last executing test programs: 3m31.011497737s ago: executing program 1 (id=347): openat(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mali0', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mali0', 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mali0', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mali0', 0x800, 0x0) 3m31.001871297s ago: executing program 1 (id=348): openat(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nvme-fabrics', 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nvme-fabrics', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nvme-fabrics', 0x800, 0x0) 3m30.935980007s ago: executing program 1 (id=349): socket$rxrpc(0x21, 0x2, 0x0) 3m30.935886727s ago: executing program 1 (id=350): sched_getscheduler(0x0) 3m30.935845807s ago: executing program 1 (id=351): getpgrp(0x0) 3m30.920305727s ago: executing program 1 (id=353): mmap(&(0x7efffffff000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x1000000)=nil, 0x1000000, 0x7, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0001000000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 53.011512223s ago: executing program 2 (id=10303): r0 = syz_io_uring_setup(0x1369, &(0x7f00000007c0)={0x0, 0xa189, 0x0, 0x0, 0x356}, &(0x7f0000000840), &(0x7f0000000880)) io_uring_enter(r0, 0x3880, 0xfc56, 0x30, 0x0, 0x0) 52.931574443s ago: executing program 2 (id=10309): r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000000)=0x11) 52.832975022s ago: executing program 2 (id=10312): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000005c0)={0x60, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0xd3}, @IPSET_ATTR_TIMEOUT={0x8}]}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}]}, 0x60}, 0x1, 0x0, 0x0, 0x2002c0c4}, 0x0) 52.771843362s ago: executing program 2 (id=10317): symlink(&(0x7f0000000480)='.\x00', &(0x7f0000000040)='./file0\x00') openat2$dir(0xffffffffffffff9c, &(0x7f0000000400)='./file0/file0/..\x00', &(0x7f0000000080)={0x0, 0x0, 0xb}, 0x18) 52.707777722s ago: executing program 2 (id=10321): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xc, 0x0, 0x0) 52.631885212s ago: executing program 2 (id=10325): unshare(0x0) move_pages(0x0, 0x20000000000001ab, &(0x7f0000000000), 0x0, &(0x7f0000000000)=[0x0], 0x0) 52.443870891s ago: executing program 5 (id=10335): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x1b, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ff00000}]}) 51.533722549s ago: executing program 3 (id=10359): r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) capget(&(0x7f0000000000)={0x19980330, r0}, &(0x7f00000000c0)={0xda, 0x8, 0x3, 0x6, 0x1, 0xfffeffff}) 51.509527228s ago: executing program 4 (id=10360): r0 = socket(0x1, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f00000004c0)={'gre0\x00', &(0x7f0000000380)={'ip_vti0\x00', 0x0, 0x7800, 0x40, 0xf1, 0x7ff, {{0x5, 0x4, 0x3, 0x38, 0x14, 0x67, 0x0, 0x8, 0x4, 0x0, @loopback, @dev={0xac, 0x14, 0x14, 0x2c}}}}}) 50.566594176s ago: executing program 3 (id=10361): iopl(0x3) futex(&(0x7f0000000140), 0xa, 0x0, 0x0, 0x0, 0x7ffffffc) 47.952027118s ago: executing program 4 (id=10363): r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x281c2, 0x0) fcntl$setlease(r0, 0x400, 0x0) 45.603063002s ago: executing program 4 (id=10364): r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000400)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) write$selinux_attr(r0, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x1d) 44.597955919s ago: executing program 5 (id=10365): r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) copy_file_range(r0, 0x0, r0, 0x0, 0x0, 0x0) 43.481816285s ago: executing program 3 (id=10366): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x51) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000400)={0x8, 0x20000002, 0x9, 0xfffffffa}) 41.988474221s ago: executing program 4 (id=10368): mprotect(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0) mount_setattr(0xffffffffffffff9c, 0x0, 0x8100, &(0x7f0000001dc0)={0xf, 0x84, 0x20000}, 0x20) 40.780859568s ago: executing program 3 (id=10369): ioperm(0x80, 0x4, 0x4) setfsuid(0xffffffffffffffff) 39.582385554s ago: executing program 5 (id=10370): r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x14, 0x16, 0x1, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) 33.168292506s ago: executing program 32 (id=10325): unshare(0x0) move_pages(0x0, 0x20000000000001ab, &(0x7f0000000000), 0x0, &(0x7f0000000000)=[0x0], 0x0) 30.921983529s ago: executing program 3 (id=10373): r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x8, 0x3, 0x1e8, 0xa0, 0x11, 0x148, 0xa0, 0x0, 0x150, 0x2a8, 0x2a8, 0x150, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x70, 0xa0}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x0, 0x4}, {0xffffffffffffffff}}}}, {{@uncond, 0x0, 0x70, 0xb0}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x1, 0x1, "be92f87777596354668949a64ff46175eb6b1ba98fd7d954180ca0208614"}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x248) 30.614808898s ago: executing program 4 (id=10374): perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x40, 0x0, @perf_config_ext={0xb10, 0x2}, 0x8, 0x2, 0x7, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timerfd_settime(0xffffffffffffffff, 0x6, &(0x7f0000000440)={{0x0, 0x989680}}, 0x0) 30.024497727s ago: executing program 0 (id=10375): r0 = socket(0x2, 0x80805, 0x0) sendmsg$sock(r0, &(0x7f0000000380)={&(0x7f0000000a80)=@l2tp6={0xa, 0x0, 0x40, @loopback, 0x6, 0x2}, 0x80, &(0x7f0000001e40)=[{&(0x7f0000000b00)="9c60ddac", 0x4}], 0x1}, 0x20000800) 28.976341354s ago: executing program 5 (id=10376): r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000d00)='/sys/power/mem_sleep', 0x122102, 0x0) sendfile(r0, r0, 0x0, 0x6) 27.67209682s ago: executing program 4 (id=10377): unshare(0x20040600) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000001c0)={@map, 0xffffffffffffffff, 0x7, 0x0, 0x0, @void, @value}, 0x10) 25.204403353s ago: executing program 5 (id=10378): r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r0, &(0x7f0000001c80)=[{&(0x7f0000001bc0)=""/156, 0x9c}], 0x1, &(0x7f0000001d80)=[{&(0x7f0000001cc0)=""/116, 0x20001c34}], 0x1, 0x0) 23.785783119s ago: executing program 3 (id=10379): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000500)=""/29) 22.614678085s ago: executing program 0 (id=10380): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ppoll(&(0x7f0000000180)=[{r0}], 0x1, 0x0, 0x0, 0x0) 19.622982977s ago: executing program 0 (id=10381): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x13, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000020200008500000070000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0xfca804a0, 0xe, 0x0, &(0x7f0000000a80)="b8000005000000000152912e5763", 0x0, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 6.216120988s ago: executing program 0 (id=10382): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB='mpol=interleave:7-N:0/D']) 4.525072373s ago: executing program 5 (id=10383): r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000180)={'wg1\x00', &(0x7f0000000000)=@ethtool_dump={0x3e, 0x7fff, 0x7}}) 2.493297918s ago: executing program 0 (id=10384): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ioctl$sock_proto_private(r0, 0x89ec, &(0x7f0000000240)='~:') 0s ago: executing program 0 (id=10385): socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a3, &(0x7f0000000cc0)='lo:\x96o8\x14d\xa1\xba\xda\xd1\xa0J\x12tQ\xb16\xe3\xd7\\b\x8b\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf\xc8>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x02\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xeb\xe1\xde\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xfc\xfa 6(%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc5 0xffff: 150994944 pid=3770 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_dis Jan 1 00:03:04 syzkaller kern.notice kernel: [ 185.889759][ T29] audit: type=1400 audit(184.800:2254): avc: denied { read } for pid=24030 comm="syz.4.10037" dev="nsfs" ino=4026532978 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permis Jan 1 00:03:05 syzkaller kern.notice kernel: [ 185.918283][ T29] audit: type=1400 audit(184.903:2255): avc: denied { create } for pid=24034 comm="syz.2.10039" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=0 Jan 1 00:03:05 syzkaller kern.notice kernel: [ 185.938412][ T29] audit: type=1400 audit(184.903:2256): avc: denied { read write } for pid=3771 comm="syz-executor" name="loop5" dev="devtmpfs" ino=105 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_dis Jan 1 00:03:05 syzkaller kern.info kernel: [ 185.984682][T24038] bridge0: port 3(veth0_to_bridge) entered blocking state Jan 1 00:03:05 syzkaller kern.info kernel: [ 185.992657][T24038] bridge0: port 3(veth0_to_bridge) entered disabled state Jan 1 00:03:05 syzkaller kern.info kernel: [ 186.008507][T24038] veth0_to_bridge: entered allmulticast mode Jan 1 00:03:05 syzkaller kern.info kernel: [ 186.016020][T24038] veth0_to_bridge: entered promiscuous mode Jan 1 00:03:05 syzkaller kern.warn kernel: [ 186.022913][T24038] bridge0: adding interface veth0_to_bridge with same address as a received packet (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:05 syzkaller kern.info kernel: [ 186.044966][T24038] bridge0: port 3(veth0_to_bridge) entered blocking state Jan 1 00:03:05 syzkaller kern.info kernel: [ 186.053247][T24038] bridge0: port 3(veth0_to_bridge) entered forwarding state Jan 1 00:03:05 syzkaller kern.info kernel: [ 186.143129][T24043] xt_l2tp: v2 tid > 0xffff: 150994944 [ 186.397215][T24084] xt_hashlimit: max too large, truncated to 1048576 Jan 1 00:03:05 syzkaller kern.info kernel: [ 186.397215][T24084] xt_hashlimit: max too large, truncated to 1048576 [ 186.571532][T24107] xt_hashlimit: max too large, truncated to 1048576 [ 186.580313][T24107] xt_limit: Overflow, try lower: 0/0 Jan 1 00:03:05 syzkaller kern.info kernel: [ 186.571532][T24107] xt_hashlimit: max too large, truncated to 1048576 Jan 1 00:03:05 syzkaller kern.info kernel: [ 186.580313][T24107] xt_limit: Overflow, try lower: 0/0 [ 187.204951][T24193] IPVS: sync thread started: state = BACKUP, mcast_ifn = hsr0, syncid = 0, id = 0 Jan 1 00:03:06 syzkaller kern.info kernel: [ 187.204951][T24193] IPVS: sync thread started: state = BACKUP, mcast_ifn = hsr0, syncid = 0, id = 0 [ 187.504373][T24230] netlink: 12 bytes leftover after parsing attributes in process `syz.0.10136'. Jan 1 00:03:06 syzkaller kern.warn kernel: [ 187.504373][T24230] netlink: 12 bytes leftover after parsing attributes in process `syz.0.10136'. [ 187.610821][T24243] xt_TCPMSS: Only works on TCP SYN packets Jan 1 00:03:06 syzkaller kern.info kernel: [ 187.610821][T24243] xt_TCPMSS: Only works on TCP SYN packets [ 187.804269][T24269] xt_CT: You must specify a L4 protocol and not use inversions on it Jan 1 00:03:06 syzkaller kern.info kernel: [ 187.804269][T24269] xt_CT: You must specify a L4 protocol and not use inversions on it [ 189.050351][ C0] net_ratelimit: 41083 callbacks suppressed [ 189.050377][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 189.068412][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 189.080581][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 189.080747][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 189.080902][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 189.081049][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 189.081213][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 189.081352][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 189.081507][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 189.081632][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:07 syzkaller kern.warn kernel: [ 189.050351][ C0] net_ratelimit: 41083 callbacks suppressed Jan 1 00:03:07 syzkaller kern.warn kernel: [ 189.050377][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:07 syzkaller kern.warn kernel: [ 189.068412][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:07 syzkaller kern.warn kernel: [ 189.080581][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:07 syzkaller kern.warn kernel: [ 189.080747][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:07 syzkaller kern.warn kernel: [ 189.080902][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:07 syzkaller kern.warn kernel: [ 189.081049][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:07 syzkaller kern.warn kernel: [ 189.081213][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:07 syzkaller kern.warn kernel: [ 189.081352][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:07 syzkaller kern.warn kernel: [ 189.081507][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:07 syzkaller kern.warn kernel: [ 189.081632][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 190.082873][T24541] netdevsim netdevsim5 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 Jan 1 00:03:08 syzkaller kern.info kernel: [ 190.082873][T24541] netdevsim netdevsim5 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 190.910190][T24639] x_tables: unsorted entry at hook 2 Jan 1 00:03:09 syzkaller kern.err kernel: [ 190.910190][T24639] x_tables: unsorted entry at hook 2 [ 191.042767][ T29] kauditd_printk_skb: 906 callbacks suppressed [ 191.042781][ T29] audit: type=1326 audit(189.758:3163): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24647 comm="syz.0.10343" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa73febd169 code=0x7ffc0000 Jan 1 00:03:09 syzkaller kern.warn kernel: [ 191.042767][ T29] kauditd_printk_skb: 906 callbacks suppressed Jan 1 00:03:09 syzkaller kern.notice kernel: [ 191.042781][ T29] audit: type=1326 audit(189.758:3163): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24647 comm="syz.0.10343" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 i [ 191.148332][ T3779] audit: audit_backlog=65 > audit_backlog_limit=64 [ 191.154949][ T3779] audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 [ 191.162704][ T3779] audit: backlog limit exceeded [ 191.168500][ T2982] audit: audit_backlog=65 > audit_backlog_limit=64 [ 191.175027][ T2982] audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 [ 191.182834][ T2982] audit: backlog limit exceeded [ 191.200748][ T29] audit: type=1326 audit(189.786:3164): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24647 comm="syz.0.10343" exe="/root/syz-executor" sig=0 arch=c000003e syscall=279 compat=0 ip=0x7fa73febd169 code=0x7ffc0000 [ 191.223782][ T29] audit: type=1326 audit(189.786:3165): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24647 comm="syz.0.10343" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa73febd169 code=0x7ffc0000 [ 191.246834][ T29] audit: type=1326 audit(189.786:3166): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24647 comm="syz.0.10343" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa73febd169 code=0x7ffc0000 Jan 1 00:03:09 syzkaller kern.warn kernel: [ 191.148332][ T3779] audit: audit_backlog=65 > audit_backlog_limit=64 Jan 1 00:03:09 syzkaller kern.warn kernel: [ 191.154949][ T3779] audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Jan 1 00:03:09 syzkaller kern.err kernel: [ 191.162704][ T3779] audit: backlog limit exceeded Jan 1 00:03:09 syzkaller kern.warn kernel: [ 191.168500][ T2982] audit: audit_backlog=65 > audit_backlog_limit=64 Jan 1 00:03:09 syzkaller kern.warn kernel: [ 191.175027][ T2982] audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 Jan 1 00:03:09 syzkaller kern.err kernel: [ 191.182834][ T2982] audit: backlog limit exceeded Jan 1 00:03:09 syzkaller kern.notice kernel: [ 191.200748][ T29] audit: type=1326 audit(189.786:3164): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24647 comm="syz.0.10343" exe="/root/syz-executor" sig=0 arch=c000003e syscall=279 compat=0 i Jan 1 00:03:09 syzkaller kern.notice kernel: [ 191.223782][ T29] audit: type=1326 audit(189.786:3165): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24647 comm="syz.0.10343" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 i Jan 1 00:03:09 syzkaller kern.notice kernel: [ 191.246834][ T29] audit: type=1326 audit(189.786:3166): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24647 comm="syz.0.10343" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 i [ 194.406568][ C0] net_ratelimit: 14678 callbacks suppressed [ 194.406583][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 194.424953][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 194.437356][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 194.449684][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 194.462083][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 194.474420][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 194.486730][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 194.499089][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 194.511452][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 194.524099][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:13 syzkaller kern.warn kernel: [ 194.406568][ C0] net_ratelimit: 14678 callbacks suppressed Jan 1 00:03:13 syzkaller kern.warn kernel: [ 194.406583][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:13 syzkaller kern.warn kernel: [ 194.424953][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:13 syzkaller kern.warn kernel: [ 194.437356][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:13 syzkaller kern.warn kernel: [ 194.449684][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:13 syzkaller kern.warn kernel: [ 194.462083][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:13 syzkaller kern.warn kernel: [ 194.474420][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:13 syzkaller kern.warn kernel: [ 194.486730][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:13 syzkaller kern.warn kernel: [ 194.499089][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:13 syzkaller kern.warn kernel: [ 194.511452][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:13 syzkaller kern.warn kernel: [ 194.524099][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 197.011988][ T29] kauditd_printk_skb: 1024 callbacks suppressed [ 197.012003][ T29] audit: type=1400 audit(195.324:4146): avc: denied { read write } for pid=3767 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Jan 1 00:03:15 syzkaller kern.warn kernel: [ 197.011988][ T29] kauditd_printk_skb: 1024 callbacks suppressed Jan 1 00:03:15 syzkaller kern.notice kernel: [ 197.012003][ T29] audit: type=1400 audit(195.324:4146): avc: denied { read write } for pid=3767 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_dis [ 197.572139][ T29] audit: type=1400 audit(195.370:4147): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 197.597731][ T29] audit: type=1400 audit(195.370:4148): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 197.623430][ T29] audit: type=1400 audit(195.464:4149): avc: denied { read write } for pid=3771 comm="syz-executor" name="loop5" dev="devtmpfs" ino=105 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Jan 1 00:03:15 syzkaller kern.notice kernel: [ 197.572139][ T29] audit: type=1400 audit(195.370:4147): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_fil Jan 1 00:03:15 syzkaller kern.notice kernel: [ 197.597731][ T29] audit: type=1400 audit(195.370:4148): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_fil Jan 1 00:03:15 syzkaller kern.notice kernel: [ 197.623430][ T29] audit: type=1400 audit(195.464:4149): avc: denied { read write } for pid=3771 comm="syz-executor" name="loop5" dev="devtmpfs" ino=105 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_dis [ 198.722249][ T29] audit: type=1400 audit(195.960:4150): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 198.748040][ T29] audit: type=1400 audit(195.960:4151): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 198.773696][ T29] audit: type=1400 audit(195.960:4152): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 198.799415][ T29] audit: type=1400 audit(196.736:4153): avc: denied { create } for pid=24693 comm="syz.0.10362" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=0 [ 198.822541][ T29] audit: type=1400 audit(196.839:4154): avc: denied { read write } for pid=3764 comm="syz-executor" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Jan 1 00:03:17 syzkaller kern.notice kernel: [ 198.722249][ T29] audit: type=1400 audit(195.960:4150): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_fil Jan 1 00:03:17 syzkaller kern.notice kernel: [ 198.748040][ T29] audit: type=1400 audit(195.960:4151): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_fil Jan 1 00:03:17 syzkaller kern.notice kernel: [ 198.773696][ T29] audit: type=1400 audit(195.960:4152): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_fil Jan 1 00:03:17 syzkaller kern.notice kernel: [ 198.799415][ T29] audit: type=1400 audit(196.736:4153): avc: denied { create } for pid=24693 comm="syz.0.10362" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=0 Jan 1 00:03:17 syzkaller kern.notice kernel: [ 198.822541][ T29] audit: type=1400 audit(196.839:4154): avc: denied { read write } for pid=3764 comm="syz-executor" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_dis [ 199.762561][ C0] net_ratelimit: 12047 callbacks suppressed [ 199.762578][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 199.765626][ T29] audit: type=1400 audit(197.185:4155): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 199.768928][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 199.814122][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 199.826741][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 199.839066][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 199.851437][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 199.863773][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 199.876119][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 199.888502][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 199.900919][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:17 syzkaller kern.warn kernel: [ 199.762561][ C0] net_ratelimit: 12047 callbacks suppressed Jan 1 00:03:17 syzkaller kern.warn kernel: [ 199.762578][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:17 syzkaller kern.notice kernel: [ 199.765626][ T29] audit: type=1400 audit(197.185:4155): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_fil Jan 1 00:03:18 syzkaller kern.warn kernel: [ 199.768928][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:18 syzkaller kern.warn kernel: [ 199.814122][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:18 syzkaller kern.warn kernel: [ 199.826741][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:18 syzkaller kern.warn kernel: [ 199.839066][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:18 syzkaller kern.warn kernel: [ 199.851437][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:18 syzkaller kern.warn kernel: [ 199.863773][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:18 syzkaller kern.warn kernel: [ 199.876119][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:18 syzkaller kern.warn kernel: [ 199.888502][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:18 syzkaller kern.warn kernel: [ 199.900919][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 203.250584][ T29] kauditd_printk_skb: 18 callbacks suppressed [ 203.250600][ T29] audit: type=1400 audit(201.160:4174): avc: denied { read write } for pid=3771 comm="syz-executor" name="loop5" dev="devtmpfs" ino=105 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Jan 1 00:03:21 syzkaller kern.warn kernel: [ 203.250584][ T29] kauditd_printk_skb: 18 callbacks suppressed[ 204.114593][ T29] audit: type=1400 audit(201.974:4175): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:03:21 syzkaller kern.notice kernel: [ 203.250600][ T29] audit: type=1400 audit(201.160:4174): avc: denied { read write } for pid=3771 comm="syz-executor" name="loop5" dev="devtmpfs" ino=105 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_dis Jan 1 00:03:22 syzkaller kern.notice kernel: [ 204.114593][ T29] audit: type=1400 audit(201.974:4175): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_fil[ 204.351307][ T29] audit: type=1400 audit(202.077:4176): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 204.375679][ T29] audit: type=1400 audit(202.124:4177): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:03:22 syzkaller kern.notice kernel: [ 204.351307][ T29] audit: type=1400 audit(202.077:4176): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_fil Jan 1 00:03:22 syzkaller kern.notice kernel: [ 204.375679][ T29] audit: type=1400 audit(202.124:4177): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_fil [ 204.806302][ T29] audit: type=1400 audit(202.264:4178): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 204.830587][ T29] audit: type=1400 audit(202.367:4179): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:03:22 syzkaller kern.notice kernel: [ 204.806302][ T29] audit: type=1400 audit(202.264:4178): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_fil [ 205.118343][ C0] net_ratelimit: 13049 callbacks suppressed [ 205.118360][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 205.136654][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 205.149047][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 205.161446][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 205.161877][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 205.162316][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 205.162714][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 205.163170][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 205.163587][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 205.164107][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 205.365786][ T29] audit: type=1400 audit(202.741:4180): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 205.390077][ T29] audit: type=1400 audit(202.947:4181): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 205.930990][ T29] audit: type=1400 audit(203.405:4182): avc: denied { read write } for pid=3764 comm="syz-executor" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 205.957446][ T29] audit: type=1400 audit(203.602:4183): avc: denied { read write } for pid=3779 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Jan 1 00:03:22 syzkaller kern.notice kernel: [ 204.830587][ T29] audit: type=1400 audit(202.367:4179): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_fil Jan 1 00:03:22 syzkaller kern.warn kernel: [ 205.118343][ C0] net_ratelimit: 13049 callbacks suppressed Jan 1 00:03:22 syzkaller kern.warn kernel: [ 205.118360][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:22 syzkaller kern.warn kernel: [ 205.136654][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:22 syzkaller kern.warn kernel: [ 205.149047][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:22 syzkaller kern.warn kernel: [ 205.161446][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:22 syzkaller kern.warn kernel: [ 205.161877][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:22 syzkaller kern.warn kernel: [ 205.162316][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:22 syzkaller kern.warn kernel: [ 205.162714][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:22 syzkaller kern.warn kernel: [ 205.163170][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:22 syzkaller kern.warn kernel: [ 205.163587][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:23 syzkaller kern.warn kernel: [ 205.164107][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:23 syzkaller daemon.err dhcpcd[24708]: ps_bpf_start_bpf: bpf_open: Invalid argument Jan 1 00:03:25 syzkaller daemon.err dhcpcd[24708]: ps_root_recvmsg: Invalid argument Jan 1 00:03:23 syzkaller kern.notice kernel: [ 205.365786][ T29] audit: type=1400 audit(202.741:4180): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_fil Jan 1 00:03:25 syzkaller kern.notice kernel: [ 205.390077][ T29] audit: type=1400 audit(202.947:4181): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_fil Jan 1 00:03:25 syzkaller kern.notice kernel: [ 205.930990][ T29] audit: type=1400 audit(203.405:4182): avc: denied { read write } for pid=3764 comm="syz-executor" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_dis Jan 1 00:03:25 syzkaller kern.notice kernel: [ 205.957446][ T29] audit: type=1400 audit(203.602:4183): avc: denied { read write } for pid=3779 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_dis Jan 1 00:03:24 syzkaller daemon.err dhcpcd[24709]: ps_bpf_start_bpf: bpf_open: Invalid argument Jan 1 00:03:25 syzkaller daemon.err dhcpcd[24709]: ps_root_recvmsg: Invalid argument Jan 1 00:03:27 [ 209.815639][ T29] kauditd_printk_skb: 20 callbacks suppressed syzkaller daemon.err dhcpcd[24700]: ps_bpf_start_bpf: bpf_open: [ 209.815653][ T29] audit: type=1400 audit(207.315:4204): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Invalid argument Jan 1 00:03:27 syzkaller daemon.err dhcpcd[24700]: ps_root_recvmsg: Invalid argument [ 209.854061][ T29] audit: type=1400 audit(207.315:4205): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:03:27 syzkaller kern.warn kernel: [ 209.815639][ T29] kauditd_printk_skb: 20 callbacks suppressed Jan 1 00:03:27 syzkaller kern.notice kernel: [ 209.815653][ T29] audit: type=1400 audit(207.315:4204): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_fil Jan 1 00:03:27 syzkaller kern.notice kernel: [ 209.854061][ T29] audit: type=1400 audit(207.315:4205): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_fil [ 210.474554][ C0] net_ratelimit: 12587 callbacks suppressed [ 210.474570][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 210.492877][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 210.505216][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 210.517534][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 210.529882][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 210.542269][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 210.554662][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 210.567017][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 210.579319][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 210.592054][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:28 syzkaller kern.warn kernel: [ 210.474554][ C0] net_ratelimit: 12587 callbacks suppressed Jan 1 00:03:28 syzkaller kern.warn kernel: [ 210.474570][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:28 syzkaller kern.warn kernel: [ 210.492877][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:28 syzkaller kern.warn kernel: [ 210.505216][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:28 syzkaller kern.warn kernel: [ 210.517534][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:28 syzkaller kern.warn kernel: [ 210.529882][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:28 syzkaller kern.warn kernel: [ 210.542269][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:28 syzkaller kern.warn kernel: [ 210.554662][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:28 syzkaller kern.warn kernel: [ 210.567017][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:28 syzkaller kern.warn kernel: [ 210.579319][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:28 syzkaller kern.warn kernel: [ 210.592054][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 210.959220][ T29] audit: type=1400 audit(207.409:4206): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 210.984919][ T29] audit: type=1400 audit(207.409:4207): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 211.010484][ T29] audit: type=1400 audit(207.409:4208): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 211.036374][ T29] audit: type=1400 audit(208.110:4209): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 211.062101][ T29] audit: type=1400 audit(208.110:4210): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 211.087771][ T29] audit: type=1400 audit(208.110:4211): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 211.113523][ T29] audit: type=1400 audit(208.110:4212): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 211.139179][ T29] audit: type=1400 audit(208.110:4213): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:03:28 syzkaller kern.notice kernel: [ 210.959220][ T29] audit: type=1400 audit(207.409:4206): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_fil Jan 1 00:03:28 syzkaller kern.notice kernel: [ 210.984919][ T29] audit: type=1400 audit(207.409:4207): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_fil Jan 1 00:03:28 syzkaller kern.notice kernel: [ 211.010484][ T29] audit: type=1400 audit(207.409:4208): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_fil Jan 1 00:03:28 syzkaller kern.notice kernel: [ 211.036374][ T29] audit: type=1400 audit(208.110:4209): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_fil Jan 1 00:03:28 syzkaller kern.notice kernel: [ 211.062101][ T29] audit: type=1400 audit(208.110:4210): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_fil Jan 1 00:03:28 syzkaller kern.notice kernel: [ 211.087771][ T29] audit: type=1400 audit(208.110:4211): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_fil Jan 1 00:03:28 syzkaller kern.notice kernel: [ 211.113523][ T29] audit: type=1400 audit(208.110:4212): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_fil Jan 1 00:03:28 syzkaller kern.notice kernel: [ 211.139179][ T29] audit: type=1400 audit(208.110:4213): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_fil [ 215.559259][ T29] kauditd_printk_skb: 21 callbacks suppressed [ 215.559318][ T29] audit: type=1400 audit(212.675:4235): avc: denied { read write } for pid=3767 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Jan 1 00:03:32 syzkaller kern.warn kernel: [ 215.559259][ T29] kauditd_printk_skb: 21 callbacks suppressed Jan 1 00:03:32 syzkaller kern.notice kernel: [ 215.559318][ T29] audit: type=1400 audit(212.675:4235): avc: denied { read write } for pid=3767 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_dis [ 215.830561][ C0] net_ratelimit: 11503 callbacks suppressed [ 215.830604][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 215.848848][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 215.861194][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 215.873574][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:32 [ 215.887219][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) syzkaller kern.w[ 215.899920][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) arn kernel: [ 2[ 215.913159][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) 15.830561][ C[ 215.926447][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) 0] net_ratelimit[ 215.939684][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) : 11503 callback[ 215.952898][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) s suppressed Jan 1 00:03:32 syzkaller kern.warn kernel: [ 215.830604][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:32 syzkaller kern.warn kernel: [ 215.848848][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:32 syzkaller kern.warn kernel: [ 215.861194][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:32 syzkaller kern.warn kernel: [ 215.873574][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:33 syzkaller kern.warn kernel: [ 215.887219][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:33 syzkaller kern.warn kernel: [ 215.899920][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:33 syzkaller kern.warn kernel: [ 215.913159][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:33 syzkaller kern.warn kernel: [ 215.926447][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:33 syzkaller kern.warn kernel: [ 215.939684][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:33 syzkaller kern.warn kernel: [ 215.952898][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 216.900221][ T29] audit: type=1400 audit(212.722:4236): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 216.925996][ T29] audit: type=1400 audit(212.722:4237): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 216.951618][ T29] audit: type=1400 audit(212.993:4238): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 216.977363][ T29] audit: type=1400 audit(212.993:4239): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 217.003009][ T29] audit: type=1400 audit(212.993:4240): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 217.028631][ T29] audit: type=1400 audit(212.993:4241): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 217.054453][ T29] audit: type=1400 audit(212.993:4242): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 217.080091][ T29] audit: type=1400 audit(213.124:4243): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 217.105839][ T29] audit: type=1400 audit(213.124:4244): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:03:34 syzkaller kern.notice kernel: [ 216.900221][ T29] audit: type=1400 audit(212.722:4236): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_fil Jan 1 00:03:34 syzkaller kern.notice kernel: [ 216.925996][ T29] audit: type=1400 audit(212.722:4237): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_fil Jan 1 00:03:34 syzkaller kern.notice kernel: [ 216.951618][ T29] audit: type=1400 audit(212.993:4238): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_fil Jan 1 00:03:34 syzkaller kern.notice kernel: [ 216.977363][ T29] audit: type=1400 audit(212.993:4239): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_fil Jan 1 00:03:34 syzkaller kern.notice kernel: [ 217.003009][ T29] audit: type=1400 audit(212.993:4240): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_fil Jan 1 00:03:34 syzkaller kern.notice kernel: [ 217.028631][ T29] audit: type=1400 audit(212.993:4241): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_fil Jan 1 00:03:34 syzkaller kern.notice kernel: [ 217.054453][ T29] audit: type=1400 audit(212.993:4242): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_fil Jan 1 00:03:34 syzkaller kern.notice kernel: [ 217.080091][ T29] audit: type=1400 audit(213.124:4243): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_fil Jan 1 00:03:34 syzkaller kern.notice kernel: [ 217.105839][ T29] audit: type=1400 audit(213.124:4244): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_fil [ 221.186536][ C0] net_ratelimit: 12160 callbacks suppressed [ 221.186553][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 221.204807][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 221.217149][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 221.229481][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:38 [ 221.243267][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) syzkaller kern.w[ 221.255850][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) arn kernel: [ 2[ 221.269079][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) 21.186536][ C[ 221.282359][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) 0] net_ratelimit[ 221.295672][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) : 12160 callback[ 221.309085][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) s suppressed Jan 1 00:03:38 syzkaller kern.warn kernel: [ 221.186553][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:38 syzkaller kern.warn kernel: [ 221.204807][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:38 syzkaller kern.warn kernel: [ 221.217149][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vl[ 221.367793][ T29] kauditd_printk_skb: 22 callbacks suppressed an:0) Jan 1 00:03:38 syzkaller kern.warn kernel: [ 221.229481[ 221.367810][ T29] audit: type=1400 audit(218.007:4267): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ][ C0] bridge0: received packet on bridge_slave_0 with own ad[ 221.406350][ T29] audit: type=1400 audit(218.007:4268): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 dress as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 221.433198][ T29] audit: type=1400 audit(218.007:4269): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 221.459689][ T29] audit: type=1400 audit(218.007:4270): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 221.485543][ T29] audit: type=1400 audit(218.007:4271): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:03:38 syzkaller kern.warn kernel: [ 221.243267][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:38 syzkaller kern.warn kernel: [ 221.255850][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:38 syzkaller kern.warn kernel: [ 221.269079][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:38 syzkaller kern.warn kernel: [ 221.282359][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:38 syzkaller kern.warn kernel: [ 221.295672][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:38 syzkaller kern.warn kernel: [ 221.309085][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:38 syzkaller kern.warn kernel: [ 221.367793][ T29] kauditd_printk_skb: 22 callbacks suppressed Jan 1 00:03:38 syzkaller kern.notice kernel: [ 221.367810][ T29] audit: type=1400 audit(218.007:4267): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_fil Jan 1 00:03:38 syzkaller kern.notice kernel: [ 221.406350][ T29] audit: type=1400 audit(218.007:4268): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_fil Jan 1 00:03:38 syzkaller kern.notice kernel: [ 221.433198][ T29] audit: type=1400 audit(218.007:4269): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_fil Jan 1 00:03:38 syzkaller kern.notice kernel: [ 221.459689][ T29] audit: type=1400 audit(218.007:4270): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_fil Jan 1 00:03:38 syzkaller kern.notice kernel: [ 221.485543][ T29] audit: type=1400 audit(218.007:4271): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_fil [ 223.476939][ T29] audit: type=1400 audit(218.260:4272): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 223.502736][ T29] audit: type=1400 audit(218.260:4273): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 223.528338][ T29] audit: type=1400 audit(218.260:4274): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 223.553939][ T29] audit: type=1400 audit(218.260:4275): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 223.579652][ T29] audit: type=1400 audit(218.260:4276): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:03:40 syzkaller kern.notice kernel: [ 223.476939][ T29] audit: type=1400 audit(218.260:4272): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_fil Jan 1 00:03:40 syzkaller kern.notice kernel: [ 223.502736][ T29] audit: type=1400 audit(218.260:4273): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_fil Jan 1 00:03:40 syzkaller kern.notice kernel: [ 223.528338][ T29] audit: type=1400 audit(218.260:4274): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_fil Jan 1 00:03:40 syzkaller kern.notice kernel: [ 223.553939][ T29] audit: type=1400 audit(218.260:4275): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_fil Jan 1 00:03:40 syzkaller kern.notice kernel: [ 223.579652][ T29] audit: type=1400 audit(218.260:4276): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_fil [ 226.542389][ C0] net_ratelimit: 12267 callbacks suppressed [ 226.542425][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 226.560669][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 226.573006][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 226.585398][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 226.597784][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 226.610135][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 226.622487][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 226.634793][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 226.647127][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 226.659459][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 227.743551][ T29] kauditd_printk_skb: 16 callbacks suppressed [ 227.743568][ T29] audit: type=1400 audit(223.891:4293): avc: denied { prog_load } for pid=24740 comm="syz.0.10381" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 228.201148][ T29] audit: type=1400 audit(224.340:4294): avc: denied { execmem } for pid=24742 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 Jan 1 00:03:43 syzkaller kern.warn kernel: [ 226.542389][ C0] net_ratelimit: 12267 callbacks suppressed Jan 1 00:03:43 syzkaller kern.warn kernel: [ 226.542425][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:43 syzkaller kern.warn kernel: [ 226.560669][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:43 syzkaller kern.warn kernel: [ 226.573006][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:43 syzkaller kern.warn kernel: [ 226.585398][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b,[ 228.851634][ T29] audit: type=1400 audit(225.051:4295): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 vlan:0) Jan 1 00:03:43 syzkaller kern.warn kernel: [ 226.597[ 228.877361][ T29] audit: type=1400 audit(225.051:4296): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 784][ C0] bridge0: received packet on bridge_slave_0 with own[ 228.904337][ T29] audit: type=1400 audit(225.051:4297): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan[ 228.931294][ T29] audit: type=1400 audit(225.051:4298): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 1 00:03:43 syzkaller kern.warn kernel: [ 226.610135][ C0] bridge0: received packet on bridge_slave_0 with [ 228.962241][ T29] audit: type=1400 audit(225.051:4299): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 228.989121][ T29] audit: type=1400 audit(225.051:4300): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:03:43 syzkaller kern.warn kernel: [ 226.622487][ C[ 229.015916][ T29] audit: type=1400 audit(225.051:4301): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 0] bridge0: received packet on bridge_slave_0 with own address a[ 229.042886][ T29] audit: type=1400 audit(225.051:4302): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 s source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:43 syzkaller kern.warn kernel: [ 226.634793][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:43 syzkaller kern.warn kernel: [ 226.647127][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:43 syzkaller kern.warn kernel: [ 226.659459][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:44 syzkaller kern.warn kernel: [ 227.743551][ T29] kauditd_printk_skb: 16 callbacks suppressed Jan 1 00:03:45 syzkaller kern.notice kernel: [ 227.743568][ T29] audit: type=1400 audit(223.891:4293): avc: denied { prog_load } for pid=24740 comm="syz.0.10381" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Jan 1 00:03:45 syzkaller kern.notice kernel: [ 228.201148][ T29] audit: type=1400 audit(224.340:4294): avc: denied { execmem } for pid=24742 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 Jan 1 00:03:45 syzkaller kern.notice kernel: [ 228.851634][ T29] audit: type=1400 audit(225.051:4295): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_fil Jan 1 00:03:45 syzkaller kern.notice kernel: [ 228.877361][ T29] audit: type=1400 audit(225.051:4296): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_fil Jan 1 00:03:45 syzkaller kern.notice kernel: [ 228.904337][ T29] audit: type=1400 audit(225.051:4297): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_fil Jan 1 00:03:45 syzkaller kern.notice kernel: [ 228.931294][ T29] audit: type=1400 audit(225.051:4298): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_fil Jan 1 00:03:45 syzkaller kern.notice kernel: [ 228.962241][ T29] audit: type=1400 audit(225.051:4299): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_fil Jan 1 00:03:45 syzkaller kern.notice kernel: [ 228.989121][ T29] audit: type=1400 audit(225.051:4300): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_fil Jan 1 00:03:45 syzkaller kern.notice kernel: [ 229.015916][ T29] audit: type=1400 audit(225.051:4301): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_fil Jan 1 00:03:45 syzkaller kern.notice kernel: [ 229.042886][ T29] audit: type=1400 audit(225.051:4302): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_fil [ 231.898602][ C0] net_ratelimit: 12482 callbacks suppressed [ 231.898619][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:47 [ 231.917643][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) syzkaller kern.w[ 231.930739][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) arn kernel: [ 2[ 231.943990][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) 31.898602][ C[ 231.957204][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) 0] net_ratelimit[ 231.970492][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) : 12482 callback[ 231.983778][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) s suppressed Ja[ 231.996983][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) n 1 00:03:47 sy[ 232.010224][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) zkaller kern.war[ 232.023500][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) n kernel: [ 231.898619][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:48 syzkaller kern.warn kernel: [ 231.917643][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:48 syzkaller kern.warn kernel: [ 231.930739][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:48 syzkaller kern.warn kernel: [ 231.943990][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:48 syzkaller kern.warn kernel: [ 231.957204][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:48 syzkaller kern.warn kernel: [ 231.970492][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:48 syzkaller kern.warn kernel: [ 231.983778][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:48 syzkaller kern.warn kernel: [ 231.996983][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:48 syzkaller kern.warn kernel: [ 232.010224][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:48 syzkaller kern.warn kernel: [ 232.023500][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 236.490159][ T29] kauditd_printk_skb: 28 callbacks suppressed [ 236.490174][ T29] audit: type=1400 audit(232.263:4331): avc: denied { execmem } for pid=24746 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 Jan 1 00:03:52 syzkaller kern.warn kernel: [ 236.490159][ T29] kauditd_printk_skb: 28 callbacks suppressed Jan 1 00:03:52 syzkaller kern.notice kernel: [ 236.490174][ T29] audit: type=1400 audit(232.263:4331): avc: denied { execmem } for pid=24746 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 236.783324][ T29] audit: type=1400 audit(232.291:4332): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 236.807594][ T29] audit: type=1400 audit(232.300:4333): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:03:52 syzkaller kern.notice kernel: [ 236.783324][ T29] audit: type=1400 audit(232.291:4332): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_fil Jan 1 00:03:52 syzkaller kern.notice kernel: [ 236.807594][ T29] audit: type=1400 audit(232.300:4333): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_fil [ 237.222663][ T29] audit: type=1400 audit(232.599:4334): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 237.246891][ T29] audit: type=1400 audit(232.693:4335): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 237.254427][ C0] net_ratelimit: 13126 callbacks suppressed [ 237.254441][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 237.286578][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 237.287023][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 237.287436][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 237.287858][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 237.288292][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 237.348010][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 237.360514][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 237.372897][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 237.385254][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:52 syzkaller kern.notice kernel: [ 237.222663][ T29] audit: type=1400 audit(232.599:4334): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_fil Jan 1 00:03:52 syzkaller kern.notice kernel: [ 237.246891][ T29] audit: type=1400 audit(232.693:4335): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_fil Jan 1 00:03:52 syzkaller kern.warn kernel: [ 237.254427][ C0] net_ratelimit: 13126 callbacks suppressed Jan 1 00:03:52 syzkaller kern.warn kernel: [ 237.254441][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:53 syzkaller kern.warn kernel: [ 237.286578][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:53 syzkaller kern.warn kernel: [ 237.287023][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:53 syzkaller kern.warn kernel: [ 237.287436][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:53 syzkaller kern.warn kernel: [ 237.287858][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:53 syzkaller kern.warn kernel: [ 237.288292][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:53 syzkaller kern.warn kernel: [ 237.348010][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:53 syzkaller kern.warn kernel: [ 237.360514][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:53 syzkaller kern.warn kernel: [ 237.372897][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:53 syzkaller kern.warn kernel: [ 237.385254][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 237.626126][ T29] audit: type=1400 audit(232.992:4336): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 237.650376][ T29] audit: type=1400 audit(233.123:4337): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 237.674514][ T29] audit: type=1400 audit(233.123:4338): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 237.698754][ T29] audit: type=1400 audit(233.123:4339): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 237.722991][ T29] audit: type=1400 audit(233.123:4340): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:03:53 syzkaller kern.notice kernel: [ 237.626126][ T29] audit: type=1400 audit(232.992:4336): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_fil Jan 1 00:03:53 syzkaller kern.notice kernel: [ 237.650376][ T29] audit: type=1400 audit(233.123:4337): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_fil Jan 1 00:03:53 syzkaller kern.notice kernel: [ 237.674514][ T29] audit: type=1400 audit(233.123:4338): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_fil Jan 1 00:03:53 syzkaller kern.notice kernel: [ 237.698754][ T29] audit: type=1400 audit(233.123:4339): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_fil Jan 1 00:03:53 syzkaller kern.notice kernel: [ 237.722991][ T29] audit: type=1400 audit(233.123:4340): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_fil [ 242.610568][ C0] net_ratelimit: 13082 callbacks suppressed [ 242.610587][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 242.628911][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 242.641287][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 242.641698][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 242.642122][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 242.642562][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 242.643021][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 242.643429][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 242.643855][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 242.644273][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 242.695478][ T29] kauditd_printk_skb: 18 callbacks suppressed [ 242.695494][ T29] audit: type=1400 audit(238.006:4359): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 242.700460][ T29] audit: type=1400 audit(238.071:4360): avc: denied { execmem } for pid=24755 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 243.031133][ T29] audit: type=1400 audit(238.371:4361): avc: denied { read write } for pid=3771 comm="syz-executor" name="loop5" dev="devtmpfs" ino=105 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 247.764928][ T29] audit: type=1400 audit(242.711:4362): avc: denied { execmem } for pid=24758 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 247.773958][ C0] ================================================================== [ 247.773996][ C0] BUG: KCSAN: data-race in batadv_bla_tx / batadv_bla_tx [ 247.774044][ C0] [ 247.774048][ C0] write to 0xffff88811c8d80a0 of 8 bytes by interrupt on cpu 1: [ 247.774066][ C0] batadv_bla_tx+0x7b4/0xc40 [ 247.774094][ C0] batadv_interface_tx+0x34a/0xb30 [ 247.774126][ C0] dev_hard_start_xmit+0x119/0x3f0 [ 247.774149][ C0] __dev_queue_xmit+0x100a/0x2090 [ 247.774174][ C0] br_dev_queue_push_xmit+0x444/0x500 [ 247.774197][ C0] br_forward_finish+0x90/0x160 [ 247.774219][ C0] br_nf_forward_finish+0x6b1/0x720 [ 247.774239][ C0] br_nf_forward+0xae2/0xe70 [ 247.774257][ C0] nf_hook_slow+0x86/0x1b0 [ 247.774284][ C0] __br_forward+0x27d/0x360 [ 247.774304][ C0] maybe_deliver+0x1c0/0x260 [ 247.774325][ C0] br_flood+0x246/0x490 [ 247.774345][ C0] br_handle_frame_finish+0xd19/0xe90 [ 247.774372][ C0] br_handle_frame+0x5af/0x9b0 [ 247.774397][ C0] __netif_receive_skb_core+0xb1a/0x2350 [ 247.774423][ C0] __netif_receive_skb+0x5a/0x280 [ 247.774450][ C0] process_backlog+0x22e/0x440 [ 247.774480][ C0] __napi_poll+0x63/0x3c0 [ 247.774505][ C0] net_rx_action+0x3a1/0x7f0 [ 247.774533][ C0] handle_softirqs+0xbf/0x280 [ 247.774566][ C0] do_softirq+0x5e/0x90 [ 247.774589][ C0] __local_bh_enable_ip+0x6e/0x70 [ 247.774611][ C0] _raw_spin_unlock_bh+0x36/0x40 [ 247.774633][ C0] batadv_tt_purge+0x2e7/0x630 [ 247.774655][ C0] process_scheduled_works+0x4db/0xa20 [ 247.774679][ C0] worker_thread+0x51d/0x6f0 [ 247.774700][ C0] kthread+0x4ae/0x520 [ 247.774727][ C0] ret_from_fork+0x4b/0x60 [ 247.774754][ C0] ret_from_fork_asm+0x1a/0x30 [ 247.774783][ C0] [ 247.774786][ C0] write to 0xffff88811c8d80a0 of 8 bytes by interrupt on cpu 0: [ 247.774800][ C0] batadv_bla_tx+0x7b4/0xc40 [ 247.774832][ C0] batadv_interface_tx+0x34a/0xb30 [ 247.774863][ C0] dev_hard_start_xmit+0x119/0x3f0 [ 247.774884][ C0] __dev_queue_xmit+0x100a/0x2090 [ 247.774909][ C0] br_dev_queue_push_xmit+0x444/0x500 [ 247.774931][ C0] br_nf_dev_queue_xmit+0x40d/0xc30 [ 247.774954][ C0] br_nf_post_routing+0x86a/0x930 [ 247.774973][ C0] nf_hook_slow+0x86/0x1b0 [ 247.775000][ C0] br_forward_finish+0x120/0x160 [ 247.775019][ C0] br_nf_forward_finish+0x6b1/0x720 [ 247.775042][ C0] br_nf_forward_ip+0x5c2/0x5d0 [ 247.775064][ C0] br_nf_forward+0x5a7/0xe70 [ 247.775084][ C0] nf_hook_slow+0x86/0x1b0 [ 247.775112][ C0] __br_forward+0x27d/0x360 [ 247.775130][ C0] maybe_deliver+0x1c0/0x260 [ 247.775150][ C0] br_flood+0x246/0x490 [ 247.775170][ C0] br_handle_frame_finish+0xd19/0xe90 [ 247.775197][ C0] br_nf_hook_thresh+0x1e5/0x220 [ 247.775216][ C0] br_nf_pre_routing_finish_ipv6+0x575/0x5a0 [ 247.775239][ C0] br_nf_pre_routing_ipv6+0x1f6/0x2a0 [ 247.775261][ C0] br_nf_pre_routing+0x517/0xbc0 [ 247.775286][ C0] br_handle_frame+0x4e0/0x9b0 [ 247.775311][ C0] __netif_receive_skb_core+0xb1a/0x2350 [ 247.775340][ C0] __netif_receive_skb+0x5a/0x280 [ 247.775368][ C0] process_backlog+0x22e/0x440 [ 247.775397][ C0] __napi_poll+0x63/0x3c0 [ 247.775421][ C0] net_rx_action+0x3a1/0x7f0 [ 247.775451][ C0] handle_softirqs+0xbf/0x280 [ 247.775475][ C0] do_softirq+0x5e/0x90 [ 247.775496][ C0] __local_bh_enable_ip+0x6e/0x70 [ 247.775521][ C0] _raw_spin_unlock_bh+0x36/0x40 [ 247.775547][ C0] lock_sock_nested+0x10f/0x140 [ 247.775581][ C0] sockopt_lock_sock+0x42/0x50 [ 247.775602][ C0] do_ip_getsockopt+0xbf3/0x1270 [ 247.775630][ C0] ip_getsockopt+0x5c/0x170 [ 247.775655][ C0] tcp_getsockopt+0xaa/0xe0 [ 247.775685][ C0] sock_common_getsockopt+0x5b/0x70 [ 247.775717][ C0] do_sock_getsockopt+0x1ca/0x260 [ 247.775741][ C0] __x64_sys_getsockopt+0x18c/0x200 [ 247.775766][ C0] x64_sys_call+0x1288/0x2dc0 [ 247.775793][ C0] do_syscall_64+0xc9/0x1c0 [ 247.775823][ C0] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 247.775853][ C0] [ 247.775857][ C0] value changed: 0x00000000ffffe757 -> 0x00000000ffffe758 [ 247.775869][ C0] [ 247.775873][ C0] Reported by Kernel Concurrency Sanitizer on: [ 247.775885][ C0] CPU: 0 UID: 0 PID: 3771 Comm: syz-executor Tainted: G W 6.14.0-rc4-syzkaller-00278-gece144f151ac #0 [ 247.775917][ C0] Tainted: [W]=WARN [ 247.775924][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 247.775939][ C0] ================================================================== [ 247.966547][ C0] net_ratelimit: 13210 callbacks suppressed [ 247.966563][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 247.966950][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 247.967366][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 247.967793][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 247.968256][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 247.968705][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 247.969192][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 247.969624][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 247.970025][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 247.970462][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 249.672757][ T29] audit: type=1400 audit(244.591:4363): avc: denied { execmem } for pid=24759 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 251.759156][ T29] audit: type=1400 audit(246.546:4364): avc: denied { read write } for pid=3764 comm="syz-executor" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 251.853164][ T29] audit: type=1400 audit(246.621:4365): avc: denied { read write } for pid=3771 comm="syz-executor" name="loop5" dev="devtmpfs" ino=105 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 252.063491][ T29] audit: type=1400 audit(246.827:4366): avc: denied { execmem } for pid=24762 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 253.322372][ C0] net_ratelimit: 13547 callbacks suppressed [ 253.322389][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 253.322764][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 253.323147][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 253.323469][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 253.323858][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 253.324183][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 253.332496][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 253.332849][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 253.333211][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 253.333530][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 253.859339][ T29] audit: type=1400 audit(247.996:4367): avc: denied { write } for pid=3290 comm="syz-executor" path="pipe:[1427]" dev="pipefs" ino=1427 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0 [ 253.859368][ T29] audit: type=1400 audit(247.996:4368): avc: denied { write } for pid=3290 comm="syz-executor" path="pipe:[1427]" dev="pipefs" ino=1427 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0 [ 253.859391][ T29] audit: type=1400 audit(247.996:4369): avc: denied { write } for pid=3290 comm="syz-executor" path="pipe:[1427]" dev="pipefs" ino=1427 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0 [ 256.509893][ T28] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 Jan 1 00:03:58 syzkaller kern.w[ 257.644931][ T29] audit: type=1400 audit(252.056:4370): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 arn kernel: [ 242.610568][ C0] net_ratelimit[ 257.670304][ T29] audit: type=1400 audit(252.056:4371): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 : 13082 callbacks suppressed Jan 1 00:03:58 sy[ 257.695982][ T29] audit: type=1400 audit(252.056:4372): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 zkaller kern.warn kernel: [ 242.610587][ C0][ 257.721416][ T29] audit: type=1400 audit(252.056:4373): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 bridge0: received packet on bridge_slave_0 with[ 257.746962][ T29] audit: type=1400 audit(252.056:4374): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 own address as source address (addr:aa:aa:aa:aa[ 257.772436][ T29] audit: type=1400 audit(252.056:4375): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 :aa:1b, vlan:0) Jan 1 00:03:58 syzkaller kern.[ 257.797891][ T29] audit: type=1400 audit(252.056:4376): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 warn kernel: [ 242.628911][ C0] bridge0: rec[ 257.823452][ T29] audit: type=1400 audit(252.056:4377): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 eived packet on bridge_slave_0 with own address [ 257.848968][ T29] audit: type=1400 audit(252.056:4378): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 as source address (addr:aa:aa:aa:aa:aa:1b, vlan:[ 257.874428][ T29] audit: type=1400 audit(252.056:4379): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 0) Jan 1 00:03:58 syzkaller kern.warn kernel: [ 242.641287][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:58 syzkaller kern.warn kernel: [ 242.641698][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:58 syzkaller kern.warn kernel: [ 242.642122][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:58 syzkaller kern.warn kernel: [ 242.642562][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:58 syzkaller kern.warn kernel: [ 242.643021][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:58 syzkaller kern.warn kernel: [ 242.643429][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:58 syzkaller kern.warn kernel: [ 242.643855][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:58 syzkaller kern.warn kernel: [ 242.644273][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:58 syzkaller kern.warn kernel: [ 242.695478][ T29] kauditd_printk_skb: 18 callbacks suppressed Jan 1 00:03:58 syzkaller kern.notice kernel: [ 242.695494][ T29] audit: type=1400 audit(238.006:4359): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_fil Jan 1 00:04:12 syzkaller kern.notice kernel: [ 242.700460][ T29] audit: type=1400 audit(238.071:4360): avc: denied { execmem } for pid=24755 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 Jan 1 00:04:12 syzkaller kern.notice kernel: [ 243.031133][ T29] audit: type=1400 audit(238.371:4361): avc: denied { read write } for pid=3771 comm="syz-executor" name="loop5" dev="devtmpfs" ino=105 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_dis Jan 1 00:04:12 syzkaller kern.notice kernel: [ 247.764928][ T29] audit: type=1400 audit(242.711:4362): avc: denied { execmem } for pid=24758 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 Jan 1 00:04:12 syzkaller kern.err kernel: [ 247.773958][ C0] ==================================================================