last executing test programs: 5m41.559884006s ago: executing program 0 (id=1): epoll_wait(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) 5m41.386760888s ago: executing program 0 (id=8): mmap(&(0x7efffffff000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x1000000)=nil, 0x1000000, 0x7, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0001000000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 1m50.194763747s ago: executing program 4 (id=9047): r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f00000001c0)="c9") 1m46.664079414s ago: executing program 1 (id=9050): r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x101041) write$sndseq(r0, &(0x7f0000000080)=[{0xe, 0xfd, 0x0, 0xfd, @time={0x5, 0x1}, {0x3}, {0xe}, @connect}], 0x1c) 1m41.751520513s ago: executing program 4 (id=9053): r0 = socket(0x1, 0x803, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000300)={'gretap0\x00', 0x0}) 1m40.80967773s ago: executing program 5 (id=9054): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a0300000000000000f400010000000900010073797a300000000058000000160a01000000000000000000010000000900010073797a30000000000900020073797a30000000002c00038008000240000000001800038014000100626f6e64300000000000000000000000080001400000000048000000180a01010000000000000000010000000900020073797a30000000000900010073797a30000000001c000380140001"], 0xe8}}, 0x0) 1m37.236371988s ago: executing program 1 (id=9056): r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1c0000004e0001000000000000ffffffff020000080001"], 0x1c}}, 0x0) 1m36.380034785s ago: executing program 2 (id=9057): r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x9, 0x3, 0x2c0, 0x110, 0xffffffff, 0xffffffff, 0x110, 0xffffffff, 0x1f0, 0xffffffff, 0xffffffff, 0x1f0, 0xffffffff, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, @private1, [0xff, 0xff, 0xffffffff], [0x0, 0x0, 0x0, 0xffffffff], 'team0\x00', 'nicvf0\x00', {0xff}, {0xff}, 0x9e, 0x2, 0x4, 0x94}, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x11, 0xe5, 0xce8d, 0x8, 'netbios-ns\x00', 'syz0\x00', {0x4}}}}, {{@uncond, 0x0, 0xa8, 0xe0}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0x0, 0x1, 0x3}, {0xffffffffffffffff, 0x5, 0x4}, {0x4, 0x5, 0x6}, 0xffffffff, 0xfba}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x320) 1m34.001122153s ago: executing program 4 (id=9058): dup(0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0040, &(0x7f0000000200)={[{@noblock_validity}, {@resgid={'resgid', 0x3d, 0xee00}}, {@block_validity}, {@noload}, {@nobarrier}, {@nodiscard}]}, 0xfe, 0x472, &(0x7f0000000940)="$eJzs3MtvG8UfAPDvOk6a9PFLfyU8GloIFETEI2nSBz1wAYHEAQQSHIo4BSetQt0GNUGiVQSBQxDigCpxRxyR+As4wQUBJySucEeVEMqlhZPR2rtp4tohDydO8ecjbTuzu+7Md2fHnp2xG0DHGkr/SCL2R8SvEdEfEcX6E4Zqf91cmi/9tTRfSqJSee3PJH1Z3FiaL2X/RHVL7avtqFSy/J4G5S6+GTFRLk9dzvKjcxffGZ29cvWp6YsT56fOT10aP3Pm5ImjPafHT7UkzjSuG4Pvzxw5/OIb114unb321o9fp/Xdnx3P42ilodrVbejRVhfWZgdWpJNiGyvChhzI+nt3tf/3R1f0LR/rjxc+amvlgG1VqVQqjT6fMwsV4D8siXbXAGiP/IM+ff7Ntx0aeuwKfzxbewBK476ZbbUjxShk53TXPd+2Um9EnF34+4t0i22ahwAAWOnbdPzzZKPxXyHuWXHe/7I1lIMR8f+IOBQRd0XEQETcHVE9996IuG+D5devkNw+/ilc31Rg65SO/57J1rZWj//y0V8c7MpyB6rxdyfnpstTx7NrMhzde9L82KqXrPbd8798Vr/v02yafWjF+C/d0vLzsWBWj+vFugm6yYm5iZYEn8b/YcRgsVH8yfI6YBIRhyNicJNlTD/+1ZFmx/49/jW0YJ2p8mXEY7X2X4i6+HNJ0/XJsadPj58a7Y3y1PHR/K643U8/L77arPwtxd8CafvvbXj/1+JPnxGT3ojZK1cvVNdrZzdexuJvH5eSJscGNnn/9ySvV9M92b73JubmLo9F9CQvpdm+VfvHb702z+fnp/EPH2vc/w/VHs+qV+L+iEhv4qMR8UBEPJi13UMR8XBEHFsj/h+ee+TtZseat/8as/ItlMY/uUb7p295aepW+2880XXh+2+alV9ZV/ufrKaGsz3ref9bbwW3cu0AAADgTlGofgc+KYwspwuFkZHad/gHYm+hPDM798S5mXcvTda+K38wugv5TFf/ivnQsWxuOM+P1+VPZPPGn3f1VfMjpZnyZLuDhw63r0n/T/3e1e7aAdvO77Wgc+n/0Ln0f+hc+j90Lv0fOlRP490f7HQ9gLbY+Od/77bUA9h5xv/QufR/6Fz6P3Skpr+NL2zpJ/93aqK4O6rRMNG3O6qRJ6KwK6rRusQrn9S6xG6pT54orvs/s9hkYk/DQ+1+ZwIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGiNfwIAAP//RwfmeQ==") 1m33.236364269s ago: executing program 5 (id=9059): r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000440)={'sit0\x00', &(0x7f0000000300)={'syztnl0\x00', 0x0, 0x0, 0x700, 0x0, 0x0, {{0x6, 0x4, 0x0, 0x0, 0x18, 0x0, 0x0, 0x80, 0x4, 0x0, @loopback, @dev={0xac, 0x14, 0x14, 0x1d}, {[@end]}}}}}) 1m31.415399524s ago: executing program 1 (id=9061): mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x4000002, 0x50032, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) 1m30.634210099s ago: executing program 2 (id=9062): r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newtaction={0x44, 0x30, 0x48b, 0x0, 0x0, {}, [{0x30, 0x1, [@m_nat={0x2c, 0x1, 0x0, 0x0, {{0x8}, {0x4}, {0x4}, {0xc}, {0xc, 0x8, {0x0, 0x3}}}}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x4048000}, 0x0) 1m28.688834725s ago: executing program 4 (id=9063): r0 = socket(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000080)="7800000018002507b9409b14ffff0b7a0204be040202fe056402040c5c0009003f0006010a000000370085a168d0bf46d32345653600648d270012000a00000049935ade4a460c89b6ec0cff3959547f509058ba86c902007a00004a32000400160008000a0000000000e000e218d1ddf66ed538f2523250", 0x78, 0x0, 0x0, 0x0) 1m25.451134701s ago: executing program 5 (id=9064): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x1, 0x7fff0000}]}) fremovexattr(0xffffffffffffffff, 0x0) 1m24.480921858s ago: executing program 3 (id=9065): bpf$ENABLE_STATS(0x20, 0x0, 0x0) syz_emit_ethernet(0x3a, &(0x7f0000000500)={@link_local, @local, @val={@void}, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x4, 0x0, 0x0, 0x32, 0x0, @empty, @broadcast}, @timestamp_reply={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}}}}}, 0x0) 1m20.286870401s ago: executing program 2 (id=9066): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000010008000900010073797a30000000006c000000090a010400000000000000000100000008000a40000000000900020000087a32000000000900010073797a3000000000080005400000003d300011800b00010074617267657400002000028005000300c400000008000240000000000a0001"], 0xb4}, 0x1, 0x0, 0x0, 0x890}, 0x0) 1m18.261821887s ago: executing program 1 (id=9067): r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r0, 0x4b72, &(0x7f0000000080)={0x2, 0x1, 0x1, 0x14, 0xc0, 0x0}) 1m14.897492473s ago: executing program 3 (id=9068): syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) waitid(0x0, 0x0, &(0x7f0000002b80), 0x41000004, &(0x7f0000000040)) 1m14.03981283s ago: executing program 5 (id=9069): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x4, 0x0, 0x1bc60, 0x1a704}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ARP_INTERVAL={0x8, 0x7, 0x2}, @IFLA_BOND_MIIMON={0x8, 0x3, 0x8}]}}}]}, 0x44}, 0x1, 0x0, 0x0, 0x11}, 0x4040044) 1m13.399625225s ago: executing program 4 (id=9070): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x40, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x800000000003}, 0x1100, 0x5dd8, 0x8000, 0x5, 0x0, 0x8, 0xfffb, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x4040, 0x0) 1m10.774041485s ago: executing program 2 (id=9071): r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000640)='pagemap\x00') lseek(r0, 0x1, 0x3) 1m8.318520965s ago: executing program 1 (id=9072): r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/bus/input/devices\x00', 0x0, 0x0) preadv(r0, &(0x7f00000015c0)=[{&(0x7f00000002c0)=""/4094, 0xffe}], 0x1, 0xf0, 0x3) 1m7.932370887s ago: executing program 5 (id=9073): r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x28, 0x16, 0x1, 0x0, 0x0, {0xa}, [@typed={0x14, 0x1, 0x0, 0x0, @ipv6=@mcast1}]}, 0x28}}, 0x0) 1m6.787317507s ago: executing program 3 (id=9074): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x541b, &(0x7f0000000040)={'ip6gretap0\x00', @local}) 1m4.936553881s ago: executing program 2 (id=9075): r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000001840), 0x0, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5417, &(0x7f0000000200)) 1m4.034495128s ago: executing program 4 (id=9076): unshare(0x2c020400) fgetxattr(0xffffffffffffffff, &(0x7f0000000080)=@known='user.incfs.metadata\x00', 0x0, 0xffffffffffffffa2) 58.567456651s ago: executing program 5 (id=9077): r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/bus/input/handlers\x00', 0x0, 0x0) statx(r0, 0x0, 0x1000, 0x6000, 0x0) 57.851122557s ago: executing program 1 (id=9078): r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000540)=@raw={'raw\x00', 0x8, 0x3, 0x238, 0x0, 0x11, 0x148, 0x0, 0x0, 0x1a0, 0x2a8, 0x2a8, 0x1a0, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x98, 0x100, 0x0, {}, [@common=@inet=@ecn={{0x28}, {0x21, 0x11, 0x81, 0x54}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x5, 0x8001, 0x5, 'netbios-ns\x00', 'syz0\x00', {0x7}}}}, {{@ip={@multicast2, @empty, 0xff000000, 0x0, 'vlan0\x00', 'netdevsim0\x00', {}, {}, 0x0, 0x1}, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00', 0x1, {0x200000, 0x0, 0x0, 0x1}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x298) 56.350226648s ago: executing program 3 (id=9079): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x60, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8}, @IPSET_ATTR_MAXELEM={0x8}]}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,port\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_REVISION={0x5}]}, 0x60}}, 0x0) 51.386095637s ago: executing program 2 (id=9080): r0 = socket(0x400000000010, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000001c0)={'ip6tnl0\x00', &(0x7f0000000140)={'syztnl2\x00', 0x0, 0x4, 0xf, 0x4, 0x4, 0xc, @private1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8, 0x7800, 0x5, 0x1}}) 47.565022797s ago: executing program 32 (id=9076): unshare(0x2c020400) fgetxattr(0xffffffffffffffff, &(0x7f0000000080)=@known='user.incfs.metadata\x00', 0x0, 0xffffffffffffffa2) 44.362370342s ago: executing program 3 (id=9082): r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=[@dstaddrv6={0x20, 0x84, 0x8, @dev={0xfe, 0x80, '\x00', 0x25}}, @authinfo={0x18, 0x84, 0x6, {0x7}}], 0x38, 0x35e646672c97c2b8}, 0x4000) 38.25810363s ago: executing program 33 (id=9077): r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/bus/input/handlers\x00', 0x0, 0x0) statx(r0, 0x0, 0x1000, 0x6000, 0x0) 37.049669369s ago: executing program 34 (id=9078): r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000540)=@raw={'raw\x00', 0x8, 0x3, 0x238, 0x0, 0x11, 0x148, 0x0, 0x0, 0x1a0, 0x2a8, 0x2a8, 0x1a0, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x98, 0x100, 0x0, {}, [@common=@inet=@ecn={{0x28}, {0x21, 0x11, 0x81, 0x54}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x5, 0x8001, 0x5, 'netbios-ns\x00', 'syz0\x00', {0x7}}}}, {{@ip={@multicast2, @empty, 0xff000000, 0x0, 'vlan0\x00', 'netdevsim0\x00', {}, {}, 0x0, 0x1}, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00', 0x1, {0x200000, 0x0, 0x0, 0x1}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x298) 34.315758901s ago: executing program 35 (id=9080): r0 = socket(0x400000000010, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000001c0)={'ip6tnl0\x00', &(0x7f0000000140)={'syztnl2\x00', 0x0, 0x4, 0xf, 0x4, 0x4, 0xc, @private1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8, 0x7800, 0x5, 0x1}}) 0s ago: executing program 3 (id=9086): r0 = socket(0x2, 0x80805, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, 0x0, &(0x7f0000000040)) kernel console output (not intermixed with test programs): :1b, vlan:0) [ 309.300085][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 309.311625][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 309.323245][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 309.335416][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 309.347817][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:35:51 syzkaller kern.notice kernel: [ 306.191347][ T30] audit: type=1400 audit(2000000151.685:51167): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass May 18 03:35:51 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:35:52 syzkaller kern.notice kernel: [ 306.722650][ T30] audit: type=1400 audit(2000000151.916:51168): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass May 18 03:35:52 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:35:52 syzkaller kern.notice kernel: [ 307.204141][ T30] audit: type=1400 audit(2000000152.378:51169): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass [ 310.670099][T22335] netlink: 16 bytes leftover after parsing attributes in process `syz.5.9073'. May 18 03:35:53 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:35:53 syzkaller kern.notice kernel: [ 307.230774][ T30] audit: type=1400 audit(2000000152.399:51170): avc: denied { read } for pid=3037 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket p May 18 03:35:53 syzkaller daemon.err dhcpcd[3037]: libudev: rece[ 311.086767][ T30] kauditd_printk_skb: 18 callbacks suppressed ived NULL device[ 311.086784][ T30] audit: type=1400 audit(2000000156.819:51195): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 18 03:35:53 syzkaller kern.notice kernel: [ 307.256078][ T30] audit: type=1400 audit(2000000152.704:51171): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass May 18 03:35:53 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device [ 311.605032][ T30] audit: type=1400 audit(2000000157.060:51196): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 311.635764][ T30] audit: type=1400 audit(2000000157.071:51197): avc: denied { read } for pid=3037 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 311.661166][ T30] audit: type=1400 audit(2000000157.291:51198): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 18 03:35:54 syzkaller kern.notice kernel: [ 308.451255][ T30] audit: type=1400 audit(2000000153.071:51172): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass May 18 03:35:54 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:35:54 syzkaller kern.notice kernel: [ 308.477599][ T30] audit: type=1400 audit(2000000153.082:51173): avc: denied { read } for pid=3037 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket p May 18 03:35:55 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:35:55 syzkaller kern.notice kernel: [ 308.503326][ T30] audit: type=1400 audit(2000000153.281:51174): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass May 18 03:35:55 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device[ 312.900219][ T30] audit: type=1400 audit(2000000157.512:51199): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 312.926494][ T30] audit: type=1400 audit(2000000157.575:51200): avc: denied { read write } for pid=3405 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 312.954889][ T30] audit: type=1400 audit(2000000157.617:51201): avc: denied { read } for pid=3037 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 312.980277][ T30] audit: type=1400 audit(2000000157.690:51202): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 313.006654][ T30] audit: type=1400 audit(2000000157.806:51203): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 313.032815][ T30] audit: type=1400 audit(2000000157.900:51204): avc: denied { read } for pid=3037 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 May 18 03:35:55 syzkaller kern.notice kernel: [ 308.529750][ T30] audit: type=1400 audit(2000000153.449:51175): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass [ 313.462498][T22337] Process accounting paused May 18 03:35:56 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:35:56 syzkaller kern.notice kernel: [ 308.555986][ T30] audit: type=1400 audit(2000000153.543:51176): avc: denied { read } for pid=3037 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket p May 18 03:35:56 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device[ 314.030095][ C0] net_ratelimit: 20994 callbacks suppressed [ 314.030114][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 314.030327][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 314.036519][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 314.048184][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 314.060337][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 314.072741][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 314.084206][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 314.095896][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 314.107968][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 314.120386][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:35:56 syzkaller kern.warn kernel: [ 309.257556][ C0] net_ratelimit: 20179 callbacks suppressed May 18 03:35:57 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:35:57 syzkaller kern.warn kernel: [ 309.257574][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) May 18 03:35:57 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:35:57 syzkaller kern.warn kernel: [ 309.258064][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:35:57 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:35:58 syzkaller kern.warn kernel: [ 309.263866][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) May 18 03:35:58 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:35:58 syzkaller kern.warn kernel: [ 309.275582][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 316.035117][ T30] kauditd_printk_skb: 25 callbacks suppressed [ 316.035134][ T30] audit: type=1400 audit(2000000162.026:51230): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 18 03:35:59 syzkaller kern.warn kernel: [ 309.287748][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 318.802479][ C0] net_ratelimit: 22103 callbacks suppressed [ 318.802498][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 318.802733][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 318.808809][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 318.820589][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 318.832740][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 318.845172][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 318.856583][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 318.868235][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 318.880354][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 318.892758][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:35:59 syzkaller kern.warn kernel: [ 309.300085][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 319.099458][ T30] audit: type=1400 audit(2000000162.078:51231): avc: denied { read } for pid=3037 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 319.124399][ T30] audit: type=1400 audit(2000000165.070:51232): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 18 03:35:59 syzkaller kern.warn kernel: [ 309.311625][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) May 18 03:36:00 syzkaller kern.warn kernel: [ 309.323245][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:35:59 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:00 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:00 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:00 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:01 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:00 syzkaller kern.warn kernel: [ 309.335416][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) May 18 03:36:01 syzkaller kern.warn kernel: [ 309.347817][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:36:01 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:01 syzkaller kern.warn kernel: [ 310.670099][T22335] netlink: 16 bytes leftover after parsing attributes in process `syz.5.9073'. May 18 03:36:05 syzkaller kern.warn kernel: [ 311.086767][ T30] kauditd_printk_skb: 18 callbacks suppressed [ 320.103651][ T30] audit: type=1400 audit(2000000165.385:51233): avc: denied { read write } for pid=3401 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 320.131801][ T30] audit: type=1400 audit(2000000165.406:51234): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 320.157658][ T30] audit: type=1400 audit(2000000165.406:51235): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 320.183926][ T30] audit: type=1400 audit(2000000165.417:51236): avc: denied { read } for pid=3037 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 320.209016][ T30] audit: type=1400 audit(2000000165.417:51237): avc: denied { read } for pid=3037 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 320.233931][ T30] audit: type=1400 audit(2000000165.417:51238): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 320.260058][ T30] audit: type=1400 audit(2000000165.480:51239): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 18 03:36:02 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:05 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:05 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:05 syzkaller kern.notice kernel: [ 311.086784][ T30] audit: type=1400 audit(2000000156.819:51195): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass May 18 03:36:05 syzkaller kern.notice kernel: [ 311.605032][ T30] audit: type=1400 audit(2000000157.060:51196): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass May 18 03:36:05 syzkaller kern.notice kernel: [ 311.635764][ T30] audit: type=1400 audit(2000000157.071:51197): avc: denied { read } for pid=3037 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket p May 18 03:36:05 syzkaller kern.notice kernel: [ 311.661166][ T30] audit: type=1400 audit(2000000157.291:51198): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass May 18 03:36:05 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:06 syzkaller kern.notice kernel: [ 312.900219][ T30] audit: type=1400 audit(2000000157.512:51199): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass May 18 03:36:06 syzkaller kern.notice kernel: [ 312.926494][ T30] audit: type=1400 audit(2000000157.575:51200): avc: denied { read write } for pid=3405 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:f May 18 03:36:06 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:06 syzkaller kern.notice kernel: [ 312.954889][ T30] audit: type=1400 audit(2000000157.617:51201): avc: denied { read } for pid=3037 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket p May 18 03:36:06 syzkaller kern.notice kernel: [ 312.980277][ T30] audit: type=1400 audit(2000000157.690:51202): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass May 18 03:36:06 syzkaller kern.notice kernel: [ 313.006654][ T30] audit: type=1400 audit(2000000157.806:51203): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass May 18 03:36:06 syzkaller kern.notice kernel: [ 313.032815][ T30] audit: type=1400 audit(2000000157.900:51204): avc: denied { read } for pid=3037 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket p May 18 03:36:06 syzkaller kern.info kernel: [ 313.462498][T22337] Process accounting paused May 18 03:36:06 syzkaller kern.warn kernel: [ 314.030095][ C0] net_ratelimit: 20994 callbacks suppressed May 18 03:36:06 syzkaller kern.warn kernel: [ 314.030114][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) May 18 03:36:06 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:06 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:06 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:06 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:06 syzkaller kern.warn kernel: [ 314.030327][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:36:07 syzkaller kern.warn kernel: [ 314.036519][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) May 18 03:36:07 syzkaller kern.warn kernel: [ 314.048184][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:36:07 syzkaller kern.warn kernel: [ 314.060337][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) May 18 03:36:07 syzkaller kern.warn kernel: [ 314.072741][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:36:07 syzkaller kern.warn kernel: [ 314.084206][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) May 18 03:36:07 syzkaller kern.warn kernel: [ 314.095896][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:36:07 syzkaller kern.warn kernel: [ 314.107968][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) May 18 03:36:06 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:07 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:07 syzkaller kern.warn kernel: [ 314.120386][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:36:07 syzkaller kern.warn kernel: [ 316.035117][ T30] kauditd_printk_skb: 25 callbacks suppressed May 18 03:36:07 syzkaller kern.notice kernel: [ 316.035134][ T30] audit: type=1400 audit(2000000162.026:51230): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass May 18 03:36:07 syzkaller kern.warn kernel: [ 318.802479][ C0] net_ratelimit: 22103 callbacks suppressed May 18 03:36:07 syzkaller kern.warn kernel: [ 318.802498][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) May 18 03:36:07 syzkaller kern.warn kernel: [ 318.802733][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:36:07 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:07 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:07 syzkaller kern.warn kernel: [ 318.808809][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) May 18 03:36:08 syzkaller kern.warn kernel: [ 318.820589][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:36:08 syzkaller kern.warn kernel: [ 318.832740][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) May 18 03:36:08 syzkaller kern.warn kernel: [ 318.845172][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:36:08 syzkaller kern.warn kernel: [ 318.856583][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) May 18 03:36:08 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:08 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:08 syzkaller kern.warn kernel: [ 318.868235][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:36:08 syzkaller kern.warn kernel: [ 318.880354][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) May 18 03:36:08 syzkaller kern.warn kernel: [ 318.892758][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:36:08 syzkaller kern.notice kernel: [ 319.099458][ T30] audit: type=1400 audit(2000000162.078:51231): avc: denied { read } for pid=3037 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket p [ 322.693650][ T3037] audit_log_start: 11 callbacks suppressed [ 322.693667][ T3037] audit: audit_backlog=65 > audit_backlog_limit=64 [ 322.713601][ T3037] audit: audit_lost=848 audit_rate_limit=0 audit_backlog_limit=64 [ 322.725420][ T3037] audit: backlog limit exceeded May 18 03:36:08 syzkaller kern.notice kernel: [ 319.124399][ T30] audit: type=1400 audit(2000000165.070:51232): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass [ 322.941661][ T2981] audit: audit_backlog=65 > audit_backlog_limit=64 [ 322.951941][ T2981] audit: audit_lost=849 audit_rate_limit=0 audit_backlog_limit=64 [ 322.963459][ T2981] audit: backlog limit exceeded May 18 03:36:08 [ 323.358046][ T2981] audit: audit_backlog=65 > audit_backlog_limit=64 syzkaller kern.notice kernel: [ 320.103651][ [ 323.368978][ T2981] audit: audit_lost=850 audit_rate_limit=0 audit_backlog_limit=64 T30] audit: type=1400 audit(2000000165.385:51233[ 323.381013][ T2981] audit: backlog limit exceeded ): avc: denied { read write } for pid=3401 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:f [ 323.574520][ C0] net_ratelimit: 20461 callbacks suppressed [ 323.574540][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 323.574580][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 323.580885][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 323.592577][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 323.604715][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 323.617112][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 323.628628][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 323.640340][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 323.652417][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 323.664834][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 323.742114][ T30] audit: type=1400 audit(2000000166.561:51251): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 18 03:36:08 syzkaller kern.notice kernel: [ 320.131801][ T30] audit: type=1400 audit(2000000165.406:51234): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass May 18 03:36:08 syzkaller kern.notice kernel: [ 320.157658][ T30] audit: type=1400 audit(2000000165.406:51235): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass May 18 03:36:08 syzkaller kern.notice kernel: [ 320.183926][ T30] audit: type=1400 audit(2000000165.417:51236): avc: denied { read } for pid=3037 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket p May 18 03:36:08 syzkaller kern.notice kernel: [ 320.209016][ T30] audit: type=1400 audit(2000000165.417:51237): avc: denied { read } for pid=3037 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket p May 18 03:36:08 syzkaller kern.notice kernel: [ 320.233931][ T30] audit: type=1400 audit(2000000165.417:51238): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass May 18 03:36:08 syzkaller kern.notice kernel: [ 320.260058][ T30] audit: type=1400 audit(2000000165.480:51239): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass May 18 03:36:09 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:09 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:09 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:09 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:09 syzkaller kern.warn kernel: [ 322.693650][ T3037] audit_log_start: 11 callbacks suppressed May 18 03:36:09 syzkaller kern.warn kernel: [ 322.693667][ T3037] audit: audit_backlog=65 > audit_backlog_limit=64 May 18 03:36:09 syzkaller kern.warn kernel: [ 322.713601][ T3037] audit: audit_lost=848 audit_rate_limit=0 audit_backlog_limit=64 May 18 03:36:10 syzkaller kern.err kernel: [ 322.725420][ T3037] audit: backlog limit exceeded May 18 03:36:09 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:10 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:10 syzkaller kern.warn kernel: [ 322.941661][ T2981] audit: audit_backlog=65 > audit_backlog_limit=64 May 18 03:36:10 syzkaller kern.warn kernel: [ 322.951941][ T2981] audit: audit_lost=849 audit_rate_limit=0 audit_backlog_limit=64 May 18 03:36:10 syzkaller kern.err kernel: [ 322.963459][ T2981] audit: backlog limit exceeded May 18 03:36:10 syzkaller kern.warn kernel: [ 323.358046][ T2981] audit: audit_backlog=65 > audit_backlog_limit=64 May 18 03:36:10 syzkaller kern.warn kernel: [ 323.368978][ T2981] audit: audit_lost=850 audit_rate_limit=0 audit_backlog_limit=64 May 18 03:36:10 syzkaller kern.err kernel: [ 323.381013][ T2981] audit: backlog limit exceeded May 18 03:36:10 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:10 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:10 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:10 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:10 syzkaller kern.warn kernel: [ 323.574520][ C0] net_ratelimit: 20461 callbacks suppressed May 18 03:36:10 syzkaller kern.warn kernel: [ 323.574540][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) May 18 03:36:10 syzkaller kern.warn kernel: [ 323.574580][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:36:10 syzkaller kern.warn kernel: [ 323.580885][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) May 18 03:36:11 syzkaller kern.warn kernel: [ 323.592577][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:36:11 syzkaller kern.warn kernel: [ 323.604715][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) May 18 03:36:11 syzkaller kern.warn kernel: [ 323.617112][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:36:11 syzkaller kern.warn kernel: [ 323.628628][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) May 18 03:36:10 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:11 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:11 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:11 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:11 syzkaller kern.warn kernel: [ 323.640340][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:36:11 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:11 syzkaller kern.warn kernel: [ 323.652417][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) May 18 03:36:11 syzkaller kern.warn kernel: [ 323.664834][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 326.126778][T22349] xt_ecn: cannot match TCP bits for non-tcp packets May 18 03:36:13 syzkaller kern.notice kernel: [ 323.742114][ T30] audit: type=1400 audit(2000000166.561:51251): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass May 18 03:36:13 syzkaller kern.info kernel: [ 326.126778][T22349] xt_ecn: cannot match TCP bits for non-tcp packets May 18 03:36:13 syzkaller daemon.err dhcpcd[22345]: ps_bpf_start_bpf: bpf_open: Invalid argument May 18 03:36:13 syzkaller daemon.err dhcpcd[22345]: ps_root_recvmsg: Invalid argument May 18 03:36:13 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:13 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:13 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:13 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:13 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:13 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:13 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:13 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:13 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:13 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:13 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:13 syzkaller daemon.err dhcpcd[22343]: ps_bpf_start_bpf: bpf_open: Invalid argument May 18 03:36:13 syzkaller daemon.err dhcpcd[22344]: ps_bpf_start_bpf: bpf_open: Invalid argument May 18 03:36:13 syzkaller daemon.err dhcpcd[22344]: ps_root_recvmsg: Invalid argument May 18 03:36:13 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:13 syzkaller daemon.err dhcpcd[22343]: ps_root_recvmsg: Invalid argument May 18 03:36:13 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:13 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:13 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:13 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:13 syzkaller daemon.err dhcpcd[22353]: ps_bpf_start_bpf: bpf_open: Invalid argument May 18 03:36:13 syzkaller daemon.err dhcpcd[22353]: ps_root_recvmsg: Invalid argument [ 328.347073][ C0] net_ratelimit: 23100 callbacks suppressed [ 328.347092][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 328.347464][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:ee:a7:4c:7c:29, vlan:0) [ 328.353414][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 328.365080][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 328.377344][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 328.389015][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 328.401159][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 328.413662][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:ee:a7:4c:7c:29, vlan:0) [ 328.425192][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 328.436676][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:36:15 syzkaller kern.warn kernel: [ 328.347073][ C0] net_ratelimit: 23100 callbacks suppressed May 18 03:36:15 syzkaller kern.warn kernel: [ 328.347092][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) May 18 03:36:15 syzkaller kern.warn kernel: [ 328.347464][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:ee:a7:4c:7c:29, vlan:0) May 18 03:36:15 syzkaller kern.warn kernel: [ 328.353414][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) May 18 03:36:15 syzkaller kern.warn kernel: [ 328.365080][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:36:15 syzkaller kern.warn kernel: [ 328.377344][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) May 18 03:36:15 syzkaller kern.warn kernel: [ 328.389015][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:36:15 syzkaller kern.warn kernel: [ 328.401159][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) May 18 03:36:15 syzkaller kern.warn kernel: [ 328.413662][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:ee:a7:4c:7c:29, vlan:0) May 18 03:36:15 syzkaller kern.warn kernel: [ 328.425192][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) May 18 03:36:15 syzkaller kern.warn kernel: [ 328.436676][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:36:13 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device[ 331.452417][ T30] kauditd_printk_skb: 162 callbacks suppressed [ 331.452437][ T30] audit: type=1400 audit(2000000174.781:51414): avc: denied { read write } for pid=3405 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 331.487671][ T30] audit: type=1400 audit(2000000176.429:51415): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 331.513969][ T30] audit: type=1400 audit(2000000176.461:51416): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 331.540380][ T30] audit: type=1400 audit(2000000176.618:51417): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 331.566617][ T30] audit: type=1400 audit(2000000176.860:51418): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 331.592915][ T30] audit: type=1400 audit(2000000176.923:51419): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 331.619132][ T30] audit: type=1400 audit(2000000177.007:51420): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 331.645481][ T30] audit: type=1400 audit(2000000177.185:51421): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 331.671877][ T30] audit: type=1400 audit(2000000177.300:51422): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 331.698158][ T30] audit: type=1400 audit(2000000177.437:51423): avc: denied { read } for pid=3037 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 May 18 03:36:17 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:17 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:17 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:17 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:17 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:17 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:17 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:17 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:17 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device[ 333.119197][ C0] net_ratelimit: 23794 callbacks suppressed [ 333.119216][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 333.119386][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:ee:a7:4c:7c:29, vlan:0) [ 333.125558][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 333.137197][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 333.149625][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 333.161270][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 333.173356][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 333.185810][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:ee:a7:4c:7c:29, vlan:0) [ 333.197189][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 333.208816][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:36:17 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:17 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:18 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:18 syzkaller kern.warn kernel: [ 331.452417][ T30] kauditd_printk_skb: 162 callbacks suppressed May 18 03:36:18 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:18 syzkaller kern.notice kernel: [ 331.452437][ T30] audit: type=1400 audit(2000000174.781:51414): avc: denied { read write } for pid=3405 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:f May 18 03:36:19 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:19 syzkaller kern.notice kernel: [ 331.487671][ T30] audit: type=1400 audit(2000000176.429:51415): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass May 18 03:36:19 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:19 syzkaller kern.notice kernel: [ 331.513969][ T30] audit: type=1400 audit(2000000176.461:51416): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass May 18 03:36:19 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:19 syzkaller kern.notice kernel: [ 331.540380][ T30] audit: type=1400 audit(2000000176.618:51417): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass May 18 03:36:19 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:20 syzkaller kern.notice kernel: [ 331.566617][ T30] audit: type=1400 audit(2000000176.860:51418): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass May 18 03:36:20 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:20 syzkaller kern.notice kernel: [ 331.592915][ T30] audit: type=1400 audit(2000000176.923:51419): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass [ 336.271200][ T30] kauditd_printk_skb: 59 callbacks suppressed [ 336.271217][ T30] audit: type=1400 audit(2000000183.263:51483): avc: denied { execmem } for pid=22362 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 May 18 03:36:20 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:20 syzkaller kern.notice kernel: [ 331.619132][ T30] audit: type=1400 audit(2000000177.007:51420): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass [ 336.591020][ T30] audit: type=1400 audit(2000000183.358:51484): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 336.617520][ T30] audit: type=1400 audit(2000000183.442:51485): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 336.643952][ T30] audit: type=1400 audit(2000000183.505:51486): avc: denied { read } for pid=3037 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 May 18 03:36:21 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:21 syzkaller kern.notice kernel: [ 331.645481][ T30] audit: type=1400 audit(2000000177.185:51421): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass May 18 03:36:21 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:21 syzkaller kern.notice kernel: [ 331.671877][ T30] audit: type=1400 audit(2000000177.300:51422): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass May 18 03:36:22 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device[ 337.649753][ T30] audit: type=1400 audit(2000000183.746:51487): avc: denied { execmem } for pid=22363 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 337.673773][ T30] audit: type=1400 audit(2000000183.799:51488): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 337.700263][ T30] audit: type=1400 audit(2000000183.998:51489): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 337.726582][ T30] audit: type=1400 audit(2000000184.271:51490): avc: denied { read } for pid=3037 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 337.752051][ T30] audit: type=1400 audit(2000000184.408:51491): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 337.778473][ T30] audit: type=1400 audit(2000000184.576:51492): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 337.891703][ C0] net_ratelimit: 23784 callbacks suppressed [ 337.891723][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 337.892257][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:ee:a7:4c:7c:29, vlan:0) [ 337.898011][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 337.909698][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 337.921925][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 337.933628][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 337.945710][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 337.958264][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:ee:a7:4c:7c:29, vlan:0) [ 337.969594][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 337.981220][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:36:22 syzkaller kern.notice kernel: [ 331.698158][ T30] audit: type=1400 audit(2000000177.437:51423): avc: denied { read } for pid=3037 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket p May 18 03:36:22 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:22 syzkaller kern.warn kernel: [ 333.119197][ C0] net_ratelimit: 23794 callbacks suppressed [ 342.663883][ C0] net_ratelimit: 25157 callbacks suppressed [ 342.663900][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 342.664417][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:ee:a7:4c:7c:29, vlan:0) [ 342.670285][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 342.681866][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 342.694825][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 342.706405][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 342.718470][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 342.730845][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:ee:a7:4c:7c:29, vlan:0) [ 342.742295][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 342.754029][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:36:22 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:22 syzkaller kern.warn kernel: [ 333.119216][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) May 18 03:36:23 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:23 syzkaller kern.warn kernel: [ 333.119386][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:ee:a7:4c:7c:29, vlan:0) May 18 03:36:23 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:23 syzkaller kern.warn kernel: [ 333.125558][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) May 18 03:36:24 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:24 syzkaller kern.warn kernel: [ 333.137197][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:36:25 syzkaller kern.warn kernel: [ 333.149625][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) May 18 03:36:25 syzkaller kern.warn kernel: [ 333.161270][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:36:25 syzkaller kern.warn kernel: [ 333.173356][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 343.724976][ T30] kauditd_printk_skb: 6 callbacks suppressed [ 343.725042][ T30] audit: type=1400 audit(2000000190.769:51499): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 343.760810][ T30] audit: type=1400 audit(2000000190.769:51500): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 343.786697][ T30] audit: type=1400 audit(2000000190.769:51501): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 343.812588][ T30] audit: type=1400 audit(2000000190.769:51502): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 343.838491][ T30] audit: type=1400 audit(2000000190.780:51503): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 343.864411][ T30] audit: type=1400 audit(2000000190.895:51504): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 343.890230][ T30] audit: type=1400 audit(2000000190.916:51505): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 343.916210][ T30] audit: type=1400 audit(2000000190.916:51506): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 343.942090][ T30] audit: type=1400 audit(2000000190.916:51507): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 343.967898][ T30] audit: type=1400 audit(2000000190.916:51508): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 18 03:36:24 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:31 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:31 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:31 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:31 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:31 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:31 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:31 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:31 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:25 syzkaller kern.warn kernel: [ 333.185810][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:ee:a7:4c:7c:29, vlan:0) May 18 03:36:31 syzkaller kern.warn kernel: [ 333.197189][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) May 18 03:36:31 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:31 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:31 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:31 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:31 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:31 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:31 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:31 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:31 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:31 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:31 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:31 syzkaller kern.warn kernel: [ 333.208816][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:36:32 syzkaller kern.warn kernel: [ 336.271200][ T30] kauditd_printk_skb: 59 callbacks suppressed May 18 03:36:32 syzkaller kern.notice kernel: [ 336.271217][ T30] audit: type=1400 audit(2000000183.263:51483): avc: denied { execmem } for pid=22362 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 May 18 03:36:32 syzkaller kern.notice kernel: [ 336.591020][ T30] audit: type=1400 audit(2000000183.358:51484): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass May 18 03:36:32 syzkaller kern.notice kernel: [ 336.617520][ T30] audit: type=1400 audit(2000000183.442:51485): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass May 18 03:36:32 syzkaller kern.notice kernel: [ 336.643952][ T30] audit: type=1400 audit(2000000183.505:51486): avc: denied { read } for pid=3037 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket p May 18 03:36:32 syzkaller kern.notice kernel: [ 337.649753][ T30] audit: type=1400 audit(2000000183.746:51487): avc: denied { execmem } for pid=22363 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 May 18 03:36:32 syzkaller kern.notice kernel: [ 337.673773][ T30] audit: type=1400 audit(2000000183.799:51488): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass May 18 03:36:32 syzkaller kern.notice kernel: [ 337.700263][ T30] audit: type=1400 audit(2000000183.998:51489): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass May 18 03:36:32 syzkaller kern.notice kernel: [ 337.726582][ T30] audit: type=1400 audit(2000000184.271:51490): avc: denied { read } for pid=3037 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket p May 18 03:36:32 syzkaller kern.notice kernel: [ 337.752051][ T30] audit: type=1400 audit(2000000184.408:51491): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass May 18 03:36:32 syzkaller kern.notice kernel: [ 337.778473][ T30] audit: type=1400 audit(2000000184.576:51492): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass May 18 03:36:32 syzkaller kern.warn kernel: [ 337.891703][ C0] net_ratelimit: 23784 callbacks suppressed May 18 03:36:32 syzkaller kern.warn kernel: [ 337.891723][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) May 18 03:36:32 syzkaller kern.warn kernel: [ 337.892257][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:ee:a7:4c:7c:29, vlan:0) May 18 03:36:32 syzkaller kern.warn kernel: [ 337.898011][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) May 18 03:36:32 syzkaller kern.warn kernel: [ 337.909698][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:36:32 syzkaller kern.warn kernel: [ 337.921925][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) May 18 03:36:32 syzkaller kern.warn kernel: [ 337.933628][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:36:32 syzkaller kern.warn kernel: [ 337.945710][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) May 18 03:36:32 syzkaller kern.warn kernel: [ 337.958264][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:ee:a7:4c:7c:29, vlan:0) May 18 03:36:32 syzkaller kern.warn kernel: [ 337.969594][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) May 18 03:36:32 syzkaller kern.warn kernel: [ 337.981220][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:36:31 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:33 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:33 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:33 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:33 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:33 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:33 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:33 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:33 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:33 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:33 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:32 syzkaller kern.warn kernel: [ 342.663883][ C0] net_ratelimit: 25157 callbacks suppressed May 18 03:36:33 syzkaller kern.warn kernel: [ 342.663900][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) May 18 03:36:33 syzkaller kern.warn kernel: [ 342.664417][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:ee:a7:4c:7c:29, vlan:0) May 18 03:36:33 syzkaller kern.warn kernel: [ 342.670285][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) May 18 03:36:33 syzkaller kern.warn kernel: [ 342.681866][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:36:33 syzkaller kern.warn kernel: [ 342.694825][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) May 18 03:36:33 syzkaller kern.warn kernel: [ 342.706405][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:36:33 syzkaller kern.warn kernel: [ 342.718470][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) May 18 03:36:33 syzkaller kern.warn kernel: [ 342.730845][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:ee:a7:4c:7c:29, vlan:0) May 18 03:36:33 syzkaller kern.warn kernel: [ 342.742295][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) May 18 03:36:33 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:33 syzkaller kern.warn kernel: [ 342.754029][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:36:33 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:33 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:33 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:33 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:33 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:33 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:33 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:33 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:33 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:33 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:33 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:33 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:33 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:33 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:33 syzkaller kern.warn kernel: [ 343.724976][ T30] kauditd_printk_skb: 6 callbacks suppressed May 18 03:36:33 syzkaller kern.notice kernel: [ 343.725042][ T30] audit: type=1400 audit(2000000190.769:51499): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass May 18 03:36:33 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:33 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:33 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:33 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:33 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:33 syzkaller kern.notice kernel: [ 343.760810][ T30] audit: type=1400 audit(2000000190.769:51500): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass May 18 03:36:34 syzkaller kern.notice kernel: [ 343.786697][ T30] audit: type=1400 audit(2000000190.769:51501): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass May 18 03:36:33 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:34 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:34 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:34 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:34 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:34 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:34 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:34 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:34 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:34 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:34 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:34 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:34 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:34 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:34 syzkaller kern.notice kernel: [ 343.812588][ T30] audit: type=1400 audit(2000000190.769:51502): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass May 18 03:36:34 syzkaller kern.notice kernel: [ 343.838491][ T30] audit: type=1400 audit(2000000190.780:51503): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass May 18 03:36:34 syzkaller kern.notice kernel: [ 343.864411][ T30] audit: type=1400 audit(2000000190.895:51504): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass May 18 03:36:34 syzkaller kern.notice kernel: [ 343.890230][ T30] audit: type=1400 audit(2000000190.916:51505): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass May 18 03:36:34 syzkaller kern.notice kernel: [ 343.916210][ T30] audit: type=1400 audit(2000000190.916:51506): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass May 18 03:36:34 syzkaller kern.notice kernel: [ 343.942090][ T30] audit: type=1400 audit(2000000190.916:51507): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass May 18 03:36:34 syzkaller kern.notice kernel: [ 343.967898][ T30] audit: type=1400 audit(2000000190.916:51508): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass May 18 03:36:34 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:34 syzkaller daemon.err dhcpcd[3037]: libudev: receiv[ 347.436365][ C1] net_ratelimit: 22949 callbacks suppressed [ 347.436384][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:ee:a7:4c:7c:29, vlan:0) ed NULL device [ 347.436489][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 347.443300][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:36:34 [ 347.455554][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) syzkaller daemon[ 347.480777][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 347.494090][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) .err dhcpcd[3037[ 347.519450][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) ]: libudev: rece[ 347.519983][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:ee:a7:4c:7c:29, vlan:0) [ 347.532550][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) ived NULL device[ 347.557747][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:36:34 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:34 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:34 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:34 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:34 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:34 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:34 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:34 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:34 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:34 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:34 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:34 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:34 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:34 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:35 syzkaller kern.warn kernel: [ 347.436365][ C1] net_ratelimit: 22949 callbacks suppressed May 18 03:36:35 syzkaller kern.warn kernel: [ 347.436384][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:ee:a7:4c:7c:29, vlan:0) May 18 03:36:35 syzkaller kern.warn kernel: [ 347.436489][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) May 18 03:36:35 syzkaller kern.warn kernel: [ 347.443300][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:36:35 syzkaller kern.warn kernel: [ 347.455554][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) May 18 03:36:34 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:35 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:35 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:35 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:35 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:35 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:35 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:35 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:35 syzkaller kern.warn kernel: [ 347.480777][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:36:35 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:35 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:35 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:35 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:35 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:35 syzkaller kern.warn kernel: [ 347.494090][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) May 18 03:36:35 syzkaller kern.warn kernel: [ 347.519450][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) May 18 03:36:35 syzkaller kern.warn kernel: [ 347.519983][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:ee:a7:4c:7c:29, vlan:0) May 18 03:36:35 syzkaller kern.warn kernel: [ 347.532550][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) May 18 03:36:35 syzkaller kern.warn kernel: [ 347.557747][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa[ 348.521653][ T30] kauditd_printk_skb: 296 callbacks suppressed :aa:aa:aa:aa:0c, vlan:0) May 18 03:36:35 syzkal[ 348.521670][ T30] audit: type=1400 audit(2000000196.123:51760): avc: denied { read } for pid=3037 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 ler daemon.err dhcpcd[3037]: libudev: received N[ 348.558008][ T30] audit: type=1400 audit(2000000196.123:51761): avc: denied { read } for pid=3037 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 ULL device May 18 03:36:35 syzkaller daemon.err[ 348.584059][ T30] audit: type=1400 audit(2000000196.123:51762): avc: denied { read } for pid=3037 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 dhcpcd[3037]: libudev: received NULL device [ 348.609402][ T30] audit: type=1400 audit(2000000196.123:51763): avc: denied { read } for pid=3037 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 348.634360][ T30] audit: type=1400 audit(2000000196.123:51764): avc: denied { read } for pid=3037 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 348.659227][ T30] audit: type=1400 audit(2000000196.123:51765): avc: denied { read } for pid=3037 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 May 18 03:36:35 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:35 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:35 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:35 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:35 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:35 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:35 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:36 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:36 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:36 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:36 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:36 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:36 syzkaller kern.warn kernel: [ 348.521653][ T30] kauditd_printk_skb: 296 callbacks suppressed May 18 03:36:36 syzkaller kern.notice kernel: [ 348.521670][ T30] audit: type=1400 audit(2000000196.123:51760): avc: denied { read } for pid=3037 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket p May 18 03:36:36 syzkaller kern.notice kernel: [ 348.558008][ T30] audit: type=1400 audit(2000000196.123:51761): avc: denied { read } for pid=3037 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket p May 18 03:36:36 syzkaller kern.notice kernel: [ 348.584059][ T30] audit: type=1400 audit(2000000196.123:51762): avc: denied { read } for pid=3037 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket p May 18 03:36:36 syzkaller kern.notice kernel: [ 348.609402][ T30] audit: type=1400 audit(2000000196.123:51763): avc: denied { read } for pid=3037 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket p May 18 03:36:36 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:36 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:36 syzkaller kern.notice kernel: [ 348.634360][ T30] audit: type=1400 audit(2000000196.123:51764): avc: denied { read } for pid=3037 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket p May 18 03:36:36 syzkaller kern.notice kernel: [ 348.659227][ T30] audit: type=1400 audit(2000000196.123:51765): avc: denied { read } for pid=3037 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket p May 18 03:36:36 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:36 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:36 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:36 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:36 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:36 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:36 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:36 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:36 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:36 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:36 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:36 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:36 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:36 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:36 syzkaller daemon[ 349.557666][ T2981] audit: audit_backlog=65 > audit_backlog_limit=64 .err dhcpcd[3037]: libudev: received NULL device[ 349.568423][ T2981] audit: audit_lost=866 audit_rate_limit=0 audit_backlog_limit=64 May 18 03:36:36 syzkaller daemon.err dhcpcd[30[ 349.580412][ T2981] audit: backlog limit exceeded 37]: libudev: received NULL device May 18 03:36:36 [ 349.880074][ T2981] audit: audit_backlog=65 > audit_backlog_limit=64 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:36 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:36 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:36 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:36 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:36 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:36 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:36 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:36 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:37 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:37 syzkaller kern.warn kernel: [ 349.557666][ T2981] audit: audit_backlog=65 > audit_backlog_limit=64 May 18 03:36:37 syzkaller kern.warn kernel: [ 349.568423][ T2981] audit: audit_lost=866 audit_rate_limit=0 audit_backlog_limit=64 May 18 03:36:37 syzkaller kern.err kernel: [ 349.580412][ T2981] audit: backlog limit exceeded May 18 03:36:37 syzkaller kern.warn kernel: [ 349.880074][ T2981] audit: audit_backlog=65 > audit_backlog_limit=64 May 18 03:36:37 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:37 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:37 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:37 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:37 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:37 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:37 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:37 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:37 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:37 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:37 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:37 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:37 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:37 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:37 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:38 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:38 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:38 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:38 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:38 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:38 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:38 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:38 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:38 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device [ 352.208516][ C0] net_ratelimit: 23314 callbacks suppressed [ 352.208534][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 352.209396][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:ee:a7:4c:7c:29, vlan:0) [ 352.214860][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 352.226530][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 352.238748][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 352.250480][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 352.262508][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 352.275031][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:ee:a7:4c:7c:29, vlan:0) [ 352.286427][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 352.298009][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 353.372716][ T30] kauditd_printk_skb: 253 callbacks suppressed [ 353.372736][ T30] audit: type=1400 audit(2000000200.207:51831): avc: denied { execmem } for pid=22374 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 May 18 03:36:41 syzkaller kern.warn kernel: [ 352.208516][ C0] net_ratelimit: 23314 callbacks suppressed May 18 03:36:41 syzkaller kern.warn kernel: [ 352.208534][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) May 18 03:36:41 syzkaller kern.warn kernel: [ 352.209396][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:ee:a7:4c:7c:29, vlan:0) May 18 03:36:41 syzkaller kern.warn kernel: [ 352.214860][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) May 18 03:36:41 syzkaller kern.warn kernel: [ 352.226530][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:36:41 syzkaller kern.warn kernel: [ 352.238748][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) May 18 03:36:41 syzkaller kern.warn kernel: [ 352.250480][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:36:41 syzkaller kern.warn kernel: [ 352.262508][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) May 18 03:36:41 syzkaller kern.warn kernel: [ 352.275031][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:ee:a7:4c:7c:29, vlan:0) May 18 03:36:41 syzkaller kern.warn kernel: [ 352.286427][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) May 18 03:36:41 syzkaller kern.warn kernel: [ 352.298009][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:36:41 syzkaller kern.warn kernel: [ 353.372716][ T30] kauditd_printk_skb: 253 callbacks suppressed May 18 03:36:41 syzkaller kern.notice kernel: [ 353.372736][ T30] audit: type=1400 audit(2000000200.207:51831): avc: denied { execmem } for pid=22374 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 353.925629][ T30] audit: type=1400 audit(2000000201.477:51832): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 353.951448][ T30] audit: type=1400 audit(2000000201.477:51833): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 353.977446][ T30] audit: type=1400 audit(2000000201.477:51834): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 354.003372][ T30] audit: type=1400 audit(2000000201.477:51835): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 354.029366][ T30] audit: type=1400 audit(2000000201.477:51836): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 354.055333][ T30] audit: type=1400 audit(2000000201.530:51837): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 354.081186][ T30] audit: type=1400 audit(2000000201.530:51838): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 354.107251][ T30] audit: type=1400 audit(2000000201.530:51839): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 354.133323][ T30] audit: type=1400 audit(2000000201.530:51840): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 18 03:36:42 syzkaller kern.notice kernel: [ 353.925629][ T30] audit: type=1400 audit(2000000201.477:51832): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass May 18 03:36:42 syzkaller kern.notice kernel: [ 353.951448][ T30] audit: type=1400 audit(2000000201.477:51833): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass May 18 03:36:42 syzkaller kern.notice kernel: [ 353.977446][ T30] audit: type=1400 audit(2000000201.477:51834): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass May 18 03:36:42 syzkaller kern.notice kernel: [ 354.003372][ T30] audit: type=1400 audit(2000000201.477:51835): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass May 18 03:36:42 syzkaller kern.notice kernel: [ 354.029366][ T30] audit: type=1400 audit(2000000201.477:51836): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass May 18 03:36:42 syzkaller kern.notice kernel: [ 354.055333][ T30] audit: type=1400 audit(2000000201.530:51837): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass May 18 03:36:42 syzkaller kern.notice kernel: [ 354.081186][ T30] audit: type=1400 audit(2000000201.530:51838): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass May 18 03:36:42 syzkaller kern.notice kernel: [ 354.107251][ T30] audit: type=1400 audit(2000000201.530:51839): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass May 18 03:36:42 syzkaller kern.notice kernel: [ 354.133323][ T30] audit: type=1400 audit(2000000201.530:51840): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass [ 356.980898][ C1] net_ratelimit: 24120 callbacks suppressed [ 356.980916][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 356.981180][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 356.987045][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 356.999287][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 357.012173][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:ee:a7:4c:7c:29, vlan:0) [ 357.027728][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 357.035124][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 357.047367][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 357.059032][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 357.071577][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) May 18 03:36:45 syzkaller kern.warn kernel: [ 356.980898][ C1] net_ratelimit: 24120 callbacks suppressed May 18 03:36:45 syzkaller kern.warn kernel: [ 356.980916][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:36:45 syzkaller kern.warn kernel: [ 356.981180][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) May 18 03:36:45 syzkaller kern.warn kernel: [ 356.987045][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:36:45 syzkaller kern.warn kernel: [ 356.999287][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) May 18 03:36:45 syzkaller kern.warn kernel: [ 357.012173][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:ee:a7:4c:7c:29, vlan:0) May 18 03:36:45 syzkaller kern.warn kernel: [ 357.027728][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) May 18 03:36:45 syzkaller kern.warn kernel: [ 357.035124][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:36:45 syzkaller kern.warn kernel: [ 357.047367][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) May 18 03:36:45 syzkaller kern.warn kernel: [ 357.059032][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:36:45 syzkaller kern.warn kernel: [ 357.071577][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 358.310613][ T30] kauditd_printk_skb: 28 callbacks suppressed [ 358.310630][ T30] audit: type=1400 audit(2000000206.401:51869): avc: denied { execmem } for pid=22379 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 May 18 03:36:46 syzkaller kern.warn kernel: [ 358.310613][ T30] kauditd_printk_skb: 28 callbacks suppressed May 18 03:36:46 syzkaller kern.notice kernel: [ 358.310630][ T30] audit: type=1400 audit(2000000206.401:51869): avc: denied { execmem } for pid=22379 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 358.575662][ T30] audit: type=1400 audit(2000000206.443:51870): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 358.601698][ T30] audit: type=1400 audit(2000000206.443:51871): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 18 03:36:46 syzkaller kern.notice kernel: [ 358.575662][ T30] audit: type=1400 audit(2000000206.443:51870): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass May 18 03:36:46 syzkaller kern.notice kernel: [ 358.601698][ T30] audit: type=1400 audit(2000000206.443:51871): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass [ 358.976749][ T30] audit: type=1400 audit(2000000206.768:51872): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 359.002712][ T30] audit: type=1400 audit(2000000206.768:51873): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 359.028651][ T30] audit: type=1400 audit(2000000206.989:51874): avc: denied { execmem } for pid=22380 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 May 18 03:36:47 syzkaller kern.notice kernel: [ 358.976749][ T30] audit: type=1400 audit(2000000206.768:51872): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass May 18 03:36:47 syzkaller kern.notice kernel: [ 359.002712][ T30] audit: type=1400 audit(2000000206.768:51873): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass May 18 03:36:47 syzkaller kern.notice kernel: [ 359.028651][ T30] audit: type=1400 audit(2000000206.989:51874): avc: denied { execmem } for pid=22380 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 359.566972][ T30] audit: type=1400 audit(2000000207.220:51875): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 359.592881][ T30] audit: type=1400 audit(2000000207.220:51876): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 359.619110][ T30] audit: type=1400 audit(2000000207.220:51877): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 359.648775][ T30] audit: type=1400 audit(2000000207.325:51878): avc: denied { execmem } for pid=22381 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 May 18 03:36:47 syzkaller kern.notice kernel: [ 359.566972][ T30] audit: type=1400 audit(2000000207.220:51875): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass May 18 03:36:47 syzkaller kern.notice kernel: [ 359.592881][ T30] audit: type=1400 audit(2000000207.220:51876): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass May 18 03:36:47 syzkaller kern.notice kernel: [ 359.619110][ T30] audit: type=1400 audit(2000000207.220:51877): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass May 18 03:36:47 syzkaller kern.notice kernel: [ 359.648775][ T30] audit: type=1400 audit(2000000207.325:51878): avc: denied { execmem } for pid=22381 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 May 18 03:36:38 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:49 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:49 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:49 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:49 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:49 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:49 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:49 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:49 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:49 [ 361.753405][ C0] net_ratelimit: 23507 callbacks suppressed syzkaller daemon[ 361.753432][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) .err dhcpcd[3037[ 361.753999][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:ee:a7:4c:7c:29, vlan:0) ]: libudev: rece[ 361.760266][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 361.773472][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) ived NULL device[ 361.787031][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 361.812199][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 361.825510][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 361.838285][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:ee:a7:4c:7c:29, vlan:0) [ 361.849478][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 361.861209][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:36:49 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:50 syzkaller kern.warn kernel: [ 361.753405][ C0] net_ratelimit: 23507 callbacks suppressed May 18 03:36:50 syzkaller kern.warn kernel: [ 361.753432][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) May 18 03:36:50 syzkaller kern.warn kernel: [ 361.753999][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:ee:a7:4c:7c:29, vlan:0) May 18 03:36:50 syzkaller kern.warn kernel: [ 361.760266][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) May 18 03:36:50 syzkaller kern.warn kernel: [ 361.773472][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:36:50 syzkaller kern.warn kernel: [ 361.787031][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) May 18 03:36:50 syzkaller kern.warn kernel: [ 361.812199][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:36:50 syzkaller kern.warn kernel: [ 361.825510][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) May 18 03:36:50 syzkaller kern.warn kernel: [ 361.838285][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:ee:a7:4c:7c:29, vlan:0) May 18 03:36:50 syzkaller kern.warn kernel: [ 361.849478][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) May 18 03:36:50 syzkaller kern.warn kernel: [ 361.861209][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 366.415507][ T30] kauditd_printk_skb: 32 callbacks suppressed [ 366.415522][ T30] audit: type=1400 audit(2000000212.007:51911): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 366.452733][ T30] audit: type=1400 audit(2000000212.007:51912): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 366.479123][ T30] audit: type=1400 audit(2000000212.007:51913): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 366.505488][ T30] audit: type=1400 audit(2000000212.007:51914): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 366.525672][ C0] net_ratelimit: 24685 callbacks suppressed [ 366.525705][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 366.528262][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:ee:a7:4c:7c:29, vlan:0) [ 366.533870][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 366.545511][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 366.557841][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 366.569440][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 366.581545][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 366.593986][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:ee:a7:4c:7c:29, vlan:0) [ 366.605362][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 366.617133][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 366.654974][ T30] audit: type=1400 audit(2000000212.112:51915): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 366.681448][ T30] audit: type=1400 audit(2000000212.112:51916): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 366.712010][ T30] audit: type=1400 audit(2000000212.112:51917): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 366.738217][ T30] audit: type=1400 audit(2000000212.122:51918): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 366.764638][ T30] audit: type=1400 audit(2000000212.164:51919): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 366.791062][ T30] audit: type=1400 audit(2000000212.164:51920): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 18 03:36:50 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:54 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:54 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:54 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:54 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:54 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:54 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:54 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:54 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:54 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:55 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:55 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:55 syzkaller kern.warn kernel: [ 366.415507][ T30] kauditd_printk_skb: 32 callbacks suppressed May 18 03:36:55 syzkaller kern.notice kernel: [ 366.415522][ T30] audit: type=1400 audit(2000000212.007:51911): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass May 18 03:36:55 syzkaller kern.notice kernel: [ 366.452733][ T30] audit: type=1400 audit(2000000212.007:51912): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass May 18 03:36:55 syzkaller kern.notice kernel: [ 366.479123][ T30] audit: type=1400 audit(2000000212.007:51913): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass May 18 03:36:55 syzkaller kern.notice kernel: [ 366.505488][ T30] audit: type=1400 audit(2000000212.007:51914): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass May 18 03:36:55 syzkaller kern.warn kernel: [ 366.525672][ C0] net_ratelimit: 24685 callbacks suppressed May 18 03:36:55 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:55 syzkaller kern.warn kernel: [ 366.525705][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) May 18 03:36:55 syzkaller kern.warn kernel: [ 366.528262][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:ee:a7:4c:7c:29, vlan:0) May 18 03:36:55 syzkaller kern.warn kernel: [ 366.533870][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) May 18 03:36:55 syzkaller kern.warn kernel: [ 366.545511][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:36:55 syzkaller kern.warn kernel: [ 366.557841][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) May 18 03:36:55 syzkaller kern.warn kernel: [ 366.569440][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:36:55 syzkaller kern.warn kernel: [ 366.581545][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) May 18 03:36:55 syzkaller kern.warn kernel: [ 366.593986][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:ee:a7:4c:7c:29, vlan:0) May 18 03:36:55 syzkaller kern.warn kernel: [ 366.605362][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) May 18 03:36:55 syzkaller kern.warn kernel: [ 366.617133][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:36:55 syzkaller kern.notice kernel: [ 366.654974][ T30] audit: type=1400 audit(2000000212.112:51915): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass May 18 03:36:55 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:56 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:56 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:55 syzkaller kern.notice kernel: [ 366.681448][ T30] audit: type=1400 audit(2000000212.112:51916): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass May 18 03:36:56 syzkaller kern.notice kernel: [ 366.712010][ T30] audit: type=1400 audit(2000000212.112:51917): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass May 18 03:36:56 syzkaller kern.notice kernel: [ 366.738217][ T30] audit: type=1400 audit(2000000212.122:51918): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass May 18 03:36:56 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:57 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:57 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:57 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:57 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:57 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:57 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:57 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:57 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:57 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:57 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:57 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:57 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:57 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:57 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:57 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:57 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:57 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:57 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:57 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:57 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:57 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:57 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:57 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:57 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:57 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:56 syzkaller kern.notice kernel: [ 366.764638][ T30] audit: type=1400 audit(2000000212.164:51919): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass May 18 03:36:57 syzkaller kern.notice kernel: [ 366.791062][ T30] audit: type=1400 audit(2000000212.164:51920): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass May 18 03:36:57 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:57 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:57 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:57 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:57 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:57 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:57 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:58 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:58 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:58 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:58 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:58 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:58 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:58 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:58 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:58 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:58 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:58 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:58 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:58 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:58 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:58 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:58 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:59 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:59 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:59 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:59 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:59 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:59 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:59 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:59 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:59 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:59 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:59 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:59 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:59 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:59 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:59 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:59 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:59 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:59 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:59 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:59 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:59 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:59 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:59 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:59 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:59 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device [ 371.297994][ C1] net_ratelimit: 23443 callbacks suppressed [ 371.298014][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 371.298271][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 371.304960][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:ee:a7:4c:7c:29, vlan:0) [ 371.316357][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 371.327972][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 371.340201][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 371.351946][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 371.364146][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 371.376729][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:ee:a7:4c:7c:29, vlan:0) [ 371.388204][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) May 18 03:36:59 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device[ 371.603143][ T30] kauditd_printk_skb: 249 callbacks suppressed [ 371.603163][ T30] audit: type=1400 audit(2000000220.300:52125): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 18 03:36:59 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:59 syzkaller daemon.err dhcpcd[3037]: libudev: rece[ 371.841686][ T30] audit: type=1400 audit(2000000220.437:52126): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ived NULL device[ 371.867813][ T30] audit: type=1400 audit(2000000220.500:52127): avc: denied { execmem } for pid=22394 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 371.892078][ T30] audit: type=1400 audit(2000000220.605:52128): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 373.281866][ T30] audit: type=1400 audit(2000000220.689:52129): avc: denied { read } for pid=3037 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 May 18 03:36:59 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device [ 373.423589][ T30] audit: type=1400 audit(2000000222.169:52130): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 373.529132][ T30] audit: type=1400 audit(2000000222.295:52131): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 18 03:36:59 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:59 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:59 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:59 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:59 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:59 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:36:59 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:37:00 syzkaller kern.warn kernel: [ 371.297994][ C1] net_ratelimit: 23443 callbacks suppressed May 18 03:37:00 syzkaller kern.warn kernel: [ 371.298014][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:36:59 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:37:00 syzkaller kern.warn kernel: [ 371.298271][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) May 18 03:37:02 syzkaller kern.warn kernel: [ 371.304960][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:ee:a7:4c:7c:29, vlan:0)[ 374.892512][ T30] audit: type=1400 audit(2000000223.019:52132): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 374.918742][ T30] audit: type=1400 audit(2000000223.124:52133): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 374.945075][ T30] audit: type=1400 audit(2000000223.198:52134): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 18 03:37:02 syzkaller kern.warn kernel: [ 371.316357][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) May 18 03:37:03 syzkaller kern.warn kernel: [ 371.327972][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:37:03 syzkaller kern.warn kernel: [ 371.340201][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) May 18 03:37:03 syzkaller kern.warn kernel: [ 371.351946][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)[ 375.898814][ C0] ================================================================== [ 375.907004][ C0] BUG: KCSAN: data-race in batadv_bla_tx / batadv_bla_tx [ 375.914176][ C0] [ 375.916516][ C0] write to 0xffff888117ccb720 of 8 bytes by interrupt on cpu 1: [ 375.924177][ C0] batadv_bla_tx+0x7b4/0xc40 [ 375.928912][ C0] batadv_interface_tx+0x34a/0xb30 [ 375.934456][ C0] dev_hard_start_xmit+0x119/0x3f0 [ 375.939603][ C0] __dev_queue_xmit+0x100a/0x2090 [ 375.944656][ C0] br_dev_queue_push_xmit+0x444/0x500 [ 375.950072][ C0] br_forward_finish+0x90/0x160 [ 375.954961][ C0] br_nf_forward_finish+0x6b1/0x720 [ 375.960285][ C0] br_nf_forward+0xae2/0xe70 [ 375.964934][ C0] nf_hook_slow+0x86/0x1b0 [ 375.969379][ C0] __br_forward+0x27d/0x360 [ 375.973910][ C0] maybe_deliver+0x1c0/0x260 [ 375.978554][ C0] br_flood+0x246/0x490 [ 375.982736][ C0] br_handle_frame_finish+0xd19/0xe90 [ 375.988140][ C0] br_handle_frame+0x5af/0x9b0 [ 375.992935][ C0] __netif_receive_skb_core+0xb1a/0x2350 [ 375.998600][ C0] __netif_receive_skb+0x5a/0x280 [ 376.003952][ C0] process_backlog+0x22e/0x440 [ 376.009288][ C0] __napi_poll+0x63/0x3c0 [ 376.013650][ C0] net_rx_action+0x3a1/0x7f0 [ 376.018285][ C0] handle_softirqs+0xbf/0x280 [ 376.023169][ C0] do_softirq+0x5e/0x90 [ 376.027359][ C0] __local_bh_enable_ip+0x6e/0x70 [ 376.032411][ C0] _raw_spin_unlock_bh+0x36/0x40 [ 376.037458][ C0] batadv_dat_purge+0x1e0/0x260 [ 376.042349][ C0] process_scheduled_works+0x4db/0xa20 [ 376.047834][ C0] worker_thread+0x51d/0x6f0 [ 376.052460][ C0] kthread+0x4ae/0x520 [ 376.056556][ C0] ret_from_fork+0x4b/0x60 [ 376.060997][ C0] ret_from_fork_asm+0x1a/0x30 [ 376.065794][ C0] [ 376.068128][ C0] write to 0xffff888117ccb720 of 8 bytes by interrupt on cpu 0: [ 376.075799][ C0] batadv_bla_tx+0x7b4/0xc40 [ 376.080427][ C0] batadv_interface_tx+0x34a/0xb30 [ 376.085582][ C0] dev_hard_start_xmit+0x119/0x3f0 [ 376.090768][ C0] __dev_queue_xmit+0x100a/0x2090 [ 376.095821][ C0] br_dev_queue_push_xmit+0x444/0x500 [ 376.098739][ C1] net_ratelimit: 23329 callbacks suppressed [ 376.098765][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:ee:a7:4c:7c:29, vlan:0) [ 376.101205][ C0] br_forward_finish+0x90/0x160 [ 376.107305][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 376.119522][ C0] br_nf_forward_finish+0x6b1/0x720 [ 376.119554][ C0] br_nf_forward+0xae2/0xe70 [ 376.124616][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 376.136353][ C0] nf_hook_slow+0x86/0x1b0 [ 376.136395][ C0] __br_forward+0x27d/0x360 [ 376.142894][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:ee:a7:4c:7c:29, vlan:0) [ 376.146287][ C0] maybe_deliver+0x1c0/0x260 [ 376.158452][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 376.162655][ C0] br_flood+0x246/0x490 [ 376.167360][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 376.179095][ C0] br_handle_frame_finish+0xd19/0xe90 [ 376.179131][ C0] br_handle_frame+0x5af/0x9b0 [ 376.185041][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:ee:a7:4c:7c:29, vlan:0) [ 376.195579][ C0] __netif_receive_skb_core+0xb1a/0x2350 [ 376.199919][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 376.211775][ C0] __netif_receive_skb+0x5a/0x280 [ 376.211811][ C0] process_backlog+0x22e/0x440 [ 376.217427][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 376.221944][ C0] __napi_poll+0x63/0x3c0 [ 376.235541][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:ee:a7:4c:7c:29, vlan:0) [ 376.239959][ C0] net_rx_action+0x3a1/0x7f0 [ 376.294911][ C0] handle_softirqs+0xbf/0x280 [ 376.299628][ C0] do_softirq+0x5e/0x90 [ 376.303900][ C0] __local_bh_enable_ip+0x6e/0x70 [ 376.308999][ C0] _raw_spin_unlock_bh+0x36/0x40 [ 376.313965][ C0] nsim_dev_trap_report_work+0x522/0x620 [ 376.319647][ C0] process_scheduled_works+0x4db/0xa20 [ 376.325154][ C0] worker_thread+0x51d/0x6f0 [ 376.329784][ C0] kthread+0x4ae/0x520 [ 376.333879][ C0] ret_from_fork+0x4b/0x60 [ 376.338332][ C0] ret_from_fork_asm+0x1a/0x30 [ 376.343130][ C0] [ 376.345469][ C0] value changed: 0x0000000100002106 -> 0x0000000100002107 [ 376.352588][ C0] [ 376.354931][ C0] Reported by Kernel Concurrency Sanitizer on: [ 376.361113][ C0] CPU: 0 UID: 0 PID: 51 Comm: kworker/u8:3 Not tainted 6.14.0-rc6-syzkaller-00202-ga29967be967e #0 [ 376.372001][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 376.382163][ C0] Workqueue: events_unbound nsim_dev_trap_report_work [ 376.389004][ C0] ================================================================== [ 376.560012][T22395] Process accounting resumed May 18 03:37:03 syzkaller kern.warn kernel: [ 371.364146][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) May 18 03:37:[ 378.369397][ T30] kauditd_printk_skb: 15 callbacks suppressed 03 syzkaller kern.warn kernel: [ 371.376729][ [ 378.369417][ T30] audit: type=1400 audit(2000000225.749:52150): avc: denied { read write } for pid=3410 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 C1] bridge0: received packet on veth0_to_bridg[ 378.409678][ T30] audit: type=1400 audit(2000000227.439:52151): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 e with own address as source address (addr:8e:ee[ 378.435580][ T30] audit: type=1400 audit(2000000227.439:52152): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 :a7:4c:7c:29, vlan:0) [ 378.462083][ T30] audit: type=1400 audit(2000000227.449:52153): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 18 03:37:03 syzkaller kern.warn kernel: [ 371.388204][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) May 18 03:37:03 syzkaller kern.warn kernel: [ 371.603143][ T30] kauditd_printk_skb: 249 callbacks suppressed May 18 03:37:03 syzkaller kern.notice kernel: [ 371.603163][ T30] audit: type=1400 audit(2000000220.300:52125): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass May 18 03:37:03 syzkaller kern.notice kernel: [ 371.841686][ T30] audit: type=1400 audit(2000000220.437:52126): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass May 18 03:37:03 syzkaller kern.notice kernel: [ 371.867813][ T30] audit: type=1400 audit(2000000220.500:52127): avc: denied { execmem } for pid=22394 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 May 18 03:37:03 syzkaller kern.notice kernel: [ 371.892078][ T30] audit: type=1400 audit(2000000220.605:52128): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass May 18 03:37:04 syzkaller kern.notice kernel: [ 373.281866][ T30] audit: type=1400 audit(2000000220.689:52129): avc: denied { read } for pid=3037 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket p May 18 03:37:00 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:37:04 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:37:04 syzkaller kern.notice kernel: [ 373.423589][ T30] audit: type=1400 audit(2000000222.169:52130): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass May 18 03:37:07 syzkaller kern.notice kernel: [ 373.529132][ T30] audit: type=1400 audit(2000000222.295:52131): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass May 18 03:37:07 syzkaller kern.notice kernel: [ 374.892512][ T30] audit: type=1400 audit(2000000223.019:52132): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass May 18 03:37:04 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:37:07 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:37:07 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:37:07 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:37:07 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:37:07 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:37:07 syzkaller kern.notice kernel: [ 374.918742][ T30] audit: type=1400 audit(2000000223.124:52133): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass May 18 03:37:07 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:37:08 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:37:08 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:37:08 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:37:08 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:37:08 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:37:08 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:37:08 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:37:08 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:37:08 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:37:08 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:37:08 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:37:08 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:37:08 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:37:08 syzkaller kern.notice kernel: [ 374.945075][ T30] audit: type=1400 audit(2000000223.198:52134): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass May 18 03:37:08 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:37:08 syzkaller kern.err kernel: [ 375.898814][ C0] ================================================================== May 18 03:37:08 syzkaller kern.err kernel: [ 375.907004][ C0] BUG: KCSAN: data-race in batadv_bla_tx / batadv_bla_tx May 18 03:37:08 syzkaller kern.err kernel: [ 375.914176][ C0] May 18 03:37:08 syzkaller kern.err kernel: [ 375.916516][ C0] write to 0xffff888117ccb720 of 8 bytes by interrupt on cpu 1: May 18 03:37:08 syzkaller kern.warn kernel: [ 375.924177][ C[ 379.496555][ T2981] audit: audit_backlog=65 > audit_backlog_limit=64 0] batadv_bla_tx+0x7b4/0xc40 May 18 03:37:08 s[ 379.507071][ T2981] audit: audit_lost=945 audit_rate_limit=0 audit_backlog_limit=64 yzkaller kern.warn kernel: [ 375.928912][ C0[ 379.519166][ T2981] audit: backlog limit exceeded ] batadv_interface_tx+0x34a/0xb30 May 18 03:37:08 syzkaller kern.warn kernel: [ 375.934456][ C0] dev_hard_start_xmit+0x119/0x3f0 May 18 03:37:08 syzkaller kern.warn kernel: [ 375.939603][ C0] __dev_queue_xmit+0x100a/0x2090 May 18 03:37:08 syzkaller kern.warn kernel: [ 375.944656][ C0] br_dev_queue_push_xmit+0x444/0x500 [ 379.695442][ T2981] audit: audit_backlog=65 > audit_backlog_limit=64 [ 379.705957][ T2981] audit: audit_lost=946 audit_rate_limit=0 audit_backlog_limit=64 [ 379.717834][ T2981] audit: backlog limit exceeded May 18 03:37:08 syzkaller kern.warn kernel: [ 375.950072][ C0] br_forward_finish+0x90/0x160 May 18 03:37:08 syzkaller kern.warn kernel: [ 375.954961][ C0] br_nf_forward_finish+0x6b1/0x720 May 18 03:37:08 syzkaller kern.warn kernel: [ 375.960285][ C0] br_nf_forward+0xae2/0xe70 May 18 03:37:08 syzkaller kern.warn kernel: [ 375.964934][ C0] nf_hook_slow+0x86/0x1b0 May 18 03:37:08 syzkaller kern.warn kernel: [ 375.969379][ C0] __br_forward+0x27d/0x360 May 18 03:37:08 syzkaller kern.warn kernel: [ 375.973910][ C0] maybe_deliver+0x1c0/0x260 May 18 03:37:08 syzkaller kern.warn kernel: [ 375.978554][ C0] br_flood+0x246/0x490 May 18 03:37:08 syzkaller kern.warn kernel: [ 375.982736][ C0] br_handle_frame_finish+0xd19/0xe90 May 18 03:37:08 syzkaller kern.warn kernel: [ 375.988140][ C0] br_handle_frame+0x5af/0x9b0 May 18 03:37:08 syzkaller kern.warn kernel: [ 375.992935][ C0] __netif_receive_skb_core+0xb1a/0x2350 May 18 03:37:08 syzkaller kern.warn kernel: [ 375.998600][ C0] __netif_receive_skb+0x5a/0x280 May 18 03:37:08 syzkaller kern.warn kernel: [ 376.003952][ C0] process_backlog+0x22e/0x440 May 18 03:37:08 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:37:09 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:37:09 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:37:09 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:37:09 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:37:09 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:37:09 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:37:09 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:37:08 syzkaller kern.warn kernel: [ 376.009288][ C0] __napi_poll+0x63/0x3c0 May 18 03:37:09 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:37:09 syzkaller kern.warn kernel: [ 376.013650][ C0] net_rx_action+0x3a1/0x7f0 May 18 03:37:09 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:37:09 syzkaller kern.warn kernel: [ 376.018285][ C0] handle_softirqs+0xbf/0x280 May 18 03:37:09 syzkaller kern.warn kernel: [ 376.023169][ C0] do_softirq+0x5e/0x90 May 18 03:37:09 syzkaller kern.warn kernel: [ 376.027359][ C0] __local_bh_enable_ip+0x6e/0x70 May 18 03:37:09 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:37:09 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device [ 380.871045][ C1] net_ratelimit: 21269 callbacks suppressed [ 380.871065][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 380.871193][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 380.877216][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 380.889384][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 380.901963][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:ee:a7:4c:7c:29, vlan:0) [ 380.913233][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 380.924875][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 380.937147][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 380.948850][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 380.960925][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) May 18 03:37:09 syzkaller kern.warn kernel: [ 376.032411][ C0] _raw_spin_unlock_bh+0x36/0x40 May 18 03:37:09 syzkaller kern.warn kernel: [ 376.037458][ C0] batadv_dat_purge+0x1e0/0x260 May 18 03:37:09 syzkaller kern.warn kernel: [ 376.042349][ C0] process_scheduled_works+0x4db/0xa20 May 18 03:37:09 syzkaller kern.warn kernel: [ 376.047834][ C0] worker_thread+0x51d/0x6f0 May 18 03:37:09 syzkaller kern.warn kernel: [ 376.052460][ C0] kthread+0x4ae/0x520 May 18 03:37:09 syzkaller kern.warn kernel: [ 376.056556][ C0] ret_from_fork+0x4b/0x60 May 18 03:37:09 syzkaller kern.warn kernel: [ 376.060997][ C0] ret_from_fork_asm+0x1a/0x30 May 18 03:37:10 syzkaller kern.err kernel: [ 376.065794][ C0] May 18 03:37:10 syzkaller kern.err kernel: [ 376.068128][ C0] write to 0xffff888117ccb720 of 8 bytes by interrupt on cpu 0: May 18 03:37:10 syzkaller kern.warn kernel: [ 376.075799][ C0] batadv_bla_tx+0x7b4/0xc40 May 18 03:37:10 syzkaller kern.warn kernel: [ 376.080427][ C0] batadv_interface_tx+0x34a/0xb30 May 18 03:37:10 syzkaller kern.warn kernel: [ 376.085582][ C0] dev_hard_start_xmit+0x119/0x3f0 May 18 03:37:09 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:37:10 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:37:10 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:37:10 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:37:10 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:37:10 syzkaller kern.warn kernel: [ 376.090768][ C0] __dev_queue_xmit+0x100a/0x2090 May 18 03:37:10 syzkaller daemon.err dhcpcd[3037]: ps_sendpsmmsg: Connection refused May 18 03:37:10 syzkaller daemon.err dhcpcd[3037]: ps_root_recvmsgcb: failed to send message to pid 22344: Connection refused May 18 03:37:10 syzkaller kern.warn kernel: [ 376.095821][ C0] br_dev_queue_push_xmit+0x444/0x500 May 18 03:37:10 syzkaller kern.warn kernel: [ 376.098739][ C1] net_ratelimit: 23329 callbacks suppressed May 18 03:37:10 syzkaller kern.warn kernel: [ 376.098765][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:ee:a7:4c:7c:29, vlan:0) May 18 03:37:10 syzkaller kern.warn kernel: [ 376.101205][ C0] br_forward_finish+0x90/0x160 May 18 03:37:10 syzkaller kern.warn kernel: [ 376.107305][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:37:10 syzkaller kern.warn kernel: [ 376.119522][ C0] br_nf_forward_finish+0x6b1/0x720 May 18 03:37:10 syzkaller kern.warn kernel: [ 376.119554][ C0] br_nf_forward+0xae2/0xe70 May 18 03:37:10 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:37:10 syzkaller kern.warn kernel: [ 376.124616][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:37:10 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device[ 383.140918][ T30] kauditd_printk_skb: 218 callbacks suppressed [ 383.140937][ T30] audit: type=1400 audit(2000000232.457:52264): avc: denied { read } for pid=3037 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 May 18 03:37:11 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:37:11 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device [ 383.369043][ T30] audit: type=1400 audit(2000000232.583:52265): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 383.396907][ T30] audit: type=1400 audit(2000000232.625:52266): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 383.423428][ T30] audit: type=1400 audit(2000000232.636:52267): avc: denied { read } for pid=3037 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 May 18 03:37:11 syzkaller daemon.err dhcpcd[3037]: ps_sendpsmmsg: Connection refused May 18 03:37:11 syzkaller daemon.err dhcpcd[3037]: ps_root_recvmsgcb: failed to send message to pid 22343: Connection refused May 18 03:37:10 syzkaller kern.warn kernel: [ 376.136353][ C0] nf_hook_slow+0x86/0x1b0 May 18 03:37:11 syzkaller kern.warn kernel: [ 376.136395][ C0] __br_forward+0x27d/0x360 May 18 03:37:12 syzkaller kern.warn kernel: [ 376.142894][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:ee:a7:4c:7c:29, vlan:0) [ 384.007987][ T30] audit: type=1400 audit(2000000232.845:52268): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 384.034400][ T30] audit: type=1400 audit(2000000232.898:52269): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 384.060639][ T30] audit: type=1400 audit(2000000232.908:52270): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 384.086857][ T30] audit: type=1400 audit(2000000233.076:52271): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 384.112907][ T30] audit: type=1400 audit(2000000233.255:52272): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 18 03:37:12 syzkaller kern.warn kernel: [ 376.146287][ C0] maybe_deliver+0x1c0/0x260 May 18 03:37:12 syzkaller kern.warn kernel: [ 376.158452][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:37:12 syzkaller kern.warn kernel: [ 376.162655][ C0] br_flood+0x246/0x490 May 18 03:37:11 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:37:12 syzkaller kern.warn kernel: [ 376.167360][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:37:12 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:37:12 syzkaller kern.warn kernel: [ 376.179095][ C0] br_handle_frame_finish+0xd19/0xe90 May 18 03:37:12 syzkaller kern.warn kernel: [ 376.179131][ C0] br_handle_frame+0x5af/0x9b0 [ 384.910207][ T30] audit: type=1400 audit(2000000233.559:52273): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 18 03:37:12 syzkaller kern.warn kernel: [ 376.185041][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:ee:a7:4c:7c:29, vlan:0) May 18 03:37:12 syzkaller kern.warn kernel: [ 376.195579][ C0] __netif_receive_skb_core+0xb1a/0x2350 May 18 03:37:12 syzkaller daemon.err dhcpcd[3037]: libudev: received NULL device May 18 03:37:13 syzkaller kern.warn kernel: [ 376.199919][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:37:13 syzkaller daemon.err dhcpcd[3037]: ps_sendpsmmsg: Connection refused May 18 03:37:13 syzkaller kern.warn kernel: [ 376.211775][ C0] __netif_receive_skb+0x5a/0x280[ 385.643402][ C0] net_ratelimit: 22388 callbacks suppressed [ 385.643429][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 385.643965][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:ee:a7:4c:7c:29, vlan:0) [ 385.649777][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 385.661418][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 385.673760][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 385.685582][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 385.697874][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 385.710445][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:ee:a7:4c:7c:29, vlan:0) [ 385.721649][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 385.733356][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:37:13 syzkaller daemon.err dhcpcd[3037]: ps_root_recvmsgcb: failed to send message to pid 22345: Connection refused