last executing test programs: 3.513755581s ago: executing program 2 (id=4812): r0 = syz_open_dev$I2C(&(0x7f0000000000), 0x0, 0x0) ioctl$I2C_PEC(r0, 0x708, 0x9) ioctl$I2C_SMBUS(r0, 0x720, &(0x7f00000002c0)={0x0, 0x0, 0x1, 0x0}) 3.168382009s ago: executing program 2 (id=4817): r0 = getpid() r1 = syz_pidfd_open(r0, 0x0) ioctl$BTRFS_IOC_ADD_DEV(r1, 0x5509, &(0x7f00000000c0)={{}, "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"}) 2.891194118s ago: executing program 2 (id=4819): r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x20, 0x52, 0x1, 0x0, 0x0, {0x1c}, [@typed={0xc, 0x1, 0x0, 0x0, @u64}]}, 0x20}}, 0x0) 2.527737035s ago: executing program 2 (id=4823): r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000040)={0x18, 0x0, {0x4, @multicast, 'ip6gre0\x00'}}, 0x1e) write$binfmt_elf64(r0, 0x0, 0x0) 2.516679764s ago: executing program 4 (id=4825): r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000180)={0x1f, 0xffff, 0x3}, 0x6) write(r0, &(0x7f0000000000)="38000300010003", 0x7) 2.372140364s ago: executing program 2 (id=4826): r0 = gettid() r1 = getpid() rt_tgsigqueueinfo(r1, r0, 0x18, &(0x7f0000000080)={0x0, 0x0, 0x4000}) 2.367431436s ago: executing program 3 (id=4827): openat$sndtimer(0xffffffffffffff9c, &(0x7f0000001980), 0x1) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') mount$9p_fd(0x0, &(0x7f00000001c0)='.\x00', &(0x7f0000000180), 0x0, &(0x7f0000000040)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) 2.20685731s ago: executing program 2 (id=4828): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x48241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) write$tun(r0, 0x0, 0x0) 2.160508508s ago: executing program 3 (id=4829): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x40, 0x10, 0x49920d862a92153b, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gtp={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GTP_FD1={0x8, 0x2, @udp=r1}]}}}, @IFLA_MTU={0x8, 0x3}]}, 0x40}}, 0x0) 2.031521023s ago: executing program 4 (id=4830): r0 = syz_open_dev$radio(&(0x7f00000003c0), 0x2, 0x2) read(r0, &(0x7f0000000000)=""/101, 0xfe75) read(r0, &(0x7f00000000c0)=""/125, 0x7d) 1.874667969s ago: executing program 3 (id=4832): r0 = syz_open_dev$vbi(&(0x7f0000000080), 0x1, 0x2) ioctl$VIDIOC_S_OUTPUT(r0, 0xc004562f, &(0x7f00000000c0)=0x1) ioctl$VIDIOC_S_DV_TIMINGS(r0, 0xc0845657, &(0x7f0000000380)={0x0, @bt={0x13, 0x7c5, 0x1, 0x2, 0xd59f80, 0x4, 0x5, 0xb, 0x8, 0x5, 0x722, 0x200, 0x7, 0x8, 0x38, 0x27, {0xffff945a, 0x1}, 0x3, 0xf1}}) 1.758960765s ago: executing program 4 (id=4834): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000001800000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000009800000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r1, 0x0, 0xe, 0x0, &(0x7f0000000300)="14fd54ab72df97e6256c00000000", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 1.652940286s ago: executing program 3 (id=4836): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000f00), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000010c0)={&(0x7f0000000180)={0x54, r1, 0x1, 0x0, 0x0, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x3}, {0xc, 0x8f, 0xfffffffffffffffd}, {0xc}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4000}, 0x0) 1.496073052s ago: executing program 4 (id=4838): r0 = memfd_create(&(0x7f0000000a00)='\x103q}2\x9a\xce\xaf\x03\xdfy[\xd9\xffR8\xf4\x1c\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xa0\x00\x00\x00\x90+\xd6\x05\r\x84\x87\x1c\b\xdb\xe2\x00\x00A\x90m\xb6&\xd0\x9d\x00\x00\xc5\xb8,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\x00\x00\x00\x00\x00\x00\r\x1b\xd3\xff<\x83z\x80\x8fQ|\xf5d\x10\x10\xd7\x01M\x7fML\x18\xca`\xf7\x12#\xfcm\xcf\xb2\x14\xf1\xab\xd9d\'\x1a<\xfee7{l\x16}\xa0I\x7f]\xda8\xe0~\x1c \x91\t\x8b\xbd\x1f\xb3834d1i\x9b\x94\xa6\\\x0e\xe2\xfa\xe5!\xd3\xcf\xfc\xce\xba\xe2\x9f\x05xgL5\x14Y+\xb3\x1axi)<\xf7\x98\xc1\xba\xf4|\xe7|\xc4\xd7\x03\x00\x00\x00\x04D\x15E^7%8\x94y\x98\xf0l\xa0\'Q%\xd4\xda\xee\x81}\xcc\xfd\xa2\xe3M~x\x96\xe3]\xd70\xa2\x17\xca\xde\x1b\xaa\xe0l\xfc\x85\x8fc\x1c{|e\x8bs\xb0\x85E\xce;p)\xf8\xa6\xaa&QC4V\x81\x04\xcf\xd2\x81\xdc\xdf\xd7<\x9f\x93\x8bX\xd4\xea\xb2\xff\b\x92\xc7\x00\xef\xff\x00\x93\x1f\x92\xa7dcY\x9c\x9e9O-\xfcF\xbb\xbd{:IR\xea\xd8$\xe2\xa0\xc2\x8b\x1a\xead\xb8\xe1:6\x15M\x1d\xdak\x8c\x909\xd8\xb3\x02\xe0\x04\x9c\xc2\x06|\xf0\x0f\xa6Y&r\x9b\xc7\x1d\xe7jDf\x87@\x8fg\x15RJwe\xe2\xdcunu\xff`\xa40\xce\xffB%\xe4k\xff\x8d\x06\x0e\x89\xd9DC\x9fF\x9cu\x1f\x85\x14\xae\x81Qy\x92[M=\xe0^\xa8\xed)\xe8Z\xe8\x99&\x87\x04\xa4\t\xaa\xd8\xd6\xd5pG\xcb\xc4\x8b\xf7\xb8#\xcb\xd8|\xa5\xa6S\x8b\x8cv\xb7)\x02k\xf3L\x03\xbb\xfa\xe1\\\xf1\x8cUj\xd5\xa5\x88GL\xe7_\xfd\x17C=G\x0f\xe9u\x1d\xfeg\xfex\xcd\xaa\xad\x906\xd0sy\xc6T\x93\xae\xd5r\xc8G\xc5\xfdS\xff\x04:`\x1e\xe3;l\xcd\xcc\xda[\xe1\xc4~\x8b\x9e\xa0\xf9P\xf5a&\xd4\xf4\x8eum\x04\x00~\xfa\x05\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0xc) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xb, 0x2012, r0, 0x0) lseek(r0, 0x0, 0x4) 1.379038517s ago: executing program 3 (id=4840): ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x891c, &(0x7f0000000000)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x0, @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}) syz_usb_connect(0x1, 0x2d, &(0x7f0000000000)=ANY=[@ANYBLOB="1201000009980708b5192100c7980000000109021b00012000ac00090400000107000009090585cf"], 0x0) 1.251476693s ago: executing program 4 (id=4841): r0 = fsopen(&(0x7f0000000400)='ceph\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000540)='\xd0\x9e^\xa0\xee\xc8\x17T\xb1GI\x90\xe2Q1\xb0\x8f\xe1\xa8\x95\xa0\xcd\fL\xf10xffffffffffffffff}) capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000280)) ioctl$SIOCSIFHWADDR(r0, 0x8923, &(0x7f0000000800)={'pim6reg1\x00', @link_local={0x1, 0x25}}) 857.531851ms ago: executing program 0 (id=4846): r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000780), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_REQ_SET_REG(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)={0x1c, r0, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1}]}, 0x1c}}, 0x0) 751.579344ms ago: executing program 0 (id=4847): r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_AIE_ON(r0, 0x7001) ioctl$RTC_SET_TIME(r0, 0x7002, 0x0) 655.477762ms ago: executing program 3 (id=4848): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x400454cd, 0xffff0324) 623.645257ms ago: executing program 0 (id=4849): r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000180)={0x80000000}, 0x10) write(r0, &(0x7f0000000000)="240000001a005f0214f9f407000904008100000003000001000000000800040001000000", 0x24) 485.983944ms ago: executing program 1 (id=4850): r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f00000083c0)={{0x1, 0x1, 0x0, 0x3}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000140)={0x0, 0x3}) 390.713806ms ago: executing program 1 (id=4851): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_CLOCK(r1, 0x4030ae7b, &(0x7f0000000000)={0x8, 0x6, 0x7, 0x100, 0x3}) 285.391777ms ago: executing program 1 (id=4852): r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000080)={0x170, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0x104, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_LINK_PROP={0x54, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}, @TIPC_NLA_PUBL={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8}, @TIPC_NLA_PUBL_TYPE={0x8}, @TIPC_NLA_PUBL_UPPER={0x8}, @TIPC_NLA_PUBL_UPPER={0x8}, @TIPC_NLA_PUBL_TYPE={0x8}]}, @TIPC_NLA_MEDIA={0x20, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8}]}]}, @TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8}]}]}, 0x170}}, 0x0) sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)=ANY=[@ANYBLOB="d824000028000100020000080000000007"], 0x24d8}], 0x1}, 0x0) 185.308939ms ago: executing program 1 (id=4853): bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x9, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0xa0, 0x15}, [@call={0x45, 0x0, 0x0, 0xffffffff}]}, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8924, &(0x7f0000000000)={'vlan0\x00', 0x1}) 53.040946ms ago: executing program 1 (id=4854): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x10, &(0x7f0000000ac0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000080850000008200000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000000000000850000001700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r1, 0xfca804a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x4}, 0x50) 0s ago: executing program 1 (id=4855): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x7) ioctl$TCFLSH(r0, 0x8926, 0x4000000000000) kernel console output (not intermixed with test programs): k_file permissive=0 o=648 scontext=r[ 269.636969][T11369] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' oot:sysadm_r:sys[ 269.649929][ T29] audit: type=1400 audit(1727639628.130:1041): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 adm_t tcontext=s[ 269.649973][ T29] audit: type=1400 audit(1727639628.130:1042): avc: denied { read write } for pid=5229 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 ystem_u:object_r[ 269.650069][ T29] audit: type=1400 audit(1727639628.148:1043): avc: denied { read write } for pid=5227 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 :fi [ 269.652213][ T29] audit: type=1400 audit(1727639628.195:1044): avc: denied { read write } for pid=11365 comm="syz.3.2845" name="swradio7" dev="devtmpfs" ino=960 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 269.758555][ T29] audit: type=1400 audit(1727639628.195:1045): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 269.758608][ T29] audit: type=1400 audit(1727639628.233:1046): avc: denied { read write } for pid=5229 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Sep 29 19:53:48 syzkaller kern.notice kernel: [ 269.602334][ T29] audit: type=1400 audit(1727639628.120:1039): avc: denied { read write } for pid=5233 com[ 269.818762][ T29] audit: type=1400 audit(1727639628.326:1047): avc: denied { create } for pid=11371 comm="syz.4.2849" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 m="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Sep 29 19:53:48 syzkaller kern.notice kernel: [ 269.626750][ T29] audit: type=1400 audit(1727639628.130:1040): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Sep 29 19:53:48 syzkaller kern.info kernel: [ 269.636969][T11369] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' Sep 29 19:53:48 syzkaller kern.notice kernel: [ 269.649929][ T29] audit: type=1400 audit(1727639628.130:1041): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Sep 29 19:53:48 syzkaller kern.notice kernel: [ 269.649973][ T29] audit: type=1400 audit(1727639628.130:1042): avc: denied { read write } for pid=5229 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Sep 29 19:53:48 syzkaller kern.notice kernel: [ 269.650069][ T29] audit: type=1400 audit(1727639628.148:1043): avc: denied { read write } for pid=5227 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Sep 29 19:53:48 syzkaller kern.notice kernel: [ 269.652213][ T29] audit: type=1400 audit(1727639628.195:1044): avc: denied { read write } for pid=11365 comm="syz.3.2845" name="swradio7" dev="devtmpfs" ino=960 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r: Sep 29 19:53:48 syzkaller kern.notice kernel: [ 269.758555][ T29] audit: type=1400 audit(1727639628.195:1045): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Sep 29 19:53:48 syzkaller kern.notice kernel: [ 269.758608][ T29] audit: type=1400 audit(1727639628.233:1046): avc: denied { read write } for pid=5229 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Sep 29 19:53:48 syzkaller kern.notice kernel: [ 269.818762][ T29] audit: type=1400 audit(1727639628.326:1047): avc: denied { create } for pid=11371 comm="syz.4.2849" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 270.107089][T11388] xt_hashlimit: max too large, truncated to 1048576 Sep 29 19:53:48 syzkaller kern.info kernel: [ 270.107089][T11388] xt_hashlimit: max too large, truncated to 1048576 [ 270.851807][T11444] SET target dimension over the limit! Sep 29 19:53:49 syzkaller kern.info kernel: [ 270.851807][T11444] SET target dimension over the limit! [ 271.708322][T11499] ebt_among: dst integrity fail: 100 Sep 29 19:53:50 syzkaller kern.err kernel: [ 271.708322][T11499] ebt_among: dst integrity fail: 100 [ 272.047932][T11522] block device autoloading is deprecated and will be removed. [ 272.120493][T11522] syz.0.2926: attempt to access beyond end of device [ 272.120493][T11522] md0: rw=2048, sector=0, nr_sectors = 8 limit=0 Sep 29 19:53:50 syzkaller kern.warn kernel: [ 272.047932][T11522] block device autoloading is deprecated and will be removed. Sep 29 19:53:50 syzkaller kern.info kernel: [ 272.120493][T11522] syz.0.2926: attempt to access beyond end of device Sep 29 19:53:50 syzkaller kern.info kernel: [ 272.120493][T11522] md0: rw=2048, sector=0, nr_sectors = 8 limit=0 Sep 29 19:53:50 syzkaller kern.debug kernel: [ 272.214011][T11522] PM: Image not found (code -5) [ 273.808621][T11630] bridge0: port 3(veth0_to_bridge) entered blocking state [ 273.826930][T11630] bridge0: port 3(veth0_to_bridge) entered disabled state Sep 29 19:53:52 syzkaller kern.info kernel: [ 273.808621][T11630] bridge0: port 3(veth0_to_bridge) entered blocking state Sep 29 19:53:52 syzkaller kern.info kernel: [ 273.826930][T11630] b[ 273.851176][T11630] veth0_to_bridge: entered allmulticast mode ridge0: port 3(veth0_to_bridge) entered disabled state Sep 29 19:53:52 [ 273.862627][T11630] veth0_to_bridge: entered promiscuous mode syzkaller kern.i[ 273.869936][T11630] bridge0: adding interface veth0_to_bridge with same address as a received packet (addr:aa:aa:aa:aa:aa:1b, vlan:0) nfo kernel: [ 273.851176][T11630] veth0_to_bridge: entered allmulticast mode Sep 29 19:53:52 syzkaller kern.info kernel: [ 273.862627][T11630] veth0_to_bridge: entered promiscuous mode Sep 29 19:53:52 syzkaller kern.warn kernel: [ 273.869936][T11630] bridge0: adding[ 273.918693][T11630] bridge0: port 3(veth0_to_bridge) entered blocking state interface veth0[ 273.926765][T11630] bridge0: port 3(veth0_to_bridge) entered forwarding state _to_bridge with same address as a received packet (addr:aa:aa:aa:aa:aa:1b, vlan:0) Sep 29 19:53:52 syzkaller kern.info kernel: [ 273.918693][T11630] bridge0: port 3(veth0_to_bridge) entered blocking state Sep 29 19:53:52 syzkaller kern.info kernel: [ 273.926765][T11630] bridge0: port 3(veth0_to_bridge) entered forwarding state [ 274.157718][T11651] xt_ecn: cannot match TCP bits for non-tcp packets Sep 29 19:53:52 syzkaller kern.info kernel: [ 274.157718][T11651] xt_ecn: cannot match TCP bits for non-tcp packets [ 274.901227][ T29] kauditd_printk_skb: 281 callbacks suppressed [ 274.901248][ T29] audit: type=1400 audit(1727639633.107:1329): avc: denied { read write } for pid=5229 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Sep 29 19:53:53 syzkaller kern.warn kernel: [ 274.901227][ T29] kauditd_printk_skb: 281 callbacks suppressed Sep 29 19:53:53 syzkaller kern.notice kernel: [ 274.901248][ T29] audit: type=1400 audit(1727639633.107:1329): avc: denied { read write } for pid=5229 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sys[ 274.970230][ T29] audit: type=1400 audit(1727639633.144:1330): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 adm_t tcontext=system_u:object_r:fi Sep 29 19:53:53 syzkaller kern.notice kernel: [ 274.970230][ T29] audit: type=1400 audit(1727639633.144:1330): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1"[ 275.011396][ T29] audit: type=1400 audit(1727639633.144:1331): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Sep 29 19:53:53 syzkaller kern.notice kernel: [ 275.011396][ T29] audit: type=1400 audit(1727639633.144:1331): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:[ 275.064381][ T29] audit: type=1400 audit(1727639633.163:1332): avc: denied { mounton } for pid=11703 comm="syz.4.3014" path="/594/file1" dev="tmpfs" ino=2998 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 syslogd_t tcontext=system_u:object_r:var_t tclass= Sep 29 19:53:53 syzkaller kern.notice kernel: [ 275.064381][ T29] audit: type=1400 audit(1727639633.163:1332): avc: denied { mounton } for pid=11703 comm="syz.4.3014" path="/594/file1" dev="tmpfs" ino=2998 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tm [ 275.144368][ T29] audit: type=1400 audit(1727639633.200:1333): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 275.166351][ C1] vkms_vblank_simulate: vblank timer overrun [ 275.175123][ T29] audit: type=1400 audit(1727639633.200:1334): avc: denied { read write } for pid=5233 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 275.199447][ T29] audit: type=1400 audit(1727639633.210:1335): avc: denied { read write } for pid=5227 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 275.223582][ C1] vkms_vblank_simulate: vblank timer overrun [ 275.229771][ T29] audit: type=1400 audit(1727639633.238:1336): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 275.252041][ T29] audit: type=1400 audit(1727639633.247:1337): avc: denied { create } for pid=11707 comm="syz.4.3017" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 275.272705][ C1] vkms_vblank_simulate: vblank timer overrun [ 275.278877][ T29] audit: type=1400 audit(1727639633.284:1338): avc: denied { read write } for pid=5229 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Sep 29 19:53:53 syzkaller kern.notice kernel: [ 275.144368][ T29] audit: type=1400 audit(1727639633.200:1333): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Sep 29 19:53:53 syzkaller kern.warn kernel: [ 275.166351][ C1] vkms_vblank_simulate: vblank timer overrun Sep 29 19:53:53 syzkaller kern.notice kernel: [ 275.175123][ T29] audit: type=1400 audit(1727639633.200:1334): avc: denied { read write } for pid=5233 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Sep 29 19:53:53 syzkaller kern.notice kernel: [ 275.199447][ T29] audit: type=1400 audit(1727639633.210:1335): avc: denied { read write } for pid=5227 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Sep 29 19:53:53 syzkaller kern.warn kernel: [ 275.223582][ C1] vkms_vblank_simulate: vblank timer overrun Sep 29 19:53:53 syzkaller kern.notice kernel: [ 275.229771][ T29] audit: type=1400 audit(1727639633.238:1336): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Sep 29 19:53:53 syzkaller kern.notice kernel: [ 275.252041][ T29] audit: type=1400 audit(1727639633.247:1337): avc: denied { create } for pid=11707 comm="syz.4.3017" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permis Sep 29 19:53:53 syzkaller kern.warn kernel: [ 275.272705][ C1] vkms_vblank_simulate: vblank timer overrun Sep 29 19:53:53 syzkaller kern.notice kernel: [ 275.278877][ T29] audit: type=1400 audit(1727639633.284:1338): avc: denied { read write } for pid=5229 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 276.227097][T11781] i2c i2c-0: Invalid block write size 34 Sep 29 19:53:54 syzkaller kern.err kernel: [ 276.227097][T11781] i2c i2c-0: Invalid block write size 34 [ 276.455921][T11798] netlink: 24 bytes leftover after parsing attributes in process `syz.4.3061'. Sep 29 19:53:54 syzkaller kern.warn kernel: [ 276.455921][T11798] netlink: 24 bytes leftover after parsing attributes in process `syz.4.3061'. [ 277.079394][T11835] netlink: 52 bytes leftover after parsing attributes in process `syz.2.3079'. Sep 29 19:53:55 syzkaller kern.warn kernel: [ 277.079394][T11835] netlink: 52 bytes leftover after parsing attributes in process `syz.2.3079'. [ 278.782176][T11955] veth0_vlan: entered allmulticast mode Sep 29 19:53:56 syzkaller kern.info kernel: [ 278.782176][T11955] veth0_vlan: entered allmulticast mode [ 280.298395][ T29] kauditd_printk_skb: 287 callbacks suppressed [ 280.298415][ T29] audit: type=1400 audit(1727639638.159:1626): avc: denied { read write } for pid=5229 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Sep 29 19:53:58 syzkaller kern.warn kernel: [ 280.298395][ T29] kauditd_printk_skb: 287 callbacks suppressed Sep 29 19:53:58 syzkaller kern.notice kernel: [ 280.298415][ T29] audit: type=1400 audit(1727639638.159:1626): avc: denied { read write } for pid=5229 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 280.371407][ T29] audit: type=1400 audit(1727639638.177:1627): avc: denied { read write } for pid=5227 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Sep 29 19:53:58 syzkaller kern.notice kernel: [ 280.371407][ T29] audit: type=1400 audit(1727639638.177:1627): avc: denied { read write } for pid=5227 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 280.435662][ T29] audit: type=1400 audit(1727639638.187:1628): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Sep 29 19:53:58 syzkaller kern.notice kernel: [ 280.435662][ T29] audit: type=1400 audit(1727639638.187:1628): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 280.538141][ T29] audit: type=1400 audit(1727639638.187:1629): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Sep 29 19:53:58 syzkaller kern.notice kernel: [ 280.538141][ [ 280.619998][ T29] audit: type=1400 audit(1727639638.187:1630): avc: denied { create } for pid=12065 comm="syz.2.3193" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 T29] audit: type[ 280.636405][T12086] ip6t_rpfilter: unknown options =1400 audit(1727[ 280.644593][ T29] audit: type=1400 audit(1727639638.205:1631): avc: denied { read write } for pid=5216 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 639638.187:1629): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tconte[ 280.684711][T12089] xt_time: invalid argument - start or stop time greater than 23:59:59 xt=system_u:obje[ 280.693483][ T29] audit: type=1400 audit(1727639638.224:1632): avc: denied { read write } for pid=12068 comm="syz.1.3195" name="video7" dev="devtmpfs" ino=864 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l_device_t tclass=chr_file permissive=0 ct_r:var_t tclass= Sep 29 19:53:58 syzkaller kern.notice kernel: [ 280.619998][ T29] audit: type=1400 audit(1727639638.187:1630): avc: denied { create } for pid=12065 comm="syz.2.3193" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive= Sep 29 1[ 280.744090][ T29] audit: type=1400 audit(1727639638.233:1633): avc: denied { read write } for pid=5221 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 9:53:58 syzkaller kern.info kernel: [ 280.636405][T12086] ip6t_rpfilter: unknown options Sep 29 19:53:58 syzkaller kern.notice[ 280.778622][ T29] audit: type=1400 audit(1727639638.252:1634): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 kernel: [ 280.644593][ T29] audit: type=1400 audit(1727639638.205:1631): avc: denied { read write } for pid=5216 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Sep 29 19:53:58 syzkaller kern.in[ 280.824973][ T29] audit: type=1400 audit(1727639638.280:1635): avc: denied { read } for pid=12072 comm="syz.3.3197" name="video7" dev="devtmpfs" ino=864 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l_device_t tclass=chr_file permissive=0 fo kernel: [ 280.684711][T12089] xt_time: invalid argument - start or stop time greater than 23:59:59 Sep 29 19:53:58 syzkaller kern.notice kernel: [ 280.693483][ T29] audit: type=1400 audit(1727639638.224:1632): avc: denied { read write } for pid=12068 comm="syz.1.3195" name="video7" dev="devtmpfs" ino=864 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4 Sep 29 19:53:58 syzkaller kern.notice kernel: [ 280.744090][ T29] audit: type=1400 audit(1727639638.233:1633): avc: denied { read write } for pid=5221 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Sep 29 19:53:58 syzkaller kern.notice kernel: [ 280.778622][ T29] audit: type=1400 audit(1727639638.252:1634): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Sep 29 19:53:58 syzkaller kern.notice kernel: [ 280.824973][ T29] audit: type=1400 audit(1727639638.280:1635): avc: denied { read } for pid=12072 comm="syz.3.3197" name="video7" dev="devtmpfs" ino=864 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l_devi [ 285.052280][T12391] tc_dump_action: action bad kind Sep 29 19:54:02 syzkaller kern.info kernel: [ 285.052280][T12391] tc_dump_action: action bad kind [ 285.664856][ T29] kauditd_printk_skb: 282 callbacks suppressed [ 285.664877][ T29] audit: type=1400 audit(1727639643.182:1918): avc: denied { read write } for pid=5216 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Sep 29 19:54:03 syzkaller kern.warn kernel: [ 285.664856][ T29] kauditd_printk_skb: 282 callbacks suppressed Sep 29 19:54:03 syzkaller kern.notice kernel: [ 285.664877][ T29] audit: type=1400 audit(1727639643.182:1918): avc: denied { read write } for pid=5216 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 285.763699][ T29] audit: type=1400 audit(1727639643.210:1919): avc: denied { create } for pid=12436 comm="syz.0.3375" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 Sep 29 19:54:03 syzkaller kern.notice kernel: [ 285.763699][ T29] audit: type=1400 audit(1727639643.210:1919): avc: denied { create } for pid=12436 comm="syz.0.3375" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permis [ 285.851987][ T29] audit: type=1400 audit(1727639643.210:1920): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Sep 29 19:54:03 syzkaller kern.notice kernel: [ 285.851987][ T29] audit: type=1400 audit(1727639643.210:1920): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 285.923640][ T29] audit: type=1400 audit(1727639643.210:1921): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Sep 29 19:54:03 syzkaller kern.notice kernel: [ 285.923640][ T29] audit: type=1400 audit(1727639643.210:1921): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tconte[ 285.968878][ T29] audit: type=1400 audit(1727639643.248:1922): avc: denied { read write } for pid=5227 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 xt=system_u:object_r:var_t tclass= Sep 29 19:54:03 syzkaller kern.notice kernel: [ 285.968878][ T29] audit: type=1400 audit(1727639643.248:1922): avc: denied { read write } for pid=5227 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 286.047370][ T29] audit: type=1400 audit(1727639643.257:1923): avc: denied { read write } for pid=5221 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Sep 29 19:54:03 syzkaller kern.notice kernel: [ 286.047370][ T29] audit: type=1400 audit(1727639643.257:1923): avc: denied { read write } for pid=5221 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 286.116273][ T29] audit: type=1400 audit(1727639643.266:1924): avc: denied { read write } for pid=5229 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Sep 29 19:54:03 syzkaller kern.notice kernel: [ 286.116273][ T29] audit: type=1400 audit(1727639643.266:1924): avc: denied { read write } for pid=5229 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 286.207704][ T29] audit: type=1400 audit(1727639643.295:1925): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Sep 29 19:54:03 syzkaller kern.notice kernel: [ 286.207704][ T29] audit: type=1400 audit(1727639643.295:1925): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=sy[ 286.268602][ T29] audit: type=1400 audit(1727639643.323:1926): avc: denied { module_request } for pid=12442 comm="syz.0.3380" kmod="netdev-netdevsim0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=0 stem_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Sep 29 19:54:03 syzkaller kern.notice kernel: [ 286.268602][ T29] audit: type=1400 audit(1727639643.323:1926): avc: denied { module_request } for pid=12442 comm="syz.0.3380" kmod="netdev-netdevsim0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t t [ 286.357464][ T29] audit: type=1400 audit(1727639643.323:1927): avc: denied { sys_module } for pid=12442 comm="syz.0.3380" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=0 Sep 29 19:54:03 syzkaller kern.notice kernel: [ 286.357464][ T29] audit: type=1400 audit(1727639643.323:1927): avc: denied { sys_module } for pid=12442 comm="syz.0.3380" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability p [ 288.148573][T12601] xt_CT: You must specify a L4 protocol and not use inversions on it Sep 29 19:54:05 syzkaller kern.info kernel: [ 288.148573][T12601] xt_CT: You must specify a L4 protocol and not use inversions on it [ 288.579294][T12632] netlink: 4 bytes leftover after parsing attributes in process `syz.1.3474'. Sep 29 19:54:05 syzkaller kern.warn kernel: [ 288.579294][T12632] netlink: 4 bytes leftover after parsing attributes in process `syz.1.3474'. [ 290.077992][T12735] SET target dimension over the limit! Sep 29 19:54:07 syzkaller kern.info kernel: [ 290.077992][T12735] SET target dimension over the limit! [ 290.477466][T12765] netlink: 'syz.3.3540': attribute type 29 has an invalid length. [ 290.489834][T12765] netlink: 4 bytes leftover after parsing attributes in process `syz.3.3540'. Sep 29 19:54:07 syzkaller kern.warn kernel: [ 290.477466][T12765] netlink: 'syz.3.3540': attribute type 29 has an invalid length. Sep 29 19:54:07 syzkaller kern.warn kernel: [ 290.489834][T12765] netlink: 4 bytes leftover after parsing attributes in process `syz.3.3540'. [ 291.022892][ T29] kauditd_printk_skb: 302 callbacks suppressed [ 291.022912][ T29] audit: type=1400 audit(1727639648.187:2230): avc: denied { read write } for pid=5216 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Sep 29 19:54:08 syzkaller kern.warn kernel: [ 291.022892][ T29] kauditd_printk_skb: 302 callbacks suppressed Sep 29 19:54:08 syzkaller kern.notice kernel: [ 291.022912][ T29] audit: type=1400 audit(1727639648.187:2230): avc: denied { read write } for pid=5216 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sys[ 291.086485][ T29] audit: type=1400 audit(1727639648.225:2231): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 adm_t tcontext=system_u:object_r:fi Sep 29 19:54:08 syzkaller kern.notice kernel: [ 291.086485][ T29] audit: type=1400 audit(1727639648.225:2231): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclas[ 291.146153][ T29] audit: type=1400 audit(1727639648.225:2232): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 s= Sep 29 19:54:08 syzkaller kern.notice kernel: [ 291.146153][ T29] audit: type=1400 audit(1727639648.225:2232): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 291.200328][ T29] audit: type=1400 audit(1727639648.253:2233): avc: denied { read write } for pid=5229 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Sep 29 19:54:08 syzkaller kern.notice kernel: [ 291.200328][ T29] audit: type=1400 audit(1727639648.253:2233)[ 291.234610][ T29] audit: type=1400 audit(1727639648.281:2234): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 : avc: denied { read write } for pid=5229 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysa[ 291.267658][ T29] audit: type=1400 audit(1727639648.281:2235): avc: denied { write } for pid=12804 comm="syz.3.3560" name="001" dev="devtmpfs" ino=735 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=0 dm_t tcontext=system_u:object_r:fi Sep 29 19:54:08 syzkaller kern.notice kernel: [ 291.234610][ T29] audit: type=1400 audit(1727639648.281:2[ 291.302975][ T29] audit: type=1400 audit(1727639648.300:2236): avc: denied { read write } for pid=5227 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 234): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Sep 29 19:54:08 syzkaller kern.notice kernel: [ 291.267658][ T29] audit: type=1400 audit(1727639648.281:2235): avc: denied { write } for pid=12804 comm="syz.3.3560" name="001" dev="devtmpfs" ino=735 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device Sep 29 19:54:08 syzkaller kern.notice kernel: [ 291.302975][ T29] audit: type=1400 audit(1727639648.300:2236): avc: denied { read write } for pid=5227 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system[ 291.387995][ T29] audit: type=1400 audit(1727639648.328:2237): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 _u:object_r:fi Sep 29 19:54:08 syzkaller kern.notice kernel: [ 291.387995][ T29] audit: type=1400 audit(1727639648.328:2237): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 291.455237][ T29] audit: type=1400 audit(1727639648.328:2238): avc: denied { create } for pid=12806 comm="syz.1.3561" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 Sep 29 19:54:08 syzkaller kern.notice kernel: [ 291.455237][ T29] audit: type=1400 audit(1727639648.328:2238): avc: denied [ 291.506985][ T29] audit: type=1400 audit(1727639648.337:2239): avc: denied { read write } for pid=5216 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 { create } for pid=12806 comm="syz.1.3561" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permis Sep 29 19:54:08 syzkaller kern.notice kernel: [ 291.506985][ T29] audit: type=1400 audit(1727639648.337:2239): avc: denied { read write } for pid=5216 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 291.715198][T12838] SET target dimension over the limit! Sep 29 19:54:08 syzkaller kern.info kernel: [ 291.715198][T12838] SET target dimension over the limit! [ 293.081865][T12931] mac80211_hwsim hwsim7 ÿÿÿÿÿÿ: renamed from wlan1 Sep 29 19:58:26 syzkaller kern.info kernel: [ 293.081865][T12931] mac80211_hwsim hwsim7 ÿÿÿÿÿÿ: renamed from wlan1 [ 294.622533][T13041] ipt_REJECT: TCP_RESET invalid for non-tcp [ 294.654975][T13045] xt_hashlimit: invalid rate Sep 29 19:58:27 syzkaller kern.info kernel: [ 294.622533][T13041] ipt_REJECT: TCP_RESET invalid for non-tcp Sep 29 19:58:27 syzkaller kern.info kernel: [ 294.654975][T13045] xt_hashlimit: invalid rate [ 296.379745][ T29] kauditd_printk_skb: 289 callbacks suppressed [ 296.379766][ T29] audit: type=1400 audit(1727639909.201:2529): avc: denied { read write } for pid=5216 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Sep 29 19:58:29 syzkaller kern.warn kernel: [ 296.379745][ T29] kauditd_printk_skb: 289 callbacks suppressed Sep 29 19:58:29 syzkaller kern.notice kernel: [ 296.379766][ T29] audit: type=1400 audit(1727639909.201:2529): avc: denied { read write } [ 296.432622][ T29] audit: type=1400 audit(1727639909.210:2530): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 for pid=5216 comm="syz-executor[ 296.456378][ T29] audit: type=1400 audit(1727639909.229:2531): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 " name="loop3" dev="devtmpfs" ino=650 scontext=r[ 296.482806][T13170] netlink: 20 bytes leftover after parsing attributes in process `syz.3.3742'. oot:sysadm_r:sys[ 296.487769][ T29] audit: type=1400 audit(1727639909.248:2532): avc: denied { read write } for pid=5229 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 adm_t tcontext=system_u:object_r:fi Sep 29 19:58:29 syzkaller kern.notice kernel: [ 296.432622][ T29] audit: type=1400 audit(1727639909.210:2530): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Sep 29 19:58:29 syzkaller kern.notice kernel: [ 296.456378][ T29] audit: type=1400 audit(1727639909.229:2531): avc: [ 296.555569][ T29] audit: type=1400 audit(1727639909.257:2533): avc: denied { read write } for pid=5221 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Sep 29 19:58:29 syzkaller kern.warn kernel: [ 296.482806][T13170] netlink: 20 bytes leftover after[ 296.600542][ T29] audit: type=1400 audit(1727639909.266:2534): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 parsing attributes in process `syz.3.3742'. Sep 29 19:58:29 syzkaller kern.notice kernel: [ 296.487769][ T29] audit: type=1[ 296.634969][ T29] audit: type=1400 audit(1727639909.304:2535): avc: denied { read write } for pid=5233 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 400 audit(1727639909.248:2532): avc: denied { read write } for pid=5229 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Sep 29 19:58:29 syzkaller kern.notice kernel: [ 296.555569][ T29] audit: type=1400 audit(1727639909.257:2533): avc: denied { read write } for pid=5221 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Sep 29 19:58:29 syzkaller kern.notice kernel: [ 296.600542][ T29] audit: type=1400 audit(1727639909.266:2534): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Sep 29 19:58:29 syzkaller kern.notice kernel: [ 296.634969][ T29] audit: type=1400 audit(1727639909.304:2535): avc: denied { read write } for pid=5233 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 296.748375][ T29] audit: type=1400 audit(1727639909.313:2536): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Sep 29 19:58:29 syzkaller kern.notice kernel: [ 296.748375][ T29] audit: type=1400 audit(1727639909.313:2536): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 296.825988][ T29] audit: type=1400 audit(1727639909.332:2537): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 296.848220][ T29] audit: type=1400 audit(1727639909.332:2538): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Sep 29 19:58:29 syzkaller kern.notice kernel: [ 296.825988][ T29] audit: type=1400 audit(1727639909.332:2537): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=sy[ 296.915679][T13194] ebt_among: wrong size: 1048 against expected 710676, rounded to 710680 stem_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Sep 29 19:58:29 syzkaller kern.notice kernel: [ 296.848220][ T29] audit: type=1400 audit(1727639909.332:2538): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Sep 29 19:58:29 syzkaller kern.err kernel: [ 296.915679][T13194] ebt_among: wrong size: 1048 against expected 710676, rounded to 710680 Sep 29 19:58:32 syzkaller daemon.err dhcpcd[4888]: ps_sendpsmmsg: Connection refused Sep 29 19:58:32 syzkaller daemon.err dhcpcd[4888]: ps_root_recvmsgcb: failed to send message to pid 9174: Connection refused Sep 29 19:58:32 syzkaller daemon.err dhcpcd[4888]: ps_sendpsmmsg: Connection refused Sep 29 19:58:32 syzkaller daemon.err dhcpcd[4888]: ps_root_recvmsgcb: failed to send message to pid 9256: Connection refused Sep 29 19:58:33 syzkaller daemon.err dhcpcd[4888]: ps_sendpsmmsg: Connection refused Sep 29 19:58:33 syzkaller daemon.err dhcpcd[4888]: ps_root_recvmsgcb: failed to send message to pid 9309: Connection refused Sep 29 19:58:34 syzkaller daemon.err dhcpcd[4888]: ps_sendpsmmsg: Connection refused Sep 29 19:58:34 syzkaller daemon.err dhcpcd[4888]: ps_root_recvmsgcb: failed to send message to pid 9283: Connection refused [ 301.725388][T13531] veth1_macvtap: entered allmulticast mode [ 301.737264][ T29] kauditd_printk_skb: 299 callbacks suppressed [ 301.737282][ T29] audit: type=1400 audit(1727639914.215:2838): avc: denied { read write } for pid=5216 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Sep 29 19:58:34 syzkaller kern.info kernel: [ 301.725388][T13531] veth1_macvtap: entered allmulticast mode Sep 29 19:58:34 syzkaller kern.warn kernel: [ 301.737264][ T29] kauditd_printk_skb: 299 callbacks suppressed Sep 29 19:58:34 syzkaller kern.notice kernel: [ 301.737282][ T29] audit: type=1400 audit(1727639914.215:2838): avc: denied { read write } for pid=5216 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 301.848204][ T29] audit: type=1400 audit(1727639914.252:2839): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 301.880342][ T29] audit: type=1400 audit(1727639914.252:2840): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 301.902608][ T29] audit: type=1400 audit(1727639914.252:2841): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 301.925581][ T29] audit: type=1400 audit(1727639914.261:2842): avc: denied { read write } for pid=5229 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 301.949838][ T29] audit: type=1400 audit(1727639914.289:2843): avc: denied { map_create } for pid=13539 comm="syz.3.3926" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Sep 29 19:58:34 syzkaller kern.notice kernel: [ 301.848204][ T29] audit: type=1400 audit(1727639914.252:2839): avc: denied { read } for pi[ 301.988245][ T29] audit: type=1400 audit(1727639914.289:2844): avc: denied { read write } for pid=5233 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 d=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Sep 29 19:58:34 syzkaller kern.notice kernel[ 302.027165][ T29] audit: type=1400 audit(1727639914.289:2845): avc: denied { prog_load } for pid=13539 comm="syz.3.3926" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 : [ 301.880342][ T29] audit: type=1400 audit(1727639914.252:2840): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Sep 29 19:58:34 syzkaller kern.notice kernel: [ 301.902608][ T29] audit: type=1400 audit(1727639914.252:2841): avc: denied { read } for pid=4656 c[ 302.079416][ T29] audit: type=1400 audit(1727639914.308:2846): avc: denied { read write } for pid=5221 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 omm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Sep 29 19:58:34 syzkaller kern.notice kernel: [ 301.925581][ T29] audit: type=1400 audit(1727639914.261:2842): avc: denied { read write } for pid=5229 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Sep 29 19:58:34 syzkaller kern.notice kernel: [ 301.949838][ T29] audit: type=1400 audit(1727639914.289:2843): avc: denied { map_create } for pid=13539 comm="syz.3.3926" scontext=root:sysadm_r:sysadm_t tcontext=root:sy[ 302.157385][ T29] audit: type=1400 audit(1727639914.336:2847): avc: denied { read write } for pid=5227 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 sadm_r:sysadm_t tclass=bpf permissive=0 Sep 29 19:58:34 syzkaller kern.notice kernel: [ 301.988245][ T29] audit: type=1400 audit(1727639914.289:2844): avc: denied { read write } for pid=5233 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Sep 29 19:58:34 syzkaller kern.notice kernel: [ 302.027165][ T29] audit: type=1400 audit(1727639914.289:2845): avc: denied { prog_load } for pid=13539 comm="syz.3.3926" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Sep 29 19:58:34 syzkaller kern.notice kernel: [ 302.079416][ T29] audit: type=1400 audit(1727639914.308:2846): avc: denied { read write } for pid=5221 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Sep 29 19:58:34 syzkaller kern.notice kernel: [ 302.157385][ T29] audit: type=1400 audit(1727639914.336:2847): avc: denied { read write } for pid=5227 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 302.734161][T13591] trusted_key: encrypted key: instantiation of keys using provided decrypted data is disabled since CONFIG_USER_DECRYPTED_DATA is set to false Sep 29 19:58:35 syzkaller kern.err kernel: [ 302.734161][T13591] trusted_key: encrypted key: instantiation of keys using provided decrypted data is disabled since CONFIG_USER_DECRYPTED_DATA is set to false [ 303.870705][T13670] tc_dump_action: action bad kind Sep 29 19:58:36 syzkaller kern.info kernel: [ 303.870705][T13670] tc_dump_action: action bad kind [ 307.105423][ T29] kauditd_printk_skb: 281 callbacks suppressed [ 307.105472][ T29] audit: type=1400 audit(2000000001.683:3129): avc: denied { write } for pid=13903 comm="syz.2.4106" name="001" dev="devtmpfs" ino=735 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=0 May 18 03:33:21 syzkaller kern.warn kernel: [ 307.105423][ T29] kauditd_printk_skb: 281 callbacks suppressed May 18 03:33:21 syzkaller kern.notice kernel: [ 307.105472][ T29] audit: type=1400 audit(2000000001.683:3129): avc: denied [ 307.156399][T13906] netlink: 'syz.0.4107': attribute type 1 has an invalid length. { write } for pid=13903 comm="syz.2.4106" name="001" dev="devtmpfs" ino=735 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device May 18 03:33:21 syzkaller kern.warn kernel: [ 307.156399][T13906] netlink: 'syz.0.4107': attribute type 1 has an invalid length. [ 307.220985][ T29] audit: type=1400 audit(2000000001.702:3130): avc: denied { read write } for pid=5221 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 18 03:33:21 syzkaller kern.notice kernel: [ 307.220985][ T29] audit: type=1400 audit(2000000001.702:3130): avc: denied { read write } for pid=5221 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 307.310296][ T29] audit: type=1400 audit(2000000001.721:3131): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 18 03:33:21 syzkaller kern.notice kernel: [ [ 307.345376][ T29] audit: type=1400 audit(2000000001.721:3132): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 307.310296][ T29] audit: type=1400 audit(2000000001.721:3131): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= May 18 03:33:21 syzkaller kern.notice kernel: [ 307.345376][ T29] audit: type=1400 audit(2000000001.721:3132): avc: denied { read } for[ 307.400744][ T29] audit: type=1400 audit(2000000001.721:3133): avc: denied { read write } for pid=5233 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 pid=4656 comm=[ 307.402212][T13920] netlink: 'syz.2.4113': attribute type 3 has an invalid length. "syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t t[ 307.442950][T13920] netlink: 11 bytes leftover after parsing attributes in process `syz.2.4113'. class= May 18 03:33:21 syzkaller kern.notice kernel: [ 307.400744][ T29] audit: type=1400 audit(2000000001.721:3133): avc: denied { read write } for pid=5233 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 sco[ 307.471500][ T29] audit: type=1400 audit(2000000001.749:3134): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ntext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi May 18 03:33:21 syzkaller kern.warn kernel: [ 307.402212][T13920] netlink: 'syz.2.4113': attribute type 3 has an invalid length. May 18 03:33:22 syzkaller kern.warn kernel: [ 307.442950][T13920] netlink: 11 bytes leftover after parsing attributes in process `syz.2.4113'. May 18 03:33:22 syzkaller kern.notice kernel: [ 307.471500][ T29] audit: type=1400 audit(2000000001.749:3134)[ 307.533079][ T29] audit: type=1400 audit(2000000001.767:3135): avc: denied { read write } for pid=5221 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 : avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= May 18 03:33:22 syzkaller kern.notice kernel: [ 307.533079][ T29] audit: type=1400 audit(2000000001.767:3135): avc: denied { read write } for pid=5221 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 307.609646][ T29] audit: type=1400 audit(2000000001.767:3136): avc: denied { read write } for pid=5216 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 18 03:33:22 syzkaller kern.notice kernel: [ 307.609646][ T29] audit: type=1400 audit(2000000001.767:3136): avc: denied { read write } for pid=5216 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 307.679781][ T29] audit: type=1400 audit(2000000001.777:3137): avc: denied { read write } for pid=5227 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 18 03:33:22 syzkaller kern.notice kernel: [ 307.679781][ T29] audit: type=1400 audit(2000000001.777:3137): avc: denied { read write } for pid=5227 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 307.754431][ T29] audit: type=1400 audit(2000000001.795:3138): avc: denied { read write } for pid=5221 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 307.807610][T13936] trusted_key: encrypted_key: hex blob is missing May 18 03:33:22 syzkaller kern.notice kernel: [ 307.754431][ T29] audit: type=1400 audit(2000000001.795:3138): avc: denied { read write } for pid=5221 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi May 18 03:33:22 syzkaller kern.info kernel: [ 307.807610][T13936] trusted_key: encrypted_key: hex blob is missing [ 309.766262][T14072] xt_CHECKSUM: unsupported CHECKSUM operation f4 May 18 03:33:24 syzkaller kern.info kernel: [ 309.766262][T14072] xt_CHECKSUM: unsupported CHECKSUM operation f4 [ 310.552520][T14124] binfmt_misc: register: failed to install interpreter file ./file0 May 18 03:33:24 syzkaller kern.notice kernel: [ 310.552520][T14124] binfmt_misc: register: failed to install interpreter file ./file0 [ 311.525739][T14196] trusted_key: encrypted_key: key description must be 16 hexadecimal characters long May 18 03:33:25 syzkaller kern.err kernel: [ 311.525739][T14196] trusted_key: encrypted_key: key description must be 16 hexadecimal characters long [ 311.748929][T14210] netlink: 8 bytes leftover after parsing attributes in process `syz.1.4259'. May 18 03:33:26 syzkaller kern.warn kernel: [ 311.748929][T14210] netlink: 8 bytes leftover after parsing attributes in process `syz.1.4259'. [ 312.384002][T14254] netlink: 'syz.4.4282': attribute type 2 has an invalid length. May 18 03:33:26 syzkaller kern.warn kernel: [ 312.384002][T14254] netlink: 'syz.4.4282': attribute type 2 has an invalid length. [ 312.509701][ T29] kauditd_printk_skb: 278 callbacks suppressed [ 312.509721][ T29] audit: type=1400 audit(2000000006.693:3417): avc: denied { read write } for pid=5229 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 18 03:33:26 syzkaller kern.warn kernel: [ 312.509701][ T29] kauditd_printk_skb: 278 callbacks suppressed May 18 03:33:26 syzkaller kern.notice kernel: [ 312.509721][ T29] audit: type=1400 audit(2000000006.693:3417): avc: denied { read write } for pid=5229 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 312.620484][ T29] audit: type=1400 audit(2000000006.711:3418): avc: denied { prog_load } for pid=14265 comm="syz.1.4289" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 May 18 03:33:26 syzkaller kern.notice kernel: [ 312.620484][ T29] audit: type=1400 audit(2000000006.711:3418): avc: denied { prog_load } for pid=14265 comm="syz.1.4289" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 312.697630][ T29] audit: type=1400 audit(2000000006.720:3419): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 18 03:33:26 syzkaller kern.notice kernel: [ 312.697630][ T29] audit: type=1400 audit(2000000006.720:3419): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 312.795616][ T29] audit: type=1400 audit(2000000006.720:3420): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 18 03:33:26 syzkaller kern.notice kernel: [ 312.795616][ T29] audit: type=1400 audit(2000000006.720:3420): avc: denied { read } for pid=4656 comm="sys[ 312.831828][ T29] audit: type=1400 audit(2000000006.730:3421): avc: denied { read write } for pid=5229 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 logd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= May 18 03:33:27 syzkaller kern.notice kernel: [ 312.831828][ T29] audit: type=1400 audit(2000000006.730:3421): avc: denied { read write } for pid=5229 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:[ 312.887435][ T29] audit: type=1400 audit(2000000006.757:3422): avc: denied { create } for pid=14268 comm="syz.1.4290" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 sysadm_t tcontext=system_u:object_r:fi May 18 03:33:27 syzkaller kern.notice kernel: [ 312.887435][ T29] audit: type=1400 audit(2000000006.757:3422): avc: denied { create } for pid=14268 comm="syz.1.4290" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 312.964743][ T29] audit: type=1400 audit(2000000006.776:3423): avc: denied { read write } for pid=5221 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 18 03:33:27 syzkaller kern.notice kernel: [ 312.964743][ T29] audit: type=1400 audit(2000000006.776:3423): avc: denied { read write } for pid=5221 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 313.038691][ T29] audit: type=1400 audit(2000000006.804:3424): avc: denied { read write } for pid=14273 comm="syz.0.4291" name="video7" dev="devtmpfs" ino=864 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l_device_t tclass=chr_file permissive=0 May 18 03:33:27 syzkaller kern.notice kernel: [ 313.038691][ T29] audit: type=1400 audit(2000000006.804:3424): avc: denied { read write } for pid=14273 comm="syz.0.4291" name="video7" dev="devtmpfs" ino=864 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4 [ 313.116856][ T29] audit: type=1400 audit(2000000006.813:3425): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 18 03:33:27 syzkaller kern.notice kernel: [ 313.116856][ T29] audit: type=1400 audit(2000000006.813:3425): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 313.178681][ T29] audit: type=1400 audit(2000000006.813:3426): avc: denied { read write } for pid=5221 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 18 03:33:27 syzkaller kern.notice kernel: [ 313.178681][ T29] audit: type=1400 audit(2000000006.813:3426): avc: denied { read write } for pid=5221 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 313.362658][T14318] kAFS: unable to lookup cell 'mS²/Ë¡8' May 18 03:33:27 syzkaller kern.err kernel: [ 313.362658][T14318] kAFS: unable to lookup cell 'mS²/Ë¡8' [ 314.028502][T14364] libceph: resolve '0' (ret=-3): failed May 18 03:33:28 syzkaller kern.info kernel: [ 314.028502][T14364] libceph: resolve '0' (ret=-3): failed [ 314.390701][T14392] syz.2.4349 uses obsolete (PF_INET,SOCK_PACKET) May 18 03:33:28 syzkaller kern.info kernel: [ 314.390701][T14392] syz.2.4349 uses obsolete (PF_INET,SOCK_PACKET) [ 315.523124][T14468] x_tables: ip_tables: REDIRECT target: used from hooks POSTROUTING, but only usable from PREROUTING/OUTPUT May 18 03:33:29 syzkaller kern.info kernel: [ 315.523124][T14468] x_tables: ip_tables: REDIRECT target: used from hooks POSTROUTING, but only usable from PREROUTING/OUTPUT [ 316.146721][T14513] x_tables: ip_tables: osf match: only valid for protocol 6 May 18 03:33:30 syzkaller kern.info kernel: [ 316.146721][T14513] x_tables: ip_tables: osf match: only valid for protocol 6 [ 316.995304][T14573] trusted_key: encrypted_key: keyword 'ne•' not recognized May 18 03:33:30 syzkaller kern.info kernel: [ 316.995304][T14573] trusted_key: encrypted_key: keyword 'ne•' not recognized [ 317.502944][T14608] snd_dummy snd_dummy.0: control 0:0:0:syz0:0 is already present May 18 03:33:31 syzkaller kern.err kernel: [ 317.502944][T14608] snd_dummy snd_dummy.0: control 0:0:0:syz0:0 is already present [ 317.935544][ T29] kauditd_printk_skb: 294 callbacks suppressed [ 317.935564][ T29] audit: type=1400 audit(2000000011.705:3721): avc: denied { read write } for pid=5227 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 18 03:33:31 syzkaller kern.warn kernel: [ 317.935544][ T29] kauditd_printk_skb: 294 callbacks suppressed May 18 03:33:31 syzkaller kern.notice kernel: [ 317.935564][ T29] audit: type=1400 audit(2000000011.705:3721): avc: denied { read write } for pid=5227 comm="syz-executor[ 317.999648][ T29] audit: type=1400 audit(2000000011.723:3722): avc: denied { read write } for pid=5216 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 " name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi May 18 03:3[ 318.033737][ T29] audit: type=1400 audit(2000000011.742:3723): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 3:31 syzkaller kern.notice kernel: [ 317.999648][ T29] audit: type=1400 audit(2000000011.723:3722): avc: denied { read write } for pid=5216 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tconte[ 318.076673][ T29] audit: type=1400 audit(2000000011.742:3724): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 xt=system_u:object_r:fi May 18 [ 318.100364][ T29] audit: type=1400 audit(2000000011.742:3725): avc: denied { prog_load } for pid=14641 comm="syz.0.4474" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 03:33:31 syzkaller kern.notice k[ 318.123152][ T29] audit: type=1400 audit(2000000011.797:3726): avc: denied { read } for pid=14640 comm="syz.1.4475" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 ernel: [ 318.033737][ T29] audit: type=1400 audit(2000000011.742:3723): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= May 18 03:33:31 syzkaller kern.notice kernel: [ 318.076673][ T29] audit: type=1400 audit(2000000011.742:3724): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=191[ 318.184065][ T29] audit: type=1400 audit(2000000011.797:3727): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= May 18 03:33:31 syzkaller kern.notice kernel: [ 318.100364][ T29] audit: type=1400 audit(2000000011.742:3725): avc: denied { prog_load } for pid=14641 co[ 318.226596][ T29] audit: type=1400 audit(2000000011.797:3728): avc: denied { prog_load } for pid=14645 comm="syz.4.4476" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 mm="syz.0.4474" [ 318.247560][ T29] audit: type=1400 audit(2000000011.797:3729): avc: denied { read write } for pid=5221 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 May 18 03:33:31 syzkaller kern.notice kernel: [ 318.123152][ T29] audit: type=1400 audit(2000000011.797:3726): avc: denied { read } for pid=14640 comm="syz.1.4475" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_dis May 18 03:33:31 syzkaller kern.notice kernel: [ 318.184065][ T29] audit: type=1400 audit(2000000011.797:3727): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=[ 318.328613][ T29] audit: type=1400 audit(2000000011.825:3730): avc: denied { read } for pid=14644 comm="syz.3.4477" name="iommu" dev="devtmpfs" ino=624 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 May 18 03:33:31 syzkaller kern.notice kernel: [ 318.226596][ T29] audit: type=1400 audit(2000000011.797:3728): avc: denied { prog_load } for pid=14645 comm="syz.4.4476" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 May 18 03:33:32 syzkaller kern.notice kernel: [ 318.247560][ T29] audit: type=1400 audit(2000000011.797:3729): avc: denied { read write } for pid=5221 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi May 18 03:33:32 syzkaller kern.notice kernel: [ 318.328613][ T29] audit: type=1400 audit(2000000011.825:3730): avc: denied { read } for pid=14644 comm="syz.3.4477" name="iommu" dev="devtmpfs" ino=624 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t [ 318.621893][T14677] x_tables: eb_tables: snat.0 target: invalid size 16 (kernel) != (user) 0 May 18 03:33:32 syzkaller kern.err kernel: [ 318.621893][T14677] x_tables: eb_tables: snat.0 target: invalid size 16 (kernel) != (user) 0 [ 319.627806][T14746] netdevsim netdevsim2: loading /lib/firmware/. failed with error -22 [ 319.636193][T14746] netdevsim netdevsim2: Direct firmware load for . failed with error -22 May 18 03:33:33 syzkaller kern.warn kernel: [ 3[ 319.650219][T14746] netdevsim netdevsim2: Falling back to sysfs fallback for: . 19.627806][T14746] netdevsim netdevsim2: loading /lib/firmware/. failed with error -22 May 18 03:33:33 syzkaller kern.warn kernel: [ 319.636193][T14746] netdevsim netdevsim2: Direct firmware load for . failed with error -22 May 18 03:33:33 syzkaller kern.warn kernel: [ 319.650219][T14746] netdevsim netdevsim2: Falling back to sysfs fallback for: . [ 320.057302][T14776] warning: `syz.3.4540' uses wireless extensions which will stop working for Wi-Fi 7 hardware; use nl80211 May 18 03:33:33 syzkaller kern.warn kernel: [ 320.057302][T14776] warning: `syz.3.4540' uses wireless extensions which will stop working for Wi-Fi 7 hardware; use nl80211 [ 320.134022][T14780] xt_ecn: cannot match TCP bits for non-tcp packets May 18 03:33:33 syzkaller kern.info kernel: [ 320.134022][T14780] xt_ecn: cannot match TCP bits for non-tcp packets [ 321.223819][T14856] ip6t_srh: unknown srh invflags 7863 May 18 03:33:34 syzkaller kern.info kernel: [ 321.223819][T14856] ip6t_srh: unknown srh invflags 7863 [ 323.361766][ T29] kauditd_printk_skb: 319 callbacks suppressed [ 323.361786][ T29] audit: type=1400 audit(2000000016.717:4050): avc: denied { read write } for pid=5229 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 18 03:33:36 syzkaller kern.warn kernel: [ 323.361766][ T29] kauditd_printk_skb: 319 callbacks suppressed May 18 03:33:36 syzkaller kern.notice kernel: [ 323.361786][ T29] audit: type=1400 audit(2000000016.717:4050): avc: denied { read write } for pid=5229 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 323.438355][ T29] audit: type=1400 audit(2000000016.717:4051): avc: denied { read write } for pid=5221 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 18 03:33:36 syzkaller kern.notice kernel: [ 323.438355][ T29] audit: type=1400 audit(2000000016.717:4051): avc: denied { read write } for pid=5221 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 323.508193][ T29] audit: type=1400 audit(2000000016.744:4052): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 18 03:33:36 syzkaller kern.notice kernel: [ 323.508193][ T29] audit: type=1400 audit(2000000016.744:4052): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 323.586696][ T29] audit: type=1400 audit(2000000016.744:4053): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 18 03:33:36 syzkaller kern.notice kernel: [ 323.586696][ T29] audit: type=1400 audit(2000000016.744:4053): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclas[ 323.642613][ T29] audit: type=1400 audit(2000000016.763:4054): avc: denied { create } for pid=15006 comm="syz.0.4657" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 s= May 18 03:33:36 syzkaller kern.notice kernel: [ 323.642613][ T29] audit: type[ 323.670478][ T29] audit: type=1400 audit(2000000016.781:4055): avc: denied { read write } for pid=5227 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 =1400 audit(2000000016.763:4054): avc: denied { create } for pid=15006 comm="syz.0.4657" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive= May 18 03:33:37 syzkaller kern.notice kernel: [ 323.670478][ T29] audit: type=1400 audit(2000000016.781:4055): avc: denied { read write } for pid=5227 comm="syz-executor" name="loop4" de[ 323.733117][ T29] audit: type=1400 audit(2000000016.809:4056): avc: denied { read write } for pid=5216 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 v="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi May 18 03:33:37 syzkaller kern.notice kernel: [ 323.733117][ T29] audit: type=1400 audit(2000000016.809:4056): avc: denied { read write } for pid=5216 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 323.824943][ T29] audit: type=1400 audit(2000000016.809:4057): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 18 03:33:37 syzkaller kern.notice kernel: [ 323.824943][ T29] audit: type=1400 audit(2000000016.809:4057): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 323.909339][ T29] audit: type=1400 audit(2000000016.809:4058): avc: denied { read write } for pid=5233 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 18 03:33:37 syzkaller kern.notice kernel: [ 323.909339][ T29] audit: type=1400 audit(2000000016.809:4058): avc: denied { read write } for pid=5233 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 323.965914][ T29] audit: type=1400 audit(2000000016.827:4059): avc: denied { read write } for pid=5221 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 18 03:33:37 syzkaller kern.notice kernel: [ 323.965914][ T29] audit: type=1400 audit(2000000016.827:4059): avc: denied { read write } for pid=5221 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 326.230220][T15198] netlink: 4 bytes leftover after parsing attributes in process `syz.4.4751'. May 18 03:33:39 syzkaller kern.warn kernel: [ 326.230220][T15198] netlink: 4 bytes leftover after parsing attributes in process `syz.4.4751'. [ 327.168641][T15258] x_tables: ip_tables: ah match: only valid for protocol 51 May 18 03:33:40 syzkaller kern.info kernel: [ 327.168641][T15258] x_tables: ip_tables: ah match: only valid for protocol 51 May 18 03:33:41 syzkaller kern.debug kernel: [ 328.763156][T15306] PM: Image not found (code -6) [ 328.845406][ T29] kauditd_printk_skb: 247 callbacks suppressed [ 328.845427][ T29] audit: type=1400 audit(2000000021.775:4307): avc: denied { read } for pid=15308 comm="syz.0.4806" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=0 May 18 03:33:41 syzkaller kern.warn kernel: [ 328.845406][ T29] kauditd_printk_skb: 247 callbacks suppressed May 18 03:33:41 syzkaller kern.notice kernel: [ 328.845427][ T29] audit: type=1400 audit(2000000021.775:4307): avc: denied { read } for pid=15308 comm="syz.0.4806" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t [ 329.031189][ T29] audit: type=1400 audit(2000000021.802:4308): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 18 03:33:41 syzkaller kern.notice kernel: [ 329.031189][ T29] audit: type=1400 audit(2000000021.802:4308): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 329.192986][ T29] audit: type=1400 audit(2000000021.821:4309): avc: denied { map_create } for pid=15309 comm="syz.2.4807" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 May 18 03:33:42 syzkaller kern.notice kernel: [ 329.192986][ T29] audit: type=1400 audit(2000000021.821:4309): avc: denied { map_create } for pid=15309 comm="syz.2.4807" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 329.361227][ T29] audit: type=1400 audit(2000000021.821:4310): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 18 03:33:42 syzkaller kern.notice kernel: [ 329.361227][ T29] audit: type=1400 audit(2000000021.821:4310): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 329.509953][ T29] audit: type=1400 audit(2000000021.830:4311): avc: denied { prog_load } for pid=15309 comm="syz.2.4807" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 May 18 03:33:42 syzkaller kern.notice kernel: [ 329.509953][ T29] audit: type=1400 audit(2000000021.830:4311): avc: denied { prog_load } for pid=15309 comm="syz.2.4807" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 329.585192][ T29] audit: type=1400 audit(2000000021.839:4312): avc: denied { read write } for pid=5229 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 18 03:33:42 syzkaller kern.notice kernel: [ 329.585192][ T29] audit: type=1400 audit(2000000021.839:4312): avc: denied { read write } for pid=5229 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 329.668786][ T29] audit: type=1400 audit(2000000021.858:4313): avc: denied { read write } for pid=5227 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 18 03:33:42 syzkaller kern.notice kernel: [ 329.668786][ T29] audit: type=1400 audit(2000000021.858:4313): avc: denied { read write } for pid=5227 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 329.818855][ T29] audit: type=1400 audit(2000000021.876:4314): avc: denied { read } for pid=15312 comm="syz.3.4808" dev="nsfs" ino=4026532803 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 May 18 03:33:42 syzkaller kern.notice kernel: [ 329.818855][ T29] audit: type=1400 audit(2000000021.876:4314): avc: denied { read } for pid=15312 comm="syz.3.4808" dev="nsfs" ino=4026532803 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file [ 329.889993][ T29] audit: type=1400 audit(2000000021.904:4315): avc: denied { create } for pid=15312 comm="syz.3.4808" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 May 18 03:33:42 syzkaller kern.notice kernel: [ 329.889993][ T29] audit: type=1400 audit(2000000021.904:4315): avc: denied { create } for pid=15312 comm="syz.3.4808" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissi [ 329.963283][ T29] audit: type=1400 audit(2000000021.932:4316): avc: denied { read write } for pid=5221 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 18 03:33:42 syzkaller kern.notice kernel: [ 329.963283][ T29] audit: type=1400 audit(2000000021.932:4316): avc: denied { read write } for pid=5221 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 330.453383][T15354] xt_CT: No such helper "pptp" May 18 03:33:43 syzkaller kern.info kernel: [ 330.453383][T15354] xt_CT: No such helper "pptp" [ 332.606943][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 332.619245][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 332.631546][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 332.643862][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 332.656155][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 332.668451][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 332.680716][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 332.693006][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 332.705274][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 332.717582][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 332.847341][ T1270] ieee802154 phy0 wpan0: encryption failed: -22 [ 332.862887][ T1270] ieee802154 phy1 wpan1: encryption failed: -22 May 18 03:33:45 syzkaller kern.warn kernel: [ 332.606943][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 337.884808][ T29] kauditd_printk_skb: 94 callbacks suppressed [ 337.884830][ T29] audit: type=1400 audit(2000000025.494:4411): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 338.028646][ C1] net_ratelimit: 17465 callbacks suppressed [ 338.028671][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 338.046884][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 338.059220][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 338.071616][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 338.083956][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 338.096249][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 338.108590][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 338.120894][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 338.133243][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 338.145539][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:33:50 syzkaller kern.warn kernel: [ 332.619245][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:[ 338.504297][ T29] audit: type=1400 audit(2000000030.654:4412): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 0) May 18 03:33:50 syzkaller kern.warn kernel: [ 332.631546][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:33:50 syzkaller kern.warn kernel: [ 332.643862][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:33:50 syzkaller kern.warn kernel: [ 332.656155][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:33:50 syzkaller kern.warn kernel: [ 332.668451][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:33:50 syzkaller kern.warn kernel: [ 332.680716][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:33:50 syzkaller kern.warn kernel: [ 332.693006][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:33:50 syzkaller kern.warn kernel: [ 332.705274][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 340.997225][ T29] audit: type=1400 audit(2000000031.272:4413): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 18 03:33:50 syzkaller kern.warn kernel: [ 332.717582][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:33:50 syzkaller kern.warn kernel: [ 332.847341][ T1270] ieee802154 phy0 wpan0: encryption failed: -22 May 18 03:33:50 syzkaller kern.warn kernel: [ 332.862887][ T1270] ieee802154 phy1 wpan1: encryption failed: -22 May 18 03:33:50 syzkaller kern.warn kernel: [ 337.884808][ T29] kauditd_printk_skb: 94 callbacks suppressed May 18 03:33:50 syzkaller kern.notice kernel: [ 337.884830][ T29] audit: type=1400 audit(2000000025.494:4411): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= May 18 03:33:50 syzkaller kern.warn kernel: [ 338.028646][ C1] net_ratelimit: 17465 callbacks suppressed May 18 03:33:51 syzkaller kern.warn kernel: [ 338.028671][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:33:51 syzkaller kern.warn kernel: [ 338.046884][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:33:51 syzkaller kern.warn kernel: [ 338.059220][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:33:51 syzkaller kern.warn kernel: [ 338.071616][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:33:51 syzkaller kern.warn kernel: [ 338.083956][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:33:53 syzkaller kern.warn kernel: [ 338.096249][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:33:53 syzkaller kern.warn kernel: [ 338.108590][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 342.234044][ T29] audit: type=1400 audit(2000000031.300:4414): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 18 03:33:53 syzkaller kern.warn kernel: [ 338.120894][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:33:53 syzkaller kern.warn kernel: [ 338.133243][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:33:53 syzkaller kern.warn kernel: [ 338.145539][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:33:53 syzkaller kern.notice kernel: [ 338.504297][ T29] audit: type=1400 audit(2000000030.654:4412): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= May 18 03:33:53 syzkaller kern.notice kernel: [ 340.997225][ T29] audit: type=1400 audit(2000000031.272:4413): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 342.807990][T15413] Falling back ldisc for ptm1. May 18 03:33:54 syzkaller kern.notice kernel: [ 342.234044][ T29] audit: type=1400 audit(2000000031.300:4414): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= May 18 03:33:54 syzkaller kern.warn kernel: [ 342.807990][T15413] Falling back ldisc for ptm1. [ 343.456579][ C1] net_ratelimit: 17736 callbacks suppressed [ 343.456606][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 343.474835][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 343.487195][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 343.499478][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 343.511810][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 343.524103][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 343.536430][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 343.548728][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 343.561052][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 343.574695][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 344.715367][ T29] audit: type=1400 audit(2000000031.688:4415): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 344.715423][ T29] audit: type=1400 audit(2000000031.715:4416): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 344.715466][ T29] audit: type=1400 audit(2000000031.725:4417): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 344.715510][ T29] audit: type=1400 audit(2000000032.943:4418): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 344.715552][ T29] audit: type=1400 audit(2000000032.952:4419): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 344.715595][ T29] audit: type=1400 audit(2000000032.971:4420): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 344.715641][ T29] audit: type=1400 audit(2000000033.035:4421): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 344.715703][ T29] audit: type=1400 audit(2000000033.128:4422): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 344.715746][ T29] audit: type=1400 audit(2000000033.155:4423): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 344.715790][ T29] audit: type=1400 audit(2000000033.174:4424): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 348.299372][ C0] sched: DL replenish lagged too much [ 348.884478][ C1] net_ratelimit: 22889 callbacks suppressed [ 348.884503][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 348.884882][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 348.885158][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 348.885367][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 348.885554][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 348.885815][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 348.886188][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 348.886397][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 348.886454][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 348.886828][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 350.928738][ T29] kauditd_printk_skb: 16 callbacks suppressed [ 350.928759][ T29] audit: type=1400 audit(2000000042.118:4441): avc: denied { read write } for pid=5229 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 354.312487][ C1] net_ratelimit: 23271 callbacks suppressed [ 354.312513][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 354.312805][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 354.313005][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 354.313203][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 354.313478][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 354.313875][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 354.313991][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 354.314150][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 354.314541][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 354.314829][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 359.740412][ C1] net_ratelimit: 23162 callbacks suppressed [ 359.740440][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 359.740877][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 359.740882][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 359.741176][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 359.741579][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 359.741851][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 359.741887][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 359.742307][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 359.742601][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 359.742991][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 365.168357][ C1] net_ratelimit: 23100 callbacks suppressed [ 365.168394][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 365.168643][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 365.168774][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 365.169045][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 365.169437][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 365.169731][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 365.169812][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 365.170188][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 365.170449][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 365.170760][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 370.596527][ C1] net_ratelimit: 23219 callbacks suppressed [ 370.596554][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 370.596820][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 370.596823][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 370.597219][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 370.597502][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 370.597860][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 370.597931][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 370.598192][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 370.598553][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 370.598817][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 376.024231][ C1] net_ratelimit: 23934 callbacks suppressed [ 376.024257][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 376.024522][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 376.024530][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 376.024907][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 376.025194][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 376.025570][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 376.025667][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 376.025838][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 376.026298][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 376.026560][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 381.452314][ C1] net_ratelimit: 23944 callbacks suppressed [ 381.452341][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 381.452631][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 381.452856][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 381.453021][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 381.453299][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 381.453689][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 381.453778][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 381.453958][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 381.454397][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 381.454671][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 386.880137][ C1] net_ratelimit: 23727 callbacks suppressed [ 386.880164][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 386.880271][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 386.880566][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 386.880838][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 386.881245][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 386.881417][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 386.881512][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 386.881903][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 386.882172][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 386.882492][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 392.308268][ C1] net_ratelimit: 22903 callbacks suppressed [ 392.308297][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 392.308577][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 392.308980][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 392.309257][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 392.309271][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 392.309668][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 392.309961][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 392.310271][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 392.310357][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 392.310630][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 397.736108][ C0] net_ratelimit: 25480 callbacks suppressed [ 397.736140][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 397.736217][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 397.736514][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:55:20:d2:88:6e, vlan:0) [ 397.736616][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 397.736886][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 397.737275][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 397.737404][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 397.737551][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 397.737759][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:55:20:d2:88:6e, vlan:0) [ 397.737957][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 402.262656][ T1270] ieee802154 phy0 wpan0: encryption failed: -22 [ 402.272591][ T1270] ieee802154 phy1 wpan1: encryption failed: -22 [ 403.163945][ C0] net_ratelimit: 27114 callbacks suppressed [ 403.163971][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 403.164056][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 403.164370][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:55:20:d2:88:6e, vlan:0) [ 403.164433][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 403.164730][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 403.165104][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 403.165317][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 403.165365][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 403.165692][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:55:20:d2:88:6e, vlan:0) [ 403.165748][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 408.592051][ C1] net_ratelimit: 26383 callbacks suppressed [ 408.592078][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 408.592360][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 408.592475][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 408.592753][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 408.592764][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:55:20:d2:88:6e, vlan:0) [ 408.593136][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 408.593411][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 408.593747][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 408.593787][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 408.594053][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 414.020020][ C1] net_ratelimit: 25980 callbacks suppressed [ 414.020046][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 414.020121][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 414.020454][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 414.020534][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:55:20:d2:88:6e, vlan:0) [ 414.020729][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 414.021119][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 414.021387][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 414.021505][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 414.021803][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 414.021892][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:55:20:d2:88:6e, vlan:0) [ 419.447869][ C1] net_ratelimit: 25822 callbacks suppressed [ 419.447896][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 419.448037][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 419.448288][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 419.448393][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:55:20:d2:88:6e, vlan:0) [ 419.448569][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 419.448965][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 419.449237][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 419.449284][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 419.449619][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 419.449654][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:55:20:d2:88:6e, vlan:0) [ 424.875797][ C1] net_ratelimit: 26301 callbacks suppressed [ 424.875825][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 424.875919][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 424.876237][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 424.876276][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:55:20:d2:88:6e, vlan:0) [ 424.876514][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 424.876914][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 424.877163][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 424.877186][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 424.877518][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:55:20:d2:88:6e, vlan:0) [ 424.877583][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 430.303818][ C1] net_ratelimit: 26463 callbacks suppressed [ 430.303845][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 430.304118][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 430.304469][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 430.304498][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 430.304774][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 430.304869][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:55:20:d2:88:6e, vlan:0) [ 430.305157][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 430.305432][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 430.305809][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 430.305849][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 435.731666][ C0] net_ratelimit: 26413 callbacks suppressed [ 435.731694][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:55:20:d2:88:6e, vlan:0) [ 435.732014][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 435.732271][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 435.732661][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 435.732685][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 435.732947][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 435.733055][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:55:20:d2:88:6e, vlan:0) [ 435.733323][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 435.733596][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 435.733938][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 441.159745][ C1] net_ratelimit: 26504 callbacks suppressed [ 441.159772][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 441.159915][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:55:20:d2:88:6e, vlan:0) [ 441.160153][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 441.160413][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 441.160802][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 441.160815][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 441.161077][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 441.161183][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:55:20:d2:88:6e, vlan:0) [ 441.161472][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 441.161741][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 446.587592][ C0] net_ratelimit: 26575 callbacks suppressed [ 446.587619][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 446.587837][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 446.587989][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:55:20:d2:88:6e, vlan:0) [ 446.588122][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 446.588518][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 446.588789][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 446.588876][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 446.589211][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 446.589253][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:55:20:d2:88:6e, vlan:0) [ 446.589488][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 452.015593][ C1] net_ratelimit: 25345 callbacks suppressed [ 452.015620][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 452.015785][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:55:20:d2:88:6e, vlan:0) [ 452.016014][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 452.016298][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 452.016695][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 452.016756][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 452.016964][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 452.017136][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:55:20:d2:88:6e, vlan:0) [ 452.017369][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 452.017644][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 457.443548][ C1] net_ratelimit: 26050 callbacks suppressed [ 457.443573][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 457.443723][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:55:20:d2:88:6e, vlan:0) [ 457.443864][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 457.444258][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 457.444542][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 457.444756][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 457.444952][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 457.445156][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:55:20:d2:88:6e, vlan:0) [ 457.445222][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 457.445611][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 462.871501][ C1] net_ratelimit: 26112 callbacks suppressed [ 462.871526][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 462.871801][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 462.872183][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 462.872194][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 462.872470][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 462.872569][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:55:20:d2:88:6e, vlan:0) [ 462.872859][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 462.873146][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 462.873519][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 462.873556][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 468.299510][ C1] net_ratelimit: 26023 callbacks suppressed [ 468.299540][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 468.299812][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 468.299962][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 468.300207][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 468.300371][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:55:20:d2:88:6e, vlan:0) [ 468.300477][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 468.300865][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 468.301155][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 468.301308][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 468.301562][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 473.727347][ C0] net_ratelimit: 26002 callbacks suppressed [ 473.727373][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:55:20:d2:88:6e, vlan:0) [ 473.727579][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 473.727972][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 473.728241][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 473.728355][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 473.728638][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 473.728741][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:55:20:d2:88:6e, vlan:0) [ 473.728907][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 473.729295][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 473.729602][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 479.155464][ C1] net_ratelimit: 25827 callbacks suppressed [ 479.155494][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 479.155604][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 479.155760][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 479.155989][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:55:20:d2:88:6e, vlan:0) [ 479.156159][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 479.156435][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 479.156810][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 479.156973][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 479.157078][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 479.157358][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:55:20:d2:88:6e, vlan:0) [ 484.583298][ C1] net_ratelimit: 25770 callbacks suppressed [ 484.583325][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 484.583616][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 484.583667][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 484.584011][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 484.584028][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:55:20:d2:88:6e, vlan:0) [ 484.584285][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 484.584693][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 484.584925][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 484.584963][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 484.585286][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:55:20:d2:88:6e, vlan:0) [ 490.011289][ C1] net_ratelimit: 26431 callbacks suppressed [ 490.011314][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 490.011714][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 490.011788][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 490.012002][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 490.012159][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:55:20:d2:88:6e, vlan:0) [ 490.012393][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 490.012685][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 490.013044][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 490.013075][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 490.013343][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 492.914569][ T30] INFO: task syz.3.4848:15401 blocked for more than 143 seconds. [ 492.914608][ T30] Not tainted 6.11.0-syzkaller-12113-ge7ed34365879 #0 [ 492.914646][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 492.924887][ T30] task:syz.3.4848 state:D stack:28624 pid:15401 tgid:15397 ppid:5216 flags:0x00000004 [ 492.924968][ T30] Call Trace: [ 492.924978][ T30] [ 492.924996][ T30] __schedule+0xef5/0x5750 [ 492.925042][ T30] ? __pfx___lock_acquire+0x10/0x10 [ 492.925068][ T30] ? trace_lock_acquire+0x14a/0x1d0 [ 492.925104][ T30] ? __pfx___lock_acquire+0x10/0x10 [ 492.925142][ T30] ? __pfx___schedule+0x10/0x10 [ 492.925174][ T30] ? schedule+0x298/0x350 [ 492.925202][ T30] ? __pfx_lock_release+0x10/0x10 [ 492.925228][ T30] ? trace_lock_acquire+0x14a/0x1d0 [ 492.925267][ T30] ? lock_acquire+0x2f/0xb0 [ 492.925292][ T30] ? schedule+0x1fd/0x350 [ 492.925325][ T30] schedule+0xe7/0x350 [ 492.925356][ T30] schedule_preempt_disabled+0x13/0x30 [ 492.925387][ T30] __mutex_lock+0x5b8/0x9c0 [ 492.925430][ T30] ? __tun_chr_ioctl+0x621/0x4760 [ 492.925464][ T30] ? __pfx___mutex_lock+0x10/0x10 [ 492.935858][ T30] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 492.935901][ T30] ? __pfx_do_vfs_ioctl+0x10/0x10 [ 492.935948][ T30] ? __tun_chr_ioctl+0x621/0x4760 [ 492.935979][ T30] ? rtnl_lock+0x9/0x20 [ 492.936006][ T30] __tun_chr_ioctl+0x621/0x4760 [ 492.936036][ T30] ? ioctl_has_perm.constprop.0.isra.0+0x2ea/0x460 [ 492.936067][ T30] ? ioctl_has_perm.constprop.0.isra.0+0x2f3/0x460 [ 492.936106][ T30] ? __pfx___tun_chr_ioctl+0x10/0x10 [ 492.936153][ T30] ? selinux_file_ioctl+0x180/0x270 [ 492.936181][ T30] ? selinux_file_ioctl+0xb4/0x270 [ 492.936212][ T30] ? __pfx_tun_chr_ioctl+0x10/0x10 [ 492.936246][ T30] __x64_sys_ioctl+0x18f/0x220 [ 492.936284][ T30] do_syscall_64+0xcd/0x250 [ 492.936322][ T30] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 492.946705][ T30] RIP: 0033:0x7f5c6197dff9 [ 492.946742][ T30] RSP: 002b:00007f5c62707038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 492.946773][ T30] RAX: ffffffffffffffda RBX: 00007f5c61b36058 RCX: 00007f5c6197dff9 [ 492.946794][ T30] RDX: 00000000ffff0324 RSI: 00000000400454cd RDI: 0000000000000003 [ 492.946814][ T30] RBP: 00007f5c619f0296 R08: 0000000000000000 R09: 0000000000000000 [ 492.946833][ T30] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 492.946852][ T30] R13: 0000000000000001 R14: 00007f5c61b36058 R15: 00007fff22699d18 [ 492.946890][ T30] [ 492.946904][ T30] INFO: task syz.0.4849:15400 blocked for more than 143 seconds. [ 492.946924][ T30] Not tainted 6.11.0-syzkaller-12113-ge7ed34365879 #0 [ 492.946941][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 492.946953][ T30] task:syz.0.4849 state:D stack:27888 pid:15400 tgid:15399 ppid:5221 flags:0x00000004 [ 492.947025][ T30] Call Trace: [ 492.947036][ T30] [ 492.947053][ T30] __schedule+0xef5/0x5750 [ 492.947085][ T30] ? __pfx___lock_acquire+0x10/0x10 [ 492.947112][ T30] ? do_syscall_64+0xcd/0x250 [ 492.947148][ T30] ? __pfx___lock_acquire+0x10/0x10 [ 493.001922][ T30] ? __pfx___schedule+0x10/0x10 [ 493.001963][ T30] ? schedule+0x298/0x350 [ 493.001993][ T30] ? __pfx_lock_release+0x10/0x10 [ 493.002020][ T30] ? trace_lock_acquire+0x14a/0x1d0 [ 493.002059][ T30] ? lock_acquire+0x2f/0xb0 [ 493.002084][ T30] ? schedule+0x1fd/0x350 [ 493.002118][ T30] schedule+0xe7/0x350 [ 493.002148][ T30] schedule_preempt_disabled+0x13/0x30 [ 493.002179][ T30] __mutex_lock+0x5b8/0x9c0 [ 493.002212][ T30] ? trace_kmalloc+0x2d/0xe0 [ 493.002247][ T30] ? rtnl_dumpit+0x18f/0x1f0 [ 493.002280][ T30] ? __pfx___mutex_lock+0x10/0x10 [ 493.002319][ T30] ? __alloc_skb+0x1fe/0x380 [ 493.002356][ T30] ? __pfx___alloc_skb+0x10/0x10 [ 493.002414][ T30] ? __pfx_ip6mr_rtm_dumproute+0x10/0x10 [ 493.002444][ T30] ? rtnl_dumpit+0x18f/0x1f0 [ 493.002472][ T30] rtnl_dumpit+0x18f/0x1f0 [ 493.002504][ T30] netlink_dump+0x552/0xcc0 [ 493.002543][ T30] ? __pfx_netlink_dump+0x10/0x10 [ 493.002573][ T30] ? __mutex_lock+0x1a6/0x9c0 [ 493.002605][ T30] ? __pfx_lock_release+0x10/0x10 [ 493.002630][ T30] ? __rhashtable_lookup.constprop.0+0x397/0x710 [ 493.002681][ T30] ? __pfx_netlink_lookup+0x10/0x10 [ 493.002715][ T30] ? __pfx_lock_release+0x10/0x10 [ 493.002748][ T30] __netlink_dump_start+0x6ca/0x970 [ 493.002785][ T30] ? __pfx_ip6mr_rtm_dumproute+0x10/0x10 [ 493.002813][ T30] rtnetlink_rcv_msg+0xb44/0xea0 [ 493.002854][ T30] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 493.002891][ T30] ? __pfx_rtnl_dumpit+0x10/0x10 [ 493.002920][ T30] ? __pfx_ip6mr_rtm_dumproute+0x10/0x10 [ 493.002961][ T30] netlink_rcv_skb+0x16b/0x440 [ 493.002996][ T30] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 493.003035][ T30] ? __pfx_netlink_rcv_skb+0x10/0x10 [ 493.003090][ T30] ? netlink_deliver_tap+0x1ae/0xd90 [ 493.003131][ T30] netlink_unicast+0x53c/0x7f0 [ 493.003171][ T30] ? __pfx_netlink_unicast+0x10/0x10 [ 493.003219][ T30] netlink_sendmsg+0x8b8/0xd70 [ 493.003261][ T30] ? __pfx_netlink_sendmsg+0x10/0x10 [ 493.003310][ T30] sock_write_iter+0x4fe/0x5b0 [ 493.003343][ T30] ? __pfx_sock_write_iter+0x10/0x10 [ 493.003389][ T30] ? bpf_lsm_file_permission+0x9/0x10 [ 493.003421][ T30] ? security_file_permission+0x71/0x210 [ 493.003458][ T30] vfs_write+0x6b5/0x1140 [ 493.003498][ T30] ? __pfx_sock_write_iter+0x10/0x10 [ 493.003532][ T30] ? trace_lock_acquire+0x14a/0x1d0 [ 493.003565][ T30] ? __pfx_vfs_write+0x10/0x10 [ 493.003606][ T30] ? __fget_files+0x40/0x3f0 [ 493.003660][ T30] ksys_write+0x1fa/0x260 [ 493.003697][ T30] ? __pfx_ksys_write+0x10/0x10 [ 493.003745][ T30] do_syscall_64+0xcd/0x250 [ 493.003783][ T30] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 493.003816][ T30] RIP: 0033:0x7faab2d7dff9 [ 493.003839][ T30] RSP: 002b:00007faab3a92038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 493.003870][ T30] RAX: ffffffffffffffda RBX: 00007faab2f35f80 RCX: 00007faab2d7dff9 [ 493.003891][ T30] RDX: 0000000000000024 RSI: 0000000020000000 RDI: 0000000000000003 [ 493.003911][ T30] RBP: 00007faab2df0296 R08: 0000000000000000 R09: 0000000000000000 [ 493.003930][ T30] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 493.003948][ T30] R13: 0000000000000000 R14: 00007faab2f35f80 R15: 00007ffc2e012cd8 [ 493.003986][ T30] [ 493.004003][ T30] [ 493.004003][ T30] Showing all locks held in the system: [ 493.004015][ T30] 2 locks held by kworker/u8:0/11: [ 493.004033][ T30] #0: ffff88801b089148 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_one_work+0x129b/0x1ba0 [ 493.004106][ T30] #1: ffffc90000107d80 ((work_completion)(&pool->idle_cull_work)){+.+.}-{0:0}, at: process_one_work+0x921/0x1ba0 [ 493.004177][ T30] 4 locks held by kworker/u8:1/12: [ 493.004194][ T30] #0: ffff8880206f9148 ((wq_completion)writeback){+.+.}-{0:0}, at: process_one_work+0x129b/0x1ba0 [ 493.004262][ T30] #1: ffffc90000117d80 ((work_completion)(&(&wb->dwork)->work)){+.+.}-{0:0}, at: process_one_work+0x921/0x1ba0 [ 493.004333][ T30] #2: ffff88814ce2c0e0 (&type->s_umount_key#52){++++}-{3:3}, at: super_trylock_shared+0x1e/0xf0 [ 493.004426][ T30] #3: ffff88814ce2eb98 (&sbi->s_writepages_rwsem){++++}-{0:0}, at: do_writepages+0x1a3/0x7f0 [ 493.004498][ T30] 6 locks held by kworker/1:0/25: [ 493.004516][ T30] 1 lock held by khungtaskd/30: [ 493.004533][ T30] #0: ffffffff8e1b8340 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x7f/0x390 [ 493.004602][ T30] 3 locks held by kworker/u8:2/35: [ 493.004618][ T30] #0: ffff88814b959948 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: process_one_work+0x129b/0x1ba0 [ 493.004688][ T30] #1: ffffc90000ab7d80 ((work_completion)(&(&net->ipv6.addr_chk_work)->work)){+.+.}-{0:0}, at: process_one_work+0x921/0x1ba0 [ 493.004760][ T30] #2: ffffffff8fee0b68 (rtnl_mutex){+.+.}-{3:3}, at: addrconf_verify_work+0x12/0x30 [ 493.004844][ T30] 2 locks held by kworker/u8:4/62: [ 493.004887][ T30] 3 locks held by syslogd/4656: [ 493.004904][ T30] 2 locks held by udevd/4674: [ 493.004922][ T30] 2 locks held by dhcpcd/4887: [ 493.004939][ T30] 1 lock held by dhcpcd/4888: [ 493.004956][ T30] 2 locks held by getty/4971: [ 493.004973][ T30] #0: ffff88803253a0a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x24/0x80 [ 493.005048][ T30] #1: ffffc90002f062f0 (&ldata->atomic_read_lock){+.+.}-{3:3}, at: n_tty_read+0xfba/0x1480 [ 493.005121][ T30] 1 lock held by syz-executor/5206: [ 493.005140][ T30] 1 lock held by syz-executor/5229: [ 493.005160][ T30] 3 locks held by kworker/1:4/5266: [ 493.005177][ T30] #0: ffff88801b080948 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x129b/0x1ba0 [ 493.005247][ T30] #1: ffffc90004297d80 (deferred_process_work){+.+.}-{0:0}, at: process_one_work+0x921/0x1ba0 [ 493.005316][ T30] #2: ffffffff8fee0b68 (rtnl_mutex){+.+.}-{3:3}, at: switchdev_deferred_process_work+0xe/0x20 [ 493.005402][ T30] 3 locks held by kworker/0:6/5329: [ 493.005421][ T30] 3 locks held by syz.4.4843/15390: [ 493.005438][ T30] #0: ffff888026e1a0a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_release+0x86/0x2a0 [ 493.005514][ T30] #1: ffff888026e1c0a0 (&tty->ldisc_sem/1){+.+.}-{0:0}, at: tty_ldisc_release+0xb0/0x2a0 [ 493.005598][ T30] #2: ffffffff8e1c3cb8 (rcu_state.exp_mutex){+.+.}-{3:3}, at: exp_funnel_lock+0x1a4/0x3b0 [ 493.005678][ T30] 3 locks held by syz.3.4848/15398: [ 493.005697][ T30] 1 lock held by syz.3.4848/15401: [ 493.005714][ T30] #0: ffffffff8fee0b68 (rtnl_mutex){+.+.}-{3:3}, at: __tun_chr_ioctl+0x621/0x4760 [ 493.005787][ T30] 2 locks held by syz.0.4849/15400: [ 493.005804][ T30] #0: ffff888032afd6c8 (nlk_cb_mutex-ROUTE){+.+.}-{3:3}, at: __netlink_dump_start+0x154/0x970 [ 493.005878][ T30] #1: ffffffff8fee0b68 (rtnl_mutex){+.+.}-{3:3}, at: rtnl_dumpit+0x18f/0x1f0 [ 493.005949][ T30] [ 493.005956][ T30] ============================================= [ 493.005956][ T30] [ 493.005976][ T30] NMI backtrace for cpu 0 [ 493.005989][ T30] CPU: 0 UID: 0 PID: 30 Comm: khungtaskd Not tainted 6.11.0-syzkaller-12113-ge7ed34365879 #0 [ 493.006021][ T30] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 493.006037][ T30] Call Trace: [ 493.006046][ T30] [ 493.006057][ T30] dump_stack_lvl+0x116/0x1f0 [ 493.006093][ T30] nmi_cpu_backtrace+0x27b/0x390 [ 493.006123][ T30] ? __pfx_nmi_raise_cpu_backtrace+0x10/0x10 [ 493.006158][ T30] nmi_trigger_cpumask_backtrace+0x29c/0x300 [ 493.006189][ T30] watchdog+0xf0c/0x1240 [ 493.006221][ T30] ? __pfx_watchdog+0x10/0x10 [ 493.006244][ T30] ? lockdep_hardirqs_on+0x7c/0x110 [ 493.006278][ T30] ? __kthread_parkme+0x148/0x220 [ 493.006312][ T30] ? __pfx_watchdog+0x10/0x10 [ 493.006337][ T30] kthread+0x2c1/0x3a0 [ 493.006366][ T30] ? _raw_spin_unlock_irq+0x23/0x50 [ 493.006400][ T30] ? __pfx_kthread+0x10/0x10 [ 493.006432][ T30] ret_from_fork+0x45/0x80 [ 493.006457][ T30] ? __pfx_kthread+0x10/0x10 [ 493.006488][ T30] ret_from_fork_asm+0x1a/0x30 [ 493.006537][ T30] [ 493.006548][ T30] Sending NMI from CPU 0 to CPUs 1: [ 493.006578][ C1] NMI backtrace for cpu 1 [ 493.006595][ C1] CPU: 1 UID: 0 PID: 25 Comm: kworker/1:0 Not tainted 6.11.0-syzkaller-12113-ge7ed34365879 #0 [ 493.006624][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 493.006643][ C1] Workqueue: events nsim_dev_trap_report_work [ 493.006673][ C1] RIP: 0010:stack_trace_consume_entry+0x93/0x170 [ 493.006712][ C1] Code: 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 0f b6 14 02 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 98 00 00 00 <8b> 43 0c 85 c0 75 57 48 b8 00 00 00 00 00 fc ff df 48 89 da 48 c1 [ 493.006735][ C1] RSP: 0018:ffffc90000a17888 EFLAGS: 00000246 [ 493.006754][ C1] RAX: 0000000000000007 RBX: ffffc90000a17968 RCX: 0000000000000000 [ 493.006769][ C1] RDX: 0000000000000000 RSI: ffffffff89ec7817 RDI: ffffc90000a17974 [ 493.006786][ C1] RBP: 0000000000000014 R08: ffffc90000a178dc R09: ffffffff918d5d2c [ 493.006803][ C1] R10: ffffc90000a178a8 R11: 000000000008ec70 R12: ffffffff81795040 [ 493.006820][ C1] R13: ffffc90000a17968 R14: 0000000000000000 R15: ffff88801d6c9e00 [ 493.006837][ C1] FS: 0000000000000000(0000) GS:ffff8880b8700000(0000) knlGS:0000000000000000 [ 493.006860][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 493.006878][ C1] CR2: 00007fad350656c0 CR3: 000000007b2da000 CR4: 00000000003526f0 [ 493.006894][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 493.006909][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 493.006925][ C1] Call Trace: [ 493.006932][ C1] [ 493.006941][ C1] ? nmi_cpu_backtrace+0x1d8/0x390 [ 493.006968][ C1] ? nmi_cpu_backtrace_handler+0xc/0x20 [ 493.007001][ C1] ? nmi_handle+0x1a9/0x5c0 [ 493.007026][ C1] ? stack_trace_consume_entry+0x93/0x170 [ 493.007056][ C1] ? default_do_nmi+0x6a/0x160 [ 493.007078][ C1] ? exc_nmi+0x170/0x1e0 [ 493.007099][ C1] ? end_repeat_nmi+0xf/0x53 [ 493.007129][ C1] ? __pfx_stack_trace_consume_entry+0x10/0x10 [ 493.007165][ C1] ? maybe_deliver+0xa7/0x120 [ 493.007192][ C1] ? stack_trace_consume_entry+0x93/0x170 [ 493.007221][ C1] ? stack_trace_consume_entry+0x93/0x170 [ 493.007251][ C1] ? stack_trace_consume_entry+0x93/0x170 [ 493.007280][ C1] [ 493.007288][ C1] [ 493.007295][ C1] ? unwind_get_return_address+0x59/0xa0 [ 493.007322][ C1] arch_stack_walk+0x86/0x100 [ 493.007351][ C1] ? maybe_deliver+0xa7/0x120 [ 493.007380][ C1] stack_trace_save+0x95/0xd0 [ 493.007406][ C1] ? __pfx_stack_trace_save+0x10/0x10 [ 493.007434][ C1] ? __pfx_mark_lock+0x10/0x10 [ 493.007458][ C1] ? lock_acquire.part.0+0x11b/0x380 [ 493.007482][ C1] kasan_save_stack+0x33/0x60 [ 493.007506][ C1] ? kasan_save_stack+0x33/0x60 [ 493.007530][ C1] ? kasan_save_track+0x14/0x30 [ 493.007553][ C1] ? kasan_save_free_info+0x3b/0x60 [ 493.007584][ C1] ? __kasan_slab_free+0x51/0x70 [ 493.007609][ C1] ? kmem_cache_free+0x152/0x4b0 [ 493.007634][ C1] ? __skb_ext_put+0x102/0x2c0 [ 493.007662][ C1] ? __skb_ext_del+0xf3/0x340 [ 493.007690][ C1] ? br_nf_dev_queue_xmit+0x6f2/0x2900 [ 493.007720][ C1] ? br_nf_post_routing+0x8ee/0x11b0 [ 493.007748][ C1] ? nf_hook_slow+0xbb/0x200 [ 493.007781][ C1] ? nf_hook+0x474/0x7d0 [ 493.007804][ C1] ? br_forward_finish+0xcd/0x130 [ 493.007829][ C1] ? br_nf_hook_thresh+0x303/0x410 [ 493.007858][ C1] ? br_nf_forward_finish+0x66a/0xba0 [ 493.007887][ C1] ? br_nf_forward_ip.part.0+0x610/0x820 [ 493.007916][ C1] ? br_nf_forward+0xf11/0x1bd0 [ 493.007945][ C1] ? nf_hook_slow+0xbb/0x200 [ 493.007976][ C1] ? nf_hook+0x474/0x7d0 [ 493.008000][ C1] ? __br_forward+0x1be/0x5b0 [ 493.008024][ C1] ? deliver_clone+0x5b/0xa0 [ 493.008065][ C1] kasan_save_track+0x14/0x30 [ 493.008089][ C1] kasan_save_free_info+0x3b/0x60 [ 493.008121][ C1] __kasan_slab_free+0x51/0x70 [ 493.008150][ C1] kmem_cache_free+0x152/0x4b0 [ 493.008176][ C1] ? __skb_ext_put+0x102/0x2c0 [ 493.008206][ C1] __skb_ext_put+0x102/0x2c0 [ 493.008236][ C1] __skb_ext_del+0xf3/0x340 [ 493.008264][ C1] ? __pfx_br_nf_dev_queue_xmit+0x10/0x10 [ 493.008296][ C1] br_nf_dev_queue_xmit+0x6f2/0x2900 [ 493.008328][ C1] ? __pfx_br_nf_dev_queue_xmit+0x10/0x10 [ 493.008361][ C1] br_nf_post_routing+0x8ee/0x11b0 [ 493.008393][ C1] ? __pfx_br_nf_post_routing+0x10/0x10 [ 493.008422][ C1] nf_hook_slow+0xbb/0x200 [ 493.008456][ C1] nf_hook+0x474/0x7d0 [ 493.008481][ C1] ? __pfx_br_dev_queue_push_xmit+0x10/0x10 [ 493.008509][ C1] ? __pfx_nf_hook+0x10/0x10 [ 493.008535][ C1] ? __pfx_br_dev_queue_push_xmit+0x10/0x10 [ 493.008563][ C1] ? __pfx___lock_acquire+0x10/0x10 [ 493.008588][ C1] br_forward_finish+0xcd/0x130 [ 493.008613][ C1] ? __pfx_br_dev_queue_push_xmit+0x10/0x10 [ 493.008641][ C1] br_nf_hook_thresh+0x303/0x410 [ 493.008670][ C1] ? __pfx_br_forward_finish+0x10/0x10 [ 493.008698][ C1] ? __pfx_br_nf_hook_thresh+0x10/0x10 [ 493.008727][ C1] ? __pfx_lock_release+0x10/0x10 [ 493.008749][ C1] ? trace_lock_acquire+0x14a/0x1d0 [ 493.008780][ C1] ? __pfx_br_forward_finish+0x10/0x10 [ 493.008810][ C1] br_nf_forward_finish+0x66a/0xba0 [ 493.008840][ C1] ? __pfx_br_forward_finish+0x10/0x10 [ 493.008869][ C1] br_nf_forward_ip.part.0+0x610/0x820 [ 493.008902][ C1] br_nf_forward+0xf11/0x1bd0 [ 493.008933][ C1] ? __pfx_br_nf_forward+0x10/0x10 [ 493.008962][ C1] nf_hook_slow+0xbb/0x200 [ 493.008996][ C1] nf_hook+0x474/0x7d0 [ 493.009020][ C1] ? __pfx_br_forward_finish+0x10/0x10 [ 493.009047][ C1] ? __pfx_nf_hook+0x10/0x10 [ 493.009074][ C1] ? __pfx_br_forward_finish+0x10/0x10 [ 493.009099][ C1] ? __asan_memcpy+0x3c/0x60 [ 493.009125][ C1] __br_forward+0x1be/0x5b0 [ 493.009157][ C1] ? __pfx_br_forward_finish+0x10/0x10 [ 493.009185][ C1] deliver_clone+0x5b/0xa0 [ 493.009210][ C1] maybe_deliver+0xa7/0x120 [ 493.009237][ C1] br_flood+0x17e/0x5c0 [ 493.009266][ C1] br_handle_frame_finish+0xda5/0x1c80 [ 493.009299][ C1] ? __pfx_br_handle_frame_finish+0x10/0x10 [ 493.009334][ C1] ? ip6t_do_table+0xd20/0x1d40 [ 493.009356][ C1] ? __local_bh_enable_ip+0xa4/0x120 [ 493.009384][ C1] ? ip6t_do_table+0xd50/0x1d40 [ 493.009408][ C1] ? nf_hook_slow+0x132/0x200 [ 493.009443][ C1] br_nf_hook_thresh+0x303/0x410 [ 493.009472][ C1] ? __pfx_br_handle_frame_finish+0x10/0x10 [ 493.009504][ C1] ? __pfx_br_nf_hook_thresh+0x10/0x10 [ 493.009536][ C1] ? __pfx_br_handle_frame_finish+0x10/0x10 [ 493.009567][ C1] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 493.009590][ C1] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 493.009615][ C1] br_nf_pre_routing_finish_ipv6+0x76a/0xfb0 [ 493.009647][ C1] ? __pfx_br_handle_frame_finish+0x10/0x10 [ 493.009681][ C1] br_nf_pre_routing_ipv6+0x3ce/0x8c0 [ 493.009712][ C1] ? __pfx_br_nf_pre_routing_ipv6+0x10/0x10 [ 493.009743][ C1] ? __pfx_lock_release+0x10/0x10 [ 493.009765][ C1] ? trace_lock_acquire+0x14a/0x1d0 [ 493.009795][ C1] ? __pfx_br_nf_pre_routing_finish_ipv6+0x10/0x10 [ 493.009833][ C1] br_nf_pre_routing+0x860/0x15b0 [ 493.009865][ C1] br_handle_frame+0x9eb/0x1490 [ 493.009896][ C1] ? __pfx_br_handle_frame+0x10/0x10 [ 493.009927][ C1] ? __pfx_br_handle_frame_finish+0x10/0x10 [ 493.009957][ C1] ? mark_lock+0xb5/0xc60 [ 493.009981][ C1] ? __pfx_br_handle_frame+0x10/0x10 [ 493.010010][ C1] __netif_receive_skb_core.constprop.0+0xa3d/0x4330 [ 493.010046][ C1] ? kmem_cache_free+0x152/0x4b0 [ 493.010072][ C1] ? kfree_skbmem+0x1a4/0x1f0 [ 493.010102][ C1] ? __pfx___netif_receive_skb_core.constprop.0+0x10/0x10 [ 493.010133][ C1] ? hlock_class+0x4e/0x130 [ 493.010168][ C1] ? __lock_acquire+0xbdd/0x3ce0 [ 493.010195][ C1] ? mark_lock+0xb5/0xc60 [ 493.010216][ C1] ? __pfx___lock_acquire+0x10/0x10 [ 493.010239][ C1] ? __pfx_mark_lock+0x10/0x10 [ 493.010266][ C1] ? process_backlog+0x3f1/0x15f0 [ 493.010294][ C1] __netif_receive_skb_one_core+0xb1/0x1e0 [ 493.010324][ C1] ? __pfx___netif_receive_skb_one_core+0x10/0x10 [ 493.010356][ C1] ? trace_lock_acquire+0x14a/0x1d0 [ 493.010385][ C1] ? process_backlog+0x3f1/0x15f0 [ 493.010416][ C1] ? process_backlog+0x3f1/0x15f0 [ 493.010444][ C1] __netif_receive_skb+0x1d/0x160 [ 493.010474][ C1] process_backlog+0x443/0x15f0 [ 493.010506][ C1] __napi_poll.constprop.0+0xb7/0x550 [ 493.010538][ C1] net_rx_action+0xa92/0x1010 [ 493.010573][ C1] ? __pfx_net_rx_action+0x10/0x10 [ 493.010601][ C1] ? __pfx_mark_lock+0x10/0x10 [ 493.010624][ C1] ? kvm_sched_clock_read+0x11/0x20 [ 493.010650][ C1] ? sched_clock+0x38/0x60 [ 493.010682][ C1] ? sched_clock_cpu+0x6d/0x4d0 [ 493.010710][ C1] ? mark_held_locks+0x9f/0xe0 [ 493.010735][ C1] handle_softirqs+0x213/0x8f0 [ 493.010764][ C1] ? __pfx_handle_softirqs+0x10/0x10 [ 493.010791][ C1] ? irqtime_account_irq+0x18d/0x2e0 [ 493.010817][ C1] ? nsim_dev_trap_report_work+0x870/0xc80 [ 493.010847][ C1] do_softirq+0xb2/0xf0 [ 493.010873][ C1] [ 493.010880][ C1] [ 493.010888][ C1] __local_bh_enable_ip+0x100/0x120 [ 493.010916][ C1] nsim_dev_trap_report_work+0x870/0xc80 [ 493.010953][ C1] process_one_work+0x9c5/0x1ba0 [ 493.010981][ C1] ? __pfx_defense_work_handler+0x10/0x10 [ 493.011007][ C1] ? __pfx_process_one_work+0x10/0x10 [ 493.011034][ C1] ? assign_work+0x1a0/0x250 [ 493.011069][ C1] worker_thread+0x6c8/0xf00 [ 493.011099][ C1] ? __pfx_worker_thread+0x10/0x10 [ 493.011122][ C1] kthread+0x2c1/0x3a0 [ 493.011154][ C1] ? _raw_spin_unlock_irq+0x23/0x50 [ 493.011180][ C1] ? __pfx_kthread+0x10/0x10 [ 493.011208][ C1] ret_from_fork+0x45/0x80 [ 493.011229][ C1] ? __pfx_kthread+0x10/0x10 [ 493.011256][ C1] ret_from_fork_asm+0x1a/0x30 [ 493.011295][ C1] [ 493.219859][ T1270] ieee802154 phy0 wpan0: encryption failed: -22 [ 493.229905][ T1270] ieee802154 phy1 wpan1: encryption failed: -22 [ 495.439273][ C1] net_ratelimit: 26350 callbacks suppressed [ 495.439300][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 495.439361][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 495.439593][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 495.439745][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:55:20:d2:88:6e, vlan:0) [ 495.440002][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 495.440402][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 495.440733][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 495.440807][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 495.441084][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 495.441103][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:55:20:d2:88:6e, vlan:0) [ 496.207841][ T30] Kernel panic - not syncing: hung_task: blocked tasks [ 496.207864][ T30] CPU: 0 UID: 0 PID: 30 Comm: khungtaskd Not tainted 6.11.0-syzkaller-12113-ge7ed34365879 #0 [ 496.207897][ T30] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 496.207913][ T30] Call Trace: [ 496.207922][ T30] [ 496.207934][ T30] dump_stack_lvl+0x3d/0x1f0 [ 496.207974][ T30] panic+0x71d/0x800 [ 496.208010][ T30] ? __pfx_panic+0x10/0x10 [ 496.208043][ T30] ? preempt_schedule_thunk+0x1a/0x30 [ 496.208081][ T30] ? __pfx_nmi_raise_cpu_backtrace+0x10/0x10 [ 496.208117][ T30] ? preempt_schedule_thunk+0x1a/0x30 [ 496.208146][ T30] ? watchdog+0xd76/0x1240 [ 496.208171][ T30] ? watchdog+0xd69/0x1240 [ 496.208200][ T30] watchdog+0xd87/0x1240 [ 496.208231][ T30] ? __pfx_watchdog+0x10/0x10 [ 496.208255][ T30] ? lockdep_hardirqs_on+0x7c/0x110 [ 496.208290][ T30] ? __kthread_parkme+0x148/0x220 [ 496.208324][ T30] ? __pfx_watchdog+0x10/0x10 [ 496.208347][ T30] kthread+0x2c1/0x3a0 [ 496.208373][ T30] ? _raw_spin_unlock_irq+0x23/0x50 [ 496.208401][ T30] ? __pfx_kthread+0x10/0x10 [ 496.208433][ T30] ret_from_fork+0x45/0x80 [ 496.208458][ T30] ? __pfx_kthread+0x10/0x10 [ 496.208488][ T30] ret_from_fork_asm+0x1a/0x30 [ 496.208536][ T30] [ 496.208665][ T30] Kernel Offset: disabled