last executing test programs: 11.583734144s ago: executing program 3 (id=2824): setreuid(0xee01, 0x0) setfsuid(0x0) 11.504790468s ago: executing program 0 (id=2825): r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0), 0x400000000c0201, 0x0) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, &(0x7f0000000180)=0x20002b) 11.282998862s ago: executing program 4 (id=2828): r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03003d000b08d25a802b8c7494f90224fc600b0000000a000400070082c137153e3719ac018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 11.215056966s ago: executing program 3 (id=2829): prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x0, &(0x7f0000006680)) getpgid(0x0) 11.189309041s ago: executing program 0 (id=2830): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00'}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r0, 0xe0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000400)=[0x0], 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) 11.059559592s ago: executing program 1 (id=2831): timer_create(0x9, &(0x7f0000000100)={0x0, 0x0, 0x1}, &(0x7f0000000500)) timer_settime(0x0, 0x0, &(0x7f0000000700)={{}, {0x77359400}}, &(0x7f0000000380)) 10.884019321s ago: executing program 0 (id=2833): r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300090c0000000000000400000000030006000000000002000000e00000010000000000000000020001000000000000000000000000000300050000000000020000007f0000010000000000000000020013000300"], 0x60}}, 0x0) 10.870856079s ago: executing program 4 (id=2834): r0 = inotify_init1(0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000180)) 10.868748955s ago: executing program 3 (id=2835): ioperm(0x0, 0x7, 0x7) ustat(0x5, &(0x7f0000000000)) 10.68385374s ago: executing program 1 (id=2837): r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x9003000000000000, 0x40, &(0x7f0000000b40)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x0, 0x178, 0x178, 0x178, 0x178, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0x158, 0x178, 0x0, {}, [@common=@unspec=@string={{0xc0}, {0x0, 0x0, 'kmp\x00', "d9d9e63590ab5471c46924e95540949f0cd7e2b0a94d71d9d944acb7f0a1297674a95b30cee19db4c1725572ba928385b1635c89b58ae9a0e1ea500b26f006da3fa8a134552f7980e92de5a784cd4f46e799e191835d7d5ea776f04bef524e22f0bb6ed4b00f44ceb936943e13fa1caa6b4b159c673db1efa9a08b1ddc74ce6c", 0x43, 0x3}}, @common=@inet=@socket3={{0x28}, 0x51}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0x98, 0xb8, 0x0, {}, [@common=@inet=@set2={{0x28}}]}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 10.649924316s ago: executing program 4 (id=2838): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="d800000019000100000212ba0d8105040a600000ff0f040b067c55a1bc0009007d0006000000000015000500fe808178a80035fd00e4ff3f0200000901ac040000d67f6f94007100a007a290457f0189b316277ce06b9e9dfc487d5d32bace8017cbec4c2ee5a71602b2a10c11ce1b14d600741f795025ccca262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fec114c5d46a769b4d4ccd40dd6e4ed01ddceb5a2b5ac3290f9eaef6288b97192309a00000e000000000000000000000000000000000000000000000000000ab628", 0xd8}], 0x1}, 0x0) 10.550422025s ago: executing program 3 (id=2839): r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000001880)={0x10, 0x2e, 0x1}, 0x10}], 0x1}, 0x0) 10.519113755s ago: executing program 0 (id=2840): r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x40, 0x0, 0x0) mq_timedreceive(r0, &(0x7f0000000000)=""/83, 0x9b0c4f391059f39b, 0x20000000, &(0x7f0000000100)={0x77359400}) 10.470079619s ago: executing program 2 (id=2841): r0 = syz_open_dev$I2C(&(0x7f0000000000), 0x0, 0x0) ioctl$I2C_SMBUS(r0, 0x720, &(0x7f0000000280)={0x1, 0x0, 0x6, &(0x7f0000000080)={0x0, "d201000080000000000000f6ff0000001f93bb8b818d46fe993c9f8bef00cdd40d"}}) 10.313346182s ago: executing program 4 (id=2842): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000380)=@req3={0x1000, 0x7fffffff, 0x240, 0x3a, 0x0, 0x0, 0xffffffff}, 0x1c) 10.312305864s ago: executing program 3 (id=2843): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000940)={0x0, 0x6000, &(0x7f00000001c0)=[{&(0x7f0000000000)="d8000000100081044e81f782db44b904021d006a0f000000e8fe55a1290015000600142603600e120900040044000004000016000a0001400200000000000000b94dcf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef52a98516277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f1aeb4edbb57a5025ccca9e00360db70100000040fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9701", 0xd8}], 0x1}, 0x0) 10.299152947s ago: executing program 1 (id=2844): r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x600) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000280)) 10.171368776s ago: executing program 2 (id=2845): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x8, 0x3, 0x290, 0x128, 0x5, 0x148, 0x128, 0x0, 0x1f8, 0x2a8, 0x2a8, 0x1f8, 0x2a8, 0x3, 0x0, {[{{@ip={@remote, @loopback, 0x0, 0x0, 'wg0\x00', 'pimreg1\x00'}, 0x0, 0x100, 0x128, 0x0, {}, [@common=@ttl={{0x28}}, @common=@unspec=@physdev={{0x68}, {'veth1_to_batadv\x00', {}, 'wlan1\x00', {}, 0x17, 0x14}}]}, @common=@inet=@SYNPROXY={0x28}}, {{@ip={@local, @multicast2, 0x0, 0x0, 'xfrm0\x00', 'team0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2f0) 10.046722388s ago: executing program 4 (id=2846): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="180200000100000000000000000000008500000053000000850000000500000095"], &(0x7f0000000080)='GPL\x00', 0x4}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000400)="e020bd7351424588bbb4eee2d42a", 0x0, 0xfffffff8, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 9.965024512s ago: executing program 1 (id=2847): r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040), 0x801, 0x0) write$rfkill(r0, 0x0, 0x600) 9.907178794s ago: executing program 3 (id=2848): r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000100)={0x400, 0x300, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, {}, {0x0, 0x80000}, {}, {}, 0x0, 0x3f0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000}) 9.885154918s ago: executing program 2 (id=2849): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x34, 0x1, 0x7, 0x3, 0x0, 0x0, {0x3, 0x0, 0xa}, [@NFACCT_FILTER={0x14, 0x7, 0x0, 0x1, [@NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x8}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x8}]}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x34}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) 9.640992642s ago: executing program 2 (id=2850): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x1f, 0x13, &(0x7f00000003c0)=@framed={{}, [@printk={@ld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0xb0}}, @printk={@li, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x97}}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x11}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 9.565453928s ago: executing program 1 (id=2851): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x2, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="1802000000000000000000000000000018200000", @ANYRES32=r0, @ANYBLOB="00000000ffffff1f86b70244e7e2d10095"], &(0x7f0000000000)='GPL\x00', 0x4, 0xe2, &(0x7f00000001c0)=""/226}, 0x90) 9.392652119s ago: executing program 0 (id=2852): r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000900)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) write$cgroup_int(r0, &(0x7f00000015c0)=0x81, 0x12) 9.350620562s ago: executing program 2 (id=2853): r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0), 0x80201, 0x0) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000080)="03000000000201", 0x7}], 0x1) 9.129610628s ago: executing program 0 (id=2854): socket$inet_tcp(0x2, 0x1, 0x0) mq_notify(0xffffffffffffffff, &(0x7f0000000040)={0x20000000, 0x4000000000003, 0x2}) 9.107083584s ago: executing program 1 (id=2855): r0 = openat$ttynull(0xffffff9c, &(0x7f00000005c0), 0x0, 0x0) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 3.491293022s ago: executing program 2 (id=2856): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x4001, 0x3, 0x450, 0x0, 0xb, 0x148, 0x300, 0x148, 0x3b8, 0x230, 0x242, 0x3b8, 0x215, 0x3, 0x0, {[{{@ip={@local, @remote, 0x0, 0x0, 'batadv_slave_0\x00', 'macvtap0\x00'}, 0x0, 0x2d0, 0x300, 0x0, {0xff0f000000000000}, [@common=@inet=@l2tp={{0x30}, {0x0, 0x0, 0x0, 0x1, 0x8}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0xe, 0x0, 0x6, './file0\x00'}}]}, @common=@inet=@SET2={0x30}}, {{@uncond, 0xec010000, 0x98, 0xb8, 0x0, {}, [@common=@icmp={{0x28}, {0x0, "bd81"}}]}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x4b0) 0s ago: executing program 4 (id=2857): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000096c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newtaction={0x48, 0x30, 0x1, 0x0, 0x0, {}, [{0x34, 0x1, [@m_vlan={0x30, 0x1, 0x0, 0x0, {{0x9}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}, 0x48}}, 0x0) kernel console output (not intermixed with test programs): bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 322.404683][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 322.405305][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 322.405889][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 322.406522][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 322.407143][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 322.407801][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 322.408411][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 322.409017][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 326.416689][ C1] net_ratelimit: 6500 callbacks suppressed [ 326.416714][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 326.417343][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 326.417953][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 326.418557][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 326.419149][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 326.419799][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 326.420405][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 326.421054][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 326.421664][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 326.422269][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 326.882341][ T29] kauditd_printk_skb: 37 callbacks suppressed [ 326.882360][ T29] audit: type=1400 audit(1725549292.224:3471): avc: denied { read } for pid=4658 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 326.882425][ T29] audit: type=1400 audit(1725549292.254:3472): avc: denied { search } for pid=4658 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 326.882485][ T29] audit: type=1400 audit(1725549292.254:3473): avc: denied { append } for pid=4658 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 326.882546][ T29] audit: type=1400 audit(1725549292.254:3474): avc: denied { open } for pid=4658 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 326.882616][ T29] audit: type=1400 audit(1725549292.254:3475): avc: denied { getattr } for pid=4658 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 327.592731][ T29] audit: type=1400 audit(1725549292.674:3476): avc: denied { read write } for pid=5245 comm="syz-executor" name="loop4" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 327.592813][ T29] audit: type=1400 audit(1725549292.674:3477): avc: denied { open } for pid=5245 comm="syz-executor" path="/dev/loop4" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 327.592875][ T29] audit: type=1400 audit(1725549292.674:3478): avc: denied { ioctl } for pid=5245 comm="syz-executor" path="/dev/loop4" dev="devtmpfs" ino=653 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 327.681735][ T29] audit: type=1400 audit(1725549293.054:3479): avc: denied { read } for pid=4658 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 327.681813][ T29] audit: type=1400 audit(1725549293.054:3480): avc: denied { search } for pid=4658 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 331.426420][ C1] net_ratelimit: 7868 callbacks suppressed [ 331.426444][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 331.426966][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 331.427677][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 331.428193][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 331.428905][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 331.429425][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 331.430097][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 331.430620][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 331.431322][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 331.431846][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 336.435953][ C1] net_ratelimit: 8208 callbacks suppressed [ 336.435978][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 336.436507][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 336.437230][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 336.437821][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 336.438505][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 336.439037][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 336.439724][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 336.440282][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 336.440969][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 336.441534][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 337.627425][ T29] kauditd_printk_skb: 8 callbacks suppressed [ 337.627446][ T29] audit: type=1400 audit(1725549302.975:3489): avc: denied { read } for pid=4658 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 337.627514][ T29] audit: type=1400 audit(1725549302.975:3490): avc: denied { search } for pid=4658 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 337.627574][ T29] audit: type=1400 audit(1725549302.975:3491): avc: denied { append } for pid=4658 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 337.627633][ T29] audit: type=1400 audit(1725549302.975:3492): avc: denied { open } for pid=4658 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 337.627695][ T29] audit: type=1400 audit(1725549302.975:3493): avc: denied { getattr } for pid=4658 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 339.629566][ T29] audit: type=1400 audit(1725549305.005:3494): avc: denied { read } for pid=4658 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 339.629636][ T29] audit: type=1400 audit(1725549305.005:3495): avc: denied { search } for pid=4658 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 339.629695][ T29] audit: type=1400 audit(1725549305.005:3496): avc: denied { append } for pid=4658 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 339.629755][ T29] audit: type=1400 audit(1725549305.005:3497): avc: denied { open } for pid=4658 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 339.629815][ T29] audit: type=1400 audit(1725549305.005:3498): avc: denied { getattr } for pid=4658 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 341.445304][ C1] net_ratelimit: 8364 callbacks suppressed [ 341.445328][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 341.445857][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 341.446545][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 341.447110][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 341.447826][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 341.448360][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 341.449045][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 341.449565][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 341.450263][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 341.450820][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 343.519190][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 343.519213][ T29] audit: type=1400 audit(1725549308.836:3500): avc: denied { read } for pid=4658 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 343.519280][ T29] audit: type=1400 audit(1725549308.836:3501): avc: denied { search } for pid=4658 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 343.519340][ T29] audit: type=1400 audit(1725549308.836:3502): avc: denied { append } for pid=4658 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 345.144780][ T29] audit: type=1400 audit(1725549310.516:3503): avc: denied { open } for pid=4658 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 345.144851][ T29] audit: type=1400 audit(1725549310.516:3504): avc: denied { getattr } for pid=4658 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 345.144911][ T29] audit: type=1400 audit(1725549310.516:3505): avc: denied { read } for pid=4658 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 345.166045][ T29] audit: type=1400 audit(1725549310.516:3506): avc: denied { search } for pid=4658 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 345.166116][ T29] audit: type=1400 audit(1725549310.516:3507): avc: denied { append } for pid=4658 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 345.166176][ T29] audit: type=1400 audit(1725549310.516:3508): avc: denied { open } for pid=4658 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 345.166237][ T29] audit: type=1400 audit(1725549310.516:3509): avc: denied { getattr } for pid=4658 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 346.455302][ C1] net_ratelimit: 8081 callbacks suppressed [ 346.455327][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 346.456008][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 346.456528][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 346.457240][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 346.457791][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 346.458471][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 346.458992][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 346.459662][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 346.460217][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 346.460895][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 351.464783][ C1] net_ratelimit: 10971 callbacks suppressed [ 351.464809][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 351.465363][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 351.466074][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 351.466604][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 351.466729][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 351.467399][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 351.467530][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 351.467965][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 351.468735][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 351.469287][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 353.454525][ T29] kauditd_printk_skb: 5 callbacks suppressed [ 353.454545][ T29] audit: type=1400 audit(1725549318.826:3515): avc: denied { read } for pid=4658 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 355.587526][ T29] audit: type=1400 audit(1725549320.946:3516): avc: denied { search } for pid=4658 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 355.587601][ T29] audit: type=1400 audit(1725549320.946:3517): avc: denied { append } for pid=4658 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 356.266637][ T29] audit: type=1400 audit(1725549321.636:3518): avc: denied { append open } for pid=4658 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 356.266710][ T29] audit: type=1400 audit(1725549321.636:3519): avc: denied { getattr } for pid=4658 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 356.266771][ T29] audit: type=1400 audit(1725549321.636:3520): avc: denied { read } for pid=4658 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 356.266831][ T29] audit: type=1400 audit(1725549321.636:3521): avc: denied { search } for pid=4658 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 356.266898][ T29] audit: type=1400 audit(1725549321.636:3522): avc: denied { append } for pid=4658 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 356.266957][ T29] audit: type=1400 audit(1725549321.636:3523): avc: denied { open } for pid=4658 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 356.267018][ T29] audit: type=1400 audit(1725549321.636:3524): avc: denied { getattr } for pid=4658 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 356.475069][ C1] net_ratelimit: 11763 callbacks suppressed [ 356.475094][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 356.475250][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 356.475658][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 356.476375][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 356.476967][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 356.477283][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 356.477721][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 356.477970][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 356.478276][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 356.478998][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 361.484861][ C1] net_ratelimit: 11727 callbacks suppressed [ 361.484887][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 361.484915][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 361.485413][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 361.486085][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 361.486608][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 361.486948][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 361.487311][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 361.487634][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 361.487867][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 361.488543][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 366.494604][ C1] net_ratelimit: 11501 callbacks suppressed [ 366.494630][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 366.495393][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 366.495991][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 366.496297][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 366.496806][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 366.497050][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 366.497401][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 366.498179][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 366.498813][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 366.499061][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 366.808208][ T29] kauditd_printk_skb: 6 callbacks suppressed [ 366.808228][ T29] audit: type=1400 audit(1725549332.156:3531): avc: denied { read } for pid=4658 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 366.808295][ T29] audit: type=1400 audit(1725549332.156:3532): avc: denied { search } for pid=4658 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 366.808355][ T29] audit: type=1400 audit(1725549332.156:3533): avc: denied { append } for pid=4658 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 366.808414][ T29] audit: type=1400 audit(1725549332.156:3534): avc: denied { open } for pid=4658 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 366.808474][ T29] audit: type=1400 audit(1725549332.156:3535): avc: denied { getattr } for pid=4658 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 369.310074][ T29] audit: type=1400 audit(1725549334.686:3536): avc: denied { read } for pid=4658 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 369.310148][ T29] audit: type=1400 audit(1725549334.686:3537): avc: denied { search } for pid=4658 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 369.310234][ T29] audit: type=1400 audit(1725549334.686:3538): avc: denied { append } for pid=4658 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 369.310293][ T29] audit: type=1400 audit(1725549334.686:3539): avc: denied { open } for pid=4658 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 369.310353][ T29] audit: type=1400 audit(1725549334.686:3540): avc: denied { getattr } for pid=4658 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 371.504644][ C1] net_ratelimit: 11244 callbacks suppressed [ 371.504668][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 371.505361][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 371.505885][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 371.506605][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 371.507167][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 371.507326][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 371.507844][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 371.508190][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 371.508379][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 371.509069][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 372.517287][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 372.517308][ T29] audit: type=1400 audit(1725549337.626:3542): avc: denied { read write } for pid=5239 comm="syz-executor" name="loop2" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 372.517377][ T29] audit: type=1400 audit(1725549337.626:3543): avc: denied { open } for pid=5239 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 372.517439][ T29] audit: type=1400 audit(1725549337.626:3544): avc: denied { ioctl } for pid=5239 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=651 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 376.514432][ C1] net_ratelimit: 9191 callbacks suppressed [ 376.514457][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 376.515353][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 376.515391][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 376.516159][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 376.517323][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 376.518071][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 376.518965][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 376.518996][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 376.519730][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 376.520163][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 379.202451][ T1267] ieee802154 phy0 wpan0: encryption failed: -22 [ 379.340415][ T1267] ieee802154 phy1 wpan1: encryption failed: -22 [ 381.524812][ C1] net_ratelimit: 11483 callbacks suppressed [ 381.524845][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 381.525369][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 381.525604][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 381.526043][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 381.526367][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 381.526597][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 381.527268][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 381.527825][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 381.528500][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 381.529005][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 383.044094][ T29] audit: type=1400 audit(1725549348.386:3545): avc: denied { read } for pid=4658 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 383.679855][ T29] audit: type=1400 audit(1725549349.026:3546): avc: denied { read write } for pid=5245 comm="syz-executor" name="loop4" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 385.269660][ T29] audit: type=1400 audit(1725549350.616:3548): avc: denied { search } for pid=4658 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 385.269732][ T29] audit: type=1400 audit(1725549350.616:3549): avc: denied { append } for pid=4658 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 386.530499][ T29] audit: type=1400 audit(1725549351.906:3550): avc: denied { append open } for pid=4658 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 386.530571][ T29] audit: type=1400 audit(1725549351.906:3551): avc: denied { getattr } for pid=4658 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 386.530631][ T29] audit: type=1400 audit(1725549351.906:3552): avc: denied { read } for pid=4658 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 386.530691][ T29] audit: type=1400 audit(1725549351.906:3553): avc: denied { search } for pid=4658 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 386.530760][ T29] audit: type=1400 audit(1725549351.906:3554): avc: denied { append } for pid=4658 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 386.530819][ T29] audit: type=1400 audit(1725549351.906:3555): avc: denied { open } for pid=4658 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 386.534426][ C0] net_ratelimit: 11443 callbacks suppressed [ 386.534446][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 386.534502][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 386.535184][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 386.535344][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 386.535714][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 386.536389][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 386.536926][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 386.537616][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 386.538034][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 386.538145][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 390.204945][ T29] kauditd_printk_skb: 12 callbacks suppressed [ 390.204966][ T29] audit: type=1400 audit(1725549355.556:3567): avc: denied { read } for pid=4658 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 390.205032][ T29] audit: type=1400 audit(1725549355.556:3568): avc: denied { search } for pid=4658 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 390.205090][ T29] audit: type=1400 audit(1725549355.556:3569): avc: denied { append } for pid=4658 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 390.205150][ T29] audit: type=1400 audit(1725549355.556:3570): avc: denied { append open } for pid=4658 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 391.544564][ C1] net_ratelimit: 11399 callbacks suppressed [ 391.544591][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 391.545135][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 391.545527][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 391.545821][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 391.546223][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 391.546399][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 391.547100][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 391.547667][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 391.548303][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 391.548572][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 393.620093][ T29] audit: type=1400 audit(1725549358.946:3571): avc: denied { getattr } for pid=4658 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 393.620169][ T29] audit: type=1400 audit(1725549358.976:3572): avc: denied { read } for pid=4658 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 393.620231][ T29] audit: type=1400 audit(1725549358.976:3573): avc: denied { search } for pid=4658 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 393.620290][ T29] audit: type=1400 audit(1725549358.976:3574): avc: denied { append } for pid=4658 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 393.620350][ T29] audit: type=1400 audit(1725549358.976:3575): avc: denied { open } for pid=4658 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 393.620410][ T29] audit: type=1400 audit(1725549358.976:3576): avc: denied { getattr } for pid=4658 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 396.554496][ C1] net_ratelimit: 11305 callbacks suppressed [ 396.554521][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 396.555252][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 396.555335][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 396.555849][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 396.556028][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 396.556583][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 396.557170][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 396.557895][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 396.558118][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 396.558459][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 396.722538][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 396.722558][ T29] audit: type=1400 audit(1725549362.076:3578): avc: denied { read } for pid=4658 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 396.722625][ T29] audit: type=1400 audit(1725549362.076:3579): avc: denied { search } for pid=4658 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 396.722684][ T29] audit: type=1400 audit(1725549362.076:3580): avc: denied { append } for pid=4658 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 396.722744][ T29] audit: type=1400 audit(1725549362.076:3581): avc: denied { open } for pid=4658 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 396.722805][ T29] audit: type=1400 audit(1725549362.076:3582): avc: denied { getattr } for pid=4658 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 399.043291][ T29] audit: type=1400 audit(1725549364.326:3583): avc: denied { read } for pid=4658 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 399.043366][ T29] audit: type=1400 audit(1725549364.326:3584): avc: denied { search } for pid=4658 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 399.043427][ T29] audit: type=1400 audit(1725549364.326:3585): avc: denied { append } for pid=4658 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 399.043494][ T29] audit: type=1400 audit(1725549364.326:3586): avc: denied { open } for pid=4658 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 399.043556][ T29] audit: type=1400 audit(1725549364.326:3587): avc: denied { getattr } for pid=4658 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 401.564442][ C1] net_ratelimit: 11169 callbacks suppressed [ 401.564467][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 401.565151][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 401.565699][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 401.565860][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 401.566378][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 401.566553][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 401.566920][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 401.567594][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 401.568149][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 401.568599][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 406.574264][ C0] net_ratelimit: 11671 callbacks suppressed [ 406.574289][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 406.574700][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 406.575210][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 406.575229][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 406.575902][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 406.576464][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 406.577157][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 406.577221][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 406.577692][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 406.577907][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 408.393805][ T29] audit: type=1400 audit(1725549373.766:3588): avc: denied { read } for pid=4658 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 410.971438][ T29] audit: type=1400 audit(1725549376.316:3589): avc: denied { search } for pid=4658 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 410.971511][ T29] audit: type=1400 audit(1725549376.316:3590): avc: denied { append } for pid=4658 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 411.584707][ C1] net_ratelimit: 11666 callbacks suppressed [ 411.584732][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 411.585270][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 411.585942][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 411.585974][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 411.586506][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 411.586650][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 411.587207][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 411.587752][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 411.588443][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 411.588793][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 413.896129][ T29] audit: type=1400 audit(1725549379.246:3591): avc: denied { append open } for pid=4658 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 413.896205][ T29] audit: type=1400 audit(1725549379.246:3592): avc: denied { getattr } for pid=4658 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 413.896265][ T29] audit: type=1400 audit(1725549379.246:3593): avc: denied { read } for pid=4658 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 413.896325][ T29] audit: type=1400 audit(1725549379.246:3594): avc: denied { search } for pid=4658 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 413.896386][ T29] audit: type=1400 audit(1725549379.246:3595): avc: denied { append } for pid=4658 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 413.896444][ T29] audit: type=1400 audit(1725549379.246:3596): avc: denied { open } for pid=4658 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 416.594678][ C1] net_ratelimit: 11265 callbacks suppressed [ 416.594702][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 416.594909][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 416.595254][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 416.595600][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 416.595932][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 416.596452][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 416.597155][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 416.597643][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 416.597675][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 416.598358][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 421.604934][ C0] net_ratelimit: 11768 callbacks suppressed [ 421.604959][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 421.605435][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 421.606113][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 421.606632][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 421.606997][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 421.607340][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 421.607680][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 421.607890][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 421.608568][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 421.609088][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 426.614461][ C0] net_ratelimit: 11431 callbacks suppressed [ 426.614484][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 426.614642][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 426.615203][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 426.615327][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 426.615859][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 426.616551][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 426.617109][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 426.617241][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 426.617799][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 426.617932][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 427.679971][ T29] audit: type=1400 audit(1725549392.996:3597): avc: denied { getattr } for pid=4658 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 430.590756][ T29] audit: type=1400 audit(1725549395.936:3598): avc: denied { read } for pid=4658 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 430.590833][ T29] audit: type=1400 audit(1725549395.936:3599): avc: denied { search } for pid=4658 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 430.590942][ T29] audit: type=1400 audit(1725549395.936:3600): avc: denied { append } for pid=4658 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 431.624604][ C1] net_ratelimit: 11348 callbacks suppressed [ 431.624627][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 431.625311][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 431.625854][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 431.626170][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 431.626665][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 431.626841][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 431.627702][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 431.628388][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 431.629074][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 431.629245][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 433.725491][ T29] audit: type=1400 audit(1725549399.076:3601): avc: denied { append open } for pid=4658 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 433.725572][ T29] audit: type=1400 audit(1725549399.076:3602): avc: denied { getattr } for pid=4658 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 433.857795][ T29] audit: type=1400 audit(1725549399.236:3603): avc: denied { read } for pid=4658 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 434.717235][ T29] audit: type=1400 audit(1725549400.066:3604): avc: denied { execmem } for pid=11277 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 434.752871][ T29] audit: type=1400 audit(1725549400.126:3605): avc: denied { search } for pid=4658 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 434.752941][ T29] audit: type=1400 audit(1725549400.126:3606): avc: denied { append } for pid=4658 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 434.753001][ T29] audit: type=1400 audit(1725549400.126:3607): avc: denied { append open } for pid=4658 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 434.753063][ T29] audit: type=1400 audit(1725549400.126:3608): avc: denied { getattr } for pid=4658 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 434.753123][ T29] audit: type=1400 audit(1725549400.126:3609): avc: denied { read } for pid=4658 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 434.753183][ T29] audit: type=1400 audit(1725549400.126:3610): avc: denied { search } for pid=4658 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 436.634440][ C1] net_ratelimit: 11103 callbacks suppressed [ 436.634465][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 436.635167][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 436.635741][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 436.636428][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 436.636473][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 436.636964][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 436.637309][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 436.637691][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 436.638726][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 436.639361][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 439.847126][ T29] audit: type=1400 audit(1725549405.196:3611): avc: denied { read } for pid=4658 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 439.847201][ T29] audit: type=1400 audit(1725549405.196:3612): avc: denied { search } for pid=4658 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 439.847260][ T29] audit: type=1400 audit(1725549405.196:3613): avc: denied { append } for pid=4658 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 441.451390][ T1267] ieee802154 phy0 wpan0: encryption failed: -22 [ 441.472237][ T1267] ieee802154 phy1 wpan1: encryption failed: -22 [ 441.644931][ C1] net_ratelimit: 11277 callbacks suppressed [ 441.644956][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 441.645477][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 441.646066][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 441.646154][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 441.646703][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 441.646816][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 441.647384][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 441.647939][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 441.648608][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 441.648961][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 446.654728][ C1] net_ratelimit: 11568 callbacks suppressed [ 446.654753][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 446.654901][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 446.655242][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 446.655599][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 446.655867][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 446.656421][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 446.657077][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 446.657562][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 446.657687][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 446.658186][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 446.841412][ T29] audit: type=1400 audit(1725549412.216:3614): avc: denied { append open } for pid=4658 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 448.640812][ T29] audit: type=1400 audit(1725549414.016:3615): avc: denied { getattr } for pid=4658 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 448.640885][ T29] audit: type=1400 audit(1725549414.016:3616): avc: denied { read } for pid=4658 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 448.640947][ T29] audit: type=1400 audit(1725549414.016:3617): avc: denied { search } for pid=4658 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 448.641013][ T29] audit: type=1400 audit(1725549414.016:3618): avc: denied { append } for pid=4658 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 448.641067][ T29] audit: type=1400 audit(1725549414.016:3619): avc: denied { open } for pid=4658 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 448.641122][ T29] audit: type=1400 audit(1725549414.016:3620): avc: denied { getattr } for pid=4658 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 450.126431][ T29] audit: type=1400 audit(1725549415.446:3621): avc: denied { read } for pid=4658 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 450.126507][ T29] audit: type=1400 audit(1725549415.446:3622): avc: denied { search } for pid=4658 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 450.126567][ T29] audit: type=1400 audit(1725549415.446:3623): avc: denied { append } for pid=4658 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 451.664287][ C0] net_ratelimit: 11549 callbacks suppressed [ 451.664312][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 451.664523][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 451.665008][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 451.665218][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 451.665805][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 451.666496][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 451.667027][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 451.667098][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 451.667713][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 451.667791][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 455.823490][ T29] kauditd_printk_skb: 2 callbacks suppressed [ 455.823509][ T29] audit: type=1400 audit(1725549421.196:3626): avc: denied { read } for pid=4658 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 456.253271][ T29] audit: type=1400 audit(1725549421.596:3627): avc: denied { search } for pid=4658 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 456.253342][ T29] audit: type=1400 audit(1725549421.596:3628): avc: denied { append } for pid=4658 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 456.674338][ C1] net_ratelimit: 11070 callbacks suppressed [ 456.674361][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 456.674893][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 456.675584][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 456.676109][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 456.676284][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 456.676832][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 456.676999][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 456.677364][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 456.678051][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 456.678583][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 461.684304][ C1] net_ratelimit: 11649 callbacks suppressed [ 461.684329][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 461.684864][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 461.685557][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 461.685770][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 461.686089][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 461.686470][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 461.686839][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 461.687373][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 461.688064][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 461.688588][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 464.313096][ T29] audit: type=1400 audit(1725549429.686:3629): avc: denied { append open } for pid=4658 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 466.694217][ C0] net_ratelimit: 11453 callbacks suppressed [ 466.694241][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 466.694340][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 466.694911][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 466.695041][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 466.695602][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 466.696159][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 466.696850][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 466.697376][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 466.697542][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 466.698066][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 471.704550][ C1] net_ratelimit: 11288 callbacks suppressed [ 471.704577][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 471.705114][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 471.705864][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 471.706062][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 471.706398][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 471.706858][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 471.707094][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 471.707622][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 471.708312][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 471.708871][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 476.711138][ T29] audit: type=1400 audit(1725549442.026:3630): avc: denied { getattr } for pid=4658 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 476.714298][ C1] net_ratelimit: 11570 callbacks suppressed [ 476.714319][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 476.714870][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 476.715345][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 476.715563][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 476.716131][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 476.716182][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 476.716815][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 476.717348][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 476.718031][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 476.718596][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 481.724257][ C1] net_ratelimit: 11583 callbacks suppressed [ 481.724281][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 481.724872][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 481.725574][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 481.725771][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 481.726162][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 481.726530][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 481.726863][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 481.727397][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 481.728088][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 481.728575][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 486.734461][ C1] net_ratelimit: 11599 callbacks suppressed [ 486.734486][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 486.735017][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 486.735372][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 486.735714][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 486.736235][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 486.736241][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 486.736976][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 486.737508][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 486.738229][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 486.738766][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 487.262257][ T29] audit: type=1400 audit(1725549452.576:3631): avc: denied { read } for pid=4658 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 487.262330][ T29] audit: type=1400 audit(1725549452.576:3632): avc: denied { search } for pid=4658 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 487.262391][ T29] audit: type=1400 audit(1725549452.576:3633): avc: denied { append } for pid=4658 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 491.744305][ C1] net_ratelimit: 11487 callbacks suppressed [ 491.744329][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 491.744873][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 491.745556][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 491.746059][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 491.746081][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 491.746762][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 491.746966][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 491.747283][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 491.747962][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 491.748481][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 492.412238][ T29] audit: type=1400 audit(1725549457.766:3634): avc: denied { append open } for pid=4658 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 496.754389][ C1] net_ratelimit: 11260 callbacks suppressed [ 496.754415][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 496.755019][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 496.755795][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 496.755953][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 496.756399][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 496.756771][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 496.757196][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 496.757834][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 496.758644][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 496.759155][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 500.232333][ T29] audit: type=1400 audit(1725549465.606:3635): avc: denied { getattr } for pid=4658 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 501.764356][ C1] net_ratelimit: 11095 callbacks suppressed [ 501.764380][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 501.764816][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 501.765073][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 501.765506][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 501.765791][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 501.766476][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 501.767006][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 501.767532][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 501.767699][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 501.768256][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 506.152182][ T1267] ieee802154 phy0 wpan0: encryption failed: -22 [ 506.173419][ T1267] ieee802154 phy1 wpan1: encryption failed: -22 [ 506.774240][ C1] net_ratelimit: 11746 callbacks suppressed [ 506.774263][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 506.774582][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 506.774825][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 506.775613][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 506.776172][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 506.776779][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 506.776866][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 506.777439][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 506.777479][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 506.778138][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 511.784341][ C0] net_ratelimit: 11735 callbacks suppressed [ 511.784366][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 511.784491][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 511.785050][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 511.785770][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 511.786318][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 511.786401][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 511.787060][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 511.787214][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 511.787663][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 511.788410][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 516.794229][ C1] net_ratelimit: 10899 callbacks suppressed [ 516.794254][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 516.794560][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 516.794922][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 516.795305][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 516.795434][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 516.796059][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 516.796547][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 516.797287][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 516.798008][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 516.800010][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 519.918544][ T29] audit: type=1400 audit(1725549485.206:3636): avc: denied { read } for pid=4658 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 519.918619][ T29] audit: type=1400 audit(1725549485.206:3637): avc: denied { search } for pid=4658 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 519.918684][ T29] audit: type=1400 audit(1725549485.206:3638): avc: denied { append } for pid=4658 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 520.170088][ T29] audit: type=1400 audit(1725549485.486:3639): avc: denied { execmem } for pid=11282 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 521.237094][ T29] audit: type=1400 audit(1725549486.556:3640): avc: denied { append open } for pid=4658 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 521.237169][ T29] audit: type=1400 audit(1725549486.556:3641): avc: denied { getattr } for pid=4658 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 521.804240][ C0] net_ratelimit: 10811 callbacks suppressed [ 521.804265][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 521.804753][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 521.805559][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 521.806189][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 521.806319][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 521.806997][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 521.807019][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 521.807624][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 521.808436][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 521.809024][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 522.051126][ T29] audit: type=1400 audit(1725549487.396:3642): avc: denied { read } for pid=4658 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 522.051198][ T29] audit: type=1400 audit(1725549487.396:3643): avc: denied { search } for pid=4658 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 522.051257][ T29] audit: type=1400 audit(1725549487.396:3644): avc: denied { append } for pid=4658 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 522.051317][ T29] audit: type=1400 audit(1725549487.426:3645): avc: denied { append open } for pid=4658 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 526.312735][ T29] kauditd_printk_skb: 6 callbacks suppressed [ 526.312755][ T29] audit: type=1400 audit(1725549491.686:3652): avc: denied { read } for pid=4658 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 526.814213][ C0] net_ratelimit: 10090 callbacks suppressed [ 526.814237][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 526.814666][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 526.815190][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 526.815878][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 526.816284][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 526.816407][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 526.816973][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 526.817087][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 526.818966][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 526.819650][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 529.929375][ T29] audit: type=1400 audit(1725549495.276:3653): avc: denied { search } for pid=4658 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 529.929449][ T29] audit: type=1400 audit(1725549495.276:3654): avc: denied { append } for pid=4658 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 531.824707][ C1] net_ratelimit: 11472 callbacks suppressed [ 531.824731][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 531.825261][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 531.825331][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 531.825949][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 531.826048][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 531.826480][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 531.827163][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 531.827761][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 531.828129][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 531.828447][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 536.834317][ C0] net_ratelimit: 11690 callbacks suppressed [ 536.834341][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 536.834384][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 536.835139][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 536.835721][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 536.836312][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 536.836436][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 536.836991][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 536.837019][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 536.837701][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 536.838253][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 540.189721][ T29] audit: type=1400 audit(1725549505.536:3655): avc: denied { append open } for pid=4658 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 540.189795][ T29] audit: type=1400 audit(1725549505.536:3656): avc: denied { getattr } for pid=4658 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 540.189865][ T29] audit: type=1400 audit(1725549505.536:3657): avc: denied { read } for pid=4658 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 541.844805][ C1] net_ratelimit: 11426 callbacks suppressed [ 541.844830][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 541.845111][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 541.845387][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 541.845828][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 541.846088][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 541.846629][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 541.847356][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 541.847858][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 541.847897][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 541.848583][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 542.142617][ T29] audit: type=1400 audit(1725549506.996:3658): avc: denied { search } for pid=4658 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 542.142692][ T29] audit: type=1400 audit(1725549506.996:3659): avc: denied { append } for pid=4658 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 542.142754][ T29] audit: type=1400 audit(1725549507.026:3660): avc: denied { open } for pid=4658 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 542.142814][ T29] audit: type=1400 audit(1725549507.026:3661): avc: denied { getattr } for pid=4658 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 542.142875][ T29] audit: type=1400 audit(1725549507.026:3662): avc: denied { read } for pid=4658 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 542.142935][ T29] audit: type=1400 audit(1725549507.026:3663): avc: denied { search } for pid=4658 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 543.727256][ T29] audit: type=1400 audit(1725549507.026:3664): avc: denied { append } for pid=4658 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 545.942357][ T29] audit: type=1400 audit(1725549511.316:3665): avc: denied { append open } for pid=4658 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 546.835971][ T29] audit: type=1400 audit(1725549512.136:3666): avc: denied { getattr } for pid=4658 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 546.836046][ T29] audit: type=1400 audit(1725549512.136:3667): avc: denied { read } for pid=4658 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 546.836107][ T29] audit: type=1400 audit(1725549512.136:3668): avc: denied { search } for pid=4658 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 546.836175][ T29] audit: type=1400 audit(1725549512.136:3669): avc: denied { append } for pid=4658 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 546.836236][ T29] audit: type=1400 audit(1725549512.136:3670): avc: denied { open } for pid=4658 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 546.836296][ T29] audit: type=1400 audit(1725549512.136:3671): avc: denied { getattr } for pid=4658 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 546.854630][ C1] net_ratelimit: 11239 callbacks suppressed [ 546.854653][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 546.855375][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 546.855404][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 546.855920][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 546.856044][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 546.856626][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 546.857175][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 546.857880][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 546.857907][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 546.858438][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 547.827635][ T29] audit: type=1400 audit(1725549513.206:3672): avc: denied { read } for pid=4658 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 548.163469][ T29] audit: type=1400 audit(1725549513.506:3673): avc: denied { search } for pid=4658 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 548.163538][ T29] audit: type=1400 audit(1725549513.506:3674): avc: denied { append } for pid=4658 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 551.864192][ C1] net_ratelimit: 11370 callbacks suppressed [ 551.864217][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 551.864790][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 551.865500][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 551.866038][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 551.866286][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 551.866729][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 551.867041][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 551.867323][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 551.868019][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 551.868553][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 556.688024][ T29] kauditd_printk_skb: 2 callbacks suppressed [ 556.688043][ T29] audit: type=1400 audit(1725549521.896:3677): avc: denied { read } for pid=4658 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 556.688108][ T29] audit: type=1400 audit(1725549522.066:3678): avc: denied { search } for pid=4658 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 556.688165][ T29] audit: type=1400 audit(1725549522.066:3679): avc: denied { append } for pid=4658 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 556.688224][ T29] audit: type=1400 audit(1725549522.066:3680): avc: denied { open } for pid=4658 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 556.688284][ T29] audit: type=1400 audit(1725549522.066:3681): avc: denied { getattr } for pid=4658 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 556.874226][ C1] net_ratelimit: 11364 callbacks suppressed [ 556.874250][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 556.874297][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 556.874850][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 556.874973][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 556.875661][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 556.876261][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 556.876956][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 556.877039][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 556.877739][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 556.877741][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 557.337008][ T29] audit: type=1400 audit(1725549522.656:3682): avc: denied { execmem } for pid=11287 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 560.471538][ T29] audit: type=1400 audit(1725549525.846:3683): avc: denied { read } for pid=4658 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 560.471608][ T29] audit: type=1400 audit(1725549525.846:3684): avc: denied { search } for pid=4658 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 560.471668][ T29] audit: type=1400 audit(1725549525.846:3685): avc: denied { append } for pid=4658 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 560.471726][ T29] audit: type=1400 audit(1725549525.846:3686): avc: denied { open } for pid=4658 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 561.884547][ C1] net_ratelimit: 11021 callbacks suppressed [ 561.884571][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 561.885100][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 561.885822][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 561.885945][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 561.886353][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 561.886667][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 561.887038][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 561.887601][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 561.888286][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 561.888667][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 562.359788][ T29] kauditd_printk_skb: 6 callbacks suppressed [ 562.359807][ T29] audit: type=1400 audit(1725549527.736:3693): avc: denied { read } for pid=4658 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 562.359873][ T29] audit: type=1400 audit(1725549527.736:3694): avc: denied { search } for pid=4658 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 562.359932][ T29] audit: type=1400 audit(1725549527.736:3695): avc: denied { append } for pid=4658 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 562.359992][ T29] audit: type=1400 audit(1725549527.736:3696): avc: denied { open } for pid=4658 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 562.360053][ T29] audit: type=1400 audit(1725549527.736:3697): avc: denied { getattr } for pid=4658 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 563.279234][ T1267] ieee802154 phy0 wpan0: encryption failed: -22 [ 563.300204][ T1267] ieee802154 phy1 wpan1: encryption failed: -22 [ 565.151496][ T29] audit: type=1400 audit(1725549530.496:3698): avc: denied { read } for pid=4658 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 565.151571][ T29] audit: type=1400 audit(1725549530.496:3699): avc: denied { search } for pid=4658 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 565.151631][ T29] audit: type=1400 audit(1725549530.496:3700): avc: denied { append } for pid=4658 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 566.894258][ C1] net_ratelimit: 11422 callbacks suppressed [ 566.894282][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 566.895001][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 566.895527][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 566.896035][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 566.896216][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 566.896742][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 566.896854][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 566.897429][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 566.898013][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 566.898702][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 568.249989][ T29] audit: type=1400 audit(1725549533.566:3701): avc: denied { append open } for pid=4658 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 571.904585][ C1] net_ratelimit: 10781 callbacks suppressed [ 571.904611][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 571.905306][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 571.905453][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 571.905828][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 571.906199][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 571.906520][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 571.907048][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 571.907803][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 571.908331][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 571.909014][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 576.372631][ T29] audit: type=1400 audit(1725549541.736:3702): avc: denied { getattr } for pid=4658 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 576.914256][ C1] net_ratelimit: 10235 callbacks suppressed [ 576.914281][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 576.914374][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 576.915084][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 576.915130][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 576.915694][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 576.916401][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 576.916925][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 576.917636][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 576.918171][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 576.918819][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 577.163768][ T29] audit: type=1400 audit(1725549542.536:3703): avc: denied { mounton } for pid=11291 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 577.391838][ T29] audit: type=1400 audit(1725549542.766:3704): avc: denied { read } for pid=4658 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 579.101388][ T29] audit: type=1400 audit(1725549544.416:3705): avc: denied { search } for pid=4658 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 579.101464][ T29] audit: type=1400 audit(1725549544.416:3706): avc: denied { append } for pid=4658 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 581.924227][ C0] net_ratelimit: 10345 callbacks suppressed [ 581.924251][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 581.924768][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 581.924972][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 581.925357][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 581.926062][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 581.926642][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 581.927361][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 581.927916][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 581.928493][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 581.928650][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 582.260302][ T29] audit: type=1400 audit(1725549547.606:3707): avc: denied { mount } for pid=11291 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 582.618812][ T29] audit: type=1400 audit(1725549547.996:3708): avc: denied { append open } for pid=4658 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 582.618885][ T29] audit: type=1400 audit(1725549547.996:3709): avc: denied { getattr } for pid=4658 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 582.618944][ T29] audit: type=1400 audit(1725549547.996:3710): avc: denied { read } for pid=4658 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 582.619005][ T29] audit: type=1400 audit(1725549547.996:3711): avc: denied { search } for pid=4658 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 583.363678][ T29] audit: type=1400 audit(1725549548.736:3712): avc: denied { read } for pid=4658 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 585.562813][ T29] audit: type=1400 audit(1725549550.936:3713): avc: denied { create } for pid=11291 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 586.934254][ C1] net_ratelimit: 10588 callbacks suppressed [ 586.934278][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 586.934989][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 586.935518][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 586.935789][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 586.936209][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 586.936645][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 586.936741][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 586.937438][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 586.937965][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 586.938656][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 591.944190][ C1] net_ratelimit: 10595 callbacks suppressed [ 591.944217][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 591.944913][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 591.945437][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 591.946127][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 591.946658][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 591.947393][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 591.947649][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 591.947955][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 591.948493][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 591.948637][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 596.954389][ C0] net_ratelimit: 10489 callbacks suppressed [ 596.954414][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 596.954471][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 596.955011][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 596.955105][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 596.955733][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 596.956262][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 596.956979][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 596.957511][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 596.958200][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 596.958616][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 597.591566][ T29] audit: type=1400 audit(1725549562.906:3714): avc: denied { read } for pid=4658 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 597.591642][ T29] audit: type=1400 audit(1725549562.906:3715): avc: denied { search } for pid=4658 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 597.591708][ T29] audit: type=1400 audit(1725549562.906:3716): avc: denied { append } for pid=4658 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 601.964348][ C1] net_ratelimit: 10535 callbacks suppressed [ 601.964373][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 601.965068][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 601.965601][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 601.966422][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 601.966974][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 601.967677][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 601.967753][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 601.968204][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 601.968497][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 601.968894][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:f0:2d:51:35:f2, vlan:0) [ 602.902161][ T30] INFO: task kworker/u8:1:12 blocked for more than 143 seconds. [ 602.902199][ T30] Not tainted 6.11.0-rc6-syzkaller-00070-gc763c4339688 #0 [ 602.902216][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 602.902226][ T30] task:kworker/u8:1 state:D stack:22128 pid:12 tgid:12 ppid:2 flags:0x00004000 [ 602.902274][ T30] Workqueue: events_unbound linkwatch_event [ 602.902315][ T30] Call Trace: [ 602.902326][ T30] [ 602.902343][ T30] __schedule+0xe37/0x5490 [ 602.902382][ T30] ? __pfx___lock_acquire+0x10/0x10 [ 602.902421][ T30] ? __pfx___lock_acquire+0x10/0x10 [ 602.902469][ T30] ? __pfx___schedule+0x10/0x10 [ 602.902502][ T30] ? schedule+0x298/0x350 [ 602.902533][ T30] ? __pfx_lock_release+0x10/0x10 [ 602.902565][ T30] ? __mutex_lock+0x5b3/0x9c0 [ 602.902601][ T30] ? __mutex_trylock_common+0x78/0x250 [ 602.902650][ T30] schedule+0xe7/0x350 [ 602.902683][ T30] schedule_preempt_disabled+0x13/0x30 [ 602.902717][ T30] __mutex_lock+0x5b8/0x9c0 [ 602.902757][ T30] ? linkwatch_event+0x51/0xc0 [ 602.902785][ T30] ? __pfx___mutex_lock+0x10/0x10 [ 602.902829][ T30] ? __pfx_lock_acquire+0x10/0x10 [ 602.902865][ T30] ? __pfx_lock_release+0x10/0x10 [ 602.902905][ T30] ? linkwatch_event+0x51/0xc0 [ 602.902929][ T30] ? rtnl_lock+0x9/0x20 [ 602.902952][ T30] linkwatch_event+0x51/0xc0 [ 602.902979][ T30] ? __pfx_linkwatch_event+0x10/0x10 [ 602.903007][ T30] ? rcu_is_watching+0x12/0xc0 [ 602.903046][ T30] process_one_work+0x9c5/0x1b40 [ 602.903106][ T30] ? __pfx_lock_acquire+0x10/0x10 [ 602.903141][ T30] ? __pfx_process_one_work+0x10/0x10 [ 602.903189][ T30] ? assign_work+0x1a0/0x250 [ 602.903228][ T30] worker_thread+0x6c8/0xed0 [ 602.903283][ T30] ? __pfx_worker_thread+0x10/0x10 [ 602.903320][ T30] kthread+0x2c1/0x3a0 [ 602.903348][ T30] ? _raw_spin_unlock_irq+0x23/0x50 [ 602.903380][ T30] ? __pfx_kthread+0x10/0x10 [ 602.903411][ T30] ret_from_fork+0x45/0x80 [ 602.903449][ T30] ? __pfx_kthread+0x10/0x10 [ 602.903479][ T30] ret_from_fork_asm+0x1a/0x30 [ 602.903532][ T30] [ 602.903582][ T30] INFO: task kworker/u8:6:1101 blocked for more than 143 seconds. [ 602.903600][ T30] Not tainted 6.11.0-rc6-syzkaller-00070-gc763c4339688 #0 [ 602.903617][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 602.903627][ T30] task:kworker/u8:6 state:D stack:24008 pid:1101 tgid:1101 ppid:2 flags:0x00004000 [ 602.903670][ T30] Workqueue: ipv6_addrconf addrconf_verify_work [ 602.903703][ T30] Call Trace: [ 602.903712][ T30] [ 602.903728][ T30] __schedule+0xe37/0x5490 [ 602.903759][ T30] ? __pfx___lock_acquire+0x10/0x10 [ 602.903796][ T30] ? __pfx___lock_acquire+0x10/0x10 [ 602.903844][ T30] ? __pfx___schedule+0x10/0x10 [ 602.903878][ T30] ? schedule+0x298/0x350 [ 602.903909][ T30] ? __pfx_lock_release+0x10/0x10 [ 602.903942][ T30] ? __mutex_lock+0x5b3/0x9c0 [ 602.903978][ T30] ? __mutex_trylock_common+0x78/0x250 [ 602.904025][ T30] schedule+0xe7/0x350 [ 602.904059][ T30] schedule_preempt_disabled+0x13/0x30 [ 602.904098][ T30] __mutex_lock+0x5b8/0x9c0 [ 602.928004][ T30] ? addrconf_verify_work+0x12/0x30 [ 602.928051][ T30] ? __pfx___mutex_lock+0x10/0x10 [ 602.928096][ T30] ? __pfx_lock_acquire+0x10/0x10 [ 602.928149][ T30] ? addrconf_verify_work+0x12/0x30 [ 602.928180][ T30] addrconf_verify_work+0x12/0x30 [ 602.928212][ T30] process_one_work+0x9c5/0x1b40 [ 602.928264][ T30] ? __pfx_wg_packet_handshake_send_worker+0x10/0x10 [ 602.928294][ T30] ? __pfx_process_one_work+0x10/0x10 [ 602.928341][ T30] ? assign_work+0x1a0/0x250 [ 602.928380][ T30] worker_thread+0x6c8/0xed0 [ 602.928434][ T30] ? __pfx_worker_thread+0x10/0x10 [ 602.928471][ T30] kthread+0x2c1/0x3a0 [ 602.928499][ T30] ? _raw_spin_unlock_irq+0x23/0x50 [ 602.928531][ T30] ? __pfx_kthread+0x10/0x10 [ 602.928562][ T30] ret_from_fork+0x45/0x80 [ 602.928598][ T30] ? __pfx_kthread+0x10/0x10 [ 602.928629][ T30] ret_from_fork_asm+0x1a/0x30 [ 602.928682][ T30] [ 602.928757][ T30] [ 602.928757][ T30] Showing all locks held in the system: [ 602.928769][ T30] 2 locks held by kworker/0:0/8: [ 602.928786][ T30] 3 locks held by kworker/u8:1/12: [ 602.928803][ T30] #0: ffff88801ac89148 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_one_work+0x1277/0x1b40 [ 602.928883][ T30] #1: ffffc90000117d80 ((linkwatch_work).work){+.+.}-{0:0}, at: process_one_work+0x921/0x1b40 [ 602.928959][ T30] #2: ffffffff8fa35628 (rtnl_mutex){+.+.}-{3:3}, at: linkwatch_event+0x51/0xc0 [ 602.929027][ T30] 3 locks held by kworker/1:0/25: [ 602.929043][ T30] #0: ffff88801ac80948 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x1277/0x1b40 [ 602.929125][ T30] #1: ffffc900001f7d80 (deferred_process_work){+.+.}-{0:0}, at: process_one_work+0x921/0x1b40 [ 602.929200][ T30] #2: ffffffff8fa35628 (rtnl_mutex){+.+.}-{3:3}, at: switchdev_deferred_process_work+0xe/0x20 [ 602.929272][ T30] 1 lock held by khungtaskd/30: [ 602.929288][ T30] #0: ffffffff8ddb9fe0 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x75/0x340 [ 602.929365][ T30] 3 locks held by kworker/1:1/47: [ 602.929381][ T30] 2 locks held by kworker/u8:3/53: [ 602.929408][ T30] 3 locks held by kworker/u8:6/1101: [ 602.929424][ T30] #0: ffff8880301ca148 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: process_one_work+0x1277/0x1b40 [ 602.929501][ T30] #1: ffffc9000437fd80 ((work_completion)(&(&net->ipv6.addr_chk_work)->work)){+.+.}-{0:0}, at: process_one_work+0x921/0x1b40 [ 602.929577][ T30] #2: ffffffff8fa35628 (rtnl_mutex){+.+.}-{3:3}, at: addrconf_verify_work+0x12/0x30 [ 602.929663][ T30] 4 locks held by kworker/u8:10/4043: [ 602.929679][ T30] #0: ffff88801bae3148 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x1277/0x1b40 [ 602.929754][ T30] #1: ffffc9000bedfd80 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x921/0x1b40 [ 602.929829][ T30] #2: ffffffff8fa1fc10 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0xbb/0xbb0 [ 602.929894][ T30] #3: ffffffff8fa35628 (rtnl_mutex){+.+.}-{3:3}, at: wg_netns_pre_exit+0x1b/0x230 [ 602.929966][ T30] 2 locks held by syslogd/4658: [ 602.929983][ T30] 1 lock held by klogd/4665: [ 602.929999][ T30] 3 locks held by dhcpcd/4889: [ 602.930015][ T30] 2 locks held by getty/4980: [ 602.930030][ T30] #0: ffff888034cc20a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x24/0x80 [ 602.930103][ T30] #1: ffffc90002efe2f0 (&ldata->atomic_read_lock){+.+.}-{3:3}, at: n_tty_read+0xfc8/0x1490 [ 602.930178][ T30] 1 lock held by syz-executor/5233: [ 602.930194][ T30] 1 lock held by syz-executor/5239: [ 602.930210][ T30] #0: ffffffff8fa35628 (rtnl_mutex){+.+.}-{3:3}, at: tun_chr_close+0x3e/0x230 [ 602.930277][ T30] 1 lock held by syz-executor/5245: [ 602.930292][ T30] #0: ffffffff8fa35628 (rtnl_mutex){+.+.}-{3:3}, at: tun_chr_close+0x3e/0x230 [ 602.930362][ T30] 5 locks held by kworker/0:3/5281: [ 602.930378][ T30] 5 locks held by kworker/0:6/5285: [ 602.930394][ T30] 4 locks held by kworker/0:7/5295: [ 602.930410][ T30] 2 locks held by kworker/1:6/5330: [ 602.930426][ T30] 2 locks held by syz.3.2848/11250: [ 602.930442][ T30] 1 lock held by syz-executor/11264: [ 602.930458][ T30] 3 locks held by kworker/u8:5/11276: [ 602.930475][ T30] 3 locks held by kworker/0:1/11278: [ 602.930491][ T30] 5 locks held by kworker/0:9/11280: [ 602.930507][ T30] 2 locks held by syz-executor/11282: [ 602.930523][ T30] 3 locks held by syz-executor/11287: [ 602.930540][ T30] 2 locks held by syz-executor/11291: [ 602.930556][ T30] 2 locks held by syz-executor/11292: [ 602.930573][ T30] [ 602.930580][ T30] ============================================= [ 602.930580][ T30] [ 602.930601][ T30] NMI backtrace for cpu 0 [ 602.930614][ T30] CPU: 0 UID: 0 PID: 30 Comm: khungtaskd Not tainted 6.11.0-rc6-syzkaller-00070-gc763c4339688 #0 [ 602.930644][ T30] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 602.930658][ T30] Call Trace: [ 602.930668][ T30] [ 602.930678][ T30] dump_stack_lvl+0x116/0x1f0 [ 602.930708][ T30] nmi_cpu_backtrace+0x27b/0x390 [ 602.930744][ T30] ? __pfx_nmi_raise_cpu_backtrace+0x10/0x10 [ 602.930780][ T30] nmi_trigger_cpumask_backtrace+0x29c/0x300 [ 602.930817][ T30] watchdog+0xf0c/0x1240 [ 602.930851][ T30] ? __pfx_watchdog+0x10/0x10 [ 602.930875][ T30] ? lockdep_hardirqs_on+0x7c/0x110 [ 602.930909][ T30] ? __kthread_parkme+0x148/0x220 [ 602.930941][ T30] ? __pfx_watchdog+0x10/0x10 [ 602.930965][ T30] kthread+0x2c1/0x3a0 [ 602.930991][ T30] ? _raw_spin_unlock_irq+0x23/0x50 [ 602.931022][ T30] ? __pfx_kthread+0x10/0x10 [ 602.931051][ T30] ret_from_fork+0x45/0x80 [ 602.931094][ T30] ? __pfx_kthread+0x10/0x10 [ 602.931123][ T30] ret_from_fork_asm+0x1a/0x30 [ 602.931171][ T30] [ 602.931181][ T30] Sending NMI from CPU 0 to CPUs 1: [ 602.931217][ C1] NMI backtrace for cpu 1 [ 602.931230][ C1] CPU: 1 UID: 0 PID: 11276 Comm: kworker/u8:5 Not tainted 6.11.0-rc6-syzkaller-00070-gc763c4339688 #0 [ 602.931257][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 602.931271][ C1] Workqueue: bat_events batadv_tt_purge [ 602.931304][ C1] RIP: 0010:nf_confirm+0x460/0x1210 [ 602.931342][ C1] Code: 4c 89 e6 e8 e2 e2 52 f8 49 83 fc 07 0f 87 b7 07 00 00 41 be 01 00 00 00 e8 5d e0 52 f8 48 b8 00 00 00 00 00 fc ff df 48 01 c5 <48> c7 45 00 00 00 00 00 c7 45 08 00 00 00 00 48 8b 84 24 90 00 00 [ 602.931364][ C1] RSP: 0018:ffffc90000a17bb8 EFLAGS: 00000282 [ 602.931381][ C1] RAX: dffffc0000000000 RBX: ffff888031d0ba00 RCX: ffffffff8938dc4d [ 602.931397][ C1] RDX: ffff88802add0000 RSI: ffffffff8938dff3 RDI: 0000000000000007 [ 602.931413][ C1] RBP: fffff52000142f7a R08: 0000000000000007 R09: 0000000000000007 [ 602.931428][ C1] R10: 0000000000000007 R11: 0000000000000000 R12: 0000000000000007 [ 602.931441][ C1] R13: ffffc90000a17d20 R14: 0000000000000001 R15: ffff888031d0ba68 [ 602.931457][ C1] FS: 0000000000000000(0000) GS:ffff8880b8900000(0000) knlGS:0000000000000000 [ 602.931480][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 602.931496][ C1] CR2: 0000562649e1bed8 CR3: 000000000db7c000 CR4: 00000000003506f0 [ 602.931511][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 602.931526][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 602.931540][ C1] Call Trace: [ 602.931547][ C1] [ 602.931555][ C1] ? show_regs+0x8c/0xa0 [ 602.931589][ C1] ? nmi_cpu_backtrace+0x1d8/0x390 [ 602.931620][ C1] ? nmi_cpu_backtrace_handler+0xc/0x20 [ 602.931649][ C1] ? nmi_handle+0x1a9/0x5c0 [ 602.931671][ C1] ? nf_confirm+0x460/0x1210 [ 602.931700][ C1] ? default_do_nmi+0x6a/0x160 [ 602.931724][ C1] ? exc_nmi+0x170/0x1e0 [ 602.931747][ C1] ? end_repeat_nmi+0xf/0x53 [ 602.931775][ C1] ? nf_confirm+0xad/0x1210 [ 602.931803][ C1] ? nf_confirm+0x453/0x1210 [ 602.931832][ C1] ? nf_confirm+0x460/0x1210 [ 602.931861][ C1] ? nf_confirm+0x460/0x1210 [ 602.931892][ C1] ? nf_confirm+0x460/0x1210 [ 602.931920][ C1] [ 602.931927][ C1] [ 602.931935][ C1] ? __pfx_nf_confirm+0x10/0x10 [ 602.931966][ C1] ? __pfx_nf_nat_ipv6_out+0x10/0x10 [ 602.931992][ C1] ? nf_nat_ipv6_out+0x39c/0x490 [ 602.932019][ C1] ? __pfx_nf_confirm+0x10/0x10 [ 602.932048][ C1] nf_hook_slow+0xbb/0x200 [ 602.932078][ C1] nf_hook+0x486/0x810 [ 602.932100][ C1] ? __pfx_br_nf_dev_queue_xmit+0x10/0x10 [ 602.932124][ C1] ? __pfx_nf_hook+0x10/0x10 [ 602.932145][ C1] ? __pfx_lock_release+0x10/0x10 [ 602.932177][ C1] ? __pfx_br_nf_dev_queue_xmit+0x10/0x10 [ 602.932201][ C1] ? lock_acquire+0x1b1/0x560 [ 602.932235][ C1] br_nf_post_routing+0x8c4/0x11b0 [ 602.932258][ C1] ? __pfx_br_nf_dev_queue_xmit+0x10/0x10 [ 602.932284][ C1] ? __pfx_br_nf_post_routing+0x10/0x10 [ 602.932308][ C1] nf_hook_slow+0xbb/0x200 [ 602.932343][ C1] nf_hook+0x474/0x7d0 [ 602.932375][ C1] ? __pfx_br_dev_queue_push_xmit+0x10/0x10 [ 602.932409][ C1] ? __pfx_nf_hook+0x10/0x10 [ 602.932442][ C1] ? __pfx_br_dev_queue_push_xmit+0x10/0x10 [ 602.932475][ C1] ? __pfx___lock_acquire+0x10/0x10 [ 602.932509][ C1] br_forward_finish+0xcd/0x130 [ 602.932541][ C1] ? __pfx_br_dev_queue_push_xmit+0x10/0x10 [ 602.932575][ C1] br_nf_hook_thresh+0x303/0x410 [ 602.932599][ C1] ? __pfx_br_forward_finish+0x10/0x10 [ 602.932634][ C1] ? __pfx_br_nf_hook_thresh+0x10/0x10 [ 602.932658][ C1] ? __pfx_lock_release+0x10/0x10 [ 602.932690][ C1] ? __pfx_br_forward_finish+0x10/0x10 [ 602.932727][ C1] br_nf_forward_finish+0x66a/0xba0 [ 602.932752][ C1] ? __pfx_br_forward_finish+0x10/0x10 [ 602.932787][ C1] br_nf_forward_ip.part.0+0x610/0x820 [ 602.932815][ C1] br_nf_forward+0xf11/0x1bd0 [ 602.932842][ C1] ? __pfx_br_nf_forward+0x10/0x10 [ 602.932865][ C1] nf_hook_slow+0xbb/0x200 [ 602.932895][ C1] nf_hook+0x474/0x7d0 [ 602.932927][ C1] ? __pfx_br_forward_finish+0x10/0x10 [ 602.932959][ C1] ? __pfx_nf_hook+0x10/0x10 [ 602.932992][ C1] ? __pfx_br_forward_finish+0x10/0x10 [ 602.933024][ C1] ? __asan_memcpy+0x3c/0x60 [ 602.933058][ C1] __br_forward+0x1be/0x5b0 [ 602.933089][ C1] ? __pfx_br_forward_finish+0x10/0x10 [ 602.933123][ C1] deliver_clone+0x5b/0xa0 [ 602.933155][ C1] maybe_deliver+0xa7/0x120 [ 602.933189][ C1] br_flood+0x17e/0x5c0 [ 602.933225][ C1] br_handle_frame_finish+0xda5/0x1c80 [ 602.933254][ C1] ? __pfx_br_handle_frame_finish+0x10/0x10 [ 602.933281][ C1] ? __pfx_nf_conntrack_icmpv6_error+0x10/0x10 [ 602.933308][ C1] ? ip6t_do_table+0xd20/0x1d40 [ 602.933341][ C1] ? __local_bh_enable_ip+0xa4/0x120 [ 602.933368][ C1] ? ip6t_do_table+0xd50/0x1d40 [ 602.933398][ C1] ? nf_hook_slow+0x132/0x200 [ 602.933428][ C1] br_nf_hook_thresh+0x303/0x410 [ 602.933452][ C1] ? __pfx_br_handle_frame_finish+0x10/0x10 [ 602.933479][ C1] ? __pfx_br_nf_hook_thresh+0x10/0x10 [ 602.933506][ C1] ? __pfx_br_handle_frame_finish+0x10/0x10 [ 602.933532][ C1] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 602.933554][ C1] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 602.933579][ C1] br_nf_pre_routing_finish_ipv6+0x76a/0xfb0 [ 602.933605][ C1] ? __pfx_br_handle_frame_finish+0x10/0x10 [ 602.933634][ C1] br_nf_pre_routing_ipv6+0x3ce/0x8c0 [ 602.933660][ C1] ? __pfx_br_nf_pre_routing_ipv6+0x10/0x10 [ 602.933685][ C1] ? __pfx_lock_release+0x10/0x10 [ 602.933718][ C1] ? __pfx_br_nf_pre_routing_finish_ipv6+0x10/0x10 [ 602.933750][ C1] br_nf_pre_routing+0x860/0x15b0 [ 602.933777][ C1] br_handle_frame+0x9eb/0x1490 [ 602.933804][ C1] ? __pfx_br_handle_frame+0x10/0x10 [ 602.933829][ C1] ? __pfx_br_handle_frame_finish+0x10/0x10 [ 602.933853][ C1] ? mark_lock+0xb5/0xc60 [ 602.933885][ C1] ? __pfx_br_handle_frame+0x10/0x10 [ 602.933909][ C1] __netif_receive_skb_core.constprop.0+0xa3d/0x4330 [ 602.933946][ C1] ? kfree_skbmem+0x1a4/0x1f0 [ 602.933976][ C1] ? __pfx___netif_receive_skb_core.constprop.0+0x10/0x10 [ 602.934006][ C1] ? hlock_class+0x4e/0x130 [ 602.934030][ C1] ? __lock_acquire+0xbdd/0x3cb0 [ 602.934068][ C1] ? __pfx___lock_acquire+0x10/0x10 [ 602.934099][ C1] ? __pfx_ip6_rcv_finish+0x10/0x10 [ 602.934134][ C1] ? lock_acquire+0x1b1/0x560 [ 602.934162][ C1] ? process_backlog+0x3f1/0x15f0 [ 602.934185][ C1] __netif_receive_skb_one_core+0xb1/0x1e0 [ 602.934214][ C1] ? __pfx___netif_receive_skb_one_core+0x10/0x10 [ 602.934244][ C1] ? process_backlog+0x3f1/0x15f0 [ 602.934272][ C1] ? __pfx_lock_release+0x10/0x10 [ 602.934306][ C1] ? mark_held_locks+0x9f/0xe0 [ 602.934346][ C1] ? process_backlog+0x3f1/0x15f0 [ 602.934376][ C1] __netif_receive_skb+0x1d/0x160 [ 602.934406][ C1] process_backlog+0x443/0x15f0 [ 602.934438][ C1] __napi_poll.constprop.0+0xb7/0x550 [ 602.934474][ C1] net_rx_action+0xa92/0x1010 [ 602.934507][ C1] ? tmigr_handle_remote+0x153/0xdd0 [ 602.934537][ C1] ? __pfx_net_rx_action+0x10/0x10 [ 602.934569][ C1] ? __pfx_tmigr_handle_remote+0x10/0x10 [ 602.934596][ C1] ? run_timer_base+0x119/0x190 [ 602.934640][ C1] ? run_timer_base+0x11e/0x190 [ 602.934674][ C1] ? __pfx_run_timer_base+0x10/0x10 [ 602.934709][ C1] handle_softirqs+0x216/0x8f0 [ 602.934738][ C1] ? irq_work_single+0x13a/0x260 [ 602.934773][ C1] ? __pfx_handle_softirqs+0x10/0x10 [ 602.934801][ C1] ? irqtime_account_irq+0x18d/0x2e0 [ 602.934829][ C1] ? batadv_tt_local_purge+0x21c/0x3c0 [ 602.934866][ C1] do_softirq+0xb2/0xf0 [ 602.934893][ C1] [ 602.934901][ C1] [ 602.934911][ C1] __local_bh_enable_ip+0x100/0x120 [ 602.934938][ C1] batadv_tt_local_purge+0x21c/0x3c0 [ 602.934979][ C1] ? __pfx_batadv_tt_local_purge+0x10/0x10 [ 602.935016][ C1] ? wg_packet_send_handshake_initiation+0xf3/0x360 [ 602.935059][ C1] batadv_tt_purge+0x86/0xb90 [ 602.935099][ C1] ? __pfx_batadv_tt_purge+0x10/0x10 [ 602.935134][ C1] ? __pfx_lock_release+0x10/0x10 [ 602.935177][ C1] process_one_work+0x9c5/0x1b40 [ 602.935220][ C1] ? __pfx_wg_packet_handshake_send_worker+0x10/0x10 [ 602.935248][ C1] ? __pfx_process_one_work+0x10/0x10 [ 602.935290][ C1] ? assign_work+0x1a0/0x250 [ 602.935331][ C1] worker_thread+0x6c8/0xed0 [ 602.935373][ C1] ? __kthread_parkme+0x148/0x220 [ 602.935404][ C1] ? __pfx_worker_thread+0x10/0x10 [ 602.935440][ C1] kthread+0x2c1/0x3a0 [ 602.935466][ C1] ? _raw_spin_unlock_irq+0x23/0x50 [ 602.935497][ C1] ? __pfx_kthread+0x10/0x10 [ 602.935526][ C1] ret_from_fork+0x45/0x80 [ 602.935560][ C1] ? __pfx_kthread+0x10/0x10 [ 602.935589][ C1] ret_from_fork_asm+0x1a/0x30 [ 602.935630][ C1] [ 602.956643][ T30] Kernel panic - not syncing: hung_task: blocked tasks [ 602.956661][ T30] CPU: 0 UID: 0 PID: 30 Comm: khungtaskd Not tainted 6.11.0-rc6-syzkaller-00070-gc763c4339688 #0 [ 602.956694][ T30] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 602.956710][ T30] Call Trace: [ 602.956720][ T30] [ 602.956732][ T30] dump_stack_lvl+0x3d/0x1f0 [ 602.956766][ T30] panic+0x6dc/0x7c0 [ 602.956802][ T30] ? __pfx_panic+0x10/0x10 [ 602.956839][ T30] ? __irq_work_queue_local+0x136/0x440 [ 602.956877][ T30] ? __pfx_nmi_raise_cpu_backtrace+0x10/0x10 [ 602.956912][ T30] ? irq_work_queue+0x2a/0x80 [ 602.956945][ T30] ? watchdog+0xd76/0x1240 [ 602.956971][ T30] ? watchdog+0xd69/0x1240 [ 602.956999][ T30] watchdog+0xd87/0x1240 [ 602.957031][ T30] ? __pfx_watchdog+0x10/0x10 [ 602.957054][ T30] ? lockdep_hardirqs_on+0x7c/0x110 [ 602.957096][ T30] ? __kthread_parkme+0x148/0x220 [ 602.957128][ T30] ? __pfx_watchdog+0x10/0x10 [ 602.957152][ T30] kthread+0x2c1/0x3a0 [ 602.957179][ T30] ? _raw_spin_unlock_irq+0x23/0x50 [ 602.957209][ T30] ? __pfx_kthread+0x10/0x10 [ 602.957239][ T30] ret_from_fork+0x45/0x80 [ 602.957273][ T30] ? __pfx_kthread+0x10/0x10 [ 602.957302][ T30] ret_from_fork_asm+0x1a/0x30 [ 602.957350][ T30] [ 602.957578][ T30] Kernel Offset: disabled