last executing test programs: 1.812182341s ago: executing program 0 (id=4691): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@delneigh={0x30, 0x1a, 0x1, 0x200000, 0x0, {0xa}, [@NDA_DST_IPV6={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @multicast2}}]}, 0x30}}, 0x0) 1.794163401s ago: executing program 4 (id=4692): r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='task\x00') lseek(r0, 0x100000e00000, 0x1) 1.738015073s ago: executing program 2 (id=4693): r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_RESET(r0, 0xc01064c4, &(0x7f0000000640)={0x0}) 1.67889955s ago: executing program 3 (id=4694): r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300090c0000000000000400000000030006000000000002000000e00000010000000000000000020001000000000000000000000000000300050000000000020000007f0000010000000000000000020013000300"], 0x60}}, 0x0) 1.635752698s ago: executing program 1 (id=4695): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x38, 0x10, 0x503, 0x70bd28, 0xffffffff, {0x0, 0xcf, 0x0, 0x0, 0x808b}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_REMOTE={0x8, 0x7, @multicast1=0xe000030a}]}}}]}, 0x38}}, 0x0) 1.473247263s ago: executing program 4 (id=4696): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000140)=@ipv6_newnexthop={0x24, 0x68, 0x827, 0x70bd25, 0x25dfdbfc, {}, [@NHA_FDB={0x4}, @NHA_OIF={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x40800}, 0x60) 1.460959344s ago: executing program 0 (id=4697): r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080), 0x202, 0x0) write$sequencer(r0, &(0x7f0000000000)=[@t={0x81, 0x6, 0x0, 0x0, @generic}], 0x8) 1.360566991s ago: executing program 2 (id=4698): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ioctl$sock_ifreq(r0, 0x8942, &(0x7f0000000240)={'geneve1\x00', @ifru_map={0x401, 0x8, 0x9, 0x3, 0xa, 0x9}}) 1.328752111s ago: executing program 3 (id=4699): r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_netdev_private(r0, 0x8927, &(0x7f0000000080)) 1.306642791s ago: executing program 1 (id=4700): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000240)=0x10001, 0x4) 1.111831304s ago: executing program 4 (id=4701): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000140)=@newtaction={0x4c, 0x30, 0x871a15abc695fb3d, 0x0, 0x0, {}, [{0x38, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}, 0x4c}}, 0x0) 1.097257175s ago: executing program 0 (id=4702): r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100080c10000001400000000000", 0x58}], 0x1) 1.042078254s ago: executing program 2 (id=4703): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000080)) 1.000208062s ago: executing program 3 (id=4704): mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='xfs\x00', 0x808000, 0x0) 995.668108ms ago: executing program 1 (id=4705): r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000800], 0x0, 0x0, 0x0}, 0x78) 804.954565ms ago: executing program 4 (id=4706): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)=@newtaction={0x68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x54, 0x1, [@m_ctinfo={0x50, 0x1, 0x0, 0x0, {{0xb}, {0x24, 0x2, 0x0, 0x1, [@TCA_CTINFO_ACT={0x18}, @TCA_CTINFO_PARMS_CPMARK_MASK={0x8}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x68}}, 0x0) 779.252727ms ago: executing program 0 (id=4707): r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000580), 0x2, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r0, 0xc0905664, &(0x7f00000009c0)={0x0, 0x0, '\x00', @raw_data=[0xa9, 0x101, 0x0, 0x1, 0x48, 0x4, 0x6, 0x3ff, 0x3, 0x0, 0x2, 0xe, 0x0, 0xca2, 0x200, 0x3, 0x0, 0x0, 0xa, 0x100, 0x6, 0x19cc, 0x7, 0xe9, 0xfa4f, 0x3, 0x4, 0x4, 0x9, 0xedbf, 0x9, 0x7]}) 715.29273ms ago: executing program 2 (id=4708): r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000380)=@newtaction={0x84, 0x30, 0xfffffffffffff9cf, 0x0, 0x0, {}, [{0x70, 0x1, [@m_bpf={0x6c, 0x1, 0x0, 0x0, {{0x8}, {0xa2, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {}]}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_NAME={0xc, 0x6, './file2\x00'}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x84}}, 0x0) 680.799582ms ago: executing program 1 (id=4709): r0 = syz_open_dev$sndctrl(&(0x7f0000000e00), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0x80dc5521, 0xfffffffffffffffd) 676.858588ms ago: executing program 3 (id=4710): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000037c0)={0x0, 0x0, &(0x7f0000003780)={&(0x7f0000000340)=@newtaction={0x88c, 0x30, 0x12f, 0x0, 0x0, {}, [{0x878, 0x1, [@m_police={0x874, 0x1, 0x0, 0x0, {{0xb}, {0x848, 0x2, 0x0, 0x1, [[@TCA_POLICE_PEAKRATE={0x404}], [@TCA_POLICE_RATE={0x404}, @TCA_POLICE_TBF={0x3c, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, {0x7, 0x0, 0x0, 0x0, 0x0, 0x7}, {0x7, 0x0, 0x0, 0x0, 0x0, 0x7}}}]]}, {0x4}, {0xc, 0xb}, {0xc, 0xa}}}]}]}, 0x88c}}, 0x0) 496.862386ms ago: executing program 4 (id=4711): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=ANY=[@ANYBLOB="280000001e000100000000000000000007000000", @ANYRES32, @ANYBLOB="000002000a0002"], 0x28}}, 0x0) 470.487014ms ago: executing program 0 (id=4712): iopl(0x3) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 411.729978ms ago: executing program 2 (id=4713): r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0xc0686611, &(0x7f0000000180)={0x900, 0x0, 0x18, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) 343.353517ms ago: executing program 1 (id=4714): r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000000)={0x54, 0xa, 0x0, "3258c546dacccfae1e008faa00000000f4ff4000"}) 327.775191ms ago: executing program 3 (id=4715): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x2, 0x0, 0x0, 0xfffffffc}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x21}, 0x50) 120.237515ms ago: executing program 0 (id=4716): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xc, 0xe, &(0x7f0000001700)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0xfffffedf, 0x10, &(0x7f0000000040), 0x0, 0x0, 0xffffffffffffffff, 0xd, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0x10, 0x0, &(0x7f0000002580)="f0b9547ee7affa9daabd309a75d387db", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x50) 113.722328ms ago: executing program 4 (id=4717): r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x7, 0x0, 0x15, 0x2}, 0x10}}, 0x0) 78.134464ms ago: executing program 2 (id=4718): r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$SOUND_MIXER_READ_CAPS(r0, 0x80044dfc, &(0x7f00000000c0)) 14.185187ms ago: executing program 1 (id=4719): semget$private(0x0, 0x4, 0x0) semctl$SEM_STAT_ANY(0x0, 0x0, 0x14, 0x0) 0s ago: executing program 3 (id=4720): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000037c0)={0x0, 0x0, &(0x7f0000003780)={&(0x7f0000003800)=@newtaction={0x48, 0x31, 0x12f, 0x0, 0x0, {}, [{0x34, 0x1, [@m_police={0x30, 0x1, 0x0, 0x0, {{0xb}, {0x4}, {0x4}, {0xc, 0xb}, {0xc, 0xa}}}]}]}, 0x48}}, 0x0) kernel console output (not intermixed with test programs): . [ 292.342163][T11021] netlink: 4 bytes leftover after parsing attributes in process `syz.3.2966'. [ 292.639853][T11037] netlink: 76 bytes leftover after parsing attributes in process `syz.4.2972'. [ 292.685761][T11040] 9pnet_fd: p9_fd_create_tcp (11040): problem connecting socket to 127.0.0.1 [ 292.708800][ T29] kauditd_printk_skb: 6 callbacks suppressed [ 292.708821][ T29] audit: type=1400 audit(1729036741.462:414): avc: denied { write } for pid=11038 comm="syz.3.2974" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 293.158942][T11066] binfmt_misc: register: failed to install interpreter file ./file0 [ 293.406986][T11085] syz.3.2996: attempt to access beyond end of device [ 293.406986][T11085] nbd3: rw=0, sector=2, nr_sectors = 2 limit=0 [ 293.440514][T11085] vxfs: unable to read disk superblock at 1 [ 293.460950][T11085] syz.3.2996: attempt to access beyond end of device [ 293.460950][T11085] nbd3: rw=0, sector=16, nr_sectors = 2 limit=0 [ 293.491725][T11085] vxfs: unable to read disk superblock at 8 [ 293.508096][ T29] audit: type=1400 audit(1729036742.276:415): avc: denied { getopt } for pid=11090 comm="syz.0.2999" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 293.508822][T11085] vxfs: can't find superblock. [ 293.593510][ T29] audit: type=1800 audit(1729036742.351:416): pid=11084 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=set_data cause=unavailable-hash-algorithm comm="syz.4.2997" name="/newroot/526/file0" dev="tmpfs" ino=2649 res=0 errno=0 [ 293.617090][ C1] vkms_vblank_simulate: vblank timer overrun [ 293.657108][T11094] xt_CT: You must specify a L4 protocol and not use inversions on it [ 293.692569][T11097] SELinux: syz.1.3000 (11097) set checkreqprot to 1. This is no longer supported. [ 293.910409][T11106] vhci_hcd vhci_hcd.0: pdev(0) rhport(0) sockfd(3) [ 293.917475][T11106] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 294.022699][T11106] vhci_hcd vhci_hcd.0: Device attached [ 294.045823][T11107] vhci_hcd: connection closed [ 294.049643][ T2512] vhci_hcd: stop threads [ 294.093404][ T2512] vhci_hcd: release socket [ 294.126108][ T2512] vhci_hcd: disconnect device [ 294.907151][T11163] tmpfs: Bad value for 'mpol' [ 295.334360][T11183] xt_connbytes: Forcing CT accounting to be enabled [ 295.341776][T11183] xt_NFQUEUE: number of total queues is 0 [ 295.984574][T11222] kAFS: Can only specify source 'none' with -o dyn [ 296.084036][ T5943] usb 1-1: new high-speed USB device number 101 using dummy_hcd [ 296.159620][ T8] usb 5-1: new high-speed USB device number 101 using dummy_hcd [ 296.283775][ T5943] usb 1-1: config 1 has an invalid interface number: 166 but max is 0 [ 296.293281][ T5943] usb 1-1: config 1 has no interface number 0 [ 296.317013][ T5943] usb 1-1: New USB device found, idVendor=0547, idProduct=2727, bcdDevice=b6.97 [ 296.342430][ T5943] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 296.404788][ T8] usb 5-1: Using ep0 maxpacket: 32 [ 296.486677][ T8] usb 5-1: New USB device found, idVendor=3823, idProduct=0001, bcdDevice= 3.eb [ 296.496329][ T8] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 296.506211][ T8] usb 5-1: Product: syz [ 296.510630][ T8] usb 5-1: Manufacturer: syz [ 296.510656][ T8] usb 5-1: SerialNumber: syz [ 296.519804][ T8] usb 5-1: config 0 descriptor?? [ 296.593135][ T5943] cdc_subset 1-1:1.166: probe with driver cdc_subset failed with error -22 [ 296.765446][ T8] input: syz syz as /devices/platform/dummy_hcd.4/usb5/5-1/5-1:0.0/input/input46 [ 296.831754][ T5943] usb 1-1: USB disconnect, device number 101 [ 296.865277][T11252] cgroup: release_agent respecified [ 296.982392][ T936] usb 5-1: USB disconnect, device number 101 [ 297.010619][T11256] netlink: 8 bytes leftover after parsing attributes in process `syz.2.3078'. [ 297.039815][T11256] netlink: 44 bytes leftover after parsing attributes in process `syz.2.3078'. [ 297.083197][T11256] bridge2: entered promiscuous mode [ 297.088629][T11256] bridge2: entered allmulticast mode [ 297.502973][T11276] netlink: 'syz.2.3087': attribute type 12 has an invalid length. [ 297.527407][T11276] netlink: 197276 bytes leftover after parsing attributes in process `syz.2.3087'. [ 297.828406][ T29] audit: type=1400 audit(1729036746.317:417): avc: denied { setopt } for pid=11289 comm="syz.3.3094" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 298.134478][ T29] audit: type=1400 audit(1729036746.607:418): avc: denied { view } for pid=11299 comm="syz.1.3098" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 298.297614][T11305] netlink: 'syz.3.3102': attribute type 10 has an invalid length. [ 298.305536][T11305] netlink: 210880 bytes leftover after parsing attributes in process `syz.3.3102'. [ 298.546398][T11318] mac80211_hwsim hwsim11 : renamed from wlan1 [ 298.605064][ T29] audit: type=1326 audit(1729036747.045:419): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11319 comm="syz.0.3109" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f305d97dff9 code=0x7ffc0000 [ 298.697350][ T29] audit: type=1326 audit(1729036747.073:420): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11319 comm="syz.0.3109" exe="/root/syz-executor" sig=0 arch=c000003e syscall=151 compat=0 ip=0x7f305d97dff9 code=0x7ffc0000 [ 298.785027][ T29] audit: type=1326 audit(1729036747.073:421): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11319 comm="syz.0.3109" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f305d97dff9 code=0x7ffc0000 [ 298.846918][T11332] xt_hashlimit: invalid rate [ 298.868350][ T29] audit: type=1326 audit(1729036747.073:422): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11319 comm="syz.0.3109" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f305d97dff9 code=0x7ffc0000 [ 299.236805][T11354] dlm: no locking on control device [ 299.472123][T11367] netlink: 9412 bytes leftover after parsing attributes in process `syz.0.3132'. [ 299.585887][T11372] ufs: Invalid option: "0(eLd9(@ 8L)uH\dKzLVR<%5rƌze ~I2~ [ 299.585887][T11372] r0Rpyh:Y [ 299.585887][T11372] O\zY" or missing value [ 299.647112][T11372] ufs: wrong mount options [ 299.728047][T11380] netlink: 20 bytes leftover after parsing attributes in process `syz.0.3139'. [ 299.795268][T11384] raw_sendmsg: syz.2.3141 forgot to set AF_INET. Fix it! [ 299.845269][T11386] bridge2: entered allmulticast mode [ 300.047907][ T29] audit: type=1400 audit(1729036748.374:423): avc: denied { write } for pid=11397 comm="syz.4.3149" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 300.168517][ T5943] usb 2-1: new high-speed USB device number 108 using dummy_hcd [ 300.183524][T11407] netlink: 20 bytes leftover after parsing attributes in process `syz.0.3153'. [ 300.362822][ T5943] usb 2-1: config 0 interface 0 altsetting 0 has an endpoint descriptor with address 0xD6, changing to 0x86 [ 300.378212][T11417] netlink: 12 bytes leftover after parsing attributes in process `syz.4.3158'. [ 300.398060][ T5943] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x86 has an invalid bInterval 0, changing to 7 [ 300.417607][ T5943] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x86 has invalid wMaxPacketSize 0 [ 300.508850][ T5943] usb 2-1: New USB device found, idVendor=05f3, idProduct=0240, bcdDevice=1b.24 [ 300.518279][ T5943] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 300.526437][ T5943] usb 2-1: Product: syz [ 300.530661][ T5943] usb 2-1: Manufacturer: syz [ 300.535288][ T5943] usb 2-1: SerialNumber: syz [ 300.551585][ T5943] usb 2-1: config 0 descriptor?? [ 300.790823][ T5943] powermate: unknown product id 0240 [ 300.799038][ T5943] powermate: Expected payload of 3--6 bytes, found 0 bytes! [ 300.806500][ T5943] powermate 2-1:0.0: probe with driver powermate failed with error -5 [ 300.870490][ T5943] usb 2-1: USB disconnect, device number 108 [ 301.176834][T11458] tmpfs: Bad value for 'mpol' [ 301.607177][T11481] openvswitch: netlink: Actions may not be safe on all matching packets [ 302.265011][ T29] audit: type=1400 audit(1729036750.423:424): avc: denied { setopt } for pid=11512 comm="syz.0.3203" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 302.360136][ T29] audit: type=1400 audit(1729036750.516:425): avc: denied { write } for pid=11518 comm="syz.1.3209" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 302.532060][T11529] overlayfs: unescaped trailing colons in lowerdir mount option. [ 302.631655][T11535] : renamed from bond0 (while UP) [ 302.732896][T11539] netlink: 'syz.3.3218': attribute type 1 has an invalid length. [ 302.768714][T11539] netlink: 3 bytes leftover after parsing attributes in process `syz.3.3218'. [ 303.627484][T11590] netlink: 'syz.3.3229': attribute type 12 has an invalid length. [ 303.657063][ T29] audit: type=1400 audit(1729036751.706:426): avc: denied { bind } for pid=11592 comm="syz.0.3239" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 303.661727][T11590] netlink: 132 bytes leftover after parsing attributes in process `syz.3.3229'. [ 303.676637][ T9] usb 3-1: new high-speed USB device number 105 using dummy_hcd [ 303.732881][ T29] audit: type=1400 audit(1729036751.780:427): avc: denied { sys_chroot } for pid=11598 comm="dhcpcd" capability=18 scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=capability permissive=1 [ 303.825816][ T29] audit: type=1400 audit(1729036751.780:428): avc: denied { setgid } for pid=11598 comm="dhcpcd" capability=6 scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=capability permissive=1 [ 303.874727][ T29] audit: type=1400 audit(1729036751.780:429): avc: denied { setrlimit } for pid=11598 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=process permissive=1 [ 303.913257][T11604] netlink: 8 bytes leftover after parsing attributes in process `syz.1.3242'. [ 303.915126][ T9] usb 3-1: config 0 has an invalid interface number: 1 but max is 0 [ 303.942495][T11604] netlink: 12 bytes leftover after parsing attributes in process `syz.1.3242'. [ 303.952075][ T9] usb 3-1: config 0 has no interface number 0 [ 303.960580][T11606] dlm: non-version read from control device 36 [ 303.982881][ T9] usb 3-1: New USB device found, idVendor=18b4, idProduct=fffb, bcdDevice=dc.7b [ 303.992002][ T9] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 304.004374][ T9] usb 3-1: Product: syz [ 304.008589][ T9] usb 3-1: Manufacturer: syz [ 304.013471][ T9] usb 3-1: SerialNumber: syz [ 304.051391][ T9] usb 3-1: config 0 descriptor?? [ 304.140817][T11612] openvswitch: netlink: Missing key (keys=20040, expected=100) [ 304.304066][ T29] audit: type=1400 audit(1729036752.306:430): avc: denied { read } for pid=11622 comm="syz.3.3252" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 304.335777][ T9] usb 3-1: dvb_usb_v2: found a 'E3C EC168 reference design' in warm state [ 304.382378][ T9] usb 3-1: dvb_usb_v2: will pass the complete MPEG2 transport stream to the software demuxer [ 304.430096][ T9] dvbdev: DVB: registering new adapter (E3C EC168 reference design) [ 304.443324][ T9] usb 3-1: media controller created [ 304.506266][ T29] audit: type=1400 audit(1729036752.482:431): avc: denied { getopt } for pid=11631 comm="syz.3.3255" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 304.513590][ T9] dvbdev: dvb_create_media_entity: media entity 'dvb-demux' registered. [ 304.696134][ T29] audit: type=1326 audit(1729036752.666:432): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11643 comm="syz.0.3263" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f305d97dff9 code=0x7ffc0000 [ 304.732435][ T9] i2c i2c-1: ec100: i2c rd failed=-71 reg=33 [ 304.783906][ T29] audit: type=1326 audit(1729036752.694:433): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11643 comm="syz.0.3263" exe="/root/syz-executor" sig=0 arch=c000003e syscall=247 compat=0 ip=0x7f305d97dff9 code=0x7ffc0000 [ 304.889145][ T9] usb 3-1: USB disconnect, device number 105 [ 304.899062][ T29] audit: type=1326 audit(1729036752.694:434): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11643 comm="syz.0.3263" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f305d97dff9 code=0x7ffc0000 [ 304.990426][ T29] audit: type=1326 audit(1729036752.694:435): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11643 comm="syz.0.3263" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f305d97dff9 code=0x7ffc0000 [ 305.243290][T11667] netlink: 288 bytes leftover after parsing attributes in process `syz.0.3272'. [ 305.826178][ T9] usb 4-1: new full-speed USB device number 103 using dummy_hcd [ 306.162781][ T9] usb 4-1: config 8 has an invalid interface number: 177 but max is 0 [ 306.171857][ T9] usb 4-1: config 8 has no interface number 0 [ 306.178054][ T9] usb 4-1: config 8 interface 177 altsetting 9 endpoint 0x8 has invalid maxpacket 1023, setting to 64 [ 306.197014][ T9] usb 4-1: config 8 interface 177 has no altsetting 0 [ 306.208631][ T9] usb 4-1: New USB device found, idVendor=04d8, idProduct=fd08, bcdDevice=59.b1 [ 306.235295][ T9] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 306.260014][T11680] raw-gadget.0 gadget.3: fail, usb_ep_enable returned -22 [ 306.502740][ T9] usb 4-1: string descriptor 0 read error: -71 [ 306.531389][ C0] ir_toy 4-1:8.177: out urb status: -71 [ 306.603051][T11735] overlayfs: conflicting options: verity=on,redirect_dir=nofollow [ 307.007637][T11757] sctp: [Deprecated]: syz.1.3318 (pid 11757) Use of struct sctp_assoc_value in delayed_ack socket option. [ 307.007637][T11757] Use struct sctp_sack_info instead [ 307.055141][T11763] netlink: 'syz.0.3321': attribute type 32 has an invalid length. [ 307.117288][ T9] ir_toy 4-1:8.177: could not write reset command: -110 [ 307.127434][ T9] ir_toy 4-1:8.177: probe with driver ir_toy failed with error -110 [ 307.159843][ T9] usb 4-1: USB disconnect, device number 103 [ 307.619683][T11781] (unnamed net_device) (uninitialized): down delay (512) is not a multiple of miimon (100), value rounded to 500 ms [ 307.671532][T11781] 8021q: adding VLAN 0 to HW filter on device bond0 [ 308.602181][T11856] netlink: 'syz.0.3365': attribute type 18 has an invalid length. [ 308.862709][T11869] openvswitch: netlink: Actions may not be safe on all matching packets [ 309.887933][T11927] REISERFS warning (device nullb0): sh-2021 reiserfs_fill_super: can not find reiserfs on nullb0 [ 309.998643][ T29] kauditd_printk_skb: 35 callbacks suppressed [ 309.998665][ T29] audit: type=1400 audit(1729036757.567:471): avc: granted { setsecparam } for pid=11932 comm="syz.0.3395" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 310.113206][T11944] netlink: 20 bytes leftover after parsing attributes in process `syz.3.3400'. [ 310.250465][T11952] usb usb7: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 310.296940][T11954] netlink: 4 bytes leftover after parsing attributes in process `syz.3.3405'. [ 310.717099][T11979] i2c i2c-0: Invalid block write size 34 [ 310.924637][ T29] audit: type=1326 audit(1729036758.417:472): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11991 comm="syz.3.3424" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f309897dff9 code=0x7ffc0000 [ 310.987065][ T29] audit: type=1326 audit(1729036758.417:473): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11991 comm="syz.3.3424" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f309897dff9 code=0x7ffc0000 [ 311.045998][ T29] audit: type=1326 audit(1729036758.417:474): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11991 comm="syz.3.3424" exe="/root/syz-executor" sig=0 arch=c000003e syscall=313 compat=0 ip=0x7f309897dff9 code=0x7ffc0000 [ 311.079038][ T29] audit: type=1326 audit(1729036758.417:475): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11991 comm="syz.3.3424" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f309897dff9 code=0x7ffc0000 [ 311.110348][ T29] audit: type=1326 audit(1729036758.417:476): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11991 comm="syz.3.3424" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f309897dff9 code=0x7ffc0000 [ 311.201014][T12006] netlink: 8 bytes leftover after parsing attributes in process `syz.4.3431'. [ 311.229807][T12006] netlink: 20 bytes leftover after parsing attributes in process `syz.4.3431'. [ 311.284343][ T936] usb 2-1: new high-speed USB device number 109 using dummy_hcd [ 311.364889][T12016] syz.4.3436: attempt to access beyond end of device [ 311.364889][T12016] nbd4: rw=0, sector=64, nr_sectors = 2 limit=0 [ 311.379899][T12016] isofs_fill_super: bread failed, dev=nbd4, iso_blknum=16, block=32 [ 311.523616][ T936] usb 2-1: Using ep0 maxpacket: 32 [ 311.534833][ T936] usb 2-1: config 0 has an invalid interface number: 141 but max is 0 [ 311.549169][ T936] usb 2-1: config 0 has no interface number 0 [ 311.556102][ T936] usb 2-1: config 0 interface 141 altsetting 0 endpoint 0x9 has invalid wMaxPacketSize 0 [ 311.564687][T12029] netlink: 'syz.2.3442': attribute type 23 has an invalid length. [ 311.568562][ T936] usb 2-1: config 0 interface 141 altsetting 0 endpoint 0xD has invalid wMaxPacketSize 0 [ 311.601242][ T936] usb 2-1: New USB device found, idVendor=0e6f, idProduct=582c, bcdDevice=31.68 [ 311.629733][ T936] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 311.661021][ T936] usb 2-1: Product: syz [ 311.674378][ T936] usb 2-1: Manufacturer: syz [ 311.679028][ T936] usb 2-1: SerialNumber: syz [ 311.703108][ T936] usb 2-1: config 0 descriptor?? [ 311.957715][ T936] usb 2-1: USB disconnect, device number 109 [ 312.014304][T12048] netlink: 20 bytes leftover after parsing attributes in process `syz.3.3451'. [ 312.026655][T12048] netlink: 20 bytes leftover after parsing attributes in process `syz.3.3451'. [ 312.146504][T12056] xt_hashlimit: invalid interval [ 312.207371][T12058] xt_CONNSECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 312.382036][ T29] audit: type=1326 audit(1729036759.764:477): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12067 comm="syz.3.3461" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f309897dff9 code=0x7ffc0000 [ 312.425635][ T29] audit: type=1326 audit(1729036759.764:478): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12067 comm="syz.3.3461" exe="/root/syz-executor" sig=0 arch=c000003e syscall=64 compat=0 ip=0x7f309897dff9 code=0x7ffc0000 [ 312.489441][ T29] audit: type=1326 audit(1729036759.764:479): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12067 comm="syz.3.3461" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f309897dff9 code=0x7ffc0000 [ 312.583036][ T29] audit: type=1326 audit(1729036759.764:480): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12067 comm="syz.3.3461" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f309897dff9 code=0x7ffc0000 [ 313.039578][T12102] netlink: 'syz.3.3476': attribute type 1 has an invalid length. [ 313.120702][T12105] netlink: 20 bytes leftover after parsing attributes in process `syz.0.3479'. [ 313.154049][T12105] netlink: 'syz.0.3479': attribute type 2 has an invalid length. [ 313.369877][T12122] set match dimension is over the limit! [ 313.376124][ T939] usb 5-1: new high-speed USB device number 102 using dummy_hcd [ 313.646345][ T939] usb 5-1: Using ep0 maxpacket: 32 [ 313.653926][ T939] usb 5-1: New USB device found, idVendor=055f, idProduct=c232, bcdDevice=de.ab [ 313.663850][ T939] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 313.697043][ T939] usb 5-1: config 0 descriptor?? [ 313.735121][ T939] gspca_main: sunplus-2.14.0 probing 055f:c232 [ 313.753345][T12141] netlink: 288 bytes leftover after parsing attributes in process `syz.0.3497'. [ 314.274737][ T939] usb 5-1: USB disconnect, device number 102 [ 314.472955][T12184] netlink: 256 bytes leftover after parsing attributes in process `syz.3.3518'. [ 314.625382][T12194] netlink: 8 bytes leftover after parsing attributes in process `syz.2.3522'. [ 315.082254][T12220] netlink: 'syz.3.3535': attribute type 10 has an invalid length. [ 315.161529][T12220] 8021q: adding VLAN 0 to HW filter on device team0 [ 315.207133][T12220] bond0: (slave team0): Enslaving as an active interface with an up link [ 315.932381][ T5906] usb 4-1: new high-speed USB device number 104 using dummy_hcd [ 316.094812][ T5906] usb 4-1: Using ep0 maxpacket: 32 [ 316.122442][ T5906] usb 4-1: config 0 has an invalid interface number: 182 but max is 0 [ 316.146825][ T5906] usb 4-1: config 0 has no interface number 0 [ 316.175609][ T5906] usb 4-1: config 0 interface 182 has no altsetting 0 [ 316.207985][ T5906] usb 4-1: New USB device found, idVendor=07cf, idProduct=1001, bcdDevice=8d.fa [ 316.217454][ T5906] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 316.225545][ T5906] usb 4-1: Product: syz [ 316.234311][ T5906] usb 4-1: Manufacturer: syz [ 316.251718][ T5906] usb 4-1: SerialNumber: syz [ 316.268830][ T5906] usb 4-1: config 0 descriptor?? [ 316.282990][ T5906] usb-storage 4-1:0.182: USB Mass Storage device detected [ 316.330485][ T5906] usb-storage 4-1:0.182: Quirks match for vid 07cf pid 1001: a [ 316.538406][ T51] usb 4-1: USB disconnect, device number 104 [ 316.729475][ T29] kauditd_printk_skb: 20 callbacks suppressed [ 316.729495][ T29] audit: type=1400 audit(1729036763.779:501): avc: denied { bind } for pid=12281 comm="syz.1.3564" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 317.105375][T12298] ɶƣ0GC: entered promiscuous mode [ 317.317144][T12306] sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 [ 317.637727][T12320] netlink: 9412 bytes leftover after parsing attributes in process `syz.4.3581'. [ 317.975647][T12333] netlink: 'syz.2.3590': attribute type 1 has an invalid length. [ 318.001856][T12333] netlink: 168864 bytes leftover after parsing attributes in process `syz.2.3590'. [ 318.020687][T12333] netlink: 1 bytes leftover after parsing attributes in process `syz.2.3590'. [ 318.269020][T12346] netlink: 2 bytes leftover after parsing attributes in process `syz.3.3596'. [ 318.445826][ T936] usb 5-1: new high-speed USB device number 103 using dummy_hcd [ 318.465269][T12352] bridge3: entered promiscuous mode [ 318.482362][T12352] bridge3: entered allmulticast mode [ 318.662472][ T936] usb 5-1: Using ep0 maxpacket: 16 [ 318.676076][ T936] usb 5-1: config 0 has an invalid interface number: 26 but max is 0 [ 318.695842][ T936] usb 5-1: config 0 has no interface number 0 [ 318.723785][ T936] usb 5-1: New USB device found, idVendor=0130, idProduct=0130, bcdDevice=a7.1c [ 318.749514][ T936] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 318.757581][ T936] usb 5-1: Product: syz [ 318.765164][T12366] SET target dimension over the limit! [ 318.782377][ T936] usb 5-1: Manufacturer: syz [ 318.798098][ T936] usb 5-1: SerialNumber: syz [ 318.816989][ T936] usb 5-1: config 0 descriptor?? [ 318.838454][ T936] gspca_main: spca508-2.14.0 probing 0130:0130 [ 319.277563][ T936] gspca_spca508: reg_read err -71 [ 319.285884][ T936] gspca_spca508: reg_read err -71 [ 319.304736][ T936] gspca_spca508: reg_read err -71 [ 319.318073][ T936] gspca_spca508: reg_read err -71 [ 319.327423][ T936] gspca_spca508: reg write: error -71 [ 319.332889][ T936] spca508 5-1:0.26: probe with driver spca508 failed with error -71 [ 319.362193][ T936] usb 5-1: USB disconnect, device number 103 [ 319.663623][T12392] xt_ipvs: protocol family 7 not supported [ 319.801136][T12402] mmap: syz.0.3624 (12402): VmData 37482496 exceed data ulimit 0. Update limits or use boot option ignore_rlimit_data. [ 320.069589][T12410] netlink: 2160 bytes leftover after parsing attributes in process `syz.4.3628'. [ 320.298615][T12421] Scaler: ================= START STATUS ================= [ 320.306048][T12421] Scaler: ================== END STATUS ================== [ 320.414824][T12429] overlayfs: empty lowerdir [ 320.558802][ T936] usb 2-1: new high-speed USB device number 110 using dummy_hcd [ 320.637236][ T29] audit: type=1400 audit(1729036767.388:502): avc: denied { wake_alarm } for pid=12439 comm="syz.4.3642" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 320.732837][ T936] usb 2-1: too many configurations: 201, using maximum allowed: 8 [ 320.744020][ T936] usb 2-1: config index 0 descriptor too short (expected 64945, got 72) [ 320.768233][ T936] usb 2-1: config index 1 descriptor too short (expected 64945, got 72) [ 320.796293][ T936] usb 2-1: config index 2 descriptor too short (expected 64945, got 72) [ 320.850982][ T936] usb 2-1: config index 3 descriptor too short (expected 64945, got 72) [ 320.922406][ T936] usb 2-1: config index 4 descriptor too short (expected 64945, got 72) [ 320.942355][ T936] usb 2-1: config index 5 descriptor too short (expected 64945, got 72) [ 320.952007][ T936] usb 2-1: config index 6 descriptor too short (expected 64945, got 72) [ 320.962849][ T936] usb 2-1: config index 7 descriptor too short (expected 64945, got 72) [ 320.979312][ T936] usb 2-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 320.988829][ T936] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 321.010580][ T936] usb 2-1: Product: syz [ 321.024290][ T936] usb 2-1: Manufacturer: syz [ 321.040000][ T936] usb 2-1: SerialNumber: syz [ 321.112764][ T936] usb 2-1: ath9k_htc: Firmware ath9k_htc/htc_9271-1.4.0.fw requested [ 321.137953][ T5943] usb 2-1: ath9k_htc: Transferred FW: ath9k_htc/htc_9271-1.4.0.fw, size: 51008 [ 321.295544][T12468] netlink: 12 bytes leftover after parsing attributes in process `syz.2.3656'. [ 321.340103][T12474] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 321.625836][ T939] usb 2-1: USB disconnect, device number 110 [ 321.911272][T12501] netlink: 64 bytes leftover after parsing attributes in process `syz.4.3672'. [ 322.000410][ T29] audit: type=1400 audit(1729036768.643:503): avc: denied { ioctl } for pid=12505 comm="syz.3.3675" path="socket:[29482]" dev="sockfs" ino=29482 ioctlcmd=0x4944 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 322.000885][T12505] delete_channel: no stack [ 322.025615][ T5906] usb 3-1: new high-speed USB device number 106 using dummy_hcd [ 322.117247][T12510] netdevsim netdevsim3: loading /lib/firmware/. failed with error -22 [ 322.141064][T12510] netdevsim netdevsim3: Direct firmware load for . failed with error -22 [ 322.149563][T12510] netdevsim netdevsim3: Falling back to sysfs fallback for: . [ 322.216205][ T5906] usb 3-1: Using ep0 maxpacket: 32 [ 322.218807][T12516] netlink: 'syz.4.3680': attribute type 21 has an invalid length. [ 322.235723][ T5906] usb 3-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 322.272089][ T5906] usb 3-1: New USB device found, idVendor=22b8, idProduct=6027, bcdDevice=c2.80 [ 322.288878][ T5906] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 322.312210][ T5906] usb 3-1: Product: syz [ 322.334627][ T5906] usb 3-1: Manufacturer: syz [ 322.359223][ T5906] usb 3-1: SerialNumber: syz [ 322.362629][T12522] netlink: 8 bytes leftover after parsing attributes in process `syz.4.3683'. [ 322.375907][ T5906] usb 3-1: config 0 descriptor?? [ 322.393626][ T5906] usb 3-1: bad CDC descriptors [ 322.403653][ T5906] usb 3-1: unsupported MDLM descriptors [ 322.519578][ T5943] usb 2-1: Service connection timeout for: 256 [ 322.525927][ T5943] ath9k_htc 2-1:1.0: ath9k_htc: Unable to initialize HTC services [ 322.553527][ T5943] ath9k_htc: Failed to initialize the device [ 322.570822][ T939] usb 2-1: ath9k_htc: USB layer deinitialized [ 322.680483][ T5905] usb 3-1: USB disconnect, device number 106 [ 322.706613][ T29] audit: type=1400 audit(1729036769.299:504): avc: denied { connect } for pid=12533 comm="syz.0.3689" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 322.993969][T12548] netlink: 'syz.0.3696': attribute type 3 has an invalid length. [ 323.003667][T12548] netlink: 11 bytes leftover after parsing attributes in process `syz.0.3696'. [ 323.451879][T12573] syz.1.3708: attempt to access beyond end of device [ 323.451879][T12573] nbd1: rw=0, sector=2, nr_sectors = 2 limit=0 [ 323.511728][T12573] MINIX-fs: unable to read superblock [ 323.817302][ T29] audit: type=1400 audit(1729036770.296:505): avc: denied { sqpoll } for pid=12590 comm="syz.2.3716" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 324.613583][T12639] No such timeout policy "syz0" [ 324.698192][T12643] 8021q: adding VLAN 0 to HW filter on device bond2 [ 324.708489][ T29] audit: type=1400 audit(1729036771.145:506): avc: denied { getopt } for pid=12645 comm="syz.3.3742" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 324.712074][T12648] netlink: 'syz.0.3744': attribute type 2 has an invalid length. [ 324.743582][T12648] netlink: 199836 bytes leftover after parsing attributes in process `syz.0.3744'. [ 324.979061][T12662] openvswitch: netlink: Missing key (keys=20040, expected=80) [ 325.242242][T12674] netlink: 'syz.0.3758': attribute type 10 has an invalid length. [ 325.413145][ T5905] usb 5-1: new high-speed USB device number 104 using dummy_hcd [ 325.598484][ T5905] usb 5-1: config 237 has too many interfaces: 213, using maximum allowed: 32 [ 325.618939][ T5905] usb 5-1: config 237 has 1 interface, different from the descriptor's value: 213 [ 325.628314][ T5905] usb 5-1: config 237 has no interface number 0 [ 325.652958][ T5905] usb 5-1: config 237 interface 4 altsetting 9 has 0 endpoint descriptors, different from the interface descriptor's value: 5 [ 325.691221][ T5905] usb 5-1: config 237 interface 4 has no altsetting 0 [ 325.701530][T12697] netlink: 20 bytes leftover after parsing attributes in process `syz.3.3767'. [ 325.716357][ T5905] usb 5-1: New USB device found, idVendor=0fc5, idProduct=1227, bcdDevice=da.8e [ 325.726453][ T29] audit: type=1404 audit(1729036772.077:507): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 325.729465][ T5905] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 325.797076][T12674] syz.0.3758 (12674) used greatest stack depth: 21200 bytes left [ 325.810071][ T29] audit: type=1400 audit(1729036772.160:508): avc: denied { read write } for pid=5860 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 325.814733][ T5905] usb 5-1: Product: syz [ 325.869219][ T5905] usb 5-1: Manufacturer: syz [ 325.873891][ T5905] usb 5-1: SerialNumber: syz [ 325.924801][ T5905] usb 5-1: can't set config #237, error -71 [ 325.934022][ T29] audit: type=1400 audit(1729036772.206:509): avc: denied { create } for pid=12701 comm="syz.2.3770" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 325.964148][ T5905] usb 5-1: USB disconnect, device number 104 [ 326.011768][ T29] audit: type=1400 audit(1729036772.225:510): avc: denied { create } for pid=12703 comm="syz.3.3771" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 326.099059][ T29] audit: type=1400 audit(1729036772.243:511): avc: denied { read write } for pid=5870 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 326.148742][ T29] audit: type=1400 audit(1729036772.252:512): avc: denied { read write } for pid=5857 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 326.173780][ C0] vkms_vblank_simulate: vblank timer overrun [ 326.189528][ T29] audit: type=1400 audit(1729036772.252:513): avc: denied { ioctl } for pid=12670 comm="syz.4.3755" path="/dev/raw-gadget" dev="devtmpfs" ino=732 ioctlcmd=0x550a scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 326.888885][T12760] xt_l2tp: unknown flags: 19 Oct 15 23:59:33 syzkaller kern.info kernel: [ 326.888885][T12760] xt_l2tp: unknown flags: 19 [ 328.137851][ T29] kauditd_printk_skb: 105 callbacks suppressed [ 328.137870][ T29] audit: type=1400 audit(1729036774.311:619): avc: denied { read } for pid=12843 comm="syz.4.3840" name="ptp0" dev="devtmpfs" ino=1073 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=0 Oct 15 23:59:34 syzkaller kern.warn kernel: [ 328.137851][ T29] kauditd_printk_skb: 105 callbacks suppressed Oct 15 23:59:34 syzkaller kern.notice kernel: [ 328.137870][ T29] audit: type=1400 audit(1729036774.311:619): avc: denied { read } for pid=12843 comm="syz.4.3840" name="ptp0" dev="devtmpfs" ino=1073 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_devi [ 328.220886][ T29] audit: type=1400 audit(1729036774.320:620): avc: denied { read } for pid=4660 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Oct 15 23:59:34 syzkaller kern.notice kernel: [ 328.220886][ T29] audit: type=1400 audit(1729036774.320:620): avc: denied { read } for pid=4660 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontex[ 328.272086][ T29] audit: type=1400 audit(1729036774.338:621): avc: denied { read } for pid=4660 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 t=system_u:object_r:var_t tclass=l Oct 15 23:59:34 syzkaller kern.notice kernel: [ 328.272086][ [ 328.307745][ T29] audit: type=1400 audit(1729036774.338:622): avc: denied { read write } for pid=5860 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 T29] audit: type=1400 audit(1729036774.338:621): avc: denied { read } for pid=4660 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l Oct 15 23:59:34 syzkaller kern.notice kernel: [ 328.307745][ T29] audit: type=1400 audit(1729036774.338:622): avc: denied { read write } for pid=5860 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object[ 328.373087][ T29] audit: type=1400 audit(1729036774.347:623): avc: denied { create } for pid=12845 comm="syz.2.3841" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 _r:fix Oct 15 23:59:34 syzkaller kern.notice kernel: [ 328.373087][ T29] audit: type=1400 audit(1729036774.347:623): avc: denied { create } for pid=12845 comm="syz.2.3841" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 328.429580][ T29] audit: type=1400 audit(1729036774.384:624): avc: denied { read write } for pid=5870 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Oct 15 23:59:34 syzkaller kern.notice kernel: [ [ 328.461230][ T29] audit: type=1400 audit(1729036774.384:625): avc: denied { read } for pid=12847 comm="syz.3.3842" dev="nsfs" ino=4026532846 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 328.429580][ T29] audit: type=1400 audit(1729036774.384:624): avc: denied { read write } for pid=5870 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fix Oct 15 23:59:34 syzkaller kern.notice kernel: [ 328.461230][ T29] audit: type=1400 audit([ 328.509810][ T29] audit: type=1400 audit(1729036774.412:626): avc: denied { read write } for pid=5857 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 1729036774.384:625): avc: denied { read } for pid=12847 comm="syz.3.3842" dev="nsfs" ino=4026532846 scontext=root:sysadm_r:sy[ 328.544591][ T29] audit: type=1400 audit(1729036774.412:627): avc: denied { read } for pid=4660 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 sadm_t tcontext=system_u:object_r:nsfs_t tclass=file p Oct 15 23:59:34 syzkaller kern.notice kernel: [ 328.509810][ T29] audit: type=1400 audit(1729036774.412:626): avc: denied { read write } for pid=5857 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:ob[ 328.594411][ T29] audit: type=1400 audit(1729036774.431:628): avc: denied { read write } for pid=5868 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 ject_r:fix Oct 15 23:59:34 syzkaller kern.notice kernel: [ 328.544591][ T29] audit: type=1400 audit(1729036774.412:627): avc: denied { read } for pid=4660 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l Oct 15 23:59:34 syzkaller kern.notice kernel: [ 328.594411][ T29] audit: type=1400 audit(1729036774.431:628): avc: denied { read write } for pid=5868 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fix [ 330.123340][T12967] UBIFS error (pid: 12967): cannot open "(null)", error -22 [ 330.165652][T12969] xt_CT: No such helper "syz0" Oct 15 23:59:36 syzkaller kern.err kernel: [ 330.123340][T12967] UBIFS error (pid: 12967): cannot open "(null)", error -22 Oct 15 23:59:36 syzkaller kern.info kernel: [ 330.165652][T12969] xt_CT: No such helper "syz0" [ 330.399849][T12985] xt_addrtype: input interface limitation not valid in POSTROUTING and OUTPUT Oct 15 23:59:36 syzkaller kern.info kernel: [ 330.399849][T12985] xt_addrtype: input interface limitation not valid in POSTROUTING and OUTPUT [ 330.651293][T13003] trusted_key: encrypted_key: key description must be 16 hexadecimal characters long Oct 15 23:59:36 syzkaller kern.err kernel: [ 330.651293][T13003] trusted_key: encrypted_key: key description must be 16 hexadecimal characters long [ 331.987643][ T1268] ieee802154 phy0 wpan0: encryption failed: -22 [ 331.994512][ T1268] ieee802154 phy1 wpan1: encryption failed: -22 Oct 15 23:59:37 syzkaller kern.warn kernel: [ 331.987643][ T1268] ieee802154 phy0 wpan0: encryption failed: -22 Oct 15 23:59:37 syzkaller kern.warn kernel: [ 331.994512][ T1268] ieee802154 phy1 wpan1: encryption failed: -22 [ 332.394670][T13117] xt_policy: neither incoming nor outgoing policy selected Oct 15 23:59:38 syzkaller kern.info kernel: [ 332.394670][T13117] xt_policy: neither incoming nor outgoing policy selected [ 333.563142][ T29] kauditd_printk_skb: 264 callbacks suppressed [ 333.563161][ T29] audit: type=1400 audit(1729036779.313:893): avc: denied { mount } for pid=13189 comm="syz.3.4013" name="/" dev="selinuxfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=filesystem permissive=0 Oct 15 23:59:39 syzkaller kern.warn kernel: [ 333.563142][ T29] kauditd_printk_skb: 264 callbacks suppressed Oct 15 23:59:39 syzkaller kern.notice kernel: [ 333.563161][ T29] audit: typ[ 333.634506][ T29] audit: type=1400 audit(1729036779.313:894): avc: denied { prog_load } for pid=13194 comm="syz.0.4015" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 e=1400 audit(1729036779.313:893): avc: denied { mount } for pid=13189 comm="syz.3.4013" name="/" dev="selinuxfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tcl Oct 15 23:59:39 syzkaller kern.notice kernel: [ 333.634506][ T29] audit: type=1400 audit(1729036779.313:894): avc: denied { prog_load } for pid=13194 comm="syz.0.4015" scontext=root:sysadm_r:sysadm_t tc[ 333.707741][ T29] audit: type=1400 audit(1729036779.369:895): avc: denied { read write } for pid=5868 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 ontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Oct 15 23:59:39 syzkaller kern.notice kernel: [ 333.707741][ T29] audit: type=1400 audit(1729036779.369:895): avc: denied { read write } for pid=5868 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fix [ 333.787289][ T29] audit: type=1400 audit(1729036779.369:896): avc: denied { read } for pid=4660 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Oct 15 23:59:39 syzkaller kern.notice kernel: [ 333.787289][ T29] audit: type=1400 audit(1729036779.369:896): avc: denied { read } for pid[ 333.828763][ T29] audit: type=1400 audit(1729036779.369:897): avc: denied { read } for pid=4660 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 =4660 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontex[ 333.859807][ T29] audit: type=1400 audit(1729036779.378:898): avc: denied { read write } for pid=5870 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 t=system_u:object_r:var_t tclass=l Oct 15 23:59:39 syzkaller kern.notice kernel: [ 333.828763][ T29] audit: type=1400 audit(1729036779.369:897): avc: denied { read } for pid=4660 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l Oct 15 23:59:39 syzkalle[ 333.912832][ T29] audit: type=1400 audit(1729036779.406:899): avc: denied { read write } for pid=5873 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 r kern.notice kernel: [ 333.859807][ T29] audit: type=1400 audit(1729036779.378:898): avc: denied { read wr[ 333.946217][ T29] audit: type=1400 audit(1729036779.406:900): avc: denied { read write } for pid=5857 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 ite } for pid=5870 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fix Oct 15 23:59:39 syzkaller kern.notice kernel: [ 333.912832][ T29] audit: type=1400 audit(1729036779.406:899): avc: denied { read write } for pid=5873 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fix Oct 15 23:59:39 syzkaller kern.notice kernel: [ 333.946217][ T29] audit: type=1400 audit(1729036779.406:900): avc: denied { read write } for pid=5857 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=roo[ 334.026576][ T29] audit: type=1400 audit(1729036779.415:901): avc: denied { read write } for pid=5860 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 t:sysadm_r:sysadm_t tcontext=system_u:object_r:fix Oct 15 23:59:39 syzkaller kern.notice kernel: [ 334.026576][ T29] audit: type=1400 audit(1729036779.415:901): avc: denied { read write } for pid=5860 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fix [ 334.112802][ T29] audit: type=1400 audit(1729036779.433:902): avc: denied { read } for pid=4660 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Oct 15 23:59:39 syzkaller kern.notice kernel: [ 334.112802][ T29] audit: type=1400 audit(1729036779.433:902): avc: denied { read } for pid=4660 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l [ 335.073925][T13290] IPVS: sync thread started: state = BACKUP, mcast_ifn = lo, syncid = 0, id = 0 Oct 15 23:59:40 syzkaller kern.info kernel: [ 335.073925][T13290] IPVS: sync thread started: state = BACKUP, mcast_ifn = lo, syncid = 0, id = 0 [ 338.734493][T13527] xt_addrtype: ipv6 PROHIBIT (THROW, NAT ..) matching not supported Oct 15 23:59:44 syzkaller kern.info kernel: [ 338.734493][T13527] xt_addrtype: ipv6 PROHIBIT (THROW, NAT ..) matching not supported [ 338.987809][ T29] kauditd_printk_skb: 256 callbacks suppressed [ 338.987830][ T29] audit: type=1400 audit(1729036784.317:1159): avc: denied { create } for pid=13546 comm="syz.2.4187" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 Oct 15 23:59:44 syzkaller kern.warn kernel: [ 338.987809][ T29] kauditd_printk_skb: 256 callbacks suppressed Oct 15 23:59:44 syzkaller kern.notice kernel: [ 338.987830][ T29] audit: type=1400 audit(1729036784.317:1159): avc: denied { create } for pid=13546 comm=[ 339.038561][ T29] audit: type=1400 audit(1729036784.326:1160): avc: denied { read write } for pid=5870 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 "syz.2.4187" sco[ 339.064003][ T29] audit: type=1400 audit(1729036784.354:1161): avc: denied { read } for pid=4660 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ntext=root:sysad[ 339.088300][ T29] audit: type=1400 audit(1729036784.354:1162): avc: denied { read } for pid=4660 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 m_r:sysadm_t tco[ 339.111628][ T29] audit: type=1400 audit(1729036784.363:1163): avc: denied { read write } for pid=5873 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 ntext=root:sysad[ 339.137170][ T29] audit: type=1400 audit(1729036784.363:1164): avc: denied { map_create } for pid=13548 comm="syz.0.4190" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 m_r:sysadm_t tcl[ 339.157646][ T29] audit: type=1400 audit(1729036784.400:1165): avc: denied { read } for pid=4660 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ass=netlink_netf[ 339.181073][ T29] audit: type=1400 audit(1729036784.464:1166): avc: denied { prog_load } for pid=13550 comm="syz.4.4189" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 ilter_socket per[ 339.201485][ T29] audit: type=1400 audit(1729036784.464:1167): avc: denied { create } for pid=13552 comm="syz.3.4188" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 mis Oct 15 23:5[ 339.222477][ T29] audit: type=1400 audit(1729036784.483:1168): avc: denied { read write } for pid=5870 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 9:44 syzkaller kern.notice kernel: [ 339.038561][ T29] audit: type=1400 audit(1729036784.326:1160): avc: denied { read write } for pid=5870 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Oct 15 23:59:44 syzkaller kern.notice kernel: [ 339.064003][ T29] audit: type=1400 audit(1729036784.354:1161): avc: denied { read } for pid=4660 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 15 23:59:44 syzkaller kern.notice kernel: [ 339.088300][ T29] audit: type=1400 audit(1729036784.354:1162): avc: denied { read } for pid=4660 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 15 23:59:44 syzkaller kern.notice kernel: [ 339.111628][ T29] audit: type=1400 audit(1729036784.363:1163): avc: denied { read write } for pid=5873 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Oct 15 23:59:44 syzkaller kern.notice kernel: [ 339.137170][ T29] audit: type=1400 audit(1729036784.363:1164): avc: denied { map_create } for pid=13548 comm="syz.0.4190" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Oct 15 23:59:44 syzkaller kern.notice kernel: [ 339.157646][ T29] audit: type=1400 audit(1729036784.400:1165): avc: denied { read } for pid=4660 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 15 23:59:44 syzkaller kern.notice kernel: [ 339.181073][ T29] audit: type=1400 audit(1729036784.464:1166): avc: denied { prog_load } for pid=13550 comm="syz.4.4189" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Oct 15 23:59:44 syzkaller kern.notice kernel: [ 339.201485][ T29] audit: type=1400 audit(1729036784.464:1167): avc: denied { create } for pid=13552 comm="syz.3.4188" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 Oct 15 23:59:44 syzkaller kern.notice kernel: [ 339.222477][ T29] audit: type=1400 audit(1729036784.483:1168): avc: denied { read write } for pid=5870 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 340.052209][T13611] ip6t_rpfilter: unknown options Oct 15 23:59:45 syzkaller kern.info kernel: [ 340.052209][T13611] ip6t_rpfilter: unknown options [ 342.581456][T13796] : renamed from vlan0 (while UP) Oct 15 23:59:47 syzkaller kern.info kernel: [ 342.581456][T13796] : renamed from vlan0 (while UP) [ 343.064045][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 343.077106][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 343.090930][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 343.103409][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 343.115877][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 343.128354][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 343.142902][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 343.143245][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 343.143569][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 343.143899][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Oct 15 23:59:48 syzkaller kern.warn kernel: [ 343.064045][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Oct 15 23:59:48 syzkaller kern.warn kernel: [ 343.077106][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Oct 15 23:59:48 syzkaller kern.warn kernel: [ 343.090930][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Oct 15 23:59:48 syzkaller kern.warn kernel: [ 343.103409][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Oct 15 23:59:48 syzkaller kern.warn kernel: [ 343.115877][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Oct 15 23:59:48 syzkaller kern.warn kernel: [ 343.128354][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Oct 15 23:59:48 syzkaller kern.warn kernel: [ 343.142902][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Oct 15 23:59:48 syzkaller kern.warn kernel: [ 343.143245][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Oct 15 23:59:48 syzkaller kern.warn kernel: [ 343.143569][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Oct 15 23:59:48 syzkaller kern.warn kernel: [ 343.143899][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 344.245085][T13864] trusted_key: encrypted_key: master key parameter 'user:' is invalid Oct 15 23:59:49 syzkaller kern.info kernel: [ 344.245085][T13864] trusted_key: encrypted_key: master key parameter 'user:' is invalid [ 344.446981][ T29] kauditd_printk_skb: 268 callbacks suppressed [ 344.447002][ T29] audit: type=1400 audit(1729036789.356:1437): avc: denied { read write } for pid=5873 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Oct 15 23:59:49 syzkaller kern.warn kernel: [ 344.446981][ T29] kauditd_printk_skb: 268 callbacks suppressed Oct 15 23:59:49 syzkaller kern.notice kernel: [ 344.447002][ T29] audit: type=1400 audit(1729036789.356:1437): avc: denied { read write } for pid=5873 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 344.632086][ T29] audit: type=1400 audit(1729036789.412:1438): avc: denied { read } for pid=4660 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Oct 15 23:59:49 syzkaller kern.notice kernel: [ 344.632086][ T29] audit: type=1400 audit(1729036789.412:1438): avc: denied { read } for pid=4660 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 344.805403][ T29] audit: type=1400 audit(1729036789.412:1439): avc: denied { read } for pid=4660 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Oct 15 23:59:49 syzkaller kern.notice kernel: [ 344.805403][ T29] audit: type=1400 audit(1729036789.412:1439): avc: denied { read } for pid=4660 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 344.983042][ T29] audit: type=1400 audit(1729036789.430:1440): avc: denied { write } for pid=13865 comm="syz.3.4346" name="softnet_stat" dev="proc" ino=4026532885 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=0 Oct 15 23:59:49 syzkaller kern.notice kernel: [ 344.983042][ T29] audit: type=1400 audit(1729036789.430:1440): avc: denied { write } for pid=13865 comm="syz.3.4346" name="softnet_stat" dev="proc" ino=4026532885 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_ [ 345.184658][ T29] audit: type=1400 audit(1729036789.476:1441): avc: denied { mounton } for pid=13866 comm="syz.0.4347" path="/765/file0" dev="tmpfs" ino=3853 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 Oct 15 23:59:50 syzkaller kern.notice kernel: [ 345.184658][ T29] audit: type=1400 audit(1729036789.476:1441): avc: denied { mounton } for pid=13866 comm="syz.0.4347" path="/765/file0" dev="tmpfs" ino=3853 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tm [ 345.349374][ T29] audit: type=1400 audit(1729036789.486:1442): avc: denied { write } for pid=13870 comm="syz.4.4349" name="ip_vs" dev="proc" ino=4026533351 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=0 Oct 15 23:59:50 syzkaller kern.notice kernel: [ 345.349374][ T29] audit: type=1400 audit(1729036789.486:1442): avc: denied { write } for pid=13870 comm="syz.4.4349" name="ip_vs" dev="proc" ino=4026533351 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_ [ 345.518910][ T29] audit: type=1400 audit(1729036789.559:1443): avc: denied { read } for pid=4660 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Oct 15 23:59:50 syzkaller kern.notice kernel: [ 345.518910][ T29] audit: type=1400 audit(1729036789.559:1443): avc: denied { read } for pid=4660 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 345.687833][ T29] audit: type=1400 audit(1729036789.569:1444): avc: denied { read } for pid=13873 comm="syz.1.4350" name="rtc0" dev="devtmpfs" ino=836 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=0 Oct 15 23:59:50 syzkaller kern.notice kernel: [ 345.687833][ T29] audit: type=1400 audit(1729036789.569:1444): avc: denied { read } for pid=13873 comm="syz.1.4350" name="rtc0" dev="devtmpfs" ino=836 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_devi [ 345.878156][ T29] audit: type=1400 audit(1729036789.578:1445): avc: denied { read write } for pid=5860 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Oct 15 23:59:50 syzkaller kern.notice kernel: [ 345.878156][ T29] audit: type=1400 audit(1729036789.578:1445): avc: denied { read write } for pid=5860 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 346.043264][ T29] audit: type=1400 audit(1729036789.606:1446): avc: denied { read write } for pid=5870 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Oct 15 23:59:50 syzkaller kern.notice kernel: [ 346.043264][ T29] audit: type=1400 audit(1729036789.606:1446): avc: denied { read write } for pid=5870 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 348.489055][ C1] net_ratelimit: 17513 callbacks suppressed [ 348.489081][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 348.507411][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 348.519829][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 348.520213][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 348.520576][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 348.520930][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 348.521323][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 348.581257][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 348.593659][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 348.606114][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Oct 15 23:59:53 syzkaller kern.warn kernel: [ 348.489055][ C1] net_ratelimit: 17513 callbacks suppressed Oct 15 23:59:53 syzkaller kern.warn kernel: [ 348.489081][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Oct 15 23:59:53 syzkaller kern.warn kernel: [ 348.507411][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Oct 15 23:59:53 syzkaller kern.warn kernel: [ 348.519829][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Oct 15 23:59:53 syzkaller kern.warn kernel: [ 348.520213][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Oct 15 23:59:53 syzkaller kern.warn kernel: [ 348.520576][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Oct 15 23:59:53 syzkaller kern.warn kernel: [ 348.520930][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Oct 15 23:59:53 syzkaller kern.warn kernel: [ 348.521323][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Oct 15 23:59:53 syzkaller kern.warn kernel: [ 348.581257][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Oct 15 23:59:53 syzkaller kern.warn kernel: [ 348.593659][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Oct 15 23:59:53 syzkaller kern.warn kernel: [ 348.606114][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 349.912219][ T29] kauditd_printk_skb: 126 callbacks suppressed [ 349.912240][ T29] audit: type=1400 audit(1729036794.405:1573): avc: denied { read write } for pid=5857 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Oct 15 23:59:54 syzkaller kern.warn kernel: [ 349.912219][ T29] kauditd_printk_skb: 126 callbacks suppressed Oct 15 23:59:54 syzkaller kern.notice kernel: [ 349.912240][ T29] audit: type=1400 audit(1729036794.405:1573): avc: denied { read write } for pid=5857 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 350.079558][ T29] audit: type=1400 audit(1729036794.433:1574): avc: denied { create } for pid=14023 comm="syz.0.4426" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=0 Oct 15 23:59:54 syzkaller kern.notice kernel: [ 350.079558][ T29] audit: type=1400 audit(1729036794.433:1574): avc: denied { create } for pid=14023 comm="syz.0.4426" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=0 [ 350.207840][ T29] audit: type=1400 audit(1729036794.433:1575): avc: denied { read write } for pid=5860 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Oct 15 23:59:54 syzkaller kern.notice kernel: [ 350.207840][ T29] audit: type=1400 audit(1729036794.433:1575): avc: denied { read write } for pid=5860 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 350.373328][ T29] audit: type=1400 audit(1729036794.461:1576): avc: denied { read } for pid=4660 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Oct 15 23:59:54 syzkaller kern.notice kernel: [ 350.373328][ T29] audit: type=1400 audit(1729036794.461:1576): avc: denied { read } for pid=4660 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 350.518686][ T29] audit: type=1400 audit(1729036794.461:1577): avc: denied { read } for pid=4660 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Oct 15 23:59:54 syzkaller kern.notice kernel: [ 350.518686][ T29] audit: type=1400 audit(1729036794.461:1577): avc: denied { read } for pid=4660 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 350.682995][ T29] audit: type=1400 audit(1729036794.479:1578): avc: denied { read write } for pid=5868 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Oct 15 23:59:55 syzkaller kern.notice kernel: [ 350.682995][ T29] audit: type=1400 audit(1729036794.479:1578): avc: denied { read write } for pid=5868 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 350.824211][ T29] audit: type=1400 audit(1729036794.553:1579): avc: denied { read write } for pid=5870 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Oct 15 23:59:55 syzkaller kern.notice kernel: [ 350.824211][ T29] audit: type=1400 audit(1729036794.553:1579): avc: denied { read write } for pid=5870 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 350.986117][ T29] audit: type=1400 audit(1729036794.590:1580): avc: denied { read write } for pid=5873 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Oct 15 23:59:55 syzkaller kern.notice kernel: [ 350.986117][ T29] audit: type=1400 audit(1729036794.590:1580): avc: denied { read write } for pid=5873 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 351.187205][ T29] audit: type=1400 audit(1729036794.599:1581): avc: denied { read } for pid=4660 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Oct 15 23:59:55 syzkaller kern.notice kernel: [ 351.187205][ T29] audit: type=1400 audit(1729036794.599:1581): avc: denied { read } for pid=4660 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 351.371094][ T29] audit: type=1400 audit(1729036794.617:1582): avc: denied { prog_load } for pid=14028 comm="syz.2.4427" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Oct 15 23:59:55 syzkaller kern.notice kernel: [ 351.371094][ T29] audit: type=1400 audit(1729036794.617:1582): avc: denied { prog_load } for pid=14028 comm="syz.2.4427" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 353.667841][T14135] netlink: 4 bytes leftover after parsing attributes in process `syz.2.4479'. Oct 15 23:59:57 syzkaller kern.warn kernel: [ 353.667841][T14135] netlink: 4 bytes leftover after parsing attributes in process `syz.2.4479'. [ 353.917056][ C1] net_ratelimit: 18007 callbacks suppressed [ 353.917080][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:1a:d5:66:1d:5a, vlan:0) [ 353.935448][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 353.947914][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:1a:d5:66:1d:5a, vlan:0) [ 353.948200][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 353.948599][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:1a:d5:66:1d:5a, vlan:0) [ 353.948873][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 353.949313][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:1a:d5:66:1d:5a, vlan:0) [ 353.949629][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 353.949987][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:1a:d5:66:1d:5a, vlan:0) [ 353.950239][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 354.034097][T14145] mapping of prio or/and queue is allowed only from OUTPUT/FORWARD/POSTROUTING chains Oct 15 23:59:58 syzkaller kern.warn kernel: [ 353.917056][ C1] net_ratelimit: 18007 callbacks suppressed Oct 15 23:59:58 syzkaller kern.warn kernel: [ 353.917080][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:1a:d5:66:1d:5a, vlan:0) Oct 15 23:59:58 syzkaller kern.warn kernel: [ 353.935448][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Oct 15 23:59:58 syzkaller kern.warn kernel: [ 353.947914][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:1a:d5:66:1d:5a, vlan:0) Oct 15 23:59:58 syzkaller kern.warn kernel: [ 353.948200][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Oct 15 23:59:58 syzkaller kern.warn kernel: [ 353.948599][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:1a:d5:66:1d:5a, vlan:0) Oct 15 23:59:58 syzkaller kern.warn kernel: [ 353.948873][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Oct 15 23:59:58 syzkaller kern.warn kernel: [ 353.949313][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:1a:d5:66:1d:5a, vlan:0) Oct 15 23:59:58 syzkaller kern.warn kernel: [ 353.949629][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Oct 15 23:59:58 syzkaller kern.warn kernel: [ 353.949987][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:1a:d5:66:1d:5a, vlan:0) Oct 15 23:59:58 syzkaller kern.warn kernel: [ 353.950239][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Oct 15 23:59:58 syzkaller kern.info kernel: [ 354.034097][T14145] mapping of prio or/and queue is allowed only from OUTPUT/FORWARD/POSTROUTING chains [ 354.557928][T14158] ebt_among: dst integrity fail: 200 Oct 15 23:59:58 syzkaller kern.err kernel: [ 354.557928][T14158] ebt_among: dst integrity fail: 200 [ 355.384860][ T29] kauditd_printk_skb: 576 callbacks suppressed [ 355.384880][ T29] audit: type=1400 audit(1729036799.454:2159): avc: denied { read write } for pid=14178 comm="syz.2.4502" name="video36" dev="devtmpfs" ino=959 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l_device_t tclass=chr_file permissive=0 Oct 15 23:59:59 syzkaller kern.warn kernel: [ 355.384860][ T29] kauditd_printk_skb: 576 callbacks suppressed Oct 15 23:59:59 syzkaller kern.notice kernel: [ 355.384880][ T29] audit: type=1400 audit(1729036799.454:2159): avc: denied { read write } for pid=14178 comm="syz.2.4502" name="video36" dev="devtmpfs" ino=959 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v [ 355.534941][ T5857] audit: audit_backlog=65 > audit_backlog_limit=64 [ 355.541514][ T5857] audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 [ 355.562189][ T4660] audit: audit_backlog=65 > audit_backlog_limit=64 [ 355.598680][ T5870] audit: audit_backlog=65 > audit_backlog_limit=64 [ 355.605241][ T5870] audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 [ 355.618464][ T29] audit: type=1400 audit(1729036799.482:2160): avc: denied { read write } for pid=5860 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 355.649883][ T4660] audit: audit_lost=3 audit_rate_limit=0 audit_backlog_limit=64 [ 355.695063][ T4660] audit: backlog limit exceeded Oct 15 23:59:59 [ 355.700620][ T4660] audit: audit_backlog=65 > audit_backlog_limit=64 syzkaller kern.warn kernel: [ 355.534941][ T5857] audit: audit_backlog=65 > audit_backlog_limit=64 Oct 15 23:59:59 syzkaller kern.warn kernel: [ 355.541514][ T5857] audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Oct 15 23:59:59 syzkaller kern.warn kernel: [ 355.562189][ T4660] audit: audit_backlog=65 > audit_backlog_limit=64 Oct 15 23:59:59 syzkaller kern.warn kernel: [ 355.598680][ T5870] audit: audit_backlog=65 > audit_backlog_limit=64 Oct 15 23:59:59 syzkaller kern.warn kernel: [ 355.605241][ T5870] audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 Oct 15 23:59:59 syzkaller kern.notice kernel: [ 355.618464][ T29] audit: type=1400 audit(1729036799.482:2160): avc: denied { read write } for pid=5860 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Oct 15 23:59:59 syzkaller kern.warn kernel: [ 355.649883][ T4660] audit: audit_lost=3 audit_rate_limit=0 audit_backlog_limit=64 Oct 15 23:59:59 syzkaller kern.err kernel: [ 355.695063][ T4660] audit: backlog limit exceeded Oct 15 23:59:59 syzkaller kern.warn kernel: [ 355.700620][ T4660] audit: audit_backlog=65 > audit_backlog_limit=64 [ 358.462414][T14254] tc_dump_action: action bad kind Oct 16 00:00:02 syzkaller kern.info kernel: [ 358.462414][T14254] tc_dump_action: action bad kind [ 359.198851][T14281] xt_l2tp: v2 tid > 0xffff: 262144 Oct 16 00:00:03 syzkaller kern.info kernel: [ 359.198851][T14281] xt_l2tp: v2 tid > 0xffff: 262144 [ 359.345051][ C1] net_ratelimit: 18284 callbacks suppressed [ 359.345074][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:1a:d5:66:1d:5a, vlan:0) [ 359.363513][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 359.375975][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:1a:d5:66:1d:5a, vlan:0) [ 359.376254][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 359.376629][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:1a:d5:66:1d:5a, vlan:0) [ 359.376893][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 359.377269][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:1a:d5:66:1d:5a, vlan:0) [ 359.377606][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 359.377992][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:1a:d5:66:1d:5a, vlan:0) [ 359.378255][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Oct 16 00:00:03 syzkaller kern.warn kernel: [ 359.345051][ C1] net_ratelimit: 18284 callbacks suppressed Oct 16 00:00:03 syzkaller kern.warn kernel: [ 359.345074][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:1a:d5:66:1d:5a, vlan:0) Oct 16 00:00:03 syzkaller kern.warn kernel: [ 359.363513][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Oct 16 00:00:03 syzkaller kern.warn kernel: [ 359.375975][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:1a:d5:66:1d:5a, vlan:0) Oct 16 00:00:03 syzkaller kern.warn kernel: [ 359.376254][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Oct 16 00:00:03 syzkaller kern.warn kernel: [ 359.376629][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:1a:d5:66:1d:5a, vlan:0) Oct 16 00:00:03 syzkaller kern.warn kernel: [ 359.376893][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Oct 16 00:00:03 syzkaller kern.warn kernel: [ 359.377269][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:1a:d5:66:1d:5a, vlan:0) Oct 16 00:00:03 syzkaller kern.warn kernel: [ 359.377606][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Oct 16 00:00:03 syzkaller kern.warn kernel: [ 359.377992][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:1a:d5:66:1d:5a, vlan:0) Oct 16 00:00:03 syzkaller kern.warn kernel: [ 359.378255][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 360.863306][ T29] kauditd_printk_skb: 1293 callbacks suppressed [ 360.863326][ T29] audit: type=1400 audit(1729036804.512:3429): avc: denied { read } for pid=14326 comm="syz.2.4574" dev="nsfs" ino=4026532807 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 Oct 16 00:00:04 syzkaller kern.warn kernel: [ 360.863306][ T29] kauditd_printk_skb: 1293 callbacks suppressed Oct 16 00:00:04 syzkaller kern.notice kernel: [ 360.863326][ T29] audit: type=1400 audit(1729036804.512:3429): avc: denied { read } for pid=14326 comm="syz.2.4574" dev="nsfs" ino=4026532807 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file [ 361.019416][ T29] audit: type=1400 audit(1729036804.567:3430): avc: denied { read } for pid=4660 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Oct 16 00:00:04 syzkaller kern.notice kernel: [ 361.019416][ T29] audit: type=1400 audit(1729036804.567:3430): avc: denied { read } for pid=4660 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 361.185079][ T29] audit: type=1400 audit(1729036804.567:3431): avc: denied { read } for pid=4660 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Oct 16 00:00:04 syzkaller kern.notice kernel: [ 361.185079][ T29] audit: type=1400 audit(1729036804.567:3431): avc: denied { read } for pid=4660 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 361.410100][ T29] audit: type=1400 audit(1729036804.623:3432): avc: denied { read write } for pid=5873 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Oct 16 00:00:05 syzkaller kern.notice kernel: [ 361.410100][ T29] audit: type=1400 audit(1729036804.623:3432): avc: denied { read write } for pid=5873 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 361.595909][ T29] audit: type=1400 audit(1729036804.660:3433): avc: denied { read write } for pid=5870 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Oct 16 00:00:05 syzkaller kern.notice kernel: [ 361.595909][ T29] audit: type=1400 audit(1729036804.660:3433): avc: denied { read write } for pid=5870 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 361.763112][ T29] audit: type=1400 audit(1729036804.687:3434): avc: denied { read } for pid=4660 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Oct 16 00:00:05 syzkaller kern.notice kernel: [ 361.763112][ T29] audit: type=1400 audit(1729036804.687:3434): avc: denied { read } for pid=4660 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 361.945250][ T29] audit: type=1400 audit(1729036804.697:3435): avc: denied { read write } for pid=5857 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Oct 16 00:00:05 syzkaller kern.notice kernel: [ 361.945250][ T29] audit: type=1400 audit(1729036804.697:3435): avc: denied { read write } for pid=5857 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 362.133440][ T29] audit: type=1400 audit(1729036804.724:3436): avc: denied { read write } for pid=5868 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Oct 16 00:00:05 syzkaller kern.notice kernel: [ 362.133440][ T29] audit: type=1400 audit(1729036804.724:3436): avc: denied { read write } for pid=5868 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 362.324352][ T29] audit: type=1400 audit(1729036804.807:3437): avc: denied { create } for pid=14332 comm="syz.1.4577" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 Oct 16 00:00:05 syzkaller kern.notice kernel: [ 362.324352][ T29] audit: type=1400 audit(1729036804.807:3437): avc: denied { create } for pid=14332 comm="syz.1.4577" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permis [ 362.484989][ T29] audit: type=1400 audit(1729036804.835:3438): avc: denied { read write } for pid=5860 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Oct 16 00:00:06 syzkaller kern.notice kernel: [ 362.484989][ T29] audit: type=1400 audit(1729036804.835:3438): avc: denied { read write } for pid=5860 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 363.950515][T14414] xt_CT: You must specify a L4 protocol and not use inversions on it [ 363.981947][ C1] sched: DL replenish lagged too much Oct 16 00:00:07 syzkaller kern.info kernel: [ 363.950515][T14414] xt_CT: You must specify a L4 protocol and not use inversions on it Oct 16 00:00:07 syzkaller kern.warn kernel: [ 363.981947][ C1] sched: DL replenish lagged too much [ 364.772994][ C1] net_ratelimit: 18012 callbacks suppressed [ 364.773020][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 364.791398][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 364.803953][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:1a:d5:66:1d:5a, vlan:0) [ 364.804279][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 364.804650][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 364.805059][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 364.805433][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:1a:d5:66:1d:5a, vlan:0) [ 364.805708][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 364.806032][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 364.806447][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) Oct 16 00:00:08 syzkaller kern.warn kernel: [ 364.772994][ C1] net_ratelimit: 18012 callbacks suppressed Oct 16 00:00:08 syzkaller kern.warn kernel: [ 364.773020][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) Oct 16 00:00:08 syzkaller kern.warn kernel: [ 364.791398][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) Oct 16 00:00:08 syzkaller kern.warn kernel: [ 364.803953][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:1a:d5:66:1d:5a, vlan:0) Oct 16 00:00:08 syzkaller kern.warn kernel: [ 364.804279][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Oct 16 00:00:08 syzkaller kern.warn kernel: [ 364.804650][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) Oct 16 00:00:08 syzkaller kern.warn kernel: [ 364.805059][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) Oct 16 00:00:08 syzkaller kern.warn kernel: [ 364.805433][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:1a:d5:66:1d:5a, vlan:0) Oct 16 00:00:08 syzkaller kern.warn kernel: [ 364.805708][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Oct 16 00:00:08 syzkaller kern.warn kernel: [ 364.806032][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) Oct 16 00:00:08 syzkaller kern.warn kernel: [ 364.806447][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 366.382229][ T29] kauditd_printk_skb: 139 callbacks suppressed [ 366.382249][ T29] audit: type=1400 audit(1729036809.607:3578): avc: denied { read write } for pid=5870 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Oct 16 00:00:09 syzkaller kern.warn kernel: [ 366.382229][ T29] kauditd_printk_skb: 139 callbacks suppressed Oct 16 00:00:09 syzkaller kern.notice kernel: [ 366.382249][ T29] audit: type=1400 audit(1729036809.607:3578): avc: denied { read write } for pid=5870 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 366.552705][ T29] audit: type=1400 audit(1729036809.635:3579): avc: denied { read write } for pid=5860 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Oct 16 00:00:09 syzkaller kern.notice kernel: [ 366.552705][ T29] audit: type=1400 audit(1729036809.635:3579): avc: denied { read write } for pid=5860 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 366.723302][ T29] audit: type=1400 audit(1729036809.644:3580): avc: denied { read write } for pid=5873 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Oct 16 00:00:09 syzkaller kern.notice kernel: [ 366.723302][ T29] audit: type=1400 audit(1729036809.644:3580): avc: denied { read write } for pid=5873 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 366.891231][ T29] audit: type=1400 audit(1729036809.644:3581): avc: denied { read write } for pid=5857 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Oct 16 00:00:10 syzkaller kern.notice kernel: [ 366.891231][ T29] audit: type=1400 audit(1729036809.644:3581): avc: denied { read write } for pid=5857 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 367.042814][ T29] audit: type=1400 audit(1729036809.653:3582): avc: denied { read } for pid=4660 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Oct 16 00:00:10 syzkaller kern.notice kernel: [ 367.042814][ T29] audit: type=1400 audit(1729036809.653:3582): avc: denied { read } for pid=4660 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 367.201126][ T29] audit: type=1400 audit(1729036809.653:3583): avc: denied { read } for pid=4660 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Oct 16 00:00:10 syzkaller kern.notice kernel: [ 367.201126][ T29] audit: type=1400 audit(1729036809.653:3583): avc: denied { read } for pid=4660 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 367.378963][ T29] audit: type=1400 audit(1729036809.718:3584): avc: denied { read write } for pid=5868 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Oct 16 00:00:10 syzkaller kern.notice kernel: [ 367.378963][ T29] audit: type=1400 audit(1729036809.718:3584): avc: denied { read write } for pid=5868 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 367.566732][ T29] audit: type=1400 audit(1729036809.810:3585): avc: denied { read } for pid=4660 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Oct 16 00:00:10 syzkaller kern.notice kernel: [ 367.566732][ T29] audit: type=1400 audit(1729036809.810:3585): avc: denied { read } for pid=4660 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 16 00:00:10 syzkaller daemon.err dhcpcd[14514]: ps_bpf_start_bpf: bpf_open: Invalid argument Oct 16 00:00:10 syzkaller daemon.err dhcpcd[14514]: ps_root_recvmsg: Invalid argument [ 367.762865][ T29] audit: type=1400 audit(1729036809.838:3586): avc: denied { create } for pid=14490 comm="syz.3.4655" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=0 Oct 16 00:00:10 syzkaller kern.notice kernel: [ 367.762865][ T29] audit: type=1400 audit(1729036809.838:3586): avc: denied { create } for pid=14490 comm="syz.3.4655" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissi [ 367.926096][ T29] audit: type=1400 audit(1729036809.875:3587): avc: denied { read write } for pid=14496 comm="syz.4.4659" name="raw-gadget" dev="devtmpfs" ino=732 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 Oct 16 00:00:11 syzkaller kern.notice kernel: [ 367.926096][ T29] audit: type=1400 audit(1729036809.875:3587): avc: denied { read write } for pid=14496 comm="syz.4.4659" name="raw-gadget" dev="devtmpfs" ino=732 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_ Oct 16 00:00:12 syzkaller daemon.err dhcpcd[14564]: ps_bpf_start_bpf: bpf_open: Invalid argument Oct 16 00:00:12 syzkaller daemon.err dhcpcd[14564]: ps_root_recvmsg: Invalid argument Oct 16 00:00:12 syzkaller daemon.err dhcpcd[14579]: ps_bpf_start_bpf: bpf_open: Invalid argument Oct 16 00:00:12 syzkaller daemon.err dhcpcd[14579]: ps_root_recvmsg: Invalid argument [ 370.200913][ C1] net_ratelimit: 17902 callbacks suppressed [ 370.200940][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 370.219293][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 370.231800][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:1a:d5:66:1d:5a, vlan:0) [ 370.232094][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 370.232455][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 370.232846][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 370.233197][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:1a:d5:66:1d:5a, vlan:0) [ 370.233537][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 370.233848][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 370.318141][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) Oct 16 00:00:13 syzkaller kern.warn kernel: [ 370.200913][ C1] net_ratelimit: 17902 callbacks suppressed Oct 16 00:00:13 syzkaller kern.warn kernel: [ 370.200940][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) Oct 16 00:00:13 syzkaller kern.warn kernel: [ 370.219293][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) Oct 16 00:00:13 syzkaller kern.warn kernel: [ 370.231800][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:1a:d5:66:1d:5a, vlan:0) Oct 16 00:00:13 syzkaller kern.warn kernel: [ 370.232094][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Oct 16 00:00:13 syzkaller kern.warn kernel: [ 370.232455][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) Oct 16 00:00:13 syzkaller kern.warn kernel: [ 370.232846][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) Oct 16 00:00:13 syzkaller kern.warn kernel: [ 370.233197][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:1a:d5:66:1d:5a, vlan:0) Oct 16 00:00:13 syzkaller kern.warn kernel: [ 370.233537][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Oct 16 00:00:13 syzkaller kern.warn kernel: [ 370.233848][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) Oct 16 00:00:13 syzkaller kern.warn kernel: [ 370.318141][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 374.027736][ T29] kauditd_printk_skb: 109 callbacks suppressed [ 374.027759][ T29] audit: type=1400 audit(1729036816.594:3697): avc: denied { prog_load } for pid=14614 comm="syz.0.4716" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 375.628845][ C1] net_ratelimit: 18111 callbacks suppressed [ 375.628873][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 375.647182][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:1a:d5:66:1d:5a, vlan:0) [ 375.659475][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 375.671749][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 375.684078][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 375.696431][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:1a:d5:66:1d:5a, vlan:0) [ 375.708727][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 375.721009][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 375.733354][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 375.746169][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:1a:d5:66:1d:5a, vlan:0) [ 380.413747][ T29] audit: type=1400 audit(1729036822.557:3698): avc: denied { read } for pid=4660 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 381.056693][ C1] net_ratelimit: 19415 callbacks suppressed [ 381.056720][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:1a:d5:66:1d:5a, vlan:0) [ 381.074995][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 381.087266][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 381.099667][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 381.112148][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:1a:d5:66:1d:5a, vlan:0) [ 381.124451][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 381.137120][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 381.149442][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 381.161804][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:1a:d5:66:1d:5a, vlan:0) [ 381.174098][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 386.484636][ C1] net_ratelimit: 18645 callbacks suppressed [ 386.484662][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 386.502962][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:1a:d5:66:1d:5a, vlan:0) [ 386.515276][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 386.527561][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 386.539888][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 386.552279][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:1a:d5:66:1d:5a, vlan:0) [ 386.564581][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 386.577046][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 386.589605][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 386.602042][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:1a:d5:66:1d:5a, vlan:0) [ 391.912885][ C1] net_ratelimit: 18170 callbacks suppressed [ 391.912912][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 391.931285][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:1a:d5:66:1d:5a, vlan:0) [ 391.943821][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 391.956191][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 391.968548][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 391.980915][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:1a:d5:66:1d:5a, vlan:0) [ 391.993234][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 392.005523][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 392.017874][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 392.030252][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:1a:d5:66:1d:5a, vlan:0) [ 397.340631][ C1] net_ratelimit: 18082 callbacks suppressed [ 397.340658][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 397.358947][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:1a:d5:66:1d:5a, vlan:0) [ 397.371274][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 397.383561][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 397.395895][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 397.408270][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:1a:d5:66:1d:5a, vlan:0) [ 397.420585][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 397.432854][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 397.445194][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 397.457926][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:1a:d5:66:1d:5a, vlan:0) [ 402.768564][ C1] net_ratelimit: 17435 callbacks suppressed [ 402.768591][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:1a:d5:66:1d:5a, vlan:0) [ 402.786826][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 402.799133][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 402.811469][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 402.823842][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:1a:d5:66:1d:5a, vlan:0) [ 402.836269][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 402.848669][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 402.861030][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 402.873960][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:1a:d5:66:1d:5a, vlan:0) [ 402.886301][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 408.196532][ C1] net_ratelimit: 17616 callbacks suppressed [ 408.196560][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 408.214845][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 408.227339][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:1a:d5:66:1d:5a, vlan:0) [ 408.239689][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 408.252035][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 408.264473][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 408.276859][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:1a:d5:66:1d:5a, vlan:0) [ 408.289270][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 408.301591][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 408.313955][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 413.624399][ C1] net_ratelimit: 17590 callbacks suppressed [ 413.624424][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 413.643055][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 413.655425][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:1a:d5:66:1d:5a, vlan:0) [ 413.667771][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 413.680070][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 413.692406][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 413.705070][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:1a:d5:66:1d:5a, vlan:0) [ 413.717457][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 413.730079][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 413.742438][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 419.052475][ C1] net_ratelimit: 18214 callbacks suppressed [ 419.052502][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 419.070837][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 419.083225][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:1a:d5:66:1d:5a, vlan:0) [ 419.095567][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 419.108584][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 419.120919][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 419.133287][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:1a:d5:66:1d:5a, vlan:0) [ 419.145606][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 419.157894][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 419.170233][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 424.480588][ C1] net_ratelimit: 18180 callbacks suppressed [ 424.480615][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:1a:d5:66:1d:5a, vlan:0) [ 424.498856][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 424.511138][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 424.523498][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 424.535880][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:1a:d5:66:1d:5a, vlan:0) [ 424.548216][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 424.560523][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 424.572871][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 424.585248][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:1a:d5:66:1d:5a, vlan:0) [ 424.597577][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 429.908444][ C1] net_ratelimit: 17628 callbacks suppressed [ 429.908470][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 429.927135][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 429.940306][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:1a:d5:66:1d:5a, vlan:0) [ 429.952764][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 429.965075][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 429.977413][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 429.989792][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:1a:d5:66:1d:5a, vlan:0) [ 430.002129][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 430.014445][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 430.026940][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 435.336405][ C1] net_ratelimit: 17510 callbacks suppressed [ 435.336432][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 435.354715][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 435.367236][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:1a:d5:66:1d:5a, vlan:0) [ 435.379981][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 435.392252][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 435.404573][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 435.416946][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:1a:d5:66:1d:5a, vlan:0) [ 435.429232][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 435.441505][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 435.453838][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 440.764185][ C1] net_ratelimit: 17391 callbacks suppressed [ 440.764212][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 440.782514][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:1a:d5:66:1d:5a, vlan:0) [ 440.794861][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 440.807181][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 440.819530][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 440.831949][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:1a:d5:66:1d:5a, vlan:0) [ 440.844258][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 440.856541][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 440.868890][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 440.881261][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:1a:d5:66:1d:5a, vlan:0) [ 446.192432][ C1] net_ratelimit: 17534 callbacks suppressed [ 446.192458][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 446.210842][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:1a:d5:66:1d:5a, vlan:0) [ 446.223155][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 446.235472][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 446.247831][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 446.260202][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:1a:d5:66:1d:5a, vlan:0) [ 446.272582][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 446.284865][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 446.297990][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 446.310360][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:1a:d5:66:1d:5a, vlan:0) [ 451.620129][ C1] net_ratelimit: 17512 callbacks suppressed [ 451.620154][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 451.638642][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 451.651020][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 451.663548][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:1a:d5:66:1d:5a, vlan:0) [ 451.675876][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 451.688191][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 451.700531][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 451.712902][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:1a:d5:66:1d:5a, vlan:0) [ 451.725233][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 451.737520][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 457.048287][ C1] net_ratelimit: 17488 callbacks suppressed [ 457.048315][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 457.066828][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:1a:d5:66:1d:5a, vlan:0) [ 457.079268][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 457.091896][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 457.104346][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 457.116728][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:1a:d5:66:1d:5a, vlan:0) [ 457.129147][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 457.141444][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 457.153800][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 457.166183][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:1a:d5:66:1d:5a, vlan:0) [ 462.476187][ C1] net_ratelimit: 17519 callbacks suppressed [ 462.476213][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:1a:d5:66:1d:5a, vlan:0) [ 462.494447][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 462.506753][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 462.519116][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 462.531500][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:1a:d5:66:1d:5a, vlan:0) [ 462.543805][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 462.556613][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 462.568971][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 462.581368][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:1a:d5:66:1d:5a, vlan:0) [ 462.593736][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 467.904158][ C1] net_ratelimit: 17608 callbacks suppressed [ 467.904184][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 467.922522][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 467.934908][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:1a:d5:66:1d:5a, vlan:0) [ 467.947292][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 467.959618][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 467.972312][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 467.984744][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:1a:d5:66:1d:5a, vlan:0) [ 467.997068][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 468.009537][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 468.022082][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 473.332031][ C1] net_ratelimit: 17469 callbacks suppressed [ 473.332060][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 473.350303][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 473.362661][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 473.375037][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:1a:d5:66:1d:5a, vlan:0) [ 473.387358][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 473.399665][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 473.412514][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 473.424886][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:1a:d5:66:1d:5a, vlan:0) [ 473.437198][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 473.449511][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 478.760028][ C1] net_ratelimit: 17396 callbacks suppressed [ 478.760056][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 478.778368][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:1a:d5:66:1d:5a, vlan:0) [ 478.790688][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 478.802992][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 478.815484][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 478.827855][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:1a:d5:66:1d:5a, vlan:0) [ 478.840286][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 478.852574][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 478.865127][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 478.877513][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:1a:d5:66:1d:5a, vlan:0) [ 484.187885][ C1] net_ratelimit: 17392 callbacks suppressed [ 484.187912][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 484.206154][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 484.218508][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 484.230884][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:1a:d5:66:1d:5a, vlan:0) [ 484.243268][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 484.255567][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 484.267932][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 484.280657][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:1a:d5:66:1d:5a, vlan:0) [ 484.292966][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 484.305249][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 489.615814][ C1] net_ratelimit: 17539 callbacks suppressed [ 489.615842][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 489.634224][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 489.646569][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:1a:d5:66:1d:5a, vlan:0) [ 489.658899][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 489.671277][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 489.683620][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 489.695968][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:1a:d5:66:1d:5a, vlan:0) [ 489.708541][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 489.720846][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 489.733667][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 491.945042][ C1] rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: [ 491.952064][ C1] rcu: Tasks blocked on level-0 rcu_node (CPUs 0-1): P14613/1:b..l [ 491.962301][ C1] rcu: (detected by 1, t=10502 jiffies, g=52177, q=330 ncpus=2) [ 491.970149][ C1] task:syz-executor state:R running task stack:28448 pid:14613 tgid:14613 ppid:5868 flags:0x00004002 [ 491.986075][ C1] Call Trace: [ 491.989397][ C1] [ 491.992373][ C1] __schedule+0xef5/0x5750 [ 491.996933][ C1] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 492.003068][ C1] ? __kernel_text_address+0xd/0x40 [ 492.008309][ C1] ? __pfx_mark_lock+0x10/0x10 [ 492.013113][ C1] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 492.019237][ C1] ? __pfx___schedule+0x10/0x10 [ 492.024157][ C1] ? mark_held_locks+0x9f/0xe0 [ 492.028968][ C1] preempt_schedule_irq+0x51/0x90 [ 492.034060][ C1] irqentry_exit+0x36/0x90 [ 492.038795][ C1] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 492.044834][ C1] RIP: 0010:__sanitizer_cov_trace_pc+0x41/0x70 [ 492.051063][ C1] Code: 00 48 8b 34 24 74 1d f6 c4 01 74 43 a9 00 00 0f 00 75 3c a9 00 00 f0 00 75 35 8b 82 1c 16 00 00 85 c0 74 2b 8b 82 f8 15 00 00 <83> f8 02 75 20 48 8b 8a 00 16 00 00 8b 92 fc 15 00 00 48 8b 01 48 [ 492.070761][ C1] RSP: 0018:ffffc90003377860 EFLAGS: 00000246 [ 492.077231][ C1] RAX: 0000000000000000 RBX: ffff88801e9fce30 RCX: ffffffff81f8bcc5 [ 492.087171][ C1] RDX: ffff888027798000 RSI: ffffffff81fae797 RDI: ffff88801e9fce30 [ 492.095186][ C1] RBP: ffff88801e9fce80 R08: 0000000000000004 R09: 0000000000000001 [ 492.104449][ C1] R10: 0000000000000001 R11: 00000000000a21ec R12: 0000000001580370 [ 492.113525][ C1] R13: 0000000000000001 R14: 0000000000000000 R15: ffff88801e9fce38 [ 492.122393][ C1] ? __reset_page_owner+0x275/0x400 [ 492.127647][ C1] ? page_ext_put+0x17/0xd0 [ 492.132202][ C1] page_ext_put+0x17/0xd0 [ 492.136575][ C1] __reset_page_owner+0x28d/0x400 [ 492.141664][ C1] free_unref_page+0x5f4/0xdc0 [ 492.146481][ C1] __put_partials+0x14c/0x170 [ 492.151228][ C1] qlist_free_all+0x4e/0x120 [ 492.155860][ C1] ? tomoyo_encode2+0x100/0x3e0 [ 492.160749][ C1] kasan_quarantine_reduce+0x192/0x1e0 [ 492.166340][ C1] __kasan_slab_alloc+0x69/0x90 [ 492.171249][ C1] __kmalloc_noprof+0x199/0x400 [ 492.176144][ C1] ? d_absolute_path+0x137/0x1b0 [ 492.181126][ C1] tomoyo_encode2+0x100/0x3e0 [ 492.186026][ C1] tomoyo_encode+0x29/0x50 [ 492.190488][ C1] tomoyo_realpath_from_path+0x19d/0x720 [ 492.196176][ C1] tomoyo_path_perm+0x273/0x450 [ 492.201070][ C1] ? tomoyo_path_perm+0x25f/0x450 [ 492.206149][ C1] ? __pfx_tomoyo_path_perm+0x10/0x10 [ 492.211573][ C1] ? lock_acquire.part.0+0x11b/0x380 [ 492.216910][ C1] ? do_raw_spin_lock+0x12d/0x2c0 [ 492.222097][ C1] ? simple_lookup+0xd6/0x110 [ 492.226815][ C1] ? lookup_one_qstr_excl+0x39/0x190 [ 492.232164][ C1] tomoyo_path_symlink+0x98/0xe0 [ 492.237156][ C1] ? __pfx_tomoyo_path_symlink+0x10/0x10 [ 492.242835][ C1] ? get_current_fs_domain+0x188/0x1f0 [ 492.248354][ C1] security_path_symlink+0x152/0x2e0 [ 492.253692][ C1] do_symlinkat+0x10e/0x310 [ 492.258280][ C1] ? __pfx_do_symlinkat+0x10/0x10 [ 492.263345][ C1] ? getname_flags.part.0+0x1c5/0x550 [ 492.268775][ C1] __x64_sys_symlinkat+0x93/0xc0 [ 492.273760][ C1] do_syscall_64+0xcd/0x250 [ 492.278320][ C1] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 492.284276][ C1] RIP: 0033:0x7f0017d7d577 [ 492.288733][ C1] RSP: 002b:00007fff1aec8f48 EFLAGS: 00000206 ORIG_RAX: 000000000000010a [ 492.297193][ C1] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f0017d7d577 [ 492.305200][ C1] RDX: 00007f0017df19b4 RSI: 00000000ffffff9c RDI: 00007fff1aec8fd0 [ 492.313208][ C1] RBP: 00007fff1aec8f7c R08: 0000000000000017 R09: 00007fff1aec8c97 [ 492.321217][ C1] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000032 [ 492.329218][ C1] R13: 000000000005636a R14: 0000000000056314 R15: 00007fff1aec8fd0 [ 492.337243][ C1] [ 492.340289][ C1] rcu: rcu_preempt kthread starved for 10312 jiffies! g52177 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=0 [ 492.351524][ C1] rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. [ 492.361533][ C1] rcu: RCU grace-period kthread stack dump: [ 492.367444][ C1] task:rcu_preempt state:R running task stack:28400 pid:17 tgid:17 ppid:2 flags:0x00004000 [ 492.379268][ C1] Call Trace: [ 492.382569][ C1] [ 492.385539][ C1] __schedule+0xef5/0x5750 [ 492.390009][ C1] ? __pfx___lock_acquire+0x10/0x10 [ 492.395248][ C1] ? _raw_spin_lock_irqsave+0x42/0x60 [ 492.400685][ C1] ? __pfx___schedule+0x10/0x10 [ 492.405591][ C1] ? schedule+0x298/0x350 [ 492.409971][ C1] ? __pfx_lock_release+0x10/0x10 [ 492.415037][ C1] ? trace_lock_acquire+0x14a/0x1d0 [ 492.420380][ C1] ? lock_acquire+0x2f/0xb0 [ 492.424917][ C1] ? schedule+0x1fd/0x350 [ 492.429304][ C1] schedule+0xe7/0x350 [ 492.433502][ C1] schedule_timeout+0x136/0x2a0 [ 492.438390][ C1] ? __pfx_schedule_timeout+0x10/0x10 [ 492.443807][ C1] ? __pfx_process_timeout+0x10/0x10 [ 492.449146][ C1] ? _raw_spin_unlock_irqrestore+0x3b/0x80 [ 492.454998][ C1] ? prepare_to_swait_event+0xf3/0x470 [ 492.460499][ C1] rcu_gp_fqs_loop+0x1eb/0xb00 [ 492.465304][ C1] ? __pfx_rcu_gp_fqs_loop+0x10/0x10 [ 492.470623][ C1] ? rcu_gp_init+0xc82/0x1630 [ 492.475352][ C1] ? _raw_spin_unlock_irq+0x2e/0x50 [ 492.480609][ C1] ? _raw_spin_unlock_irqrestore+0x52/0x80 [ 492.486478][ C1] rcu_gp_kthread+0x271/0x380 [ 492.491219][ C1] ? __pfx_rcu_gp_kthread+0x10/0x10 [ 492.496458][ C1] ? lockdep_hardirqs_on+0x7c/0x110 [ 492.501712][ C1] ? __kthread_parkme+0x148/0x220 [ 492.506786][ C1] ? __pfx_rcu_gp_kthread+0x10/0x10 [ 492.512027][ C1] kthread+0x2c1/0x3a0 [ 492.516136][ C1] ? _raw_spin_unlock_irq+0x23/0x50 [ 492.521382][ C1] ? __pfx_kthread+0x10/0x10 [ 492.526015][ C1] ret_from_fork+0x45/0x80 [ 492.530469][ C1] ? __pfx_kthread+0x10/0x10 [ 492.535123][ C1] ret_from_fork_asm+0x1a/0x30 [ 492.539951][ C1] [ 492.543006][ C1] rcu: Stack dump where RCU GP kthread last ran: [ 492.549360][ C1] Sending NMI from CPU 1 to CPUs 0: [ 492.554682][ C0] NMI backtrace for cpu 0 [ 492.554706][ C0] CPU: 0 UID: 0 PID: 939 Comm: kworker/0:2 Not tainted 6.12.0-rc3-syzkaller-00044-g2f87d0916ce0 #0 [ 492.554739][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 492.554758][ C0] Workqueue: events nsim_dev_trap_report_work [ 492.554799][ C0] RIP: 0010:__find_rr_leaf+0x296/0xe00 [ 492.554831][ C0] Code: 08 0f 84 80 01 00 00 e8 08 c1 c2 f7 48 83 3c 24 00 74 43 e8 fc c0 c2 f7 48 8d bb 90 00 00 00 48 89 f8 48 c1 e8 03 0f b6 04 28 <84> c0 74 08 3c 03 0f 8e 3a 09 00 00 44 8b a3 90 00 00 00 44 8b 74 [ 492.554857][ C0] RSP: 0018:ffffc900000074e0 EFLAGS: 00000a02 [ 492.554878][ C0] RAX: 0000000000000000 RBX: ffff88802834ec00 RCX: ffffffff89cac299 [ 492.554897][ C0] RDX: ffff888025d03c00 RSI: ffffffff89cac1a4 RDI: ffff88802834ec90 [ 492.554916][ C0] RBP: dffffc0000000000 R08: 0000000000000005 R09: 0000000000000000 [ 492.554933][ C0] R10: 0000000000000001 R11: 0000000000000000 R12: 0000000000000001 [ 492.554950][ C0] R13: ffffc900000077e8 R14: 0000000000000000 R15: ffff88807d39fcb8 [ 492.554968][ C0] FS: 0000000000000000(0000) GS:ffff8880b8600000(0000) knlGS:0000000000000000 [ 492.554995][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 492.555016][ C0] CR2: 00007f3098b052d8 CR3: 00000000789a2000 CR4: 00000000003526f0 [ 492.555034][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 492.555051][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 492.555069][ C0] Call Trace: [ 492.555077][ C0] [ 492.555088][ C0] ? nmi_cpu_backtrace+0x1d8/0x390 [ 492.555121][ C0] ? nmi_cpu_backtrace_handler+0xc/0x20 [ 492.555163][ C0] ? nmi_handle+0x1a9/0x5c0 [ 492.555193][ C0] ? __find_rr_leaf+0x296/0xe00 [ 492.555226][ C0] ? default_do_nmi+0x6a/0x160 [ 492.555255][ C0] ? exc_nmi+0x170/0x1e0 [ 492.555281][ C0] ? end_repeat_nmi+0xf/0x53 [ 492.555338][ C0] ? __find_rr_leaf+0x379/0xe00 [ 492.555366][ C0] ? __find_rr_leaf+0x284/0xe00 [ 492.555393][ C0] ? __find_rr_leaf+0x296/0xe00 [ 492.555421][ C0] ? __find_rr_leaf+0x296/0xe00 [ 492.555451][ C0] ? __find_rr_leaf+0x296/0xe00 [ 492.555478][ C0] [ 492.555487][ C0] [ 492.555499][ C0] ? __pfx___find_rr_leaf+0x10/0x10 [ 492.555527][ C0] ? fib6_node_lookup+0x125/0x180 [ 492.555568][ C0] ? __pfx_fib6_node_lookup+0x10/0x10 [ 492.555617][ C0] fib6_table_lookup+0x57e/0xa30 [ 492.555655][ C0] ? __pfx_fib6_table_lookup+0x10/0x10 [ 492.555685][ C0] ? trace_lock_acquire+0x14a/0x1d0 [ 492.555721][ C0] ? lock_acquire+0x2f/0xb0 [ 492.555746][ C0] ? ip6_pol_route+0x186/0x1120 [ 492.555778][ C0] ip6_pol_route+0x1cd/0x1120 [ 492.555808][ C0] ? __pfx_ip6_pol_route+0x10/0x10 [ 492.555839][ C0] ? __pfx_rt6_multipath_hash+0x10/0x10 [ 492.555877][ C0] ? __pfx_ip6_pol_route_input+0x10/0x10 [ 492.555908][ C0] fib6_rule_lookup+0x536/0x720 [ 492.555949][ C0] ? ip6t_do_table+0xd50/0x1d40 [ 492.555978][ C0] ? __pfx_fib6_rule_lookup+0x10/0x10 [ 492.556022][ C0] ? nf_nat_ipv6_fn+0x103/0x2e0 [ 492.556061][ C0] ? __pfx_nf_nat_ipv6_fn+0x10/0x10 [ 492.556103][ C0] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 492.556150][ C0] ip6_route_input+0x663/0xc10 [ 492.556183][ C0] ? __pfx_ip6_route_input+0x10/0x10 [ 492.556217][ C0] ? __pfx_lock_release+0x10/0x10 [ 492.556241][ C0] ? trace_lock_acquire+0x14a/0x1d0 [ 492.556288][ C0] ? __pfx_ip6_rcv_finish+0x10/0x10 [ 492.556324][ C0] ip6_rcv_finish_core.constprop.0+0x1a0/0x5d0 [ 492.556360][ C0] ipv6_rcv+0x1e4/0x680 [ 492.556390][ C0] ? __pfx_ipv6_rcv+0x10/0x10 [ 492.556419][ C0] __netif_receive_skb_one_core+0x12e/0x1e0 [ 492.556458][ C0] ? __pfx___netif_receive_skb_one_core+0x10/0x10 [ 492.556498][ C0] ? trace_lock_acquire+0x14a/0x1d0 [ 492.556533][ C0] ? process_backlog+0x3f1/0x15f0 [ 492.556572][ C0] ? process_backlog+0x3f1/0x15f0 [ 492.556608][ C0] __netif_receive_skb+0x1d/0x160 [ 492.556645][ C0] process_backlog+0x443/0x15f0 [ 492.556685][ C0] __napi_poll.constprop.0+0xb7/0x550 [ 492.556726][ C0] net_rx_action+0xa92/0x1010 [ 492.556763][ C0] ? tmigr_handle_remote+0x153/0xdd0 [ 492.556796][ C0] ? __pfx_net_rx_action+0x10/0x10 [ 492.556834][ C0] ? __pfx_tmigr_handle_remote+0x10/0x10 [ 492.556863][ C0] ? run_timer_base+0x119/0x190 [ 492.556908][ C0] ? run_timer_base+0x11e/0x190 [ 492.556944][ C0] ? __pfx_run_timer_base+0x10/0x10 [ 492.556983][ C0] handle_softirqs+0x213/0x8f0 [ 492.557017][ C0] ? __pfx_handle_softirqs+0x10/0x10 [ 492.557049][ C0] ? irqtime_account_irq+0x18d/0x2e0 [ 492.557081][ C0] ? nsim_dev_trap_report_work+0x870/0xc80 [ 492.557120][ C0] do_softirq+0xb2/0xf0 [ 492.557149][ C0] [ 492.557158][ C0] [ 492.557166][ C0] __local_bh_enable_ip+0x100/0x120 [ 492.557198][ C0] nsim_dev_trap_report_work+0x870/0xc80 [ 492.557249][ C0] process_one_work+0x9c5/0x1ba0 [ 492.557281][ C0] ? __pfx_wg_packet_tx_worker+0x10/0x10 [ 492.557310][ C0] ? __pfx_process_one_work+0x10/0x10 [ 492.557341][ C0] ? assign_work+0x1a0/0x250 [ 492.557383][ C0] worker_thread+0x6c8/0xf00 [ 492.557414][ C0] ? __kthread_parkme+0x148/0x220 [ 492.557448][ C0] ? __pfx_worker_thread+0x10/0x10 [ 492.557475][ C0] kthread+0x2c1/0x3a0 [ 492.557506][ C0] ? _raw_spin_unlock_irq+0x23/0x50 [ 492.557539][ C0] ? __pfx_kthread+0x10/0x10 [ 492.557573][ C0] ret_from_fork+0x45/0x80 [ 492.557597][ C0] ? __pfx_kthread+0x10/0x10 [ 492.557630][ C0] ret_from_fork_asm+0x1a/0x30 [ 492.557676][ C0] [ 495.043813][ C1] net_ratelimit: 14255 callbacks suppressed [ 495.043839][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 495.062137][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:1a:d5:66:1d:5a, vlan:0) [ 495.074471][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 495.086776][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 495.099136][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 495.111492][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:1a:d5:66:1d:5a, vlan:0) [ 495.123813][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 495.136101][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 495.148440][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 495.160816][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:1a:d5:66:1d:5a, vlan:0) [ 500.471657][ C1] net_ratelimit: 17551 callbacks suppressed [ 500.471684][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:1a:d5:66:1d:5a, vlan:0) [ 500.489932][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 500.502210][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 500.514566][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 500.526944][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:1a:d5:66:1d:5a, vlan:0) [ 500.539252][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 500.551539][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 500.564691][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 500.577260][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:2e:1a:d5:66:1d:5a, vlan:0) [ 500.589699][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)