last executing test programs: 5.154499718s ago: executing program 0 (id=5099): r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/rcu_expedited', 0x101a02, 0x0) write$P9_RWALK(r0, &(0x7f00000006c0)=ANY=[], 0x4a) 4.920536055s ago: executing program 4 (id=5102): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)={0xa0, 0x0, 0x1, 0x505, 0x0, 0x0, {0xa}, [@CTA_TUPLE_ORIG={0x3c, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast1}, {0x14, 0x4, @mcast2}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_ORIG={0x44, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast2}, {0x14, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x1}, @CTA_NAT_SRC={0x4}]}, 0xa0}, 0x1, 0x0, 0x0, 0x4041}, 0x0) 4.78929733s ago: executing program 0 (id=5103): r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_buf(r0, 0x0, 0x11, &(0x7f0000000080)="1700000021080200007fbe8c5ee17688a2003c000303000afdff02a25afc5ad90205bb02880000d6c9db0000db00000200df01800a0000ebfc0607bdff59100ac45761541feb601b5d2ff969c87a681fa9b86e4d950466e6001fb700674f00c88ebbf9315033bf79ac2dfc061f15003901dee2ffffffffe9000000000000000062068f5ee50ce5af9b1c568302ffff02ff0331dd3bab0840024f0298e9e90539062a80e605007f71", 0xa8) 4.466272445s ago: executing program 4 (id=5106): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RATE_GET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)={0x14, r1, 0x701, 0x70bd2b, 0xfffffffc, {0x41}}, 0x14}}, 0x0) 4.263634376s ago: executing program 0 (id=5107): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f0, 0x128, 0x111, 0x4b4, 0x0, 0xd4feffff, 0x220, 0x20a, 0x278, 0x220, 0x278, 0x3, 0x0, {[{{@ipv6={@loopback, @empty, [], [], 'bridge_slave_0\x00', 'team_slave_0\x00', {}, {}, 0x6}, 0x0, 0x100, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28}}, @common=@inet=@tcp={{0x30}}]}, @common=@inet=@TCPMSS={0x28}}, {{@uncond, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@inet=@SYNPROXY={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x350) 4.014980607s ago: executing program 4 (id=5110): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000001640)=""/139, &(0x7f0000000100)=0x8) 3.871375118s ago: executing program 0 (id=5111): sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="200000006a0083130000000000000000000000040000000008000e"], 0x20}}, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r0, &(0x7f00000002c0), 0x40000000000009f, 0x0) 3.628802738s ago: executing program 3 (id=5113): r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/pm_debug_messages', 0x402, 0x5) write$proc_mixer(r0, &(0x7f0000000180)=[{'SPEAKER', @void}], 0x8) 3.627228313s ago: executing program 4 (id=5114): mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) connect$packet(r0, &(0x7f0000000000)={0x1f, 0xf8, 0x0, 0x1, 0x2, 0x6, @broadcast}, 0x14) 3.487911499s ago: executing program 0 (id=5115): openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0), 0x602, 0x0) unshare(0x2000680) pselect6(0x40, &(0x7f0000004600)={0x2, 0x0, 0x8, 0x7, 0xffffffffffffffe8, 0x401, 0xffffffff}, 0x0, &(0x7f0000004680)={0x9, 0xfff, 0xd3, 0x5, 0x7, 0x400, 0x9, 0xa1}, &(0x7f00000046c0)={0x0, 0x989680}, 0x0) 3.322838999s ago: executing program 3 (id=5118): io_uring_setup(0x30d3, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) syz_usb_connect(0x0, 0x5e, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000c291492099042a102d850102030109024c0001000010000904100002e51de5000b2402010302057ff49bfd052406000105240000080624037f000109050602ff0300000009058202"], 0x0) 3.222307587s ago: executing program 4 (id=5119): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) write$tun(r0, &(0x7f0000000280)={@val={0x1c, 0x800}, @val={0x1, 0x0, 0x0, 0x0, 0x3d}, @mpls={[], @ipv4=@tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x84, 0x0, @empty=0x3fffffff, @local}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x2, 0x5, 0x0, 0x0, 0x0, 0x1c}}}}}, 0x36) 3.215255145s ago: executing program 0 (id=5120): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x1) ioctl$TCFLSH(r0, 0x8910, 0x20000000) 2.520152179s ago: executing program 3 (id=5128): r0 = userfaultfd(0x801) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000600)) ioctl$UFFDIO_COPY(r0, 0xc028aa03, &(0x7f0000000000)={&(0x7f0000800000/0x800000)=nil, &(0x7f00002b3000/0x2000)=nil, 0x800000, 0x300}) 2.300317321s ago: executing program 3 (id=5131): request_key(&(0x7f00000002c0)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\\\\@}\x01\x00\x00@\xf5\xe2\xdbE\xc0P\x02\xe0\xf2\xaa\xe6\x00\x00\x00\x00\x00\x00\x00\xd0\xa1B\x80\xd3\xcc\x06D\a\x00\x00\x00\x00\x00\x00\x04)\'\x03t\xcd\xe8\xd0u\x01\xff\x01\xd1', 0xfffffffffffffffe) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000900)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000940)={0x2020}, 0x2020) 2.073196702s ago: executing program 3 (id=5133): r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000100)={@mcast1, 0x72, r1}) 1.411436999s ago: executing program 1 (id=5141): socketpair$unix(0x1, 0x2, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x10001, 0x2, 0x2) 1.259602432s ago: executing program 1 (id=5143): r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x46d, 0xc293, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x7}}}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000140)={0x24, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="00220700000044061a211545"], 0x0}, 0x0) 1.032645449s ago: executing program 2 (id=5145): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x121301, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000500)=0xf) write$binfmt_aout(r0, &(0x7f0000001600)=ANY=[], 0xff2e) 950.992837ms ago: executing program 2 (id=5146): capset(&(0x7f0000000080)={0x20071026}, &(0x7f0000000040)={0x200000, 0x200000}) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x560f, 0x0) 868.279909ms ago: executing program 2 (id=5147): r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000001000), 0x2, 0x0) io_setup(0x6, &(0x7f0000001080)=0x0) io_submit(r1, 0x1, &(0x7f0000001480)=[&(0x7f0000001140)={0x0, 0x0, 0x0, 0x0, 0x8001, r0, 0x0, 0x0, 0x8}]) 712.321921ms ago: executing program 2 (id=5148): r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0x3, r0, 0x5, 0x0) 560.400391ms ago: executing program 1 (id=5149): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000380)='sys_enter\x00', r0, 0x0, 0x1}, 0x18) cachestat(r1, 0x0, 0x0, 0x4000) 560.137308ms ago: executing program 2 (id=5150): r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x2040, 0x0) fcntl$setlease(r0, 0x400, 0x0) fremovexattr(r0, &(0x7f0000000000)=@known='system.posix_acl_access\x00') 459.08961ms ago: executing program 1 (id=5151): unshare(0x8000600) r0 = syz_open_dev$sg(&(0x7f00000003c0), 0x0, 0x181005) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f0000000080)=0x8000) 452.232392ms ago: executing program 2 (id=5152): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) write$cgroup_devices(r0, &(0x7f0000000000)=ANY=[@ANYRES8=r0, @ANYRES16=r0, @ANYRES32], 0xffdd) 338.16744ms ago: executing program 1 (id=5153): r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000), 0x8801, 0x0) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000000c0)={0x0, 0xfad3, 0x1, 0x0, 0x0, "f6a6756c9832488c"}) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000100)="1876d433b8c266f9be2253e7c12fc9ea10343a19c358547a9357a174911e926c57b51eab3d0a4a2297653ac0c62201010000881a8789adddd1ca89ebd8632972a4f65ad1505ed06b6785508eb1dee994d18b084ef189ce72b079ed03ef849c46e3dedf604c01fae7c32f782dd9a45993a0798444d6ba181f2546b88893bf12575b27c1af55a55c55ca8855d5dc89db3e110430d10f429cc423ff64acc9fdb59a76caf809", 0xa4}], 0x1) 234.971739ms ago: executing program 1 (id=5154): r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000), 0x42, 0x0) write$dsp(r0, &(0x7f00000001c0)="5cba91a4", 0xffffffd9) ioctl$SNDCTL_DSP_SETFMT(r0, 0xc0045005, &(0x7f0000000180)=0xe3b) 97.621693ms ago: executing program 3 (id=5155): sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@ipv4_newrule={0x24, 0x20, 0x301, 0x0, 0x40, {}, [@FRA_GENERIC_POLICY=@FRA_SUPPRESS_PREFIXLEN={0x8}]}, 0x24}}, 0x4044004) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYBLOB="2800000021000100"], 0x28}}, 0x0) 0s ago: executing program 4 (id=5156): r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r0, 0x40082102, 0x0) kernel console output (not intermixed with test programs): ngth. [ 238.202227][T14188] netlink: 1 bytes leftover after parsing attributes in process `syz.4.3818'. [ 239.189456][T14240] netlink: 'syz.4.3843': attribute type 21 has an invalid length. [ 239.208474][T14241] netlink: 'syz.2.3844': attribute type 10 has an invalid length. [ 239.232457][T14240] netlink: 100 bytes leftover after parsing attributes in process `syz.4.3843'. [ 239.341947][T14241] team0: Device ipvlan1 failed to register rx_handler [ 239.533724][T14248] netlink: 'syz.1.3846': attribute type 10 has an invalid length. [ 239.830971][T14248] team0: Device hsr_slave_0 failed to register rx_handler [ 239.908186][T14259] netlink: 'syz.0.3850': attribute type 21 has an invalid length. [ 239.953353][T14259] netlink: 156 bytes leftover after parsing attributes in process `syz.0.3850'. [ 239.968450][T14256] netlink: 380 bytes leftover after parsing attributes in process `syz.2.3852'. [ 240.143937][T14267] xt_l2tp: missing protocol rule (udp|l2tpip) [ 241.489675][T14341] usb usb1: usbfs: interface 0 claimed by hub while 'syz.0.3892' sets config #0 [ 241.624282][T14351] erofs (device nullb0): cannot find valid erofs superblock [ 242.592149][ T29] kauditd_printk_skb: 451 callbacks suppressed [ 242.592165][ T29] audit: type=1400 audit(2000000052.981:9298): avc: denied { create } for pid=14387 comm="syz.4.3916" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 242.623438][T14388] netlink: 64 bytes leftover after parsing attributes in process `syz.4.3916'. [ 242.642089][ T29] audit: type=1400 audit(2000000053.018:9299): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 242.698329][ T29] audit: type=1400 audit(2000000053.018:9300): avc: denied { write } for pid=14387 comm="syz.4.3916" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 242.761489][ T29] audit: type=1400 audit(2000000053.018:9301): avc: denied { search } for pid=5172 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 242.827488][ T29] audit: type=1400 audit(2000000053.018:9302): avc: denied { append } for pid=5172 comm="syslogd" name="messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 242.891690][ T29] audit: type=1400 audit(2000000053.018:9303): avc: denied { append open } for pid=5172 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 242.984832][ T29] audit: type=1400 audit(2000000053.018:9304): avc: denied { getattr } for pid=5172 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 243.058762][ T29] audit: type=1400 audit(2000000053.027:9305): avc: denied { read } for pid=14389 comm="syz.1.3917" dev="nsfs" ino=4026532968 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 243.163147][ T29] audit: type=1400 audit(2000000053.027:9306): avc: denied { open } for pid=14389 comm="syz.1.3917" path="net:[4026532968]" dev="nsfs" ino=4026532968 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 243.226339][ T29] audit: type=1400 audit(2000000053.027:9307): avc: denied { create } for pid=14389 comm="syz.1.3917" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 243.769432][T14431] Option ' ' to dns_resolver key: bad/missing value [ 244.316667][T14454] sctp: [Deprecated]: syz.1.3939 (pid 14454) Use of int in maxseg socket option. [ 244.316667][T14454] Use struct sctp_assoc_value instead [ 244.475203][ T5871] usb 1-1: new high-speed USB device number 81 using dummy_hcd [ 244.859942][ T5871] usb 1-1: Using ep0 maxpacket: 32 [ 244.872729][ T5871] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x82 has invalid maxpacket 1024, setting to 64 [ 244.908278][ T5871] usb 1-1: New USB device found, idVendor=0123, idProduct=0001, bcdDevice=4a.fe [ 244.924377][ T5871] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 244.937067][ T5871] usb 1-1: Product: syz [ 244.948638][ T5871] usb 1-1: Manufacturer: syz [ 244.960296][ T5871] usb 1-1: SerialNumber: syz [ 244.981875][ T5871] usb 1-1: config 0 descriptor?? [ 245.508211][ T5871] input: syz syz as /devices/platform/dummy_hcd.0/usb1/1-1/1-1:0.0/input/input41 [ 245.524907][T14488] netlink: 'syz.4.3954': attribute type 1 has an invalid length. [ 245.533174][T14488] netlink: 'syz.4.3954': attribute type 2 has an invalid length. [ 245.575416][T14476] xt_CT: No such helper "syz0" [ 245.853046][ T5871] usb 1-1: USB disconnect, device number 81 [ 247.258765][T14546] NILFS (loop4): device size too small [ 247.952101][ T29] kauditd_printk_skb: 522 callbacks suppressed [ 247.952116][ T29] audit: type=1400 audit(2000000058.004:9830): avc: denied { read write } for pid=5825 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 248.076224][ T29] audit: type=1400 audit(2000000058.004:9831): avc: denied { read write open } for pid=5825 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 248.215585][ T29] audit: type=1400 audit(2000000058.004:9832): avc: denied { ioctl } for pid=5825 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=648 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 248.320035][ T29] audit: type=1400 audit(2000000058.041:9833): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 248.377628][ T29] audit: type=1400 audit(2000000058.041:9834): avc: denied { search } for pid=5172 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 248.420962][ T29] audit: type=1400 audit(2000000058.041:9835): avc: denied { append } for pid=5172 comm="syslogd" name="messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 248.557937][ T29] audit: type=1400 audit(2000000058.041:9836): avc: denied { append open } for pid=5172 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 248.584226][ T29] audit: type=1400 audit(2000000058.041:9837): avc: denied { getattr } for pid=5172 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 248.607834][ T29] audit: type=1400 audit(2000000058.097:9838): avc: denied { create } for pid=14563 comm="syz.2.3978" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 248.628589][ T29] audit: type=1400 audit(2000000058.144:9839): avc: denied { write } for pid=14563 comm="syz.2.3978" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 248.824763][T14620] binder: 14617:14620 ioctl c0046209 0 returned -22 [ 249.827336][T14664] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable [ 250.022992][T14674] ebt_limit: overflow, try lower: 570423552/2483027968 [ 250.171055][T14682] netlink: 'syz.0.4018': attribute type 21 has an invalid length. [ 250.487799][T14698] netlink: 16 bytes leftover after parsing attributes in process `syz.1.4025'. [ 250.805169][T14720] netlink: 'syz.4.4035': attribute type 10 has an invalid length. [ 250.813208][T14716] IPv6: Can't replace route, no match found [ 250.833508][T14720] netdevsim netdevsim4 netdevsim0: left promiscuous mode [ 250.863212][T14720] team0: Port device netdevsim0 added [ 251.157835][T14738] netlink: 'syz.3.4043': attribute type 1 has an invalid length. [ 251.362464][T14747] netlink: 20 bytes leftover after parsing attributes in process `syz.3.4048'. [ 252.021530][T14780] netlink: 8 bytes leftover after parsing attributes in process `syz.3.4063'. [ 252.469898][T14798] openvswitch: netlink: Missing key (keys=40, expected=100) [ 252.479799][T14803] netlink: 72 bytes leftover after parsing attributes in process `syz.1.4075'. [ 252.767769][T14816] SELinux: policydb version 0 does not match my version range 15-33 [ 252.802070][T14816] SELinux: failed to load policy [ 253.334714][ T29] kauditd_printk_skb: 532 callbacks suppressed [ 253.334730][ T29] audit: type=1400 audit(2000000063.027:10372): avc: denied { read write } for pid=5828 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 253.415756][ T29] audit: type=1400 audit(2000000063.036:10373): avc: denied { read write open } for pid=5828 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 253.507701][ T29] audit: type=1400 audit(2000000063.036:10374): avc: denied { ioctl } for pid=5828 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=649 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 253.533341][ C0] vkms_vblank_simulate: vblank timer overrun [ 253.603598][ T29] audit: type=1400 audit(2000000063.074:10375): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 253.625669][ C0] vkms_vblank_simulate: vblank timer overrun [ 253.655762][ T29] audit: type=1400 audit(2000000063.083:10376): avc: denied { search } for pid=5172 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 253.677429][ C0] vkms_vblank_simulate: vblank timer overrun [ 253.732321][ T29] audit: type=1400 audit(2000000063.092:10377): avc: denied { append } for pid=5172 comm="syslogd" name="messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 253.807084][ T29] audit: type=1400 audit(2000000063.102:10378): avc: denied { append open } for pid=5172 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 253.882200][ T29] audit: type=1400 audit(2000000063.102:10379): avc: denied { getattr } for pid=5172 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 253.957430][ T29] audit: type=1400 audit(2000000063.223:10380): avc: denied { read write } for pid=5818 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 254.035700][ T29] audit: type=1400 audit(2000000063.233:10381): avc: denied { read write open } for pid=5818 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 254.559064][T14889] ip6t_srh: unknown srh match flags 4000 [ 256.183142][T14950] overlayfs: conflicting options: userxattr,redirect_dir=on [ 256.299916][T14953] usb usb3: usbfs: process 14953 (syz.1.4141) did not claim interface 0 before use [ 256.961076][T14978] netlink: 152 bytes leftover after parsing attributes in process `syz.2.4153'. [ 257.357854][T14993] netlink: 'syz.2.4160': attribute type 1 has an invalid length. [ 258.393032][ T8] usb 3-1: new high-speed USB device number 75 using dummy_hcd [ 258.588792][ T8] usb 3-1: config index 0 descriptor too short (expected 72, got 10) [ 258.612065][ T8] usb 3-1: config 1 descriptor has 1 excess byte, ignoring [ 258.628484][ T8] usb 3-1: config 1 has 0 interfaces, different from the descriptor's value: 1 [ 258.717073][ T8] usb 3-1: string descriptor 0 read error: -71 [ 258.723328][ T8] usb 3-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 258.740858][ T29] kauditd_printk_skb: 649 callbacks suppressed [ 258.740876][ T29] audit: type=1400 audit(2000000068.087:11031): avc: denied { read } for pid=15045 comm="syz.1.4180" name="binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 258.762217][ T8] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 258.874234][ T8] usb 3-1: can't set config #1, error -71 [ 258.890867][ T29] audit: type=1400 audit(2000000068.087:11032): avc: denied { read open } for pid=15045 comm="syz.1.4180" path="/dev/binderfs/binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 258.928406][ T8] usb 3-1: USB disconnect, device number 75 [ 259.002758][ T29] audit: type=1400 audit(2000000068.134:11033): avc: denied { ioctl } for pid=15045 comm="syz.1.4180" path="/dev/binderfs/binder0" dev="binder" ino=7 ioctlcmd=0x6210 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 259.120038][ T29] audit: type=1400 audit(2000000068.246:11034): avc: denied { read write } for pid=5830 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 259.196226][ T29] audit: type=1400 audit(2000000068.246:11035): avc: denied { read write open } for pid=5830 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 259.273111][ T29] audit: type=1400 audit(2000000068.246:11036): avc: denied { ioctl } for pid=5830 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=650 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 259.387294][ T29] audit: type=1400 audit(2000000068.302:11037): avc: denied { read write } for pid=5825 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 259.455349][ T29] audit: type=1400 audit(2000000068.302:11038): avc: denied { read write open } for pid=5825 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 259.518152][ T29] audit: type=1400 audit(2000000068.312:11039): avc: denied { ioctl } for pid=5825 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=648 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 259.626460][ T29] audit: type=1400 audit(2000000068.340:11040): avc: denied { read write } for pid=5818 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 260.445700][ T5870] usb 3-1: new high-speed USB device number 76 using dummy_hcd [ 260.470256][T15094] netlink: 'syz.3.4197': attribute type 9 has an invalid length. [ 260.478044][T15094] netlink: 'syz.3.4197': attribute type 7 has an invalid length. [ 260.485817][T15094] netlink: 'syz.3.4197': attribute type 8 has an invalid length. [ 260.777446][ T5870] usb 3-1: Using ep0 maxpacket: 16 [ 260.798943][ T5870] usb 3-1: New USB device found, idVendor=0483, idProduct=1234, bcdDevice=ff.76 [ 260.812887][ T5870] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 260.851390][ T5870] usb 3-1: Product: syz [ 260.892600][ T5870] usb 3-1: Manufacturer: syz [ 260.901591][ T5870] usb 3-1: SerialNumber: syz [ 260.934500][ T5870] usb 3-1: config 0 descriptor?? [ 261.294365][ T5870] usb 3-1: ignoring: not an USB2CAN converter [ 261.561775][ T5868] usb 3-1: USB disconnect, device number 76 [ 262.279784][T15170] IPv6: NLM_F_CREATE should be specified when creating new route [ 262.352172][T15171] tmpfs: Bad value for 'grpquota_block_hardlimit' [ 262.728533][T15195] netlink: 'syz.0.4234': attribute type 10 has an invalid length. [ 262.751246][T15195] netlink: 2 bytes leftover after parsing attributes in process `syz.0.4234'. [ 262.751421][T15195] team0: entered promiscuous mode [ 262.751440][T15195] team_slave_0: entered promiscuous mode [ 262.751601][T15195] team_slave_1: entered promiscuous mode [ 262.751832][T15195] bridge0: port 3(team0) entered blocking state [ 262.752737][T15195] bridge0: port 3(team0) entered disabled state [ 262.752863][T15195] team0: entered allmulticast mode [ 262.752879][T15195] team_slave_0: entered allmulticast mode [ 262.752894][T15195] team_slave_1: entered allmulticast mode [ 262.758624][T15195] bridge0: port 3(team0) entered blocking state [ 262.759208][T15195] bridge0: port 3(team0) entered forwarding state [ 262.965725][T15208] lo: entered allmulticast mode [ 263.180959][T15226] kernel profiling enabled (shift: 63) [ 263.202706][T15226] profiling shift: 63 too large [ 263.350603][T15238] netlink: 256 bytes leftover after parsing attributes in process `syz.2.4246'. [ 263.386026][T15238] unsupported nlmsg_type 40 [ 263.526614][T15246] netlink: 8 bytes leftover after parsing attributes in process `syz.3.4250'. [ 264.069744][T15273] qrtr: Invalid version 0 [ 264.091275][ T29] kauditd_printk_skb: 817 callbacks suppressed [ 264.091289][ T29] audit: type=1400 audit(2000000073.101:11525): avc: denied { ioctl } for pid=5829 comm="syz-executor" path="/dev/loop4" dev="devtmpfs" ino=651 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 264.166455][ T29] audit: type=1400 audit(2000000073.110:11526): avc: denied { read write } for pid=5828 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 264.232479][ T29] audit: type=1400 audit(2000000073.110:11527): avc: denied { read write open } for pid=5828 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 264.313130][ T29] audit: type=1400 audit(2000000073.110:11528): avc: denied { ioctl } for pid=5828 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=649 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 264.395103][ T29] audit: type=1400 audit(2000000073.138:11529): avc: denied { read write } for pid=5830 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 264.472034][ T29] audit: type=1400 audit(2000000073.138:11530): avc: denied { read write open } for pid=5830 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 264.543559][ T29] audit: type=1400 audit(2000000073.138:11531): avc: denied { ioctl } for pid=5830 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=650 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 264.635849][ T29] audit: type=1400 audit(2000000073.213:11532): avc: denied { read write } for pid=5825 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 264.688467][ T29] audit: type=1400 audit(2000000073.213:11533): avc: denied { read write open } for pid=5825 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 264.717687][T15299] netlink: 8 bytes leftover after parsing attributes in process `syz.3.4274'. [ 264.777620][ T29] audit: type=1400 audit(2000000073.213:11534): avc: denied { ioctl } for pid=5825 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=648 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 264.909101][T15307] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 264.950851][T15309] netlink: 'syz.1.4279': attribute type 11 has an invalid length. [ 265.306473][T15326] bridge1: entered promiscuous mode [ 265.498910][T15338] bridge1: the hash_elasticity option has been deprecated and is always 16 [ 265.784681][T15352] netlink: 32 bytes leftover after parsing attributes in process `syz.2.4296'. [ 266.173533][T15361] xt_CONNSECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 267.430159][T15385] x_tables: ip6_tables: ipcomp match: only valid for protocol 108 [ 268.809623][T15438] netlink: 'syz.1.4335': attribute type 10 has an invalid length. [ 268.865511][T15438] 8021q: adding VLAN 0 to HW filter on device bond0 [ 268.905768][T15438] team0: Port device bond0 added [ 269.447851][ T29] kauditd_printk_skb: 382 callbacks suppressed [ 269.447868][ T29] audit: type=1400 audit(2000000078.105:11917): avc: denied { open } for pid=15463 comm="syz.0.4348" path="/dev/video36" dev="devtmpfs" ino=1044 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l_device_t tclass=chr_file permissive=1 [ 269.543297][ T29] audit: type=1400 audit(2000000078.143:11918): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 269.619722][ T29] audit: type=1400 audit(2000000078.143:11919): avc: denied { search } for pid=5172 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 269.685355][ T29] audit: type=1400 audit(2000000078.143:11920): avc: denied { append } for pid=5172 comm="syslogd" name="messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 269.767835][ T29] audit: type=1400 audit(2000000078.143:11921): avc: denied { open } for pid=5172 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 269.836560][T15479] netlink: 'syz.3.4354': attribute type 2 has an invalid length. [ 269.874850][ T29] audit: type=1400 audit(2000000078.143:11922): avc: denied { getattr } for pid=5172 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 269.928134][ T29] audit: type=1400 audit(2000000078.143:11923): avc: denied { read } for pid=15462 comm="syz.4.4347" dev="nsfs" ino=4026531834 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 269.970906][ T29] audit: type=1400 audit(2000000078.143:11924): avc: denied { open } for pid=15462 comm="syz.4.4347" path="time:[4026531834]" dev="nsfs" ino=4026531834 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 269.998986][ T29] audit: type=1400 audit(2000000078.152:11925): avc: denied { read write } for pid=5830 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 270.023312][ T29] audit: type=1400 audit(2000000078.152:11926): avc: denied { open } for pid=5830 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 270.322970][T15502] netdevsim netdevsim2 netdevsim0: set [1, 1] type 2 family 0 port 20000 - 0 [ 270.352919][T15502] netdevsim netdevsim2 netdevsim1: set [1, 1] type 2 family 0 port 20000 - 0 [ 270.396707][T15502] netdevsim netdevsim2 netdevsim2: set [1, 1] type 2 family 0 port 20000 - 0 [ 270.425227][T15502] netdevsim netdevsim2 netdevsim3: set [1, 1] type 2 family 0 port 20000 - 0 [ 270.462941][T15502] geneve3: entered promiscuous mode [ 270.468182][T15502] geneve3: entered allmulticast mode [ 271.403718][ T5868] usb 1-1: new high-speed USB device number 82 using dummy_hcd [ 271.605079][ T5868] usb 1-1: Using ep0 maxpacket: 32 [ 271.634275][ T5868] usb 1-1: New USB device found, idVendor=1a0a, idProduct=0108, bcdDevice=27.51 [ 271.643518][ T5868] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 271.660847][ T5868] usb 1-1: Product: syz [ 271.665162][ T5868] usb 1-1: Manufacturer: syz [ 271.670156][ T5868] usb 1-1: SerialNumber: syz [ 271.703293][ T5868] usb 1-1: config 0 descriptor?? [ 271.722786][ T5868] usb_ehset_test 1-1:0.0: probe with driver usb_ehset_test failed with error -32 [ 271.831365][ T5870] usb 2-1: new high-speed USB device number 76 using dummy_hcd [ 271.918434][T15583] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 272.004635][ T5868] usb 1-1: USB disconnect, device number 82 [ 272.078558][ T5870] usb 2-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 272.088720][ T5870] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 272.096721][ T5870] usb 2-1: Product: syz [ 272.118004][ T5870] usb 2-1: Manufacturer: syz [ 272.133847][T15595] syz.4.4404 uses old SIOCAX25GETINFO [ 272.139751][ T5870] usb 2-1: SerialNumber: syz [ 272.220412][ T5870] usb 2-1: ath9k_htc: Firmware ath9k_htc/htc_9271-1.4.0.fw requested [ 272.327469][ T5868] usb 2-1: ath9k_htc: Transferred FW: ath9k_htc/htc_9271-1.4.0.fw, size: 51008 [ 272.580088][ T5871] usb 2-1: USB disconnect, device number 76 May 18 03:34:41 syzkaller kern.info kernel: [ 272.580088][ T5871] usb 2-1: USB disconnect, device number 76 [ 273.341793][T15666] x_tables: ip6_tables: rpfilter match: used from hooks INPUT, but only valid from PREROUTING May 18 03:34:41 syzkaller kern.info kernel: [ 273.341793][T15666] x_tables: ip6_tables: rpfilter match: used from hooks INPUT, but only valid from PREROUTING [ 273.461396][ T5868] ath9k_htc 2-1:1.0: ath9k_htc: Target is unresponsive [ 273.488256][ T5868] ath9k_htc: Failed to initialize the device May 18 03:34:41 syzkaller kern.err kernel: [ 27[ 273.538618][ T5871] usb 2-1: ath9k_htc: USB layer deinitialized 3.461396][ T5868] ath9k_htc 2-1:1.0: ath9k_htc: Target is unresponsive May 18 03:34:41 syzkaller kern.err kernel: [ 273.488256][ T5868] ath9k_htc: Failed to initialize the device May 18 03:34:41 syzkaller kern.info kernel: [ 273.538618][ T5871] usb 2-1: ath9k_htc: USB layer deinitialized [ 274.813834][ T29] kauditd_printk_skb: 433 callbacks suppressed [ 274.813851][ T29] audit: type=1400 audit(2000000083.119:12360): avc: denied { read write } for pid=5829 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 18 03:34:43 syzkaller kern.warn kernel: [ 274.813834][ T29] kauditd_printk_skb: 433 callbacks suppressed May 18 03:34:43 syzkaller kern.notice kernel: [ 274.813851][ T29] audit: type=1400 audit(2000000083.119:12360): avc: denied [ 274.892752][ T29] audit: type=1400 audit(2000000083.119:12361): avc: denied { read write } for pid=5818 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 { read write } for pid=5829 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:f May 18 03:34:43 syzkaller kern.notice kernel: [ 274.892752][ T29] audit: type=1400 audit(2000000083.119:12361): avc: denied { read write } for pid=5818 comm="syz-executor" name="loop0" dev="devtmpfs[ 274.946979][ T29] audit: type=1400 audit(2000000083.129:12362): avc: denied { read write } for pid=5830 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 " ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:f May 18 03:34:43 syzkaller kern.notice kernel: [ 274.946979][ T29] audit: type=1400 audit(2000000083.129:12362): avc: denied { read write } for pid=5830 comm="syz-executor" name="loop3" d[ 275.012903][ T29] audit: type=1400 audit(2000000083.166:12363): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:f May 18 03:34:43 syzkaller kern.notice kernel: [ 275.012903][ T29] audit: type=1400 audit(2000000083.166:12363): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass [ 275.075294][ T29] audit: type=1400 audit(2000000083.175:12364): avc: denied { read write } for pid=5825 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 18 03:34:43 syzkaller kern.notice kernel: [ 275.075294][ T29] audit: type=1400 audit(2000000083.175:12364): avc: denied { read write } [ 275.133585][ T29] audit: type=1400 audit(2000000083.194:12365): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 for pid=5825 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:f May 18 03:34:43 syzkaller kern.notice kernel: [ 275.133585][ T29] audit: type=1400 audit(2000000083.194:12365): avc: denied [ 275.202740][ T29] audit: type=1400 audit(2000000083.222:12366): avc: denied { create } for pid=15753 comm="syz.0.4477" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass May 18 03:34:43 syzkaller kern.notice kernel: [ 275.202740][ T29] audit: type=1400 audit(2000000083.222:12366): avc: denied { create } for pid=15753 comm="syz.0.4477" scontext=root:sysadm_r:sysadm_t tcontext=root:s[ 275.255109][ T29] audit: type=1400 audit(2000000083.231:12367): avc: denied { read write } for pid=5828 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 ysadm_r:sysadm_t tclass=netlink_netfilter_socket[ 275.284271][ T29] audit: type=1400 audit(2000000083.231:12368): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 permi [ 275.306883][ T29] audit: type=1400 audit(2000000083.278:12369): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 18 03:34:43 syzkaller kern.notice kernel: [ 275.255109][ T29] audit: type=1400 audit(2000000083.231:12367): avc: denied { read write } for pid=5828 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:f May 18 03:34:43 syzkaller kern.notice kernel: [ 275.284271][ T29] audit: type=1400 audit(2000000083.231:12368): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass May 18 03:34:43 syzkaller kern.notice kernel: [ 275.306883][ T29] audit: type=1400 audit(2000000083.278:12369): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass [ 275.853718][T15806] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(3) [ 275.860281][T15806] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) May 18 03:34:44 syzkaller kern.info kernel: [ 2[ 275.876889][T15806] vhci_hcd vhci_hcd.0: Device attached 75.853718][T15806] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(3) May 18 03:34:44 syzkaller kern.info kernel: [ 275.860281][T15806] vhci_hcd vhci_hcd.0: devid(0) speed(4) s[ 275.894572][T15807] vhci_hcd: connection closed peed_str(wireles[ 275.898478][ T57] vhci_hcd: stop threads s) [ 275.910285][ T57] vhci_hcd: release socket May 18 03:34:44 syzkaller kern.info kernel: [ 275.876889][T15806] vhci_hcd vhci_hcd.0: Device attached May 18 03:34:44 syzkaller kern.info kernel: [ 275.894572][T15807] vhci_hcd: connection closed May 18 03:34:44 syzkaller kern.info ker[ 275.935820][ T57] vhci_hcd: disconnect device nel: [ 275.898478][ T57] vhci_hcd: stop threads May 18 03:34:44 syzkaller kern.info kernel: [ 275.910285][ T57] vhci_hcd: release socket May 18 03:34:44 syzkaller kern.info kernel: [ 275.935820][ T57] vhci_hcd: disconnect device [ 277.600919][T15881] x_tables: ip_tables: SNAT target: used from hooks OUTPUT, but only usable from INPUT/POSTROUTING May 18 03:34:45 syzkaller kern.info kernel: [ 277.600919][T15881] x_tables: ip_tables: SNAT target: used from hooks OUTPUT, but only usable from INPUT/POSTROUTING [ 278.502794][T15931] SELinux: syz.3.4564 (15931) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. May 18 03:34:46 syzkaller kern.warn kernel: [ 278.502794][T15931] SELinux: syz.3.4564 (15931) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 279.108462][T15952] xt_CT: You must specify a L4 protocol and not use inversions on it May 18 03:34:47 syzkaller kern.info kernel: [ 279.108462][T15952] xt_CT: You must specify a L4 protocol and not use inversions on it [ 279.279656][T15963] netlink: 16 bytes leftover after parsing attributes in process `syz.0.4579'. May 18 03:34:47 syzkaller kern.warn kernel: [ 279.279656][T15963] netlink: 16 bytes leftover after parsing attributes in process `syz.0.4579'. [ 279.356105][T15965] Cannot find add_set index 1026 as target May 18 03:34:47 syzkaller kern.info kernel: [ 279.356105][T15965] Cannot find add_set index 1026 as target [ 280.200635][T16015] xt_hashlimit: max too large, truncated to 1048576 [ 280.222982][ T29] kauditd_printk_skb: 9507 callbacks suppressed [ 280.222998][ T29] audit: type=1400 audit(2000000088.180:21835): avc: denied { read write } for pid=5828 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 18 03:34:48 syzkaller kern.info kernel: [ 280.200635][T16015] xt_hashlimit: max too large, truncated to 1048576 May 18 03:34:48 syzkaller kern.warn kernel: [ 280.222982][ T29] kauditd_printk_skb: 9507 callbacks suppressed May 18 03:34:48 syzkaller kern.notice kernel: [ 280.222998][ T29] audit: type=1400 audit(2000000088.180:21835): avc: denied { read write } for pid=5828 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:f [ 280.307242][ T29] audit: type=1400 audit(2000000088.217:21836): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 18 03:34:48 syzkaller kern.notice kernel: [ 280.307242][ T29] audit: type=1400 audit(2000000088.217:21836): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=s[ 280.374910][ T29] audit: type=1400 audit(2000000088.217:21837): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ystem_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass May 18 03:34:48 syzkaller kern.notice kernel: [ 280.374910][ T29] audit: type=1400 audit(2000000088.217:21837): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tcla[ 280.437037][ T29] audit: type=1400 audit(2000000088.217:21838): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ss May 18 03:34:48 syzkaller kern.notice kernel: [ 280.437037][ T29] audit: type=1400 audit(2000000088.217:21838): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass [ 280.568174][ T29] audit: type=1400 audit(2000000088.236:21839): avc: denied { read write } for pid=5830 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 18 03:34:48 syzkaller kern.notice kernel: [ 280.568174][ T29] audit: type=1400 audit(2000000088.236:21839): avc: denied { read write } for pid=5830 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:f [ 280.676282][ T29] audit: type=1400 audit(2000000088.292:21840): avc: denied { prog_load } for pid=16020 comm="syz.2.4609" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 May 18 03:34:48 syzkaller kern.notice kernel: [ 280.676282][ T29] audit: type=1400 audit(2000000088.292:21840): avc: denied { prog_load } for pid=16020 comm="syz.2.4609" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 280.753308][ T29] audit: type=1400 audit(2000000088.292:21841): avc: denied { read write } for pid=5818 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 18 03:34:48 syzkaller kern.notice kernel: [ 280.753308][ T29] audit: type=1400 audit(2000000088.292:21841): avc: denied { read write } for pid=5818 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:f [ 280.864757][ T29] audit: type=1400 audit(2000000088.292:21842): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 18 03:34:48 syzkaller kern.notice kernel: [ 280.864757][ T29] audit: type=1400 audit(2000000088.292:21842): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass [ 281.235281][ T29] audit: type=1400 audit(2000000088.329:21843): avc: denied { read write } for pid=5825 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 18 03:34:49 syzkaller kern.notice kernel: [ 281.235281][ T29] audit: type=1400 audit(2000000088.329:21843): avc: denied { read write } for pid=5825 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:f [ 281.312403][ T29] audit: type=1400 audit(2000000088.357:21844): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 18 03:34:49 syzkaller kern.notice kernel: [ 281.312403][ T29] audit: type=1400 audit(2000000088.357:21844): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass [ 281.517106][T16086] netlink: 8 bytes leftover after parsing attributes in process `syz.4.4625'. May 18 03:34:49 syzkaller kern.warn kernel: [ 281.517106][T16086] netlink: 8 bytes leftover after parsing attributes in process `syz.4.4625'. [ 281.595660][T16086] netlink: 36 bytes leftover after parsing attributes in process `syz.4.4625'. May 18 03:34:49 syzkaller kern.warn kernel: [ 281.595660][T16086] netlink: 36 bytes leftover after parsing attributes in process `syz.4.4625'. [ 283.964397][T16217] @ÿ: renamed from veth0_vlan (while UP) May 18 03:34:51 syzkaller kern.info kernel: [ 283.964397][T16217] ^A@^Pÿ: renamed from veth0_vlan (while UP) [ 284.114082][T16225] xt_hashlimit: invalid rate May 18 03:34:51 syzkaller kern.info kernel: [ 284.114082][T16225] xt_hashlimit: invalid rate [ 285.583313][ T29] kauditd_printk_skb: 170 callbacks suppressed [ 285.583331][ T29] audit: type=1400 audit(2000000093.203:22015): avc: denied { read write } for pid=5828 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 18 03:34:53 syzkaller kern.warn kernel: [ 285.583313][ T29] kauditd_printk_skb: 170 callbacks suppressed May 18 03:34:53 syzkaller kern.notice kernel: [ 285.583331][ T29] audit: typ[ 285.632495][ T29] audit: type=1400 audit(2000000093.231:22016): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 e=1400 audit(2000000093.203:22015): avc: denied { read write } for pid=5828 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:f May 18 03:34:53 syzkaller kern.notice kernel: [ 285.632495][ T29] audit: type=1400 audit(2000000093.231:22016): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tcla[ 285.698604][ T29] audit: type=1400 audit(2000000093.231:22017): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ss May 18 03:34:53 syzkaller kern.notice kernel: [ 285.698604][ T29] audit: type=1400 audit(2000000093.231:22017): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass [ 285.786614][ T29] audit: type=1400 audit(2000000093.240:22018): avc: denied { read write } for pid=5830 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 18 03:34:53 syzkaller kern.notice kernel: [ 285.786614][ T29] audit: type=1400 audit(2000000093.240:22018): avc: denied { read write } for pid=5830 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:f [ 285.884371][ T29] audit: type=1326 audit(2000000093.278:22019): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16308 comm="syz.1.4733" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb078385d29 code=0x7ffc0000 May 18 03:34:53 syzkaller kern.notice kernel: [ 285.884371][ T29] audit: type=1326 audit(2000000093.278:22019): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16308 comm="syz.1.4733" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 com [ 285.974897][ T29] audit: type=1400 audit(2000000093.278:22020): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 18 03:34:53 syzkaller kern.notice kernel: [ 285.974897][ T29] audit: type=1400 audit(2000000093.278:22020): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass [ 286.041119][ T29] audit: type=1400 audit(2000000093.287:22021): avc: denied { read write } for pid=5818 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 18 03:34:53 syzkaller kern.notice kernel: [ 286.041119][ T29] audit: type=1400 audit(2000000093.287:22021): avc: denied { read write } for pid=5818 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:f [ 286.120199][ T29] audit: type=1326 audit(2000000093.296:22022): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16308 comm="syz.1.4733" exe="/root/syz-executor" sig=0 arch=c000003e syscall=218 compat=0 ip=0x7fb078385d29 code=0x7ffc0000 May 18 03:34:53 syzkaller kern.notice kernel: [ 286.120199][ T29] audit: type=1326 audit(2000000093.296:22022): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16308 comm="syz.1.4733" exe="/root/syz-executor" sig=0 arch=c000003e syscall=218 com [ 286.200088][ T29] audit: type=1326 audit(2000000093.296:22023): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16308 comm="syz.1.4733" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb078385d29 code=0x7ffc0000 May 18 03:34:53 syzkaller kern.notice kernel: [ 286.200088][ T29] audit: type=1326 audit(2000000093.296:22023): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16308 comm="syz.1.4733" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 com [ 286.293525][ T29] audit: type=1400 audit(2000000093.334:22024): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 18 03:34:53 syzkaller kern.notice kernel: [ 286.293525][ T29] audit: type=1400 audit(2000000093.334:22024): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass [ 287.228433][T16397] bridge0: port 3(veth0_to_bridge) entered blocking state [ 287.235704][T16397] bridge0: port 3(veth0_to_bridge) entered disabled state [ 287.238564][T16399] trusted_key: encrypted_key: keyword 'update' not allowed when called from .instantiate method [ 287.243002][T16397] veth0_to_bridge: entered allmulticast mode [ 287.262040][T16397] veth0_to_bridge: entered promiscuous mode [ 287.269635][T16397] bridge0: adding interface veth0_to_bridge with same address as a received packet (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 287.270144][T16397] bridge0: port 3(veth0_to_bridge) entered blocking state [ 287.270198][T16397] bridge0: port 3(veth0_to_bridge) entered forwarding state May 18 03:34:54 syzkaller kern.info kernel: [ 287.228433][T16397] bridge0: port 3(veth0_to_bridge) entered blocking state May 18 03:34:54 syzkaller kern.info kernel: [ 287.235704][T16397] bridge0: port 3(veth0_to_bridge) entered disabled state May 18 03:34:54 syzkaller kern.info kernel: [ 287.238564][T16399] trusted_key: encrypted_key: keyword 'update' not allowed when called from .instantiate method May 18 03:34:54 syzkaller kern.info kernel: [ 287.243002][T16397] veth0_to_bridge: entered allmulticast mode May 18 03:34:54 syzkaller kern.info kernel: [ 287.262040][T16397] veth0_to_bridge: entered promiscuous mode May 18 03:34:54 syzkaller kern.warn kernel: [ 287.269635][T16397] bridge0: adding interface veth0_to_bridge with same address as a received packet (addr:aa:aa:aa:aa:aa:1b, vlan:0) May 18 03:34:54 syzkaller kern.info kernel: [ 287.270144][T16397] bridge0: port 3(veth0_to_bridge) entered blocking state May 18 03:34:54 syzkaller kern.info kernel: [ 287.270198][T16397] bridge0: port 3(veth0_to_bridge) entered forwarding state [ 287.653832][T16414] netlink: 20 bytes leftover after parsing attributes in process `syz.4.4782'. May 18 03:34:55 syzkaller kern.warn kernel: [ 287.653832][T16414] netlink: 20 bytes leftover after parsing attributes in process `syz.4.4782'. [ 290.299349][T16576] trusted_key: encrypted_key: master key parameter '' is invalid May 18 03:34:57 syzkaller kern.info kernel: [ 290.299349][T16576] trusted_key: encrypted_key: master key parameter '' is invalid [ 290.965324][ T29] kauditd_printk_skb: 196 callbacks suppressed [ 290.965341][ T29] audit: type=1400 audit(2000000098.226:22221): avc: denied { read } for pid=16604 comm="syz.3.4876" dev="nsfs" ino=4026533140 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 May 18 03:34:58 syzkaller kern.warn kernel: [ 290.965324][ T29] kauditd_printk_skb: 196 callbacks suppressed May 18 03:34:58 syzkaller kern.notice kernel: [ 290.965341][ T29] audit: type=1400 audit(2000000098.226:22221): avc: denied { read } for pid=16604 comm="syz.3.4876" dev="nsfs" ino=4026533140 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file [ 291.129276][ T29] audit: type=1400 audit(2000000098.273:22222): avc: denied { read } for pid=16605 comm="syz.1.4877" dev="nsfs" ino=4026532968 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 May 18 03:34:58 syzkaller kern.notice kernel: [ 291.129276][ T29] audit: type=1400 audit(2000000098.273:22222): avc: denied { read } for pid=16605 comm="syz.1.4877" dev="nsfs" ino=4026532968 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file [ 291.269628][ T29] audit: type=1400 audit(2000000098.291:22223): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 18 03:34:58 syzkaller kern.notice kernel: [ 291.269628][ T29] audit: type=1400 audit(2000000098.291:22223): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass [ 291.377176][ T29] audit: type=1400 audit(2000000098.291:22224): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 18 03:34:58 syzkaller kern.notice kernel: [ 291.377176][ T29] audit: type=1400 audit(2000000098.291:22224): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass [ 291.492301][ T29] audit: type=1400 audit(2000000098.376:22225): avc: denied { read write } for pid=5830 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 18 03:34:58 syzkaller kern.notice kernel: [ 291.492301][ T29] audit: type=1400 audit(2000000098.376:22225): avc: denied { read write } for pid=5830 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:f [ 291.657585][ T29] audit: type=1400 audit(2000000098.441:22226): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 18 03:34:58 syzkaller kern.notice kernel: [ 291.657585][ T29] audit: type=1400 audit(2000000098.441:22226): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass [ 291.821196][ T29] audit: type=1400 audit(2000000098.450:22227): avc: denied { read write } for pid=5825 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 18 03:34:59 syzkaller kern.notice kernel: [ 291.821196][ T29] audit: type=1400 audit(2000000098.450:22227): avc: denied { read write } for pid=5825 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:f [ 291.933516][ T29] audit: type=1400 audit(2000000098.488:22228): avc: denied { read write } for pid=5828 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 18 03:34:59 syzkaller kern.notice kernel: [ 291.933516][ T29] audit: type=1400 audit(2000000098.488:22228): avc: denied { read write } for pid=5828 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:f [ 292.046325][ T29] audit: type=1400 audit(2000000098.544:22229): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 18 03:34:59 syzkaller kern.notice kernel: [ 292.046325][ T29] audit: type=1400 audit(2000000098.544:22229): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass [ 292.156130][ T29] audit: type=1400 audit(2000000098.609:22230): avc: denied { read write } for pid=5818 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 18 03:34:59 syzkaller kern.notice kernel: [ 292.156130][ T29] audit: type=1400 audit(2000000098.609:22230): avc: denied { read write } for pid=5818 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:f [ 292.464707][T16627] netlink: 10 bytes leftover after parsing attributes in process `syz.1.4886'. May 18 03:34:59 syzkaller kern.warn kernel: [ 292.464707][T16627] netlink: 10 bytes leftover after parsing attributes in process `syz.1.4886'. May 18 03:34:59 syzkaller daemon.err dhcpcd[5484]: ps_sendpsmmsg: Connection refused May 18 03:34:59 syzkaller daemon.err dhcpcd[5484]: ps_root_recvmsgcb: failed to send message to pid 12962: Connection refused May 18 03:35:01 syzkaller daemon.err dhcpcd[5484]: ps_sendpsmmsg: Connection refused May 18 03:35:01 syzkaller daemon.err dhcpcd[5484]: ps_root_recvmsgcb: failed to send message to pid 13068: Connection refused May 18 03:35:02 syzkaller daemon.err dhcpcd[5484]: ps_sendpsmmsg: Connection refused May 18 03:35:02 syzkaller daemon.err dhcpcd[5484]: ps_root_recvmsgcb: failed to send message to pid 13198: Connection refused [ 295.714553][T16746] x_tables: eb_tables: snat.0 target: invalid size 16 (kernel) != (user) 0 May 18 03:35:02 syzkaller kern.err kernel: [ 295.714553][T16746] x_tables: eb_tables: snat.0 target: invalid size 16 (kernel) != (user) 0 [ 296.227003][ C1] sched: DL replenish lagged too much May 18 03:35:03 syzkaller kern.warn kernel: [ 296.227003][ C1] sched: DL replenish lagged too much [ 296.353632][ T29] kauditd_printk_skb: 107 callbacks suppressed [ 296.353649][ T29] audit: type=1400 audit(2000000103.268:22338): avc: denied { read write } for pid=5830 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 18 03:35:03 syzkaller kern.warn kernel: [ 296.353632][ T29] kauditd_printk_skb: 107 callbacks suppressed May 18 03:35:03 syzkaller kern.notice kernel: [ 296.353649][ T29] audit: type=1400 audit(2000000103.268:22338): avc: denied { read write } for pid=5830 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:f [ 296.538711][ T29] audit: type=1400 audit(2000000103.343:22339): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 18 03:35:03 syzkaller kern.notice kernel: [ 296.538711][ T29] audit: type=1400 audit(2000000103.343:22339): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass May 18 03:35:03 syzkaller daemon.err dhcpcd[5484]: ps_sendpsmmsg: Connection ref[ 296.704803][ T29] audit: type=1400 audit(2000000103.343:22340): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 used May 18 03:35:03 syzkaller daemon.err dhcpcd[5484]: ps_root_recvmsgcb: failed to send message to pid 13401: Connection refused May 18 03:35:03 syzkaller kern.notice kernel: [ 296.704803][ T29] audit: type=1400 audit(2000000103.343:22340): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass [ 296.887595][ T29] audit: type=1400 audit(2000000103.380:22341): avc: denied { read write } for pid=5825 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 18 03:35:03 syzkaller kern.notice kernel: [ 296.887595][ T29] audit: type=1400 audit(2000000103.380:22341): avc: denied { read write } for pid=5825 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:f [ 297.034283][ T29] audit: type=1400 audit(2000000103.399:22342): avc: denied { read write } for pid=5818 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 18 03:35:03 syzkaller kern.notice kernel: [ 297.034283][ T29] audit: type=1400 audit(2000000103.399:22342): avc: denied { read write } for pid=5818 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:f [ 297.236110][ T29] audit: type=1400 audit(2000000103.502:22343): avc: denied { read write } for pid=5829 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 18 03:35:04 syzkaller kern.notice kernel: [ 297.236110][ T29] audit: type=1400 audit(2000000103.502:22343): avc: denied { read write } for pid=5829 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:f [ 297.413803][ T29] audit: type=1400 audit(2000000103.511:22344): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 18 03:35:04 syzkaller kern.notice kernel: [ 297.413803][ T29] audit: type=1400 audit(2000000103.511:22344): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass [ 297.571541][ T29] audit: type=1400 audit(2000000103.586:22345): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 18 03:35:04 syzkaller kern.notice kernel: [ 297.571541][ T29] audit: type=1400 audit(2000000103.586:22345): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass [ 297.744374][ T29] audit: type=1400 audit(2000000103.595:22346): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 18 03:35:04 syzkaller kern.notice kernel: [ 297.744374][ T29] audit: type=1400 audit(2000000103.595:22346): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass [ 297.902498][ T29] audit: type=1400 audit(2000000103.633:22347): avc: denied { read write } for pid=5828 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 18 03:35:04 syzkaller kern.notice kernel: [ 297.902498][ T29] audit: type=1400 audit(2000000103.633:22347): avc: denied { read write } for pid=5828 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:f [ 298.462869][T16819] xt_time: invalid argument - start or stop time greater than 23:59:59 May 18 03:35:05 syzkaller kern.info kernel: [ 298.462869][T16819] xt_time: invalid argument - start or stop time greater than 23:59:59 [ 301.701065][ T29] kauditd_printk_skb: 85 callbacks suppressed [ 301.701081][ T29] audit: type=1400 audit(2000000108.281:22433): avc: denied { read write } for pid=5830 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 18 03:35:08 syzkaller kern.warn kernel: [ 301.701065][ T29] kauditd_printk_skb: 85 callbacks suppressed May 18 03:35:08 syzkaller kern.notice kernel: [ 301.701081][ T29] audit: type=1400 audit(2000000108.281:22433): avc: denied { read write } for pid=5830 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:f [ 301.879102][ T29] audit: type=1400 audit(2000000108.310:22434): avc: denied { create } for pid=16904 comm="syz.1.5023" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 May 18 03:35:08 syzkaller kern.notice kernel: [ 301.879102][ T29] audit: type=1400 audit(2000000108.310:22434): avc: denied { create } for pid=16904 comm="syz.1.5023" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permiss [ 302.048259][ T29] audit: type=1400 audit(2000000108.328:22435): avc: denied { read write } for pid=5818 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 18 03:35:08 syzkaller kern.notice kernel: [ 302.048259][ T29] audit: type=1400 audit(2000000108.328:22435): avc: denied { read write } for pid=5818 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:f [ 302.221932][ T29] audit: type=1400 audit(2000000108.338:22436): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 18 03:35:08 syzkaller kern.notice kernel: [ 302.221932][ T29] audit: type=1400 audit(2000000108.338:22436): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass [ 302.393212][ T29] audit: type=1400 audit(2000000108.347:22437): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 18 03:35:08 syzkaller kern.notice kernel: [ 302.393212][ T29] audit: type=1400 audit(2000000108.347:22437): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass [ 302.558310][ T29] audit: type=1400 audit(2000000108.412:22438): avc: denied { read write } for pid=5825 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 18 03:35:09 syzkaller kern.notice kernel: [ 302.558310][ T29] audit: type=1400 audit(2000000108.412:22438): avc: denied { read write } for pid=5825 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:f [ 302.742878][ T29] audit: type=1400 audit(2000000108.459:22439): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 18 03:35:09 syzkaller kern.notice kernel: [ 302.742878][ T29] audit: type=1400 audit(2000000108.459:22439): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass [ 302.893661][ T29] audit: type=1400 audit(2000000108.543:22440): avc: denied { create } for pid=16909 comm="syz.0.5026" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 May 18 03:35:09 syzkaller kern.notice kernel: [ 302.893661][ T29] audit: type=1400 audit(2000000108.543:22440): avc: denied { create } for pid=16909 comm="syz.0.5026" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permiss [ 303.079914][ T29] audit: type=1400 audit(2000000108.590:22441): avc: denied { read write } for pid=5828 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 18 03:35:09 syzkaller kern.notice kernel: [ 303.079914][ T29] audit: type=1400 audit(2000000108.590:22441): avc: denied { read write } for pid=5828 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:f [ 303.239288][ T29] audit: type=1400 audit(2000000108.637:22442): avc: denied { read write } for pid=5830 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 18 03:35:09 syzkaller kern.notice kernel: [ 303.239288][ T29] audit: type=1400 audit(2000000108.637:22442): avc: denied { read write } for pid=5830 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:f [ 304.846916][T16986] xt_CT: You must specify a L4 protocol and not use inversions on it May 18 03:35:11 syzkaller kern.info kernel: [ 304.846916][T16986] xt_CT: You must specify a L4 protocol and not use inversions on it [ 305.087152][T16993] kAFS: unable to lookup cell '.,' May 18 03:35:11 syzkaller kern.err kernel: [ 305.087152][T16993] kAFS: unable to lookup cell '.,' [ 305.245304][T16995] netlink: 'syz.2.5068': attribute type 3 has an invalid length. May 18 03:35:11 syzkaller kern.warn kernel: [ 305.245304][T16995] netlink: 'syz.2.5068': attribute type 3 has an invalid length. [ 306.079099][T17018] xt_connbytes: Forcing CT accounting to be enabled [ 306.131608][T17018] x_tables: ip_tables: icmp match: only valid for protocol 1 May 18 03:35:12 syzkaller kern.warn kernel: [ 306.079099][T17018] xt_connbytes: Forcing CT accounting to be enabled May 18 03:35:12 syzkaller kern.info kernel: [ 306.131608][T17018] x_tables: ip_tables: icmp match: only valid for protocol 1 [ 306.849750][T17037] netlink: 'syz.1.5089': attribute type 3 has an invalid length. May 18 03:35:13 syzkaller kern.warn kernel: [ 306.849750][T17037] netlink: 'syz.1.5089': attribute type 3 has an invalid length. [ 307.102525][ T29] kauditd_printk_skb: 89 callbacks suppressed [ 307.102542][ T29] audit: type=1400 audit(2000000113.333:22532): avc: denied { read write } for pid=5830 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 18 03:35:13 syzkaller kern.warn kernel: [ 307.102525][ T29] kauditd_printk_skb: 89 callbacks suppressed May 18 03:35:13 syzkaller kern.notice kernel: [ 307.102542][ T29] audit: type=1400 audit(2000000113.333:22532): avc: denied { read write } for pid=5830 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:f [ 307.290018][ T29] audit: type=1400 audit(2000000113.398:22533): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 18 03:35:13 syzkaller kern.notice kernel: [ 307.290018][ T29] audit: type=1400 audit(2000000113.398:22533): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass [ 307.447474][ T29] audit: type=1400 audit(2000000113.398:22534): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 18 03:35:13 syzkaller kern.notice kernel: [ 307.447474][ T29] audit: type=1400 audit(2000000113.398:22534): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass [ 307.622229][ T29] audit: type=1400 audit(2000000113.417:22535): avc: denied { read write } for pid=5829 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 307.646518][ C0] vkms_vblank_simulate: vblank timer overrun May 18 03:35:13 syzkaller kern.notice kernel: [ 307.622229][ T29] audit: type=1400 audit(2000000113.417:22535): avc: denied { read write } for pid=5829 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:f May 18 03:35:13 syzkaller kern.warn kernel: [ 307.646518][ C0] vkms_vblank_simulate: vblank timer overrun [ 307.812074][ T29] audit: type=1400 audit(2000000113.492:22536): avc: denied { read write } for pid=5828 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 18 03:35:14 syzkaller kern.notice kernel: [ 307.812074][ T29] audit: type=1400 audit(2000000113.492:22536): avc: denied { read write } for pid=5828 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:f [ 308.000589][ T29] audit: type=1400 audit(2000000113.548:22537): avc: denied { read write } for pid=5818 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 18 03:35:14 syzkaller kern.notice kernel: [ 308.000589][ T29] audit: type=1400 audit(2000000113.548:22537): avc: denied { read write } for pid=5818 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:f [ 308.188815][ T29] audit: type=1400 audit(2000000113.576:22538): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 18 03:35:14 syzkaller kern.notice kernel: [ 308.188815][ T29] audit: type=1400 audit(2000000113.576:22538): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass [ 308.332188][ T29] audit: type=1400 audit(2000000113.623:22539): avc: denied { read write } for pid=5825 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 308.356441][ C0] vkms_vblank_simulate: vblank timer overrun May 18 03:35:14 syzkaller kern.notice kernel: [ 308.332188][ T29] audit: type=1400 audit(2000000113.623:22539): avc: denied { read write } for pid=5825 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:f May 18 03:35:14 syzkaller kern.warn kernel: [ 308.356441][ C0] vkms_vblank_simulate: vblank timer overrun [ 308.486620][T17075] xt_TCPMSS: Only works on TCP SYN packets May 18 03:35:14 syzkaller kern.info kernel: [ 308.486620][T17075] xt_TCPMSS: Only works on TCP SYN packets [ 308.574720][ T29] audit: type=1400 audit(2000000113.669:22540): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 18 03:35:14 syzkaller kern.notice kernel: [ 308.574720][ T29] audit: type=1400 audit(2000000113.669:22540): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass [ 308.728660][ T29] audit: type=1400 audit(2000000113.679:22541): avc: denied { read write } for pid=5830 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 18 03:35:14 syzkaller kern.notice kernel: [ 308.728660][ T29] audit: type=1400 audit(2000000113.679:22541): avc: denied { read write } for pid=5830 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:f [ 309.867067][T17113] CUSE: unknown device info "€" [ 309.882215][T17113] CUSE: zero length info key specified May 18 03:35:15 syzkaller kern.warn kernel: [ 309.867067][T17113] CUSE: unknown device info "€" May 18 03:35:15 syzkaller kern.err kernel: [ 309.882215][T17113] CUSE: zero length info key specified [ 310.042087][T17115] netlink: 12 bytes leftover after parsing attributes in process `syz.1.5126'. May 18 03:35:16 syzkaller kern.warn kernel: [ 310.042087][T17115] netlink: 12 bytes leftover after parsing attributes in process `syz.1.5126'. [ 312.253347][T17172] [U] VÔ3¸ÂFÙ¾"SÇÁ/ÉÊ4:ÃXTZ“W¡T‘’LWµ«= [ 312.262172][T17171] [U] J"—E:ÀÆ" May 18 03:35:18 syzkaller kern.info kernel: [ 312.253347][T17172] [U] ^XVÔ3¸ÂFÙ¾"SÇÁ/ÉÊ^P4:^YÃXTZ“W¡T‘^^’LWµ^^«= May 18 03:35:18 syzkaller kern.info kernel: [ 312.262172][T17171] [U] J"—E:ÀÆ"^A^A May 18 03:35:18 syzkaller daemon.err dhcpcd[5484]: libudev: received NULL device[ 312.455390][ T29] kauditd_printk_skb: 114 callbacks suppressed May 18 03:35:1[ 312.455407][ T29] audit: type=1400 audit(2000000118.328:22656): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 8 syzkaller daemon.err dhcpcd[5484]: libudev: received NULL device May 18 03:35:18 syzkaller daemon.err dhcpcd[5484]: libudev: received NULL device May 18 03:35:18 syzkaller daemon.err dhcpcd[5484]: libudev: received NULL device May 18 03:35:18 syzkaller daemon.err dhcpcd[5484]: libudev: received NULL device May 18 03:35:18 syzkaller daemon.err dhcpcd[5484]: libudev: received NULL device May 18 03:35:18 syzkaller daemon.err dhcpcd[5484]: libudev: received NULL device May 18 03:35:18 syzkaller daemon.err dhcpcd[5484]: libudev: received NULL device May 18 03:35:18 syzkaller daemon.err dhcpcd[5484]: libudev: received NULL device May 18 03:35:18 syzkaller daemon.err dhcpcd[5484]: libudev: received NULL device May 18 03:35:18 syzkaller daemon.err dhcpcd[5484]: libudev: received NULL device May 18 03:35:18 syzkaller daemon.err dhcpcd[5484[ 312.677224][ T29] audit: type=1400 audit(2000000118.328:22657): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ]: libudev: received NULL device May 18 03:35:18 syzkaller daemon.err dhcpcd[5484]: libudev: received NULL device May 18 03:35:18 syzkaller daemon.err dhcpcd[5484]: libudev: [ 312.714716][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) received NULL de[ 312.727286][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) vice May 18 03:[ 312.740601][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) 35:18 syzkaller [ 312.753856][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) daemon.err dhcpc[ 312.767097][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) d[5484]: libudev[ 312.780396][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) : received NULL [ 312.793656][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) device May 18 0[ 312.807003][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) 3:35:18 syzkalle[ 312.820231][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) r kern.warn kern[ 312.833531][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) el: [ 312.455390][ T29] kauditd_printk_skb: 114 callbacks suppressed May 18 03:35:18 syzkaller kern.notice kernel: [ 312.455407][ T29] audit: type=1400 audit(2000000118.328:22656): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass May 18 03:35:18 syzkaller daemon.err dhcpcd[5484]: libudev: received NULL device [ 318.067964][ C0] net_ratelimit: 29268 callbacks suppressed [ 318.067984][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 318.086031][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 318.098178][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 318.110315][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 318.122464][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 318.134584][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 318.146740][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 318.159206][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 318.171367][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 318.183529][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 323.424017][ C0] net_ratelimit: 30141 callbacks suppressed [ 323.424038][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 323.442097][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 323.454219][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 323.466353][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 323.478462][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 323.490592][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 323.502703][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 323.514855][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 323.526966][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 323.539096][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 328.779947][ C1] net_ratelimit: 38514 callbacks suppressed [ 328.779972][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 328.779991][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 328.786434][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 328.797907][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 328.810279][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 328.821800][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 328.833999][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 328.845468][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 328.857823][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 328.869417][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 334.136035][ C0] net_ratelimit: 37123 callbacks suppressed [ 334.136055][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 334.136210][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 334.142121][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 334.154431][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 334.165927][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 334.178278][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 334.189806][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 334.202007][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 334.213520][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 334.225827][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 334.542728][ T29] audit: type=1400 audit(2000000118.328:22658): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 18 03:35:18 syzkaller daemon.err dhcpcd[5484]: libudev: received NULL device [ 334.681773][ T29] audit: type=1400 audit(2000000118.328:22659): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 18 03:35:18 syzkaller daemon.err dhcpcd[5484]: libudev: received NULL device [ 334.868581][ T29] audit: type=1400 audit(2000000118.328:22660): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 May 18 03:35:18 syzkaller daemon.err dhcpcd[5484]: libudev: received NULL device May 18 03:35:18 syzkaller daemon.err dhcpcd[5484]: libudev: received NULL device [ 335.002323][ T29] audit: type=1400 audit(2000000118.328:22661): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 335.114367][ T29] audit: type=1400 audit(2000000118.356:22662): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 May 18 03:35:18 syzkaller daemon.err dhcpcd[5484]: libudev: received NULL device [ 335.205839][ T29] audit: type=1400 audit(2000000118.365:22663): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 May 18 03:35:18 syzkaller daemon.err dhcpcd[5484]: libudev: received NULL device [ 335.302092][ T29] audit: type=1400 audit(2000000118.440:22664): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 18 03:35:18 syzkaller kern.notice kernel: [ 312.677224][ T29] audit: type=1400 audit(2000000118.328:22657): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass [ 335.381842][ T29] audit: type=1400 audit(2000000118.449:22665): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 18 03:35:18 syzkaller kern.warn kernel: [ 312.714716][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 335.467605][ T29] audit: type=1400 audit(2000000118.449:22666): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 May 18 03:35:18 syzkaller kern.warn kernel: [ 312.727286][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 335.563595][ T29] audit: type=1400 audit(2000000118.459:22667): avc: denied { read write } for pid=5829 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 18 03:35:18 syzkaller kern.warn kernel: [ 312.740601][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:35:18 syzkaller kern.warn kernel: [ 312.753856][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:35:18 syzkaller daemon.err dhcpcd[5484]: libudev: received NULL device [ 339.492039][ C0] net_ratelimit: 30713 callbacks suppressed [ 339.492058][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 339.492117][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 339.498188][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 339.510503][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 339.522019][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 339.534321][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 339.545827][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 339.558059][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 339.569544][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 339.581979][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 344.847914][ C0] net_ratelimit: 39381 callbacks suppressed [ 344.847935][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 344.848335][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 344.853970][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 344.866291][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 344.877863][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 344.890066][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 344.901589][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 344.913873][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 344.925374][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 344.937691][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 350.203960][ C0] net_ratelimit: 39127 callbacks suppressed [ 350.203981][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 350.204179][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 350.210067][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 350.222297][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 350.233805][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 350.246109][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 350.257603][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 350.269958][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 350.281481][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 350.293695][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 355.559901][ C0] net_ratelimit: 38922 callbacks suppressed [ 355.559922][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 355.560331][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 355.565964][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 355.578310][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 355.589845][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 355.602030][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 355.613578][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 355.625851][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 355.637354][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 355.649810][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 360.915922][ C0] net_ratelimit: 39094 callbacks suppressed [ 360.915941][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 360.915992][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 360.922047][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 360.934255][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 360.945776][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 360.958095][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 360.969554][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 360.981905][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 360.993439][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 361.005658][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 366.271872][ C0] net_ratelimit: 38747 callbacks suppressed [ 366.271893][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 366.272089][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 366.277990][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 366.290214][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 366.301724][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 366.314050][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 366.325522][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 366.337970][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 366.349526][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 366.361829][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 371.627880][ C1] net_ratelimit: 38897 callbacks suppressed [ 371.627900][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 371.627967][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 371.634406][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 371.645906][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 371.658356][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 371.669683][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 371.682100][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 371.693601][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 371.705783][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 371.717279][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 376.983937][ C0] net_ratelimit: 38976 callbacks suppressed [ 376.983956][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 376.984151][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 376.990046][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 377.002239][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 377.013764][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 377.026067][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 377.037573][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 377.050236][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 377.061468][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 377.073648][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 382.339926][ C0] net_ratelimit: 36965 callbacks suppressed [ 382.339945][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 382.340245][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 382.346006][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 382.358303][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 382.369810][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 382.382119][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 382.393769][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 382.405947][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 382.417453][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 382.429782][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 387.695849][ C0] net_ratelimit: 39140 callbacks suppressed [ 387.695871][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 387.696143][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 387.701920][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 387.714240][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 387.725800][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 387.738016][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 387.749538][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 387.761928][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 387.773396][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 387.785725][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 393.051856][ C1] net_ratelimit: 38920 callbacks suppressed [ 393.051876][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 393.051936][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 393.058325][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 393.069820][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 393.082139][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 393.093614][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 393.105970][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 393.117500][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 393.129690][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 393.141197][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 398.407854][ C0] net_ratelimit: 38849 callbacks suppressed [ 398.407873][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 398.408007][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 398.413978][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 398.426198][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 398.437691][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 398.450056][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 398.461516][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 398.473855][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 398.485386][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 398.497694][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 403.763841][ C0] net_ratelimit: 39145 callbacks suppressed [ 403.763862][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 403.764180][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 403.770013][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 403.782159][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 403.793696][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 403.806038][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 403.817533][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 403.829857][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 403.841426][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 403.853607][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) May 18 03:35:42 syzkaller daemon.err dhcpcd[5484]: libudev: received NULL device [ 409.119867][ C0] net_ratelimit: 35639 callbacks suppressed [ 409.119887][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 409.120284][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 409.125931][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 409.138234][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 409.149841][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 409.161986][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 409.173518][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 409.185805][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 409.197313][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 409.209624][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 414.475912][ C0] net_ratelimit: 38813 callbacks suppressed [ 414.475931][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 414.476317][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 414.481983][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 414.494285][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 414.505803][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 414.518116][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 414.529673][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 414.541867][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 414.553380][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 414.565689][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 419.831873][ C0] net_ratelimit: 39259 callbacks suppressed [ 419.831892][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 419.832376][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 419.837924][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 419.850245][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 419.861813][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 419.874047][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 419.885516][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 419.898217][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 419.909754][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 419.922025][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 425.187833][ C0] net_ratelimit: 38933 callbacks suppressed [ 425.187854][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 425.188037][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 425.193884][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 425.206257][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 425.217768][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 425.229995][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 425.241494][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 425.253809][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 425.265280][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 425.277630][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 430.543879][ C0] net_ratelimit: 38875 callbacks suppressed [ 430.543898][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 430.544339][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 430.549962][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 430.562304][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 430.573782][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 430.586151][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 430.597678][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 430.609890][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 430.621539][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 430.633801][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 435.899795][ C0] net_ratelimit: 38816 callbacks suppressed [ 435.899814][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 435.900147][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 435.905881][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 435.918220][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 435.929700][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 435.942071][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 435.953583][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 435.965890][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 435.977336][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 435.989648][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 441.255925][ C0] net_ratelimit: 39235 callbacks suppressed [ 441.255945][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 441.256151][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 441.262048][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 441.274332][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 441.285851][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 441.298165][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 441.309716][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 441.321885][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 441.333428][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 441.345832][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 446.611856][ C0] net_ratelimit: 39326 callbacks suppressed [ 446.611875][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 446.612132][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 446.617925][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 446.630245][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 446.641797][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 446.653984][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 446.665510][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 446.677832][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 446.689336][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 446.701688][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 451.967836][ C0] net_ratelimit: 39269 callbacks suppressed [ 451.967856][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 451.968102][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 451.973930][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 451.986231][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 451.997740][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 452.010070][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 452.021622][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 452.033882][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 452.045337][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 452.057622][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 457.323831][ C0] net_ratelimit: 39182 callbacks suppressed [ 457.323851][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 457.324139][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 457.329902][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 457.342298][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 457.353846][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 457.366054][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 457.377707][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 457.389970][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 457.401434][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 457.413792][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 462.679810][ C0] net_ratelimit: 39139 callbacks suppressed [ 462.679829][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 462.680220][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 462.685919][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 462.698140][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 462.709759][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 462.722050][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 462.733555][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 462.745999][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 462.757545][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 462.769838][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 468.035823][ C0] net_ratelimit: 39288 callbacks suppressed [ 468.035842][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 468.035907][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 468.041898][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 468.054259][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 468.065722][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 468.078041][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 468.089703][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 468.101920][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 468.113408][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 468.125734][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 473.391796][ C0] net_ratelimit: 39227 callbacks suppressed [ 473.391817][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 473.391911][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 473.397922][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 473.410111][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 473.421668][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 473.433974][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 473.445463][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 473.457780][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 473.469350][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 473.481645][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 478.747857][ C0] net_ratelimit: 39335 callbacks suppressed [ 478.747877][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 478.747968][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 478.753998][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 478.766378][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 478.777924][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 478.790104][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 478.801630][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 478.813932][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 478.825444][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 478.837846][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 484.103755][ C0] net_ratelimit: 37092 callbacks suppressed [ 484.103776][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 484.103851][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 484.109866][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 484.122069][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 484.133605][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 484.145915][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 484.157427][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 484.169765][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 484.181295][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 484.193477][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 489.459712][ C0] net_ratelimit: 39313 callbacks suppressed [ 489.459731][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 489.459926][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 489.465777][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 489.478118][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 489.489708][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 489.501921][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 489.513429][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 489.525797][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 489.537239][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 489.549570][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 489.887320][ C0] rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: [ 489.894299][ C0] rcu: Tasks blocked on level-0 rcu_node (CPUs 0-1): P5484/1:b..l P5483/1:b..l [ 489.903820][ C0] rcu: (detected by 0, t=10503 jiffies, g=47525, q=737 ncpus=2) [ 489.911538][ C0] task:dhcpcd state:R running task stack:25456 pid:5483 tgid:5483 ppid:1 flags:0x00004002 [ 489.924473][ C0] Call Trace: [ 489.927767][ C0] [ 489.930721][ C0] __schedule+0xe58/0x5ad0 [ 489.935152][ C0] ? __pfx_mark_lock+0x10/0x10 [ 489.939920][ C0] ? mark_lock+0xb5/0xc60 [ 489.944259][ C0] ? hlock_class+0x4e/0x130 [ 489.948774][ C0] ? hlock_class+0x4e/0x130 [ 489.953286][ C0] ? hlock_class+0x4e/0x130 [ 489.957796][ C0] ? mark_lock+0xb5/0xc60 [ 489.962131][ C0] ? __pfx___schedule+0x10/0x10 [ 489.966988][ C0] ? mark_held_locks+0x9f/0xe0 [ 489.971754][ C0] ? irqentry_exit+0x3b/0x90 [ 489.976352][ C0] ? lockdep_hardirqs_on+0x7c/0x110 [ 489.981559][ C0] ? preempt_schedule_thunk+0x1a/0x30 [ 489.986936][ C0] preempt_schedule_common+0x44/0xc0 [ 489.992229][ C0] preempt_schedule_thunk+0x1a/0x30 [ 489.997440][ C0] unwind_next_frame+0x1776/0x20c0 [ 490.002555][ C0] ? alloc_skb_with_frags+0xe4/0x850 [ 490.007850][ C0] ? __pfx_stack_trace_consume_entry+0x10/0x10 [ 490.014014][ C0] arch_stack_walk+0x95/0x100 [ 490.018701][ C0] ? sock_alloc_send_pskb+0x7f1/0x980 [ 490.024089][ C0] stack_trace_save+0x95/0xd0 [ 490.028775][ C0] ? __pfx_stack_trace_save+0x10/0x10 [ 490.034155][ C0] ? __lock_acquire+0x15a9/0x3c40 [ 490.039189][ C0] save_stack+0x162/0x1f0 [ 490.043521][ C0] ? __pfx_save_stack+0x10/0x10 [ 490.048371][ C0] ? __pfx_lock_acquire.part.0+0x10/0x10 [ 490.054011][ C0] ? free_unref_page+0x661/0x1080 [ 490.059043][ C0] ? __put_partials+0x14c/0x170 [ 490.063893][ C0] ? qlist_free_all+0x4e/0x120 [ 490.068677][ C0] ? kasan_quarantine_reduce+0x195/0x1e0 [ 490.074313][ C0] ? __kasan_kmalloc+0x8a/0xb0 [ 490.079077][ C0] ? __kmalloc_node_track_caller_noprof+0x222/0x510 [ 490.085668][ C0] ? kmalloc_reserve+0xef/0x2c0 [ 490.090521][ C0] ? __alloc_skb+0x164/0x380 [ 490.095116][ C0] ? alloc_skb_with_frags+0xe4/0x850 [ 490.100420][ C0] __reset_page_owner+0x8d/0x400 [ 490.105364][ C0] free_unref_page+0x661/0x1080 [ 490.110235][ C0] __put_partials+0x14c/0x170 [ 490.114921][ C0] qlist_free_all+0x4e/0x120 [ 490.119517][ C0] kasan_quarantine_reduce+0x195/0x1e0 [ 490.124980][ C0] __kasan_kmalloc+0x8a/0xb0 [ 490.129588][ C0] __kmalloc_node_track_caller_noprof+0x222/0x510 [ 490.136024][ C0] ? rcu_watching_snap_stopped_since+0x61/0x110 [ 490.142276][ C0] ? __alloc_skb+0x164/0x380 [ 490.146879][ C0] kmalloc_reserve+0xef/0x2c0 [ 490.151563][ C0] __alloc_skb+0x164/0x380 [ 490.155986][ C0] ? __pfx___alloc_skb+0x10/0x10 [ 490.160931][ C0] ? hlock_class+0x4e/0x130 [ 490.165440][ C0] ? __lock_acquire+0x14f0/0x3c40 [ 490.170473][ C0] alloc_skb_with_frags+0xe4/0x850 [ 490.175587][ C0] ? hlock_class+0x4e/0x130 [ 490.180102][ C0] sock_alloc_send_pskb+0x7f1/0x980 [ 490.185317][ C0] ? __pfx_sock_alloc_send_pskb+0x10/0x10 [ 490.191046][ C0] ? __pfx_lock_release+0x10/0x10 [ 490.196073][ C0] ? do_raw_spin_lock+0x12d/0x2c0 [ 490.201111][ C0] ? __pfx_do_raw_spin_lock+0x10/0x10 [ 490.206491][ C0] ? lock_acquire+0x2f/0xb0 [ 490.210999][ C0] ? unix_dgram_sendmsg+0x928/0x19e0 [ 490.216297][ C0] unix_dgram_sendmsg+0x4b8/0x19e0 [ 490.221423][ C0] ? __pfx_tomoyo_socket_sendmsg_permission+0x10/0x10 [ 490.228192][ C0] ? avc_has_perm_noaudit+0x61/0x3a0 [ 490.233487][ C0] ? __pfx_unix_dgram_sendmsg+0x10/0x10 [ 490.239044][ C0] ? avc_has_perm_noaudit+0x143/0x3a0 [ 490.244437][ C0] sock_write_iter+0x4fe/0x5b0 [ 490.249209][ C0] ? __pfx_sock_write_iter+0x10/0x10 [ 490.254508][ C0] ? __pfx_file_has_perm+0x10/0x10 [ 490.259622][ C0] do_iter_readv_writev+0x532/0x7f0 [ 490.264834][ C0] ? __pfx_do_iter_readv_writev+0x10/0x10 [ 490.270565][ C0] ? bpf_lsm_file_permission+0x9/0x10 [ 490.275945][ C0] ? security_file_permission+0x71/0x210 [ 490.281587][ C0] vfs_writev+0x363/0xdd0 [ 490.285924][ C0] ? __pfx_vfs_writev+0x10/0x10 [ 490.290804][ C0] ? __pfx___seccomp_filter+0x10/0x10 [ 490.296194][ C0] ? do_writev+0x297/0x340 [ 490.300610][ C0] do_writev+0x297/0x340 [ 490.304852][ C0] ? __pfx_do_writev+0x10/0x10 [ 490.309614][ C0] ? __secure_computing+0x273/0x3f0 [ 490.314817][ C0] do_syscall_64+0xcd/0x250 [ 490.319330][ C0] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 490.325233][ C0] RIP: 0033:0x7f2d4bb3ae03 [ 490.329648][ C0] RSP: 002b:00007ffdc25a9bc8 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 490.338065][ C0] RAX: ffffffffffffffda RBX: 00007ffdc25a9f28 RCX: 00007f2d4bb3ae03 [ 490.346037][ C0] RDX: 0000000000000005 RSI: 00007ffdc25a9be0 RDI: 000000000000000a [ 490.354010][ C0] RBP: 000000000000012c R08: 000000000000000a R09: 00007ffdc25a9c20 [ 490.361984][ C0] R10: 00007ffdc25a9c28 R11: 0000000000000246 R12: 000055b2f7e6cec0 [ 490.369976][ C0] R13: 000055b2eaa98f88 R14: 00000000ffffffff R15: 0000000000000001 [ 490.377966][ C0] [ 490.380986][ C0] task:dhcpcd state:R running task stack:22688 pid:5484 tgid:5484 ppid:5483 flags:0x00000002 [ 490.392746][ C0] Call Trace: [ 490.396025][ C0] [ 490.398963][ C0] __schedule+0xe58/0x5ad0 [ 490.403402][ C0] ? is_bpf_text_address+0x30/0x1a0 [ 490.408627][ C0] ? __pfx_mark_lock+0x10/0x10 [ 490.413420][ C0] ? __pfx___schedule+0x10/0x10 [ 490.418299][ C0] ? mark_held_locks+0x9f/0xe0 [ 490.423077][ C0] preempt_schedule_irq+0x51/0x90 [ 490.428119][ C0] irqentry_exit+0x36/0x90 [ 490.432546][ C0] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 490.438546][ C0] RIP: 0010:unwind_next_frame+0x68/0x20c0 [ 490.444275][ C0] Code: 31 c0 48 83 c4 38 5b 5d 41 5c 41 5d 41 5e 41 5f c3 cc cc cc cc 49 8d 6d 48 48 b8 00 00 00 00 00 fc ff df 48 89 ea 48 c1 ea 03 <80> 3c 02 00 0f 85 00 18 00 00 49 8b 45 48 48 89 44 24 08 49 8d 45 [ 490.463894][ C0] RSP: 0018:ffffc900045cf450 EFLAGS: 00000a02 [ 490.469967][ C0] RAX: dffffc0000000000 RBX: 0000000000000001 RCX: 0000000000000000 [ 490.477943][ C0] RDX: 1ffff920008b9ea1 RSI: ffffffff81f1fadc RDI: ffffc900045cf4c0 [ 490.485922][ C0] RBP: ffffc900045cf508 R08: ffffc900045cf4f4 R09: ffffffff90fede7c [ 490.493897][ C0] R10: ffffc900045cf4c0 R11: 000000000000ef90 R12: ffffffff8185d2b0 [ 490.501870][ C0] R13: ffffc900045cf4c0 R14: 0000000000000000 R15: ffff888027524880 [ 490.509846][ C0] ? __pfx_stack_trace_consume_entry+0x10/0x10 [ 490.516043][ C0] ? __put_partials+0x14c/0x170 [ 490.520901][ C0] ? free_unref_page+0x661/0x1080 [ 490.525935][ C0] ? __pfx_stack_trace_consume_entry+0x10/0x10 [ 490.532114][ C0] arch_stack_walk+0x95/0x100 [ 490.536800][ C0] ? __put_partials+0x14c/0x170 [ 490.541657][ C0] stack_trace_save+0x95/0xd0 [ 490.546342][ C0] ? __pfx_stack_trace_save+0x10/0x10 [ 490.551734][ C0] save_stack+0x162/0x1f0 [ 490.556068][ C0] ? __pfx_save_stack+0x10/0x10 [ 490.560919][ C0] ? __pfx_lock_acquire.part.0+0x10/0x10 [ 490.566554][ C0] ? free_unref_page+0x661/0x1080 [ 490.571582][ C0] ? __put_partials+0x14c/0x170 [ 490.576456][ C0] __reset_page_owner+0x8d/0x400 [ 490.581408][ C0] free_unref_page+0x661/0x1080 [ 490.586286][ C0] __put_partials+0x14c/0x170 [ 490.590972][ C0] qlist_free_all+0x4e/0x120 [ 490.595665][ C0] kasan_quarantine_reduce+0x195/0x1e0 [ 490.601131][ C0] __kasan_kmalloc+0x8a/0xb0 [ 490.605726][ C0] __kmalloc_node_track_caller_noprof+0x222/0x510 [ 490.612155][ C0] ? rcu_watching_snap_stopped_since+0x61/0x110 [ 490.618418][ C0] ? __alloc_skb+0x164/0x380 [ 490.623035][ C0] kmalloc_reserve+0xef/0x2c0 [ 490.627732][ C0] __alloc_skb+0x164/0x380 [ 490.632169][ C0] ? __pfx___alloc_skb+0x10/0x10 [ 490.637123][ C0] ? hlock_class+0x4e/0x130 [ 490.641647][ C0] ? __lock_acquire+0x14f0/0x3c40 [ 490.646690][ C0] alloc_skb_with_frags+0xe4/0x850 [ 490.651815][ C0] sock_alloc_send_pskb+0x7f1/0x980 [ 490.657031][ C0] ? __pfx_sock_alloc_send_pskb+0x10/0x10 [ 490.662753][ C0] ? __pfx_lock_release+0x10/0x10 [ 490.667784][ C0] ? do_raw_spin_lock+0x12d/0x2c0 [ 490.672819][ C0] ? __pfx_do_raw_spin_lock+0x10/0x10 [ 490.678197][ C0] ? lock_acquire+0x2f/0xb0 [ 490.682703][ C0] ? unix_dgram_sendmsg+0x928/0x19e0 [ 490.688002][ C0] unix_dgram_sendmsg+0x4b8/0x19e0 [ 490.693125][ C0] ? __pfx_tomoyo_socket_sendmsg_permission+0x10/0x10 [ 490.699897][ C0] ? __pfx_unix_dgram_sendmsg+0x10/0x10 [ 490.705457][ C0] ? __lock_acquire+0xcc5/0x3c40 [ 490.710412][ C0] __sys_sendto+0x488/0x4f0 [ 490.714927][ C0] ? __pfx___sys_sendto+0x10/0x10 [ 490.719960][ C0] ? __pfx___lock_acquire+0x10/0x10 [ 490.725170][ C0] ? find_held_lock+0x2d/0x110 [ 490.729961][ C0] __x64_sys_sendto+0xe0/0x1c0 [ 490.734736][ C0] ? do_syscall_64+0x91/0x250 [ 490.739423][ C0] ? lockdep_hardirqs_on+0x7c/0x110 [ 490.744639][ C0] do_syscall_64+0xcd/0x250 [ 490.749150][ C0] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 490.755049][ C0] RIP: 0033:0x7f2d4bb449b5 [ 490.759462][ C0] RSP: 002b:00007ffdc25a9818 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 490.767901][ C0] RAX: ffffffffffffffda RBX: 000000000000006b RCX: 00007f2d4bb449b5 [ 490.775875][ C0] RDX: 000000000000003f RSI: 000055b2f7e8aea0 RDI: 0000000000000004 [ 490.783935][ C0] RBP: 000055b2f7e80cb0 R08: 0000000000000000 R09: 0000000000000000 [ 490.791909][ C0] R10: 0000000000004000 R11: 0000000000000246 R12: 0000000000000014 [ 490.799905][ C0] R13: 00007f2d4ba690e1 R14: 00007ffdc25a9d50 R15: 0000000000000000 [ 490.807901][ C0] [ 490.810923][ C0] rcu: rcu_preempt kthread starved for 8357 jiffies! g47525 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=1 [ 490.822032][ C0] rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. [ 490.832002][ C0] rcu: RCU grace-period kthread stack dump: [ 490.837887][ C0] task:rcu_preempt state:R running task stack:28424 pid:17 tgid:17 ppid:2 flags:0x00004000 [ 490.849649][ C0] Call Trace: [ 490.852942][ C0] [ 490.855878][ C0] __schedule+0xe58/0x5ad0 [ 490.860302][ C0] ? __pfx___lock_acquire+0x10/0x10 [ 490.865516][ C0] ? __pfx___schedule+0x10/0x10 [ 490.870377][ C0] ? schedule+0x298/0x350 [ 490.874709][ C0] ? __pfx_lock_release+0x10/0x10 [ 490.879739][ C0] ? lock_acquire+0x2f/0xb0 [ 490.884242][ C0] ? schedule+0x1fd/0x350 [ 490.888578][ C0] schedule+0xe7/0x350 [ 490.892651][ C0] schedule_timeout+0x124/0x280 [ 490.897505][ C0] ? __pfx_schedule_timeout+0x10/0x10 [ 490.902886][ C0] ? __pfx_process_timeout+0x10/0x10 [ 490.908183][ C0] ? _raw_spin_unlock_irqrestore+0x3b/0x80 [ 490.913999][ C0] ? prepare_to_swait_event+0xf3/0x470 [ 490.919469][ C0] rcu_gp_fqs_loop+0x1eb/0xb00 [ 490.924245][ C0] ? __pfx_rcu_gp_fqs_loop+0x10/0x10 [ 490.929532][ C0] ? rcu_gp_init+0xc82/0x1630 [ 490.934216][ C0] ? _raw_spin_unlock_irq+0x2e/0x50 [ 490.939427][ C0] ? _raw_spin_unlock_irqrestore+0x52/0x80 [ 490.945241][ C0] rcu_gp_kthread+0x271/0x380 [ 490.949924][ C0] ? __pfx_rcu_gp_kthread+0x10/0x10 [ 490.955127][ C0] ? lockdep_hardirqs_on+0x7c/0x110 [ 490.960335][ C0] ? __kthread_parkme+0x148/0x220 [ 490.965370][ C0] ? __pfx_rcu_gp_kthread+0x10/0x10 [ 490.970579][ C0] kthread+0x2c1/0x3a0 [ 490.974656][ C0] ? _raw_spin_unlock_irq+0x23/0x50 [ 490.979861][ C0] ? __pfx_kthread+0x10/0x10 [ 490.984459][ C0] ret_from_fork+0x45/0x80 [ 490.988881][ C0] ? __pfx_kthread+0x10/0x10 [ 490.993480][ C0] ret_from_fork_asm+0x1a/0x30 [ 490.998266][ C0] [ 491.001282][ C0] rcu: Stack dump where RCU GP kthread last ran: [ 491.007598][ C0] Sending NMI from CPU 0 to CPUs 1: [ 491.012889][ C1] NMI backtrace for cpu 1 [ 491.012899][ C1] CPU: 1 UID: 0 PID: 24 Comm: ksoftirqd/1 Not tainted 6.13.0-rc5-syzkaller-00163-gab75170520d4 #0 [ 491.012915][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 491.012923][ C1] RIP: 0010:kasan_check_range+0x39/0x1a0 [ 491.012947][ C1] Code: f8 41 54 44 0f b6 c2 48 01 f0 55 53 0f 82 c6 00 00 00 48 b8 ff ff ff ff ff 7f ff ff 48 39 f8 0f 83 b3 00 00 00 4c 8d 54 37 ff <48> 89 fd 48 b8 00 00 00 00 00 fc ff df 4d 89 d1 48 c1 ed 03 49 c1 [ 491.012961][ C1] RSP: 0018:ffffc900001e75a8 EFLAGS: 00000087 [ 491.012973][ C1] RAX: ffff7fffffffffff RBX: 0000000000000001 RCX: ffffffff81a1b635 [ 491.012982][ C1] RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffffffff905f3950 [ 491.012991][ C1] RBP: 000000000003d90c R08: 0000000000000000 R09: 0000000000000000 [ 491.012999][ C1] R10: ffffffff905f3957 R11: 0000000000000001 R12: ffff88803639fb40 [ 491.013009][ C1] R13: 1ffff9200003cec4 R14: 0000000000000080 R15: ffffc900001e7680 [ 491.013018][ C1] FS: 0000000000000000(0000) GS:ffff8880b8700000(0000) knlGS:0000000000000000 [ 491.013034][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 491.013044][ C1] CR2: 000055905d761060 CR3: 0000000030110000 CR4: 00000000003526f0 [ 491.013053][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 491.013062][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 491.013070][ C1] Call Trace: [ 491.013075][ C1] [ 491.013081][ C1] ? nmi_cpu_backtrace+0x1d8/0x390 [ 491.013098][ C1] ? nmi_cpu_backtrace_handler+0xc/0x20 [ 491.013112][ C1] ? nmi_handle+0x1ac/0x5d0 [ 491.013134][ C1] ? kasan_check_range+0x39/0x1a0 [ 491.013153][ C1] ? default_do_nmi+0x6a/0x160 [ 491.013168][ C1] ? exc_nmi+0x170/0x1e0 [ 491.013181][ C1] ? end_repeat_nmi+0xf/0x53 [ 491.013203][ C1] ? trace_irq_disable.constprop.0+0x35/0x140 [ 491.013222][ C1] ? kasan_check_range+0x39/0x1a0 [ 491.013241][ C1] ? kasan_check_range+0x39/0x1a0 [ 491.013260][ C1] ? kasan_check_range+0x39/0x1a0 [ 491.013279][ C1] [ 491.013284][ C1] [ 491.013289][ C1] trace_irq_disable.constprop.0+0x35/0x140 [ 491.013306][ C1] ? ip6_pol_route+0x3ff/0x1120 [ 491.013322][ C1] __local_bh_enable_ip+0xcd/0x120 [ 491.013340][ C1] ip6_pol_route+0x404/0x1120 [ 491.013356][ C1] ? rt6_multipath_hash+0x1f0/0x1830 [ 491.013371][ C1] ? __pfx_ip6_pol_route+0x10/0x10 [ 491.013388][ C1] ? __pfx_rt6_multipath_hash+0x10/0x10 [ 491.013409][ C1] ? __pfx_ip6_pol_route_input+0x10/0x10 [ 491.013425][ C1] fib6_rule_lookup+0x536/0x720 [ 491.013441][ C1] ? ip6t_do_table+0xd50/0x1d40 [ 491.013457][ C1] ? __pfx_fib6_rule_lookup+0x10/0x10 [ 491.013472][ C1] ? nf_nat_ipv6_fn+0x103/0x2e0 [ 491.013492][ C1] ? __pfx_nf_nat_ipv6_fn+0x10/0x10 [ 491.013513][ C1] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 491.013533][ C1] ip6_route_input+0x663/0xc10 [ 491.013550][ C1] ? __pfx_ip6_route_input+0x10/0x10 [ 491.013566][ C1] ? __pfx_lock_release+0x10/0x10 [ 491.013581][ C1] ? trace_lock_acquire+0x14e/0x1f0 [ 491.013608][ C1] ? __pfx_ip6_rcv_finish+0x10/0x10 [ 491.013628][ C1] ip6_rcv_finish_core.constprop.0+0x1a0/0x5d0 [ 491.013647][ C1] ipv6_rcv+0x1e4/0x680 [ 491.013663][ C1] ? __pfx_ipv6_rcv+0x10/0x10 [ 491.013679][ C1] __netif_receive_skb_one_core+0x12e/0x1e0 [ 491.013699][ C1] ? __pfx___netif_receive_skb_one_core+0x10/0x10 [ 491.013717][ C1] ? rcu_is_watching+0x12/0xc0 [ 491.013737][ C1] ? __pfx_do_raw_spin_lock+0x10/0x10 [ 491.013753][ C1] ? process_backlog+0x3f1/0x15f0 [ 491.013772][ C1] ? process_backlog+0x3f1/0x15f0 [ 491.013788][ C1] __netif_receive_skb+0x1d/0x160 [ 491.013807][ C1] process_backlog+0x443/0x15f0 [ 491.013826][ C1] __napi_poll.constprop.0+0xb7/0x550 [ 491.013846][ C1] net_rx_action+0xa94/0x1010 [ 491.013864][ C1] ? tmigr_handle_remote+0x153/0xdd0 [ 491.013885][ C1] ? __pfx_net_rx_action+0x10/0x10 [ 491.013904][ C1] ? __pfx_tmigr_handle_remote+0x10/0x10 [ 491.013922][ C1] ? run_timer_base+0x11c/0x190 [ 491.013942][ C1] ? run_timer_base+0x121/0x190 [ 491.013957][ C1] ? __pfx_run_timer_base+0x10/0x10 [ 491.013973][ C1] handle_softirqs+0x213/0x8f0 [ 491.013992][ C1] ? __pfx_handle_softirqs+0x10/0x10 [ 491.014009][ C1] ? rcu_is_watching+0x12/0xc0 [ 491.014027][ C1] ? __pfx_run_ksoftirqd+0x10/0x10 [ 491.014043][ C1] ? smpboot_thread_fn+0x59d/0xa30 [ 491.014061][ C1] run_ksoftirqd+0x3a/0x60 [ 491.014076][ C1] smpboot_thread_fn+0x661/0xa30 [ 491.014094][ C1] ? __kthread_parkme+0x148/0x220 [ 491.014113][ C1] ? __pfx_smpboot_thread_fn+0x10/0x10 [ 491.014136][ C1] kthread+0x2c1/0x3a0 [ 491.014152][ C1] ? _raw_spin_unlock_irq+0x23/0x50 [ 491.014168][ C1] ? __pfx_kthread+0x10/0x10 [ 491.014186][ C1] ret_from_fork+0x45/0x80 [ 491.014200][ C1] ? __pfx_kthread+0x10/0x10 [ 491.014217][ C1] ret_from_fork_asm+0x1a/0x30 [ 491.014242][ C1] [ 494.815859][ C0] net_ratelimit: 30600 callbacks suppressed [ 494.815879][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 494.815986][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 494.821924][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 494.834250][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 494.845813][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 494.857997][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 494.869526][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 494.881825][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 494.893328][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 494.905665][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)