last executing test programs: 1m41.223112161s ago: executing program 3 (id=7594): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newtaction={0x88, 0x30, 0x1, 0x0, 0x25dfdbfe, {}, [{0x74, 0x1, [@m_mpls={0x70, 0x1, 0x0, 0x0, {{0x9}, {0x44, 0x2, 0x0, 0x1, [@TCA_MPLS_PARMS={0x1c, 0x2, {{}, 0x2}}, @TCA_MPLS_PARMS={0x1c, 0x2, {{0xc, 0x2, 0x4, 0x3, 0x9}, 0x1}}, @TCA_MPLS_PROTO={0x6, 0x4, 0x8035}]}, {0x4, 0x4}, {0xc}, {0xc}}}]}]}, 0x88}}, 0x0) 1m41.198740743s ago: executing program 4 (id=7596): r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000001040)={'gre0\x00', &(0x7f0000000000)={'erspan0\x00', 0x0, 0x80, 0xab00, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0xfffc, 0x0, 0x2f, 0x0, @loopback, @dev={0xac, 0x14, 0x14, 0xc}}}}}) 1m41.089769154s ago: executing program 3 (id=7598): r0 = socket$kcm(0x10, 0x400000002, 0x0) sendmsg$inet(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000000)="130000004e007f049e", 0x9}, {&(0x7f0000000180)="78cabf89254400111bb8", 0xa}], 0x2}, 0x0) 1m41.076878425s ago: executing program 1 (id=7599): r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000a80)=@raw={'raw\x00', 0x8, 0x3, 0x4d8, 0x340, 0x11, 0x148, 0x0, 0x0, 0x440, 0x2a8, 0x2a8, 0x440, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x2f8, 0x340, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'ip_vti0\x00', {0x0, 0x0, 0x3f, 0x20000000, 0x20000000, 0x3, 0x7, 0x0, 0x40}}}, @common=@unspec=@bpf1={{0x230}, @pinned={0x1, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@ip={@multicast2, @empty, 0x0, 0x0, 'vlan0\x00', 'netdevsim0\x00'}, 0x0, 0xd0, 0x100, 0x0, {}, [@inet=@rpfilter={{0x28}}, @common=@unspec=@quota={{0x38}}]}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x538) 1m41.068513885s ago: executing program 2 (id=7600): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="380000001800dd8d0000000000000000020000000000000500000000060015000200000014001680100008800c00038005"], 0x38}}, 0x0) 1m40.70834526s ago: executing program 0 (id=7601): r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x6) ioctl$sock_bt_hci(r0, 0x800448d3, 0x0) 1m40.70810519s ago: executing program 3 (id=7602): r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="b4050000ffe0f50571101800000000006600000000800080950000000000000072c2f98cb7333011f1cf97f165ac0dc8c84c1ed04a84f6243cec3706bd2d671c2c28c7a0bd13871d815bbc06c2fa221f1a91d63e4bdbf3cbdd4ff4738d969857122ea180b8b25ad6c006c3e4e86dd319c92d683f6d593cb860187c7640045af58adcfc943a215f12b50493e62b5a127771fc659f39d1470e7d85"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f00000000c0), 0x366, 0x10, &(0x7f0000000000), 0x2b2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000680)={r0, 0xffffffffffffffff, 0x35, 0x0, @val=@uprobe_multi={0x0, 0x0, 0x0, 0x7}}, 0x40) 1m40.698793281s ago: executing program 4 (id=7603): r0 = gettid() rt_sigqueueinfo(r0, 0x30, &(0x7f0000000400)={0x1e, 0x1, 0x6}) 1m40.698500641s ago: executing program 2 (id=7604): r0 = socket$l2tp(0x2, 0x2, 0x73) recvfrom$l2tp(r0, 0x0, 0x0, 0x40, 0x0, 0x0) 1m40.637519967s ago: executing program 1 (id=7605): r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x9, r0, r0) 1m40.535469717s ago: executing program 3 (id=7606): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000017c0), 0x800, 0x0) ioctl$TIOCNXCL(r0, 0x540d) 1m40.535389197s ago: executing program 4 (id=7607): socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a0, &(0x7f00000000c0)='%d\xf1\xfa\xbc%j\xfef;q1\x95\xf4\xe4\x13\x95k#Jz.F\xce\xfb\x9c\x19\xf3v\x88\x91\xbct\xb0\x1bLq\x15\x00\xad\t\x13\xf5U\x02\xc9d6q\xc3\xa5\xcf\x01t\r%\xad-\x13\xb0 U\xaaC\xc388\x13\xc6H\x0f \x03\x9e\xa98\xa1\xc3\xe9\x06C\xd4\xb5\x18}4\xa9yA8\x1fQ\xdfN\x8e\xd7m\xee\xb8N\x98\xef\xff\xddR\xec~c\xcb\x93\x84\x7f\\x6\xedZ\x82\xa0\x1by\x17\x1a\xc8\x98\x99\x0f') 1m40.515966938s ago: executing program 0 (id=7608): r0 = socket$pppl2tp(0x18, 0x1, 0x1) setsockopt$pppl2tp_PPPOL2TP_SO_DEBUG(r0, 0x111, 0x4, 0x20000000, 0x4) 1m40.471938803s ago: executing program 2 (id=7609): r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000002780), 0x2280) fcntl$setstatus(r0, 0x4, 0x0) 1m40.451642194s ago: executing program 1 (id=7610): r0 = socket$nl_audit(0x10, 0x3, 0x9) getsockopt$sock_buf(r0, 0x1, 0x3c, 0x0, &(0x7f0000000540)) 1m40.356799024s ago: executing program 2 (id=7611): mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x1000002, 0x200000005c831, 0xffffffffffffffff, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) 1m40.356501324s ago: executing program 3 (id=7612): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000500)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x7}}, [@NFT_MSG_DELTABLE={0xa0, 0x2, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x9}, [@NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x4}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x1}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x3}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x1}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x1}, @NFTA_TABLE_USERDATA={0x35, 0x6, "0ff35360b07367b272d871e45d0551a1374fa8461b90c8f8db2434680a013a51f83acbdc896d39e3c49df5660a21516ecc"}]}, @NFT_MSG_NEWSET={0x14, 0x9, 0xa, 0x201, 0x0, 0x0, {0x2, 0x0, 0xa}}, @NFT_MSG_NEWRULE={0x1c, 0x6, 0xa, 0x801, 0x0, 0x0, {0x3, 0x0, 0x7}, [@NFTA_RULE_CHAIN_ID={0x8, 0xb, 0x1, 0x0, 0x1}]}, @NFT_MSG_NEWRULE={0x44, 0x6, 0xa, 0x5, 0x0, 0x0, {0x5, 0x0, 0x4}, [@NFTA_RULE_POSITION={0xc, 0x6, 0x1, 0x0, 0x5}, @NFTA_RULE_COMPAT={0xc, 0x5, 0x0, 0x1, [@NFTA_RULE_COMPAT_FLAGS={0x8, 0x2, 0x1, 0x0, 0x2}]}, @NFTA_RULE_CHAIN_ID={0x8, 0xb, 0x1, 0x0, 0x2}, @NFTA_RULE_POSITION_ID={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_RULE_USERDATA={0x4}, @NFTA_RULE_EXPRESSIONS={0x4}]}, @NFT_MSG_NEWSET={0x44, 0x9, 0xa, 0x201, 0x0, 0x0, {0xa, 0x0, 0x4}, [@NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_EXPR={0xc, 0x11, 0x0, 0x1, @fwd={{0x8}, @void}}, @NFTA_SET_ID={0x8}, @NFTA_SET_OBJ_TYPE={0x8, 0xf, 0x1, 0x0, 0x7}, @NFTA_SET_DATA_LEN={0x8, 0x7, 0x1, 0x0, 0x25}]}, @NFT_MSG_DELSETELEM={0x28, 0xe, 0xa, 0x101, 0x0, 0x0, {0x1, 0x0, 0x2}, [@NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_SET_ID={0x8, 0x4, 0x1, 0x0, 0x2}]}, @NFT_MSG_NEWCHAIN={0x28, 0x3, 0xa, 0x201, 0x0, 0x0, {0x3, 0x0, 0x7}, [@NFTA_CHAIN_TYPE={0x8, 0x7, 'nat\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz0\x00'}]}, @NFT_MSG_DELSET={0x28, 0xb, 0xa, 0x101, 0x0, 0x0, {0x2, 0x0, 0x5}, [@NFTA_SET_HANDLE={0xc, 0x10, 0x1, 0x0, 0x5}, @NFTA_SET_DATA_TYPE={0x8}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x7}}}, 0x1f8}, 0x1, 0x0, 0x0, 0x20000000}, 0x40010) 1m40.355976094s ago: executing program 4 (id=7613): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000380)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@empty, 0x80000000, 0x2, 0x32}, [@mark={0xc}]}, 0x34}}, 0x0) 1m40.333497036s ago: executing program 0 (id=7614): r0 = socket$rxrpc(0x21, 0x2, 0x2) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r0, 0x110, 0x4, &(0x7f0000000000)=0x12, 0x4) 1m40.279103091s ago: executing program 1 (id=7615): ioperm(0x9, 0x8, 0xf9) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) 1m40.211683208s ago: executing program 4 (id=7616): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000700)=[@in={0x2, 0x4e23, @multicast2}], 0x10) 1m40.207596498s ago: executing program 0 (id=7617): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x40049409, 0x0) 1m40.200919089s ago: executing program 2 (id=7618): r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100080c10000000000000000100", 0x58}], 0x1) 1m40.173028422s ago: executing program 3 (id=7619): r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, 0x0, 0x0) 1m40.124778746s ago: executing program 1 (id=7620): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001180)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000001100)=ANY=[@ANYBLOB="200000006a00010000000000000000000a000000deffffff07"], 0x20}}, 0x0) 1m34.158210227s ago: executing program 0 (id=7621): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000440)={0x68, 0x0, 0x2, 0x401, 0x0, 0x0, {0x2}, [@CTA_EXPECT_TUPLE={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @loopback}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_EXPECT_MASTER={0x4}, @CTA_EXPECT_MASK={0x2c, 0x3, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast2}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x8b}}]}]}, 0x68}}, 0x0) 1m34.048397498s ago: executing program 1 (id=7622): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000100)) 1m33.930168789s ago: executing program 2 (id=7623): r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmmsg(r0, &(0x7f0000000180)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[{0x10, 0x110, 0x1}], 0x10, 0xe000}, 0x5}], 0x1, 0x0) 1m32.98319869s ago: executing program 4 (id=7624): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x18, &(0x7f00000000c0)=0x46, 0x4) 1m3.068069013s ago: executing program 0 (id=7625): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x5, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}]}, @NFT_MSG_NEWRULE={0x50, 0x6, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_RULE_CHAIN_ID={0x8}, @NFTA_RULE_EXPRESSIONS={0x28, 0x4, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, @tproxy={{0xb}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_TPROXY_FAMILY={0x8}, @NFTA_TPROXY_REG_ADDR={0x8}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0xc4}}, 0x0) 40.230346309s ago: executing program 32 (id=7622): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000100)) 0s ago: executing program 33 (id=7623): r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmmsg(r0, &(0x7f0000000180)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[{0x10, 0x110, 0x1}], 0x10, 0xe000}, 0x5}], 0x1, 0x0) kernel console output (not intermixed with test programs): tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 105.959509][ [ 106.050613][ T29] audit: type=1400 audit(1730531570.214:4939): avc: denied { read } for pid=3000 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 T29] audit: typ[ 106.074766][ T29] audit: type=1400 audit(1730531570.214:4940): avc: denied { read } for pid=3000 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 e=1400 audit(1730531570.177:4937): avc: denied { read write } for pid=3316 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Nov 2 07:12:50 syzkaller kern.notice kernel: [ 106.024097][ T29] audit: type=1400 audit(1730531570.186:4938): avc: denied { read write } for pid=15204 comm="syz.0.5737" name="loop0" dev="devtmpfs"[ 106.134678][ T29] audit: type=1400 audit(1730531570.232:4941): avc: denied { read write } for pid=3319 comm="syz-executor" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 ino=100 scontex[ 106.160300][ T29] audit: type=1400 audit(1730531570.242:4942): avc: denied { read write } for pid=3321 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 t=root:sysadm_r:[ 106.186293][ T29] audit: type=1400 audit(1730531570.278:4943): avc: denied { write } for pid=15221 comm="syz.2.5745" name="unix" dev="proc" ino=4026532688 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=0 sysadm_t tcontex[ 106.210325][ T29] audit: type=1400 audit(1730531570.278:4944): avc: denied { read } for pid=3000 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 t=system_u:objec[ 106.233641][ T29] audit: type=1400 audit(1730531570.288:4945): avc: denied { read write } for pid=3316 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 t_r:fix Nov 2 [ 106.259268][ T29] audit: type=1400 audit(1730531570.288:4946): avc: denied { read write } for pid=3321 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 07:12:50 syzkaller kern.notice kernel: [ 106.050613][ T29] audit: type=1400 audit(1730531570.214:4939): avc: denied { read } for pid=3000 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 2 07:12:50 syzkaller kern.notice kernel: [ 106.074766][ T29] audit: type=1400 audit(1730531570.214:4940): avc: denied { read } for pid=3000 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 2 07:12:50 syzkaller kern.notice kernel: [ 106.134678][ T29] audit: type=1400 audit(1730531570.232:4941): avc: denied { read write } for pid=3319 comm="syz-executor" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Nov 2 07:12:50 syzkaller kern.notice kernel: [ 106.160300][ T29] audit: type=1400 audit(1730531570.242:4942): avc: denied { read write } for pid=3321 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Nov 2 07:12:50 syzkaller kern.notice kernel: [ 106.186293][ T29] audit: type=1400 audit(1730531570.278:4943): avc: denied { write } for pid=15221 comm="syz.2.5745" name="unix" dev="proc" ino=4026532688 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_n Nov 2 07:12:50 syzkaller kern.notice kernel: [ 106.210325][ T29] audit: type=1400 audit(1730531570.278:4944): avc: denied { read } for pid=3000 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 2 07:12:50 syzkaller kern.notice kernel: [ 106.233641][ T29] audit: type=1400 audit(1730531570.288:4945[ 106.441494][T15258] vhci_hcd vhci_hcd.0: pdev(3) rhport(0) sockfd(4) ): avc: denied [ 106.449214][T15258] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) { read write } [ 106.458252][T15258] vhci_hcd vhci_hcd.0: Device attached for pid=3316 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r[ 106.475443][T15260] vhci_hcd: connection closed :fi Nov 2 07:1[ 106.475849][ T1316] vhci_hcd: stop threads 2:50 syzkaller k[ 106.488664][ T1316] vhci_hcd: release socket ern.notice kernel: [ 106.259268[ 106.488672][ T1316] vhci_hcd: disconnect device ][ T29] audit: type=1400 audit(1730531570.288:4946): avc: denied { read write } for pid=3321 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Nov 2 07:12:50 syzkaller kern.info kernel: [ 106.441494][T15258] vhci_hcd vhci_hcd.0: pdev(3) rhport(0) sockfd(4) Nov 2 07:12:50 syzkaller kern.info kernel: [ 106.449214][T15258] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) Nov 2 07:12:50 syzkaller kern.info kernel: [ 106.458252][T15258] vhci_hcd vhci_hcd.0: Device attached Nov 2 07:12:50 syzkaller kern.info kernel: [ 106.475443][T15260] vhci_hcd: connection closed Nov 2 07:12:50 syzkaller kern.info kernel: [ 106.475849][ T1316] vhci_hcd: stop threads Nov 2 07:12:50 syzkaller kern.info kernel: [ 106.488664][ T1316] vhci_hcd: release socket Nov 2 07:12:50 syzkaller kern.info kernel: [ 106.488672][ T1316] vhci_hcd: disconnect device [ 106.961913][T15315] Cannot find del_set index 4 as target Nov 2 07:12:51 syzkaller kern.info kernel: [ 106.961913][T15315] Cannot find del_set index 4 as target [ 107.167647][T15342] netlink: 10 bytes leftover after parsing attributes in process `syz.3.5804'. Nov 2 07:12:51 syzkaller kern.warn kernel: [ 107.167647][T15342] netlink: 10 bytes leftover after parsing attributes in process `syz.3.5804'. [ 107.347923][T15370] xt_limit: Overflow, try lower: 0/0 Nov 2 07:12:51 syzkaller kern.info kernel: [ 107.347923][T15370] xt_limit: Overflow, try lower: 0/0 [ 108.286259][T15519] xt_TCPMSS: Only works on TCP SYN packets Nov 2 07:12:52 syzkaller kern.info kernel: [ 108.286259][T15519] xt_TCPMSS: Only works on TCP SYN packets [ 108.420962][T15539] netlink: 4 bytes leftover after parsing attributes in process `syz.2.5901'. Nov 2 07:12:52 syzkaller kern.warn kernel: [ 108.420962][T15539] netlink: 4 bytes leftover after parsing attributes in process `syz.2.5901'. [ 108.693488][T15585] x_tables: ip_tables: icmp match: only valid for protocol 1 Nov 2 07:12:52 syzkaller kern.info kernel: [ 108.693488][T15585] x_tables: ip_tables: icmp match: only valid for protocol 1 [ 108.791203][T15601] x_tables: ip6_tables: SNPT target: used from hooks PREROUTING, but only usable from INPUT/POSTROUTING Nov 2 07:12:52 syzkaller kern.info kernel: [ 108.791203][T15601] x_tables: ip6_tables: SNPT target: used from hooks PREROUTING, but only usable from INPUT/POSTROUTING [ 108.904622][T15618] xt_CONNSECMARK: invalid mode: 0 Nov 2 07:12:52 syzkaller kern.info kernel: [ 108.904622][T15618] xt_CONNSECMARK: invalid mode: 0 [ 109.363333][T15697] IPVS: length: 39 != 24 Nov 2 07:12:53 syzkaller kern.err kernel: [ 109.363333][T15697] IPVS: length: 39 != 24 [ 109.600157][T15732] @: renamed from veth0_vlan (while UP) Nov 2 07:12:53 syzkaller kern.info kernel: [ 109.600157][T15732] ^A@^P: renamed from veth0_vlan (while UP) [ 109.631529][T15739] ebt_among: src integrity fail: 30a Nov 2 07:12:53 syzkaller kern.err kernel: [ 109.631529][T15739] ebt_among: src integrity fail: 30a [ 109.775541][T15759] xt_TPROXY: Can be used only with -p tcp or -p udp Nov 2 07:12:53 syzkaller kern.info kernel: [ 109.775541][T15759] xt_TPROXY: Can be used only with -p tcp or -p udp [ 109.819660][T15769] netlink: 'syz.1.6014': attribute type 3 has an invalid length. [ 109.827541][T15769] netlink: 132 bytes leftover after parsing attributes in process `syz.1.6014'. Nov 2 07:12:53 syzkaller kern.warn kernel: [ 109.819660][T15769] netlink: 'syz.1.6014': attribute type 3 has an invalid length. Nov 2 07:12:53 syzkaller kern.warn kernel: [ 109.827541][T15769] netlink: 132 bytes leftover after parsing attributes in process `syz.1.6014'. [ 109.948621][T15788] SET target dimension over the limit! Nov 2 07:12:53 syzkaller kern.info kernel: [ 109.948621][T15788] SET target dimension over the limit! [ 110.112073][T15816] mapping of prio or/and queue is allowed only from OUTPUT/FORWARD/POSTROUTING chains Nov 2 07:12:54 syzkaller kern.info kernel: [ 110.112073][T15816] mapping of prio or/and queue is allowed only from OUTPUT/FORWARD/POSTROUTING chains [ 110.708718][T15913] xt_cgroup: xt_cgroup: no path or classid specified [ 110.719970][T15917] netlink: 'syz.2.6089': attribute type 29 has an invalid length. Nov 2 07:12:54 syzkaller kern.info kernel: [ 110.708718][T15913] xt_cgroup: xt_cgroup: no path or classid specified Nov 2 07:12:54 syzkaller kern.warn kernel: [ 110.719970][T15917] netlink: 'syz.2.6089': attribute type 29 has an invalid length. [ 110.943368][T15950] netlink: 'syz.3.6102': attribute type 9 has an invalid length. [ 110.951146][T15950] netlink: 'syz.3.6102': attribute type 7 has an invalid length. [ 110.958947][T15950] netlink: 'syz.3.6102': attribute type 8 has an invalid length. Nov 2 07:12:54 syzkaller kern.warn kernel: [ 110.943368][T15950] netlink: 'syz.3.6102': attribute type 9 has an invalid length. Nov 2 07:12:54 syzkaller kern.warn kernel: [ 110.951146][T15950] netlink: 'syz.3.6102': attribute type 7 has an invalid length. Nov 2 07:12:54 syzkaller kern.warn kernel: [ 110.958947][T15950] netlink: 'syz.3.6102': attribute type 8 has an invalid length. [ 111.107571][T15969] xt_l2tp: v2 doesn't support IP mode Nov 2 07:12:54 syzkaller kern.info kernel: [ 111.107571][T15969] xt_l2tp: v2 doesn't support IP mode [ 111.177431][T15982] netlink: 10 bytes leftover after parsing attributes in process `syz.4.6120'. [ 111.192472][T15983] x_tables: ip_tables: osf match: only valid for protocol 6 Nov 2 07:12:55 syzkaller kern.warn kernel: [ 111.177431][T15982] netlink: 10 bytes leftover after parsing attributes in process `syz.4.6120'. Nov 2 07:12:55 syzkaller kern.info kernel: [ 111.192472][T15983] x_tables: ip_tables: osf match: only valid for protocol 6 [ 111.397552][ T29] kauditd_printk_skb: 545 callbacks suppressed [ 111.397569][ T29] audit: type=1400 audit(1730531575.180:5492): avc: denied { read write } for pid=3319 comm="syz-executor" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 111.428048][ T29] audit: type=1400 audit(1730531575.180:5493): avc: denied { read write } for pid=3321 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 111.459074][ T29] audit: type=1400 audit(1730531575.217:5494): avc: denied { read write } for pid=3319 comm="syz-executor" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 111.483981][ T29] audit: type=1400 audit(1730531575.226:5495): avc: denied { read write } for pid=3317 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 111.508871][ T29] audit: type=1400 audit(1730531575.244:5496): avc: denied { create } for pid=16022 comm="syz.3.6141" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 111.516161][ T29] audit: type=1400 audit(1730531575.244:5497): avc: denied { read } for pid=16019 comm="syz.2.6139" name="rtc0" dev="devtmpfs" ino=244 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=0 [ 111.516197][ T29] audit: type=1400 audit(1730531575.272:5498): avc: denied { read write } for pid=3317 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 111.516230][ T29] audit: type=1400 audit(1730531575.272:5499): avc: denied { read } for pid=3000 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 111.560066][ T29] audit: type=1400 audit(1730531575.327:5500): avc: denied { read write } for pid=3319 comm="syz-executor" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 111.560151][ T29] audit: type=1400 audit(1730531575.337:5501): avc: denied { read write } for pid=3321 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Nov 2 07:12:55 syzkaller kern.warn kernel: [ 111.397552][ T29] kauditd_printk_skb: 545 callbacks suppressed Nov 2 07:12:55 syzkaller kern.notice kernel: [ 111.397569][ T29] audit: type=1400 audit(1730531575.180:5492): avc: denied { read write } for pid=3319 comm="syz-executor" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Nov 2 07:12:55 syzkaller kern.notice kernel: [ 111.428048][ T29] audit: type=1400 audit(1730531575.180:5493): avc: denied { read write } for pid=3321 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Nov 2 07:12:55 syzkaller kern.notice kernel: [ 111.459074][ T29] audit: type=1400 audit(1730531575.217:5494): avc: denied { read write } for pid=3319 comm="syz-executor" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Nov 2 07:12:55 syzkaller kern.notice kernel: [ 111.483981][ T29] audit: type=1400 audit(1730531575.226:5495): avc: denied { read write } for pid=3317 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Nov 2 07:12:55 syzkaller kern.notice kernel: [ 111.508871][ T29] audit: type=1400 audit(1730531575.244:5496): avc: denied { create } for pid=16022 comm="syz.3.6141" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permis Nov 2 07:12:55 syzkaller kern.notice kernel: [ 111.516161][ T29] audit: type=1400 audit(1730531575.244:5497): avc: denied { read } for pid=16019 comm="syz.2.6139" name="rtc0" dev="devtmpfs" ino=244 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_devi Nov 2 07:12:55 syzkaller kern.notice kernel: [ 111.516197][ T29] audit: type=1400 audit(1730531575.272:5498): avc: denied { read write } for pid=3317 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Nov 2 07:12:55 syzkaller kern.notice kernel: [ 111.516230][ T29] audit: type=1400 audit(1730531575.272:5499): avc: denied { read } for pid=3000 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 2 07:12:55 syzkaller kern.notice kernel: [ 111.560066][ T29] audit: type=1400 audit(1730531575.327:5500): avc: denied { read write } for pid=3319 comm="syz-executor" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Nov 2 07:12:55 syzkaller kern.notice kernel: [ 111.560151][ T29] audit: type=1400 audit(1730531575.337:5501): avc: denied { read write } for pid=3321 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 112.224711][T16110] xt_TPROXY: Can be used only with -p tcp or -p udp Nov 2 07:12:55 syzkaller kern.info kernel: [ 112.224711][T16110] xt_TPROXY: Can be used only with -p tcp or -p udp [ 112.771457][T16198] SET target dimension over the limit! Nov 2 07:12:56 syzkaller kern.info kernel: [ 112.771457][T16198] SET target dimension over the limit! [ 113.228052][T16278] Cannot find del_set index 4 as target Nov 2 07:12:56 syzkaller kern.info kernel: [ 113.228052][T16278] Cannot find del_set index 4 as target [ 113.376143][T16304] xt_limit: Overflow, try lower: 0/0 Nov 2 07:12:57 syzkaller kern.info kernel: [ 113.376143][T16304] xt_limit: Overflow, try lower: 0/0 [ 113.446747][T16314] SET target dimension over the limit! Nov 2 07:12:57 syzkaller kern.info kernel: [ 113.446747][T16314] SET target dimension over the limit! [ 114.385164][T16449] netlink: 4 bytes leftover after parsing attributes in process `syz.3.6348'. Nov 2 07:12:57 syzkaller kern.warn kernel: [ 114.385164][T16449] netlink: 4 bytes leftover after parsing attributes in process `syz.3.6348'. [ 114.560295][T16466] xt_CT: You must specify a L4 protocol and not use inversions on it [ 114.762345][T16491] IPVS: Error connecting to the multicast addr Nov 2 07:12:58 syzkaller kern.info kernel: [ 114.560295][T16466] xt_CT: You must specify a L4 protocol and not use inversions on it Nov 2 07:12:58 syzkaller kern.err kernel: [ 114.762345][T16491] IPVS: Error connecting to the multicast addr [ 114.976109][T16521] xt_CONNSECMARK: invalid mode: 0 Nov 2 07:12:58 syzkaller kern.info kernel: [ 114.976109][T16521] xt_CONNSECMARK: invalid mode: 0 [ 115.030044][T16529] IPVS: sync thread started: state = MASTER, mcast_ifn = bridge_slave_0, syncid = 0, id = 0 Nov 2 07:12:58 syzkaller kern.info kernel: [ 115.030044][T16529] IPVS: sync thread started: state = MASTER, mcast_ifn = bridge_slave_0, syncid = 0, id = 0 [ 115.131232][T16548] @: renamed from veth0_vlan (while UP) Nov 2 07:12:58 syzkaller kern.info kernel: [ 115.131232][T16548] ^A@^P: renamed from veth0_vlan (while UP) [ 115.299119][ T3393] IPVS: starting estimator thread 0... Nov 2 07:12:58 syzkaller kern.info kernel: [ 115.299119][ T3393] IPVS: starting estimator thre[ 115.318886][T16575] xt_addrtype: ipv6 BLACKHOLE matching not supported ad 0... Nov 2 07:12:58 syzkaller kern.info kernel: [ 115.318886][T16575] xt_addrtype: ipv6 BLACKHOLE matching not supported [ 115.428009][T16576] IPVS: using max 2256 ests per chain, 112800 per kthread Nov 2 07:12:58 syzkaller kern.info kernel: [ 115.428009][T16576] IPVS: using max 2256 ests per chain, 112800 per kthread [ 115.474827][T16600] netlink: 'syz.2.6421': attribute type 3 has an invalid length. [ 115.482667][T16600] netlink: 132 bytes leftover after parsing attributes in process `syz.2.6421'. Nov 2 07:12:58 syzkaller kern.warn kernel: [ 115.474827][T16600] netlink: 'syz.2.6421': attribute type 3 has an invalid length. Nov 2 07:12:58 syzkaller kern.warn kernel: [ 115.482667][T16600] netlink: 132 bytes leftover after parsing attributes in process `syz.2.6421'. [ 115.592658][T16619] ebt_among: src integrity fail: 30a Nov 2 07:12:59 syzkaller kern.err kernel: [ 115.592658][T16619] ebt_among: src integrity fail: 30a [ 115.752499][T16638] Cannot find set identified by id 632 to match Nov 2 07:12:59 syzkaller kern.info kernel: [ 115.752499][T16638] Cannot find set identified by id 632 to match [ 116.001446][T16681] IPVS: set_ctl: invalid protocol: 41730 10.1.1.0:20004 Nov 2 07:12:59 syzkaller kern.err kernel: [ 116.001446][T16681] IPVS: set_ctl: invalid protocol: 41730 10.1.1.0:20004 [ 116.312979][T16733] xt_CT: You must specify a L4 protocol and not use inversions on it Nov 2 07:12:59 syzkaller kern.info kernel: [ 116.312979][T16733] xt_CT: You must specify a L4 protocol and not use inversions on it [ 116.567105][T16774] netlink: 'syz.3.6509': attribute type 29 has an invalid length. Nov 2 07:12:59 syzkaller kern.warn kernel: [ 116.567105][T16774] netlink: 'syz.3.6509': attribute type 29 has an invalid lengt[ 116.593306][T16776] xt_CT: You must specify a L4 protocol and not use inversions on it h. Nov 2 07:13:00 syzkaller kern.info kernel: [ 116.593306][T16776] xt_CT: You must specify a L4 protocol and not use inversions on it [ 116.825858][ T29] kauditd_printk_skb: 540 callbacks suppressed [ 116.825876][ T29] audit: type=1400 audit(1730531580.201:6042): avc: denied { read } for pid=16811 comm="syz.2.6530" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Nov 2 07:13:00 syzkaller kern.warn kernel: [ 116.825858][ T29] kauditd_printk_skb: 540 callbacks suppressed [ 116.871306][ T29] audit: type=1400 audit(1730531580.201:6043): avc: denied { read write } for pid=3319 comm="syz-executor" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 116.895790][ T29] audit: type=1400 audit(1730531580.228:6044): avc: denied { read } for pid=3000 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Nov 2 07:13:00 [ 116.918145][ T29] audit: type=1400 audit(1730531580.238:6045): avc: denied { read write } for pid=3324 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 syzkaller kern.notice kernel: [ 116.825876][ T29] audit: type=1400 audit(1730531580.201:6042): avc: denied { read } for pid=16811 comm="syz.2.6530" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_dis Nov 2 07:13:00 syzkaller kern.notice kernel: [ 116.871306][ T29] audit: [ 116.972729][ T29] audit: type=1400 audit(1730531580.247:6046): avc: denied { read write } for pid=3316 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 type=1400 audit([ 116.997378][ T29] audit: type=1400 audit(1730531580.247:6047): avc: denied { read } for pid=3000 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 1730531580.201:6[ 117.020697][ T29] audit: type=1400 audit(1730531580.247:6048): avc: denied { read write } for pid=3317 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 043): avc: deni[ 117.046392][ T29] audit: type=1400 audit(1730531580.293:6049): avc: denied { read write } for pid=3321 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 ed { read write[ 117.046423][ T29] audit: type=1400 audit(1730531580.311:6050): avc: denied { read } for pid=3000 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 } for pid=3319[ 117.046453][ T29] audit: type=1400 audit(1730531580.311:6051): avc: denied { read } for pid=3000 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 comm="syz-executor" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Nov 2 07:13:00 syzkaller kern.notice kernel: [ 116.895790][ T29] audit: type=1400 audit(1730531580.228:6044): avc: denied { read } for pid=3000 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 2 07:13:00 syzkaller kern.notice kernel: [ 116.918145][ T29] audit: type=1400 audit(1730531580.238:6045): avc: denied { read write } for [ 117.165587][T16846] x_tables: ip_tables: osf match: only valid for protocol 6 pid=3324 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Nov 2 07:13:00 syzkaller kern.notice kernel: [ 116.972729][ T29] audit: type=1400 audit(1730531580.247:6046): avc: denied { read write } for pid=3316 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Nov 2 07:13:00 syzkaller kern.notice kernel: [ 116.997378][ T29] audit: type=1400 audit(1730531580.247:6047): avc: denied { read } for pid=3000 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 2 07:13:00 syzkaller kern.notice kernel: [ 117.020697][ T29] audit: type=1400 audit(1730531580.247:6048): avc: denied { read write } for pid=3317 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Nov 2 07:13:00 syzkaller kern.notice kernel: [ 117.046392][ T29] audit: type=1400 audit(1730531580.293:6049): avc: denied { read write } for pid=3321 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Nov 2 07:13:00 syzkaller kern.notice kernel: [ 117.046423][ T29] audit: type=1400 audit(1730[ 117.290900][T16861] netlink: 10 bytes leftover after parsing attributes in process `syz.3.6554'. 531580.311:6050): avc: denied { read } for pid=3000 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 2 07:13:00 syzkaller kern.notice kernel: [ 117.046453][ T29] audit: type=1400 audit(1730531580.311:6051): avc: denied { read } for pid=3000 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 2 07:13:00 syzkaller kern.info kernel: [ 117.165587][T16846] x_tables: ip_tables: osf match: only valid for protocol 6 Nov 2 07:13:00 syzkaller kern.warn kernel: [ 117.290900][T16861] netlink: 10 bytes leftover after parsing attributes in process `syz.3.6554'. [ 117.416601][T16880] netlink: 'syz.4.6564': attribute type 5 has an invalid length. Nov 2 07:13:00 syzkaller kern.warn kernel: [ 117.416601][T16880] netlink: 'syz.4.6564': attribute type 5 has an invalid length. [ 117.507912][T16898] xt_HMARK: spi-set and port-set can't be combined Nov 2 07:13:00 syzkaller kern.info kernel: [ 117.507912][T16898] xt_HMARK: spi-set and port-set can't be combined [ 117.761995][T16939] xt_TPROXY: Can be used only with -p tcp or -p udp Nov 2 07:13:01 syzkaller kern.info kernel: [ 117.761995][T16939] xt_TPROXY: Can be used only with -p tcp or -p udp [ 119.061997][T17153] netlink: 'syz.1.6693': attribute type 11 has an invalid length. Nov 2 07:13:02 syzkaller kern.warn kernel: [ 119.061997][T17153] netlink: 'syz.1.6693': attribute type 11 has an invalid length. [ 119.174528][T17171] netlink: 'syz.1.6702': attribute type 1 has an invalid length. Nov 2 07:13:02 syzkaller kern.warn kernel: [ 119.174528][T17171] netlink: 'syz.1.6702': attribute type 1 has an invalid length. [ 119.882440][T17282] netlink: 'syz.0.6758': attribute type 3 has an invalid length. Nov 2 07:13:03 syzkaller kern.warn kernel: [ 119.882440][T17282] netlink: 'syz.0.6758': attribute type 3 has an invalid length. [ 120.628383][T17382] xt_policy: output policy not valid in PREROUTING and INPUT Nov 2 07:13:03 syzkaller kern.info kernel: [ 120.628383][T17382] xt_policy: output policy not valid in PREROUTING and INPUT [ 120.765641][T17393] netlink: 'syz.2.6812': attribute type 7 has an invalid length. Nov 2 07:13:03 syzkaller kern.warn kernel: [ 120.765641][T17393] netlink: 'syz.2.6812': attribute type 7 has an invalid length. [ 121.918617][T17554] Cannot find set identified by id 632 to match Nov 2 07:13:04 syzkaller kern.info kernel: [ 121.918617][T17554] Cannot find set identified by id 632 to match [ 122.254356][ T29] kauditd_printk_skb: 523 callbacks suppressed [ 122.254409][ T29] audit: type=1400 audit(1730531585.213:6575): avc: denied { read write } for pid=3324 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Nov 2 07:13:05 [ 122.305067][ T29] audit: type=1400 audit(1730531585.240:6576): avc: denied { read write } for pid=3317 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 syzkaller kern.w[ 122.330631][ T29] audit: type=1400 audit(1730531585.259:6577): avc: denied { read write } for pid=3319 comm="syz-executor" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 arn kernel: [ 1[ 122.333956][T17602] xt_hashlimit: Unknown mode mask 2000, kernel too old? 22.254356][ T2[ 122.356535][ T29] audit: type=1400 audit(1730531585.259:6578): avc: denied { read } for pid=3000 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 9] kauditd_print[ 122.356574][ T29] audit: type=1400 audit(1730531585.259:6579): avc: denied { read } for pid=3000 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 k_skb: 523 callbacks suppressed Nov 2 07:13:05 syzkaller kern.notice kernel: [ 122.254409][ T29] audit: type=1400 audit(1730531585.213:6575): avc: denied { read write } for pid=3324 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Nov 2 07:13:05 syzkaller kern.notice kerne[ 122.443732][ T29] audit: type=1400 audit(1730531585.323:6580): avc: denied { read } for pid=3000 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 l: [ 122.305067[ 122.466714][ T29] audit: type=1400 audit(1730531585.342:6581): avc: denied { module_request } for pid=17598 comm="syz.3.6915" kmod="ip6t_" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=0 ][ T29] audit:[ 122.489757][ T29] audit: type=1400 audit(1730531585.351:6582): avc: denied { read } for pid=3000 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 type=1400 audit[ 122.512808][ T29] audit: type=1400 audit(1730531585.351:6583): avc: denied { read } for pid=3000 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 (1730531585.240:6576): avc: denied { read write } for pid=3317 comm="syz-executor" name="loop[ 122.512841][ T29] audit: type=1400 audit(1730531585.351:6584): avc: denied { read } for pid=3000 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Nov 2 07:13:05 syzkaller kern.notice kernel: [ 122.330631][ T29] audit: type=1400 audit(1730531585.259:6577): avc: denied { read write } for pid=3319 comm="syz-executor" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Nov 2 07:13:05 syzkaller kern.info kernel: [ 122.333956][T17602] xt_hashlimit: Unknown mode mask 2000, kernel too old? Nov 2 07:13:05 syzkaller kern.notice kernel: [ 122.356535][ T29] audit: type=1400 audit(1730531585.259:6578): avc: denied { read } for pid=3000 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 2 07:13:05 syzkaller kern.notice kernel: [ 122.356574][ T29] audit: type=1400 audit(1730531585.259:6579): avc: denied { read } for pid=3000 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 2 07:13:05 syzkaller kern.notice kernel: [ 122.443732][ T29] audit: type=1400 audit(1730531585.323:6580): avc: denied { read } for pid=3000 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 2 07:13:05 syzkaller kern.notice kernel: [ 122.466714][ T29] audit: type=1400 audit(1730531585.342:6581): avc: denied { module_request } for pid=17598 comm="syz.3.6915" kmod="ip6t_" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system Nov 2 07:13:05 syzkaller kern.notice kernel: [ 122.489757][ T29] audit: type=1400 audit(1730531585.351:6582): avc: denied { read } for pid=3000 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 2 07:13:05 syzkaller kern.notice kernel: [ 122.512808][ T29] audit: type=1400 audit(1730531585.351:6583): avc: denied { read } for pid=3000 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 2 07:13:05 syzkaller kern.notice kernel: [ 122.512841][ T29] audit: type=1400 audit(1730531585.351:6584): avc: denied { read } for pid=3000 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 122.854601][T17662] x_tables: eb_tables: snat.0 target: invalid size 16 (kernel) != (user) 0 Nov 2 07:13:05 syzkaller kern.err kernel: [ 122.854601][T17662] x_tables: eb_tables: snat.0 target: invalid size 16 (kernel) != (user) 0 [ 123.071310][T17699] netlink: 'syz.0.6964': attribute type 5 has an invalid length. Nov 2 07:13:05 syzkaller kern.warn kernel: [ 123.071310][T17699] netlink: 'syz.0.6964': attribute type 5 has an invalid length. [ 123.152641][T17709] x_tables: ip6_tables: TCPMSS target: only valid for protocol 6 Nov 2 07:13:06 syzkaller kern.info kernel: [ 123.152641][T17709] x_tables: ip6_tables: TCPMSS target: only valid for protocol 6 [ 123.611536][T17781] binfmt_misc: register: failed to install interpreter file ./file0 [ 123.670165][T17792] netlink: 36 bytes leftover after parsing attributes in process `syz.0.7011'. [ 123.787865][T17806] netlink: 8 bytes leftover after parsing attributes in process `syz.2.7018'. [ 123.797436][T17806] netlink: 16 bytes leftover after parsing attributes in process `syz.2.7018'. [ 123.844599][T17812] netlink: 28 bytes leftover after parsing attributes in process `syz.4.7019'. [ 124.149278][T17840] netlink: 8 bytes leftover after parsing attributes in process `syz.4.7034'. [ 125.066257][T17930] netlink: 'syz.3.7074': attribute type 10 has an invalid length. [ 125.074134][T17930] netlink: 40 bytes leftover after parsing attributes in process `syz.3.7074'. [ 125.128536][T17930] bridge0: port 3(batadv0) entered blocking state [ 125.135028][T17930] bridge0: port 3(batadv0) entered disabled state [ 125.142779][T17930] batadv0: entered allmulticast mode [ 125.148712][T17930] batadv0: entered promiscuous mode [ 125.154332][T17930] bridge0: port 3(batadv0) entered blocking state [ 125.160911][T17930] bridge0: port 3(batadv0) entered forwarding state [ 125.206304][ T50] batman_adv: batadv0: No IGMP Querier present - multicast optimizations disabled [ 125.215572][ T50] batman_adv: batadv0: No MLD Querier present - multicast optimizations disabled [ 125.772555][T17969] netlink: 8 bytes leftover after parsing attributes in process `syz.1.7095'. [ 126.529207][T18035] netlink: 8 bytes leftover after parsing attributes in process `syz.3.7136'. [ 126.712752][T18045] netlink: 'syz.4.7132': attribute type 1 has an invalid length. [ 126.807430][T18054] SET target dimension over the limit! [ 126.839099][T18058] netlink: 'syz.4.7140': attribute type 3 has an invalid length. [ 127.138405][T18081] SELinux: failed to load policy [ 127.315664][T18102] netlink: 'syz.4.7163': attribute type 2 has an invalid length. [ 127.546024][T18120] SELinux: failed to load policy [ 127.695290][ T29] kauditd_printk_skb: 754 callbacks suppressed [ 127.695305][ T29] audit: type=1400 audit(1730531590.234:7339): avc: denied { prog_load } for pid=18128 comm="syz.4.7176" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 127.720752][ T29] audit: type=1400 audit(1730531590.234:7340): avc: denied { bpf } for pid=18128 comm="syz.4.7176" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 127.741644][ T29] audit: type=1400 audit(1730531590.234:7341): avc: denied { perfmon } for pid=18128 comm="syz.4.7176" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 127.932379][ T29] audit: type=1400 audit(1730531590.234:7342): avc: denied { read write } for pid=3319 comm="syz-executor" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 127.956702][ T29] audit: type=1400 audit(1730531590.234:7343): avc: denied { open } for pid=3319 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 127.981295][ T29] audit: type=1400 audit(1730531590.234:7344): avc: denied { ioctl } for pid=3319 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=100 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 128.007055][ T29] audit: type=1400 audit(1730531590.261:7345): avc: denied { read write } for pid=3319 comm="syz-executor" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 128.031304][ T29] audit: type=1400 audit(1730531590.261:7346): avc: denied { read write open } for pid=3319 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 128.056369][ T29] audit: type=1400 audit(1730531590.261:7347): avc: denied { ioctl } for pid=3319 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=100 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 128.082040][ T29] audit: type=1400 audit(1730531590.308:7348): avc: denied { perfmon } for pid=18128 comm="syz.4.7176" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 128.532371][T18175] netlink: 28 bytes leftover after parsing attributes in process `syz.1.7198'. [ 128.541428][T18175] netlink: 28 bytes leftover after parsing attributes in process `syz.1.7198'. [ 128.852930][T18195] netlink: 'syz.1.7206': attribute type 3 has an invalid length. [ 128.860714][T18195] netlink: 'syz.1.7206': attribute type 3 has an invalid length. [ 128.869693][T18196] netlink: 'syz.0.7205': attribute type 10 has an invalid length. [ 128.903509][T18196] bridge0: port 4(batadv0) entered blocking state [ 128.910205][T18196] bridge0: port 4(batadv0) entered disabled state [ 128.948464][T18196] batadv0: entered allmulticast mode [ 128.965507][T18196] batadv0: entered promiscuous mode [ 128.975871][T18196] bridge0: port 4(batadv0) entered blocking state [ 128.982471][T18196] bridge0: port 4(batadv0) entered forwarding state [ 129.144199][T18220] __nla_validate_parse: 2 callbacks suppressed [ 129.144216][T18220] netlink: 12 bytes leftover after parsing attributes in process `syz.3.7219'. [ 129.148331][T18219] x_tables: duplicate underflow at hook 1 [ 129.193398][T18223] netlink: 'syz.0.7220': attribute type 10 has an invalid length. [ 129.250253][T18231] netlink: 'syz.3.7224': attribute type 11 has an invalid length. [ 129.265266][ T50] batman_adv: batadv0: No IGMP Querier present - multicast optimizations disabled [ 129.274692][ T50] batman_adv: batadv0: No MLD Querier present - multicast optimizations disabled [ 129.349401][T18241] xt_policy: output policy not valid in PREROUTING and INPUT [ 129.443820][T18249] netlink: 132 bytes leftover after parsing attributes in process `syz.1.7233'. [ 130.190910][T18319] (unnamed net_device) (uninitialized): Unable to set down delay as MII monitoring is disabled [ 130.440890][T18330] netlink: 132 bytes leftover after parsing attributes in process `syz.4.7273'. [ 130.855522][T18345] netlink: 'syz.3.7280': attribute type 3 has an invalid length. [ 130.863331][T18345] netlink: 'syz.3.7280': attribute type 3 has an invalid length. [ 130.881415][T18345] netlink: 16 bytes leftover after parsing attributes in process `syz.3.7280'. [ 132.410167][T18498] x_tables: ip6_tables: TCPMSS target: only valid for protocol 6 [ 132.822822][T18518] 8021q: adding VLAN 0 to HW filter on device bond3 [ 132.897201][T18528] binfmt_misc: register: failed to install interpreter file ./file0 [ 132.919601][T18531] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 133.127941][ T29] kauditd_printk_skb: 732 callbacks suppressed [ 133.127960][ T29] audit: type=1400 audit(1730531595.246:8081): avc: denied { read write } for pid=3324 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 133.181424][ T29] audit: type=1400 audit(1730531595.273:8082): avc: denied { read write } for pid=3316 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 133.206631][ T29] audit: type=1400 audit(1730531595.273:8083): avc: denied { open } for pid=3316 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 133.232832][ T29] audit: type=1400 audit(1730531595.273:8084): avc: denied { ioctl } for pid=3316 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=101 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 133.259910][ T29] audit: type=1400 audit(1730531595.283:8085): avc: denied { read write } for pid=3321 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 133.285103][ T29] audit: type=1400 audit(1730531595.283:8086): avc: denied { open } for pid=3321 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 133.310367][ T29] audit: type=1400 audit(1730531595.283:8087): avc: denied { ioctl } for pid=3321 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=102 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 133.336221][ T29] audit: type=1400 audit(1730531595.283:8088): avc: denied { read write open } for pid=3324 comm="syz-executor" path="/dev/loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 133.361937][ T29] audit: type=1400 audit(1730531595.283:8089): avc: denied { ioctl } for pid=3324 comm="syz-executor" path="/dev/loop4" dev="devtmpfs" ino=104 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 133.392222][ T29] audit: type=1400 audit(1730531595.292:8090): avc: denied { read write } for pid=3319 comm="syz-executor" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 133.768753][T18574] loop3: detected capacity change from 0 to 8192 [ 133.805525][T17330] loop3: p4 < > [ 133.907304][T18595] 8021q: adding VLAN 0 to HW filter on device bond1 [ 133.918381][T18574] loop3: p4 < > [ 134.146291][T17330] udevd[17330]: inotify_add_watch(7, /dev/loop3p4, 10) failed: No such file or directory [ 134.363353][T17908] udevd[17908]: inotify_add_watch(7, /dev/loop3p4, 10) failed: No such file or directory [ 134.371693][T18636] 8021q: adding VLAN 0 to HW filter on device bond1 [ 134.518107][T18647] Y4`Ҙ: renamed from lo [ 134.587987][T18653] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 134.621737][T18658] random: crng reseeded on system resumption [ 134.788132][T18659] netlink: 20 bytes leftover after parsing attributes in process `syz.1.7432'. [ 134.888153][T18674] netlink: 132 bytes leftover after parsing attributes in process `syz.4.7438'. [ 135.084169][T18692] netlink: 'syz.1.7448': attribute type 21 has an invalid length. [ 135.470076][T18729] x_tables: ip6_tables: SYNPROXY target: used from hooks PREROUTING, but only usable from INPUT/FORWARD [ 135.712469][T18753] netlink: 52 bytes leftover after parsing attributes in process `syz.3.7478'. [ 135.721595][T18753] netlink: 52 bytes leftover after parsing attributes in process `syz.3.7478'. [ 135.816641][T18762] netlink: 132 bytes leftover after parsing attributes in process `syz.2.7481'. [ 135.856262][T18766] netlink: 'syz.3.7483': attribute type 1 has an invalid length. [ 135.864154][T18766] netlink: 224 bytes leftover after parsing attributes in process `syz.3.7483'. [ 136.090949][T18759] loop1: detected capacity change from 0 to 8192 [ 136.353272][T18775] x_tables: duplicate underflow at hook 3 [ 137.479487][T18813] loop3: detected capacity change from 0 to 2048 [ 138.912417][ T29] kauditd_printk_skb: 513 callbacks suppressed [ 138.912435][ T29] audit: type=1400 audit(1730531600.581:8604): avc: denied { read write } for pid=3317 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 139.020935][T18759] loop1: p4 < > [ 139.158704][ T29] audit: type=1400 audit(1730531600.617:8605): avc: denied { open } for pid=3317 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 139.183042][ T29] audit: type=1400 audit(1730531600.617:8606): avc: denied { ioctl } for pid=3317 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=103 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 139.209798][ T29] audit: type=1400 audit(1730531600.627:8607): avc: denied { read } for pid=3000 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 139.233264][ T29] audit: type=1400 audit(1730531600.627:8608): avc: denied { search } for pid=3000 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 139.255290][ T29] audit: type=1400 audit(1730531600.627:8609): avc: denied { append } for pid=3000 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 139.279499][ T29] audit: type=1400 audit(1730531600.627:8610): avc: denied { append open } for pid=3000 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 139.303957][ T29] audit: type=1400 audit(1730531600.627:8611): avc: denied { getattr } for pid=3000 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 139.326933][ T29] audit: type=1400 audit(1730531600.636:8612): avc: denied { read write } for pid=3324 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 139.351764][ T29] audit: type=1400 audit(1730531600.636:8613): avc: denied { open } for pid=3324 comm="syz-executor" path="/dev/loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 139.817932][T17928] udevd[17928]: inotify_add_watch(7, /dev/loop1p4, 10) failed: No such file or directory [ 139.903167][T18851] netlink: 8 bytes leftover after parsing attributes in process `syz.3.7527'. [ 140.539318][T18868] loop1: detected capacity change from 0 to 256 [ 140.664536][T18873] x_tables: duplicate underflow at hook 3 [ 141.317753][T18897] netlink: 8 bytes leftover after parsing attributes in process `syz.3.7550'. [ 141.326706][T18897] netlink: 40 bytes leftover after parsing attributes in process `syz.3.7550'. [ 142.048875][T18927] netlink: 36 bytes leftover after parsing attributes in process `syz.3.7559'. [ 142.057868][T18927] netlink: 36 bytes leftover after parsing attributes in process `syz.3.7559'. [ 142.066888][T18927] netlink: 36 bytes leftover after parsing attributes in process `syz.3.7559'. [ 142.145412][T18932] netlink: 4 bytes leftover after parsing attributes in process `syz.2.7565'. [ 142.368678][T18927] netlink: 36 bytes leftover after parsing attributes in process `syz.3.7559'. [ 142.377718][T18927] netlink: 36 bytes leftover after parsing attributes in process `syz.3.7559'. [ 142.386755][T18927] netlink: 36 bytes leftover after parsing attributes in process `syz.3.7559'. [ 142.712040][T18949] loop1: detected capacity change from 0 to 4096 [ 142.814693][T18927] netlink: 36 bytes leftover after parsing attributes in process `syz.3.7559'. [ 142.864874][T18949] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 143.026672][ T3316] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 145.833543][ T29] kauditd_printk_skb: 336 callbacks suppressed [ 145.833558][ T29] audit: type=1400 audit(1730531606.977:8950): avc: denied { read write } for pid=3316 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 146.056488][ T29] audit: type=1400 audit(1730531607.005:8951): avc: denied { read } for pid=3000 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 146.078565][ T29] audit: type=1400 audit(1730531607.005:8952): avc: denied { search } for pid=3000 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 146.100234][ T29] audit: type=1400 audit(1730531607.005:8953): avc: denied { append } for pid=3000 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 146.122554][ T29] audit: type=1400 audit(1730531607.005:8954): avc: denied { append open } for pid=3000 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 146.145763][ T29] audit: type=1400 audit(1730531607.005:8955): avc: denied { getattr } for pid=3000 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 146.168601][ T29] audit: type=1400 audit(1730531607.014:8956): avc: denied { read write } for pid=3317 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 146.192831][ T29] audit: type=1400 audit(1730531607.014:8957): avc: denied { open } for pid=3317 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 146.217249][ T29] audit: type=1400 audit(1730531607.014:8958): avc: denied { ioctl } for pid=3317 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=103 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 146.242864][ T29] audit: type=1400 audit(1730531607.014:8959): avc: denied { read write } for pid=3321 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 146.339326][T19010] xt_hashlimit: size too large, truncated to 1048576 [ 146.346132][T19010] xt_hashlimit: max too large, truncated to 1048576 [ 153.353603][ T29] kauditd_printk_skb: 80 callbacks suppressed [ 153.353623][ T29] audit: type=1400 audit(1730531607.402:8974): avc: denied { read write } for pid=3324 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 153.391536][ T29] audit: type=1400 audit(1730531607.402:8975): avc: denied { read write open } for pid=3324 comm="syz-executor" path="/dev/loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 153.419796][ T29] audit: type=1400 audit(1730531607.402:8976): avc: denied { ioctl } for pid=3324 comm="syz-executor" path="/dev/loop4" dev="devtmpfs" ino=104 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 153.448554][ T29] audit: type=1400 audit(1730531607.420:8977): avc: denied { create } for pid=19006 comm="syz.0.7597" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 153.471951][ T29] audit: type=1400 audit(1730531607.420:8978): avc: denied { write } for pid=19006 comm="syz.0.7597" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 153.495260][ T29] audit: type=1400 audit(1730531607.420:8979): avc: denied { nlmsg_write } for pid=19006 comm="syz.0.7597" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 153.519100][ T29] audit: type=1400 audit(1730531607.475:8980): avc: denied { read write } for pid=3317 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 153.546724][ T29] audit: type=1400 audit(1730531607.475:8981): avc: denied { open } for pid=3317 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 153.574173][ T29] audit: type=1400 audit(1730531607.475:8982): avc: denied { ioctl } for pid=3317 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=103 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 153.603748][ T29] audit: type=1400 audit(1730531607.503:8983): avc: denied { read write } for pid=3321 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 159.516067][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 159.528491][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 159.540626][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 159.553066][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 159.565138][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 159.577244][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 159.589537][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 159.601719][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 159.613836][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 159.626137][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 164.940352][ C1] net_ratelimit: 24833 callbacks suppressed [ 164.940372][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 164.958386][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 164.970768][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 164.983373][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 164.995810][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 165.007928][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 165.020244][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 165.032321][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 165.045438][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 165.057890][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 170.368281][ C1] net_ratelimit: 26795 callbacks suppressed [ 170.368297][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 170.386357][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 170.398708][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 170.410902][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 170.423144][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 170.435491][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 170.448380][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 170.460584][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 170.473036][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 170.485324][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 170.488964][ T29] kauditd_printk_skb: 68 callbacks suppressed [ 170.489025][ T29] audit: type=1400 audit(1730531629.720:9052): avc: denied { read write } for pid=3317 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 170.534654][ T29] audit: type=1400 audit(1730531629.720:9053): avc: denied { read write open } for pid=3317 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 170.563226][ T29] audit: type=1400 audit(1730531629.720:9054): avc: denied { ioctl } for pid=3317 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=103 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 175.796662][ C1] net_ratelimit: 19072 callbacks suppressed [ 175.796681][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 175.814782][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 175.827801][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 175.840007][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 175.852861][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 175.865795][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 175.877945][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 175.890200][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 175.902921][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 175.914991][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 176.523466][ T29] audit: type=1400 audit(1730531629.932:9055): avc: denied { read } for pid=3000 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 176.548745][ T29] audit: type=1400 audit(1730531629.932:9056): avc: denied { search } for pid=3000 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 176.573715][ T29] audit: type=1400 audit(1730531629.932:9057): avc: denied { append } for pid=3000 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 176.599932][ T29] audit: type=1400 audit(1730531629.932:9058): avc: denied { open } for pid=3000 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 176.626028][ T29] audit: type=1400 audit(1730531629.932:9059): avc: denied { getattr } for pid=3000 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 176.652021][ T29] audit: type=1400 audit(1730531630.080:9060): avc: denied { read write } for pid=3321 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 176.679282][ T29] audit: type=1400 audit(1730531630.080:9061): avc: denied { open } for pid=3321 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 176.706738][ T29] audit: type=1400 audit(1730531630.080:9062): avc: denied { ioctl } for pid=3321 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=102 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 180.373760][ T29] audit: type=1400 audit(1730531636.282:9063): avc: denied { read } for pid=3000 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 180.399569][ T29] audit: type=1400 audit(1730531636.282:9064): avc: denied { search } for pid=3000 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 181.224596][ C1] net_ratelimit: 19038 callbacks suppressed [ 181.224613][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 181.242719][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 181.254847][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 181.267734][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 181.280419][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 181.292505][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 181.304625][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 181.316882][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 181.329591][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 181.342633][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 185.458701][ T29] kauditd_printk_skb: 9 callbacks suppressed [ 185.458735][ T29] audit: type=1400 audit(1730531642.494:9074): avc: denied { read } for pid=3000 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 185.493341][ T29] audit: type=1400 audit(1730531642.494:9075): avc: denied { search } for pid=3000 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 185.518223][ T29] audit: type=1400 audit(1730531642.494:9076): avc: denied { append } for pid=3000 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 185.547310][ T29] audit: type=1400 audit(1730531642.494:9077): avc: denied { open } for pid=3000 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 185.573265][ T29] audit: type=1400 audit(1730531642.494:9078): avc: denied { getattr } for pid=3000 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 186.652233][ C1] net_ratelimit: 18960 callbacks suppressed [ 186.652251][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 186.670436][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 186.683061][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 186.695143][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 186.707760][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 186.719940][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 186.732564][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 186.744771][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 186.756879][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 186.769052][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 192.080635][ C1] net_ratelimit: 18868 callbacks suppressed [ 192.080655][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 192.098720][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 192.110817][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 192.123194][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 192.135862][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 192.147977][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 192.160110][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 192.172486][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 192.185281][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 192.197354][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 197.197875][ T29] audit: type=1400 audit(1730531654.336:9079): avc: denied { read write } for pid=3324 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 197.226863][ T29] audit: type=1400 audit(1730531654.336:9080): avc: denied { open } for pid=3324 comm="syz-executor" path="/dev/loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 197.254312][ T29] audit: type=1400 audit(1730531654.336:9081): avc: denied { ioctl } for pid=3324 comm="syz-executor" path="/dev/loop4" dev="devtmpfs" ino=104 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 197.508342][ C1] net_ratelimit: 19078 callbacks suppressed [ 197.508361][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 197.526465][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 197.538665][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 197.550836][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 197.563663][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 197.575819][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 197.587931][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 197.600261][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 197.612955][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 197.625057][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 202.550896][ T29] audit: type=1400 audit(1730531654.511:9082): avc: denied { read } for pid=3000 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 202.576681][ T29] audit: type=1400 audit(1730531654.511:9083): avc: denied { search } for pid=3000 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 202.604192][ T29] audit: type=1400 audit(1730531654.511:9084): avc: denied { append } for pid=3000 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 202.631029][ T29] audit: type=1400 audit(1730531654.511:9085): avc: denied { open } for pid=3000 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 202.657146][ T29] audit: type=1400 audit(1730531654.511:9086): avc: denied { getattr } for pid=3000 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 202.683629][ T29] audit: type=1400 audit(1730531656.191:9087): avc: denied { read } for pid=3000 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 202.709142][ T29] audit: type=1400 audit(1730531656.191:9088): avc: denied { search } for pid=3000 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 202.734178][ T29] audit: type=1400 audit(1730531656.191:9089): avc: denied { append } for pid=3000 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 202.760228][ T29] audit: type=1400 audit(1730531656.191:9090): avc: denied { open } for pid=3000 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 202.786770][ T29] audit: type=1400 audit(1730531656.191:9091): avc: denied { getattr } for pid=3000 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 202.936073][ C1] net_ratelimit: 18959 callbacks suppressed [ 202.936100][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 202.954396][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 202.966836][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 202.979927][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 202.992683][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 203.005037][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 203.017631][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 203.030295][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 203.042395][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 203.054584][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 208.364156][ C1] net_ratelimit: 18869 callbacks suppressed [ 208.364177][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 208.382173][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 208.394315][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 208.406673][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 208.419348][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 208.431553][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 208.443658][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 208.456643][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 208.469312][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 208.481414][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 213.355309][ T29] audit: type=1400 audit(1730531669.298:9092): avc: denied { read } for pid=3000 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 213.381480][ T29] audit: type=1400 audit(1730531669.298:9093): avc: denied { search } for pid=3000 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 213.406447][ T29] audit: type=1400 audit(1730531669.298:9094): avc: denied { append } for pid=3000 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 213.432081][ T29] audit: type=1400 audit(1730531669.298:9095): avc: denied { open } for pid=3000 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 213.458099][ T29] audit: type=1400 audit(1730531669.298:9096): avc: denied { getattr } for pid=3000 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 213.791874][ C1] net_ratelimit: 18959 callbacks suppressed [ 213.791894][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 213.810249][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 213.822524][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 213.835387][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 213.847691][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 213.860134][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 213.872445][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 213.885179][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 213.897317][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 213.909508][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 214.467747][ T29] audit: type=1400 audit(1730531670.313:9097): avc: denied { read } for pid=3000 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 214.493155][ T29] audit: type=1400 audit(1730531670.313:9098): avc: denied { search } for pid=3000 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 214.518232][ T29] audit: type=1400 audit(1730531670.313:9099): avc: denied { append } for pid=3000 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 214.545589][ T29] audit: type=1400 audit(1730531670.313:9100): avc: denied { open } for pid=3000 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 214.574856][ T29] audit: type=1400 audit(1730531670.313:9101): avc: denied { getattr } for pid=3000 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 219.219891][ C1] net_ratelimit: 18784 callbacks suppressed [ 219.219911][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 219.239086][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 219.251191][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 219.263291][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 219.275574][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 219.288440][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 219.300495][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 219.312592][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 219.324745][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 219.337388][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 224.647834][ C1] net_ratelimit: 19042 callbacks suppressed [ 224.647854][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 224.666495][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 224.678614][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 224.690708][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 224.702998][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 224.715663][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 224.727753][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 224.739903][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 224.752090][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 224.764756][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 230.075709][ C1] net_ratelimit: 19011 callbacks suppressed [ 230.075728][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 230.093728][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 230.105861][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 230.118160][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 230.131007][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 230.143183][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 230.155391][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 230.167663][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 230.180323][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 230.192411][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 235.503864][ C1] net_ratelimit: 18998 callbacks suppressed [ 235.503885][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 235.521912][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 235.534036][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 235.546416][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 235.559099][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 235.571301][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 235.584090][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 235.596451][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 235.609694][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 235.621802][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 240.931976][ C1] net_ratelimit: 18894 callbacks suppressed [ 240.931995][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 240.950621][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 240.962823][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 240.976745][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 240.990682][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 241.003248][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 241.018781][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 241.035239][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 241.047925][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 241.060968][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 246.360082][ C1] net_ratelimit: 18890 callbacks suppressed [ 246.360104][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 246.378289][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 246.390690][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 246.403071][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 246.415742][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 246.427929][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 246.440159][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 246.452344][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 246.464983][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 246.477084][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 251.787567][ C1] net_ratelimit: 19011 callbacks suppressed [ 251.787585][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 251.805686][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 251.818015][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 251.830756][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 251.842961][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 251.855181][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 251.867456][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 251.880362][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 251.892638][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 251.904756][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 257.215855][ C1] net_ratelimit: 18897 callbacks suppressed [ 257.215876][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 257.234376][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 257.246641][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 257.259104][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 257.272032][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 257.284150][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 257.296524][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 257.308955][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 257.321647][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 257.333904][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 262.643721][ C1] net_ratelimit: 18938 callbacks suppressed [ 262.643741][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 262.663005][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 262.675124][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 262.687451][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 262.700095][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 262.712894][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 262.725067][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 262.737253][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 262.749981][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 262.762081][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 268.071507][ C1] net_ratelimit: 18949 callbacks suppressed [ 268.071534][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 268.090125][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 268.102351][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 268.115158][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 268.127330][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 268.140048][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 268.152161][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 268.164354][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 268.176582][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 268.189261][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 273.499429][ C1] net_ratelimit: 18878 callbacks suppressed [ 273.499451][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 273.518513][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 273.530603][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 273.542752][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 273.555404][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 273.568167][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 273.580289][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 273.592903][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 273.605181][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 273.618395][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 278.927401][ C1] net_ratelimit: 18865 callbacks suppressed [ 278.927421][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 278.945747][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 278.958430][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 278.970600][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 278.982789][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 278.995010][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 279.007682][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 279.019779][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 279.031895][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 279.044061][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 284.355296][ C1] net_ratelimit: 19018 callbacks suppressed [ 284.355315][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 284.373593][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 284.386877][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 284.399010][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 284.411233][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 284.424161][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 284.437016][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 284.449206][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 284.461451][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 284.473622][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 289.783523][ C1] net_ratelimit: 18960 callbacks suppressed [ 289.783546][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 289.801568][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 289.813747][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 289.826817][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 289.840217][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 289.853364][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 289.866633][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 289.879341][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 289.892820][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 289.905394][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 295.211228][ C1] net_ratelimit: 18930 callbacks suppressed [ 295.211245][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 295.229266][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 295.241401][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 295.253764][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 295.266449][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 295.278568][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 295.290710][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 295.303496][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 295.316188][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 295.328303][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 300.639216][ C1] net_ratelimit: 20850 callbacks suppressed [ 300.639237][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 300.657516][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 300.669675][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 300.681739][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 300.693953][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 300.706114][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 300.718735][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 300.730849][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 300.742972][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 300.755169][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 306.067116][ C1] net_ratelimit: 24117 callbacks suppressed [ 306.067136][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 306.085886][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 306.098032][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 306.110192][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 306.123386][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 306.135836][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 306.148009][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 306.160302][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 306.172560][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 306.184639][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 311.495086][ C1] net_ratelimit: 24849 callbacks suppressed [ 311.495129][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 311.513636][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 311.525739][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 311.537904][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 311.550185][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 311.562330][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 311.574397][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 311.586696][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 311.598969][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 311.611592][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 316.923377][ C1] net_ratelimit: 23255 callbacks suppressed [ 316.923395][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 316.941807][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 316.954025][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 316.966269][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 316.978713][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 316.991712][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 317.007013][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 317.019178][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 317.031917][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 317.044485][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 322.351383][ C1] net_ratelimit: 20782 callbacks suppressed [ 322.351404][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 322.371250][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 322.383469][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 322.395947][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 322.408174][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 322.420591][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 322.433856][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 322.446295][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 322.459122][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 322.472923][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 327.779034][ C1] net_ratelimit: 20804 callbacks suppressed [ 327.779054][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 327.797842][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 327.810465][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 327.823135][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 327.835263][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 327.847662][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 327.859811][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 327.871993][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 327.884191][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 327.896428][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 333.206866][ C1] net_ratelimit: 20812 callbacks suppressed [ 333.206888][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 333.224930][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 333.237070][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 333.249239][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 333.261949][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 333.274359][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 333.286495][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 333.298756][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 333.310913][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 333.323089][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 338.634724][ C1] net_ratelimit: 20998 callbacks suppressed [ 338.634744][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 338.652844][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 338.664977][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 338.677286][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 338.689843][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 338.702677][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 338.714867][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 338.727143][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 338.740030][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 338.752132][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 344.062967][ C1] net_ratelimit: 20898 callbacks suppressed [ 344.062987][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 344.081333][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 344.093818][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 344.106089][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 344.118423][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 344.130510][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 344.142618][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 344.154799][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 344.167370][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 344.179873][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 349.490702][ C1] net_ratelimit: 20765 callbacks suppressed [ 349.490723][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 349.509328][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 349.521752][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 349.534010][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 349.546242][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 349.558378][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 349.570491][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 349.582906][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 349.595183][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 349.607834][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 354.918618][ C1] net_ratelimit: 20876 callbacks suppressed [ 354.918638][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 354.936660][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 354.948977][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 354.961537][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 354.973991][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 354.986121][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 354.998307][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 355.010449][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 355.022507][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 355.034607][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 360.346982][ C1] net_ratelimit: 20858 callbacks suppressed [ 360.347003][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 360.367020][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 360.379335][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 360.391540][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 360.404284][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 360.416713][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 360.429597][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 360.442769][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 360.456077][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 360.468309][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 365.774943][ C1] net_ratelimit: 20877 callbacks suppressed [ 365.774961][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 365.793607][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 365.807102][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 365.819638][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 365.832143][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 365.844225][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 365.856350][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 365.868546][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 365.881227][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 365.893699][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 371.202527][ C1] net_ratelimit: 20725 callbacks suppressed [ 371.202558][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 371.221565][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 371.234157][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 371.246673][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 371.259065][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 371.272005][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 371.284448][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 371.297430][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 371.309994][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 371.322746][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 376.630485][ C1] net_ratelimit: 20766 callbacks suppressed [ 376.630505][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 376.648981][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 376.661453][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 376.673732][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 376.686183][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 376.699150][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 376.713190][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 376.727080][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 376.739553][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 376.752335][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 382.058363][ C1] net_ratelimit: 20849 callbacks suppressed [ 382.058382][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 382.076537][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 382.088708][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 382.100898][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 382.113015][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 382.125227][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 382.138001][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 382.150499][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 382.162690][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 382.174927][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 387.486376][ C1] net_ratelimit: 21007 callbacks suppressed [ 387.486397][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 387.504503][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 387.516602][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 387.529272][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 387.541728][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 387.554553][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 387.567295][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 387.579663][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 387.591914][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 387.604365][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 392.914222][ C1] net_ratelimit: 20792 callbacks suppressed [ 392.914243][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 392.932268][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 392.944918][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 392.957935][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 392.970469][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 392.982796][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 392.994995][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 393.007204][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 393.019274][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 393.031388][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 398.342289][ C1] net_ratelimit: 20928 callbacks suppressed [ 398.342310][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 398.361677][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 398.374846][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 398.386989][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 398.399321][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 398.411567][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 398.423660][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 398.435763][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 398.448125][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 398.460831][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 398.548171][ C1] ================================================================== [ 398.556466][ C1] BUG: KCSAN: data-race in batadv_bla_tx / batadv_bla_tx [ 398.563636][ C1] [ 398.565967][ C1] write to 0xffff88811549b9a0 of 8 bytes by interrupt on cpu 0: [ 398.573703][ C1] batadv_bla_tx+0x7b4/0xc40 [ 398.579307][ C1] batadv_interface_tx+0x314/0xaf0 [ 398.584834][ C1] dev_hard_start_xmit+0x119/0x3f0 [ 398.590120][ C1] __dev_queue_xmit+0xfba/0x2040 [ 398.595106][ C1] br_dev_queue_push_xmit+0x425/0x4e0 [ 398.600531][ C1] br_forward_finish+0x90/0x160 [ 398.605421][ C1] br_nf_forward_finish+0x6b1/0x720 [ 398.610849][ C1] br_nf_forward+0xae2/0xe70 [ 398.615558][ C1] nf_hook_slow+0x86/0x1b0 [ 398.620102][ C1] __br_forward+0x27d/0x360 [ 398.624730][ C1] maybe_deliver+0x1c0/0x260 [ 398.629353][ C1] br_flood+0x246/0x470 [ 398.633622][ C1] br_handle_frame_finish+0xcfb/0xe70 [ 398.639032][ C1] br_handle_frame+0x5a0/0x9a0 [ 398.643926][ C1] __netif_receive_skb_core+0xb00/0x2310 [ 398.649690][ C1] __netif_receive_skb+0x5a/0x280 [ 398.655500][ C1] process_backlog+0x22e/0x440 [ 398.660815][ C1] __napi_poll+0x63/0x3c0 [ 398.665249][ C1] net_rx_action+0x3a1/0x7f0 [ 398.669859][ C1] handle_softirqs+0xbf/0x280 [ 398.674553][ C1] do_softirq+0x5e/0x90 [ 398.678742][ C1] __local_bh_enable_ip+0x6e/0x70 [ 398.683788][ C1] _raw_write_unlock_bh+0x1f/0x30 [ 398.688841][ C1] neigh_periodic_work+0x55a/0x600 [ 398.693993][ C1] process_scheduled_works+0x483/0x9a0 [ 398.699595][ C1] worker_thread+0x51d/0x6f0 [ 398.704258][ C1] kthread+0x1d1/0x210 [ 398.708361][ C1] ret_from_fork+0x4b/0x60 [ 398.712814][ C1] ret_from_fork_asm+0x1a/0x30 [ 398.717620][ C1] [ 398.719961][ C1] write to 0xffff88811549b9a0 of 8 bytes by interrupt on cpu 1: [ 398.727634][ C1] batadv_bla_tx+0x7b4/0xc40 [ 398.732273][ C1] batadv_interface_tx+0x314/0xaf0 [ 398.737420][ C1] dev_hard_start_xmit+0x119/0x3f0 [ 398.742563][ C1] __dev_queue_xmit+0xfba/0x2040 [ 398.747537][ C1] br_dev_queue_push_xmit+0x425/0x4e0 [ 398.752943][ C1] br_nf_dev_queue_xmit+0x41a/0xc40 [ 398.758169][ C1] br_nf_post_routing+0x86a/0x930 [ 398.763235][ C1] nf_hook_slow+0x86/0x1b0 [ 398.768037][ C1] br_forward_finish+0x120/0x160 [ 398.773089][ C1] br_nf_forward_finish+0x6b1/0x720 [ 398.778313][ C1] br_nf_forward_ip+0x5c2/0x5d0 [ 398.783289][ C1] br_nf_forward+0x5a7/0xe70 [ 398.787909][ C1] nf_hook_slow+0x86/0x1b0 [ 398.792372][ C1] __br_forward+0x27d/0x360 [ 398.797098][ C1] maybe_deliver+0x1c0/0x260 [ 398.801739][ C1] br_flood+0x246/0x470 [ 398.806048][ C1] br_handle_frame_finish+0xcfb/0xe70 [ 398.811485][ C1] br_nf_hook_thresh+0x1e5/0x220 [ 398.816452][ C1] br_nf_pre_routing_finish_ipv6+0x575/0x5a0 [ 398.822472][ C1] br_nf_pre_routing_ipv6+0x1f6/0x2a0 [ 398.828069][ C1] br_nf_pre_routing+0x517/0xbc0 [ 398.833034][ C1] br_handle_frame+0x4dd/0x9a0 [ 398.837840][ C1] __netif_receive_skb_core+0xb00/0x2310 [ 398.843540][ C1] __netif_receive_skb+0x5a/0x280 [ 398.848692][ C1] process_backlog+0x22e/0x440 [ 398.853483][ C1] __napi_poll+0x63/0x3c0 [ 398.857923][ C1] net_rx_action+0x3a1/0x7f0 [ 398.862533][ C1] handle_softirqs+0xbf/0x280 [ 398.867231][ C1] run_ksoftirqd+0x1c/0x30 [ 398.871669][ C1] smpboot_thread_fn+0x31c/0x4c0 [ 398.876625][ C1] kthread+0x1d1/0x210 [ 398.880713][ C1] ret_from_fork+0x4b/0x60 [ 398.885417][ C1] ret_from_fork_asm+0x1a/0x30 [ 398.890208][ C1] [ 398.892538][ C1] value changed: 0x0000000100001c2e -> 0x0000000100001c2f [ 398.899654][ C1] [ 398.901983][ C1] Reported by Kernel Concurrency Sanitizer on: [ 398.908164][ C1] CPU: 1 UID: 0 PID: 23 Comm: ksoftirqd/1 Tainted: G W 6.12.0-rc5-syzkaller-00299-g11066801dd4b #0 [ 398.920434][ C1] Tainted: [W]=WARN [ 398.924249][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 398.934348][ C1] ================================================================== [ 403.770505][ C1] net_ratelimit: 19368 callbacks suppressed [ 403.770534][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 403.789130][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 403.801461][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 403.814655][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 403.828413][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 403.841342][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 403.855127][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:1e:09:d5:08:de, vlan:0) [ 403.868110][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 403.881330][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 403.894319][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)