3a0 [ 631.217811][ T29] arch_trigger_cpumask_backtrace+0x10/0x20 [ 631.223721][ T29] watchdog+0xd44/0xe80 [ 631.227932][ T29] ? __cfi_watchdog+0x10/0x10 [ 631.232654][ T29] ? __kasan_check_read+0x11/0x20 [ 631.237716][ T29] ? __kthread_parkme+0x142/0x180 [ 631.242761][ T29] kthread+0x281/0x320 [ 631.246848][ T29] ? __cfi_watchdog+0x10/0x10 [ 631.251545][ T29] ? __cfi_kthread+0x10/0x10 [ 631.256163][ T29] ret_from_fork+0x1f/0x30 [ 631.260602][ T29] [ 631.265468][ T29] Sending NMI from CPU 1 to CPUs 0: [ 631.270709][ C0] NMI backtrace for cpu 0 [ 631.270722][ C0] CPU: 0 PID: 43 Comm: kworker/u4:2 Not tainted syzkaller #0 [ 631.270738][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 631.270747][ C0] Workqueue: netns cleanup_net [ 631.270775][ C0] RIP: 0010:__sanitizer_cov_trace_const_cmp8+0x0/0x80 [ 631.270801][ C0] Code: 11 10 48 89 74 11 18 48 89 44 11 20 5d c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 90 90 90 90 90 90 90 90 90 90 90 b8 80 f8 fd 6f <55> 48 89 e5 48 8b 45 08 65 48 8b 0d 90 5f 92 7e 65 8b 15 91 5f 92 [ 631.270813][ C0] RSP: 0018:ffffc900000074c0 EFLAGS: 00000246 [ 631.270825][ C0] RAX: ffffc90000007a10 RBX: 0000000000000200 RCX: 00000000000000f8 [ 631.270836][ C0] RDX: ffff88811190a880 RSI: 0000000000000000 RDI: 0000000000000000 [ 631.270846][ C0] RBP: ffffc90000007530 R08: ffffc90000007750 R09: 0000000000000003 [ 631.270856][ C0] R10: fffff52000000eee R11: 1ffff92000000eea R12: 00000000000000f8 [ 631.270866][ C0] R13: 00000000000000ff R14: ffff88811fc29a80 R15: 1ffff11023f85354 [ 631.270877][ C0] FS: 0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 631.270890][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 631.270901][ C0] CR2: 00007f962adc6038 CR3: 000000010e70a000 CR4: 00000000003506b0 [ 631.270916][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 631.270926][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 631.270936][ C0] Call Trace: [ 631.270941][ C0] [ 631.270946][ C0] ? fib6_node_lookup+0x35e/0x530 [ 631.270965][ C0] fib6_table_lookup+0xb7/0x9a0 [ 631.270981][ C0] ? __cfi_ip6_rcv_finish+0x10/0x10 [ 631.270997][ C0] ? __cfi_ipv6_rcv+0x10/0x10 [ 631.271014][ C0] ? __cfi_fib6_table_lookup+0x10/0x10 [ 631.271029][ C0] ? netif_receive_skb+0xa9/0x3d0 [ 631.271049][ C0] ip6_pol_route+0x14c/0x1110 [ 631.271066][ C0] ? __cfi_ip6_pol_route+0x10/0x10 [ 631.271082][ C0] ? br_flood+0x3cf/0x420 [ 631.271100][ C0] ip6_pol_route_input+0x56/0x80 [ 631.271117][ C0] fib6_rule_lookup+0x1d7/0x580 [ 631.271137][ C0] ? __cfi_ip6_pol_route_input+0x10/0x10 [ 631.271152][ C0] ? __cfi_fib6_rule_lookup+0x10/0x10 [ 631.271171][ C0] ? ip6t_do_table+0x1328/0x14e0 [ 631.271191][ C0] ip6_route_input+0x58c/0x8c0 [ 631.271207][ C0] ? __cfi_ip6_route_input+0x10/0x10 [ 631.271224][ C0] ? __cfi_ip6t_do_table+0x10/0x10 [ 631.271242][ C0] ? __cfi_ip6table_mangle_hook+0x10/0x10 [ 631.271262][ C0] ip6_rcv_finish+0x156/0x370 [ 631.271277][ C0] ipv6_rcv+0xe9/0x210 [ 631.271292][ C0] ? __cfi_ipv6_rcv+0x10/0x10 [ 631.271307][ C0] ? __cfi_ip6_rcv_finish+0x10/0x10 [ 631.271323][ C0] ? __kasan_check_write+0x14/0x20 [ 631.271343][ C0] ? _raw_spin_lock_irq+0x8f/0xe0 [ 631.271364][ C0] ? __cfi_ipv6_rcv+0x10/0x10 [ 631.271378][ C0] __netif_receive_skb+0xd7/0x2a0 [ 631.271395][ C0] ? __cfi____update_load_sum+0x10/0x10 [ 631.271414][ C0] process_backlog+0x351/0x600 [ 631.271434][ C0] __napi_poll+0xd0/0x5e0 [ 631.271451][ C0] net_rx_action+0x49b/0xaa0 [ 631.271470][ C0] ? __cfi_net_rx_action+0x10/0x10 [ 631.271488][ C0] ? _raw_spin_unlock_irqrestore+0x5a/0x80 [ 631.271502][ C0] ? irqtime_account_irq+0x75/0x240 [ 631.271522][ C0] handle_softirqs+0x1d7/0x600 [ 631.271538][ C0] __do_softirq+0xb/0xd [ 631.271555][ C0] do_softirq+0xc6/0x120 [ 631.271568][ C0] [ 631.271573][ C0] [ 631.271578][ C0] ? __cfi_do_softirq+0x10/0x10 [ 631.271592][ C0] ? _raw_spin_lock_bh+0x8e/0xe0 [ 631.271604][ C0] ? __cfi__raw_spin_lock_bh+0x10/0x10 [ 631.271617][ C0] ? preempt_schedule_thunk+0x16/0x18 [ 631.271637][ C0] __local_bh_enable_ip+0x75/0x80 [ 631.271650][ C0] _raw_spin_unlock_bh+0x50/0x60 [ 631.271664][ C0] addrconf_ifdown+0x604/0x1910 [ 631.271682][ C0] ? __this_cpu_preempt_check+0x13/0x20 [ 631.271702][ C0] ? addrconf_cleanup+0x130/0x130 [ 631.271720][ C0] ? __kasan_check_write+0x14/0x20 [ 631.271739][ C0] ? mutex_unlock+0x89/0x220 [ 631.271761][ C0] ? __cfi_mutex_unlock+0x10/0x10 [ 631.271775][ C0] ? _raw_spin_lock+0x8e/0xe0 [ 631.271794][ C0] ? __cfi__raw_spin_lock+0x10/0x10 [ 631.271815][ C0] addrconf_notify+0x39f/0xe40 [ 631.271834][ C0] ? ip6mr_device_event+0x1e7/0x200 [ 631.271851][ C0] raw_notifier_call_chain+0xa1/0x110 [ 631.271872][ C0] unregister_netdevice_many+0xf8f/0x1820 [ 631.271891][ C0] ? __cfi_unregister_netdevice_many+0x10/0x10 [ 631.271908][ C0] ? unregister_netdevice_queue+0x1aa/0x360 [ 631.271925][ C0] ? __cfi_unregister_netdevice_queue+0x10/0x10 [ 631.271941][ C0] ? br_dev_delete+0xfc/0x110 [ 631.271959][ C0] default_device_exit_batch+0x9b9/0xa50 [ 631.271977][ C0] ? idr_destroy+0x21e/0x290 [ 631.271995][ C0] ? __cfi_mutex_lock+0x10/0x10 [ 631.272010][ C0] ? __cfi_default_device_exit_batch+0x10/0x10 [ 631.272028][ C0] ? __cfi_xfrmi_exit_batch_net+0x10/0x10 [ 631.272044][ C0] ? rtnl_unlock+0xe/0x10 [ 631.272061][ C0] ? __cfi_default_device_exit_batch+0x10/0x10 [ 631.272080][ C0] cleanup_net+0x62d/0xb00 [ 631.272096][ C0] ? __cfi_cleanup_net+0x10/0x10 [ 631.272114][ C0] process_one_work+0x71f/0xc40 [ 631.272129][ C0] worker_thread+0xa29/0x11f0 [ 631.272143][ C0] ? _raw_spin_lock_irqsave+0xb0/0x110 [ 631.272167][ C0] kthread+0x281/0x320 [ 631.272181][ C0] ? __cfi_worker_thread+0x10/0x10 [ 631.272194][ C0] ? __cfi_kthread+0x10/0x10 [ 631.272209][ C0] ret_from_fork+0x1f/0x30 [ 631.272226][ C0] [ 635.010880][ C1] net_ratelimit: 129080 callbacks suppressed [ 635.010904][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 635.010927][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 635.016964][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 635.028996][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 635.040967][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 635.052835][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 635.064873][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 635.076877][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 635.088741][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 635.100616][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 639.680452][ C0] net_ratelimit: 137384 callbacks suppressed [ 639.680473][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 639.680557][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 639.686559][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 639.698567][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 639.710436][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 639.722403][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 639.734428][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 639.746287][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 639.758249][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 639.770190][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 641.408682][ T28] audit: type=1400 audit(2000000489.413:12778): avc: denied { execmem } for pid=16264 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 641.744163][ T28] audit: type=1400 audit(2000000489.767:12779): avc: denied { read } for pid=16265 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 641.834632][ T28] audit: type=1400 audit(2000000489.799:12780): avc: denied { open } for pid=16265 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 641.955452][ T28] audit: type=1400 audit(2000000489.799:12781): avc: denied { mounton } for pid=16265 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 642.104293][ T28] audit: type=1400 audit(2000000489.799:12782): avc: denied { module_request } for pid=16265 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 644.350032][ C0] net_ratelimit: 132577 callbacks suppressed [ 644.350061][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 644.350069][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 644.350130][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 644.356148][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 644.368309][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 644.380168][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 644.392125][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 644.403988][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 644.415952][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 644.427872][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 649.019631][ C0] net_ratelimit: 136974 callbacks suppressed [ 649.019652][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 649.019661][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 649.019720][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 649.025723][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 649.037787][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 649.049643][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 649.061539][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 649.073389][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 649.085356][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 649.097272][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 651.186915][ T28] audit: type=1400 audit(2000000499.895:12783): avc: denied { execmem } for pid=16266 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 651.558729][ T28] audit: type=1400 audit(2000000500.303:12784): avc: denied { read } for pid=16267 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 651.639499][ T28] audit: type=1400 audit(2000000500.324:12785): avc: denied { open } for pid=16267 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 651.704080][ T28] audit: type=1400 audit(2000000500.324:12786): avc: denied { mounton } for pid=16267 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 651.807816][ T28] audit: type=1400 audit(2000000500.324:12787): avc: denied { module_request } for pid=16267 comm="syz-executor" kmod="netdev-nr6" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 653.689194][ C1] net_ratelimit: 133350 callbacks suppressed [ 653.689216][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 653.689217][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 653.689338][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 653.695291][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 653.707404][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 653.719293][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 653.731237][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 653.743185][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 653.755173][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:e0:b9:22:12:5d, vlan:0) [ 653.767163][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)