last executing test programs: 2.12684357s ago: executing program 3 (id=4235): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000a00)=""/4096) 1.936909628s ago: executing program 0 (id=4238): r0 = syz_usb_connect(0x3, 0x2d, &(0x7f00000003c0)={{0x12, 0x1, 0x0, 0x5a, 0xe4, 0xc4, 0x10, 0x596, 0x1, 0x5f5, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0xd6, 0x0, 0x1, 0xb5, 0xe1, 0x45, 0x0, [], [{{0x9, 0x5, 0x83, 0x0, 0x3ff, 0x3, 0x7, 0x4}}]}}]}}]}}, 0x0) syz_usb_control_io(r0, 0x0, &(0x7f0000001480)={0x84, &(0x7f0000001000)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 1.899538783s ago: executing program 3 (id=4239): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fff7ffc}]}) fchown(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 1.822713737s ago: executing program 4 (id=4240): r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x18, 0x19, 0x1, 0x0, 0x0, {0x1d, 0xd601, 0x9}, [@nested={0x4, 0x12}]}, 0x18}, 0x1, 0x0, 0x0, 0x5}, 0x0) 1.709167091s ago: executing program 3 (id=4241): r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, &(0x7f0000000040)=0x1e) 1.686009881s ago: executing program 4 (id=4242): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)={0x78, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SEQ_ADJ_REPLY={0x14, 0xf, 0x0, 0x1, [@CTA_SEQADJ_CORRECTION_POS={0x8}, @CTA_SEQADJ_OFFSET_BEFORE={0x8}]}]}, 0x78}}, 0x0) 1.609813182s ago: executing program 3 (id=4244): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x16, 0x8, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x8, 0x0, 0xff12, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x2800000002000000, 0x2d, 0x55, &(0x7f0000000540)="a06ad876d56a0064d082778c393848e47aafb93e825bc86755a2eacec33fc952dd561507bc6b135f56dbf06a9d9ceee56670596ed92308d08c59eca23dcc6b6ba358116f41e4d9ab66a8203331c0763188fac61ebb4303d19d417546d16adca03aa17717ad74a5ef4f998c04575bb63a549646e527acde027974c3cd1cfd4b6b0f8e2d00"/153, &(0x7f0000000380)=""/85, 0x400000, 0x4000000, 0x30, 0x0, &(0x7f0000000180)="63f48972dae3f4a86c0349357f1a22fe48450f85daf04828cd1a18ffb8ab4359ecbcfb78ef46d047d95d8091652b56000000", &(0x7f0000000180), 0x0, 0x0, 0x1}, 0x24) 1.466972268s ago: executing program 3 (id=4246): r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 1.265350562s ago: executing program 0 (id=4250): r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, 0x0, &(0x7f0000000fc0)) 1.1223548s ago: executing program 1 (id=4251): r0 = gettid() ioprio_set$pid(0x2, r0, 0x2000) 1.07330054s ago: executing program 0 (id=4252): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x5c}]}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_REVISION={0x5}]}, 0x58}}, 0x0) 1.07034413s ago: executing program 2 (id=4253): r0 = socket(0x2b, 0x1, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x11e, 0x1, 0x0, 0x20000000) 905.185331ms ago: executing program 3 (id=4254): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f0000001480)=0x5, 0x4) 905.051287ms ago: executing program 2 (id=4255): r0 = syz_open_dev$I2C(&(0x7f0000000000), 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) 897.408728ms ago: executing program 0 (id=4256): pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) fcntl$addseals(r0, 0x409, 0x8) 829.840043ms ago: executing program 4 (id=4257): r0 = syz_open_dev$video4linux(&(0x7f0000000000), 0x5, 0x400) ioctl$VIDIOC_SUBDEV_S_FMT(r0, 0xc0585605, &(0x7f0000000140)={0x1, 0x14100000, {0x3, 0x8, 0x1014, 0x2, 0x8, 0x3, 0x1, 0x4}}) 753.826126ms ago: executing program 1 (id=4258): r0 = syz_open_dev$media(&(0x7f0000004800), 0x5, 0x100) ppoll(&(0x7f0000004840)=[{r0, 0x28}], 0x1, &(0x7f0000004880), 0x0, 0x0) 699.966548ms ago: executing program 4 (id=4259): r0 = socket$inet(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'syz_tun\x00', &(0x7f0000000480)=@ethtool_link_settings={0x2, 0x0, 0x8, 0x0, 0x0, 0x7f, 0x10, 0x0, 0x0, 0x0, [0x2, 0x5, 0x11]}}) 692.160567ms ago: executing program 2 (id=4260): r0 = socket(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'netdevsim0\x00', &(0x7f0000000000)=@ethtool_perm_addr={0x11}}) 609.014666ms ago: executing program 1 (id=4261): r0 = fsopen(&(0x7f0000000000)='befs\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000ac0)='gid', &(0x7f0000000440)='0\x00#\x00\xd0\x00 \x00\x00qS\x00\x00\x00\x00\x00\x00\x00\x00$\xf6_\xbdI\x1c\xf2\xa9]\xcc\xe0*\xef\x01\x8d\x15\xd2h\x93\xc9\xb57\xc3\xea\\Eb\xf8\xe6,\xdf\xd4\xfae\x84\xcc\xd5\"d\xf0D-\x98\x9f\x81{\xfc$\xc4\xbcF\xf8\xc8\x8d\xcb\xb8\xf2\x1e\xe4\'U\xb3\xb8\xd3\xe6\xd7\x80Y\xc2\xeb\n\xb8_\xe8\x96YY\xe3\xc7\xe6\xf28\x19\xa6\xa7\xfa\xdb\x1ce\xc1\x03\x86J\xb2fh\x19\xee#\xcc\x0f\xed\xfea\xdc\x88\xcb%bW\xd35\xda=\xac\x1d\xae\x93\xfd\'T6\x94\n\xa4\x9cU\xc4\fA~[\xbf\x8b\x90\xfe\x04\xe7U\xf3h\x81\x14l7u\x95\x96t\\\x0f\xef;\x03\xa4C\xbc(Vc!a\xc1\xe39\xc6b\x905\xf8\xc9@h\x01\xf5\xcb\x88\xdf9\xaf5\xc8a:z\xe4\xcbag&67\x814\xf6}\xe10v6l\xd6,\x1e\xa0\xcc\xbf\xfdkm\b?\x839\x85N\x1c\xc1\xcb\xfc\x85\xd2\n\x02\"\xf2\x81g\x90\x01n%\x7f_\xe1.f>>\xa5\xfb\"\xab\xdb\x06\x12e\x14\x11~\x9a\bR-\x85\xc3\xa9\xe6\xf6R\x11\"\xc3\xc9\xfc\x14s X\xec\xdd\xc2qB\x85\xf0\xd7\x04\xdd<\x9a\x84\'\xa3\xf1\xd9<\xb9k', 0x0) 507.778977ms ago: executing program 4 (id=4262): r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000003e00)=[{{&(0x7f0000000140)={0x2, 0x4e20, @broadcast}, 0x10, 0x0, 0x0, &(0x7f0000000640)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}, @ip_retopts={{0x10}}], 0x30}}], 0x1, 0x8000) 503.018995ms ago: executing program 2 (id=4263): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TYPE(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000004c0)={0x30, 0xd, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}]}, 0x30}}, 0x0) 420.891928ms ago: executing program 1 (id=4264): r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f0000000700)=0xed) 314.855141ms ago: executing program 2 (id=4265): r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000100)={0x3}) 292.473873ms ago: executing program 4 (id=4266): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000300)={0x24, 0x4, 0x8, 0x201, 0x0, 0x0, {0x1, 0x0, 0x8}, [@CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x88e7}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x3a}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x4010) 232.677179ms ago: executing program 1 (id=4267): r0 = gettid() getpriority(0x0, r0) 180.207354ms ago: executing program 0 (id=4268): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)=@newtaction={0x14, 0x1e, 0x109}, 0x14}, 0x1, 0x2b1e}, 0x0) 97.556135ms ago: executing program 2 (id=4269): r0 = syz_open_dev$usbfs(&(0x7f00000000c0), 0x201, 0x0) lseek(r0, 0x3, 0x0) 37.487597ms ago: executing program 1 (id=4270): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, 0x0, 0x0) 0s ago: executing program 0 (id=4271): r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000), 0x20040, 0x0) ioctl$SNDCTL_DSP_POST(r0, 0x5008, 0x0) kernel console output (not intermixed with test programs): h own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:33:35 syzkaller kern.warn kernel: [ 251.960882][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:33:35 syzkaller kern.warn kernel: [ 251.974396][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 255.101102][T13890] xt_limit: Overflow, try lower: 1207959552/384 May 18 03:33:38 syzkaller kern.info kernel: [ 255.101102][T13890] xt_limit: Overflow, try lower: 1207959552/384 [ 255.257532][ T29] kauditd_printk_skb: 128 callbacks suppressed [ 255.257549][ T29] audit: type=1400 audit(2000000018.633:8850): avc: denied { create } for pid=13868 comm="syz.3.3726" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=0 May 18 03:33:38 syzkaller kern.warn kernel: [ 255.257532][ T29] kauditd_printk_skb: 128 callbacks suppressed May 18 03:33:38 syzkaller kern.notice kernel: [ 255.257549][ T29] audit: type=1400 audit(2000000018.633:8850): avc: denied { create } for pid=13868 comm="syz.3.3726" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=0 [ 255.334535][ T29] audit: type=1400 audit(2000000018.665:8851): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 255.416156][ T29] audit: type=1400 audit(2000000018.665:8852): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 18 03:33:38 syzkaller kern.notice kernel: [ 255.334535][ T29] audit: type=1400 audit(2000000018.665:8851): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= May 18 03:33:38 syzkaller kern.notice kernel: [ 255.416156][ T29] audit: type=1400 audit(2000000018.665:8852): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 255.722684][ T29] audit: type=1400 audit(2000000018.675:8853): avc: denied { read write } for pid=5825 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 18 03:33:39 syzkaller kern.notice kernel: [ 255.722684][ T29] audit: type=1400 audit(2000000018.675:8853): avc: denied { read write } for pid=5825 comm="syz-executor" name="loop2" dev="devtmpfs" ino[ 255.769135][ T29] audit: type=1400 audit(2000000018.686:8854): avc: denied { read write } for pid=5812 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 =649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi May 18 03:33:39 [ 255.801367][ T29] audit: type=1400 audit(2000000018.759:8855): avc: denied { read write } for pid=13884 comm="syz.4.3734" name="vbi8" dev="devtmpfs" ino=1004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l_device_t tclass=chr_file permissive=0 syzkaller kern.notice kernel: [ 255.769135][ T29] audit: type=1400 audit(2000000018.686:8854): avc: denied { read write } for pid=5812 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 255.919506][ T29] audit: type=1400 audit(2000000018.780:8856): avc: denied { create } for pid=13899 comm="syz.2.3740" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=0 [ 255.979768][ T29] audit: type=1400 audit(2000000018.833:8857): avc: denied { read write } for pid=5822 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 256.004112][ T29] audit: type=1400 audit(2000000018.875:8858): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 256.026188][ T29] audit: type=1400 audit(2000000018.875:8859): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 256.094615][T13918] No such timeout policy "syz0" May 18 03:33:39 syzkaller kern.notice kernel: [ 255.801367][ T29] audit: type=1400 audit(2000000018.759:8855): avc: denied { read write } for pid=13884 comm="syz.4.3734" name="vbi8" dev="devtmpfs" ino=1004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l May 18 03:33:39 syzkaller kern.notice kernel: [ 255.919506][ T29] audit: type=1400 audit(2000000018.780:8856): avc: denied { create } for pid=13899 comm="syz.2.3740" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=0 May 18 03:33:39 syzkaller kern.notice kernel: [ 255.979768][ T29] audit: type=1400 audit(2000000018.833:8857): avc: denied { read write } for pid=5822 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi May 18 03:33:39 syzkaller kern.notice kernel: [ 256.004112][ T29] audit: type=1400 audit(2000000018.875:8858): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= May 18 03:33:39 syzkaller kern.notice kernel: [ 256.026188][ T29] audit: type=1400 audit(2000000018.875:8859): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= May 18 03:33:39 syzkaller kern.info kernel: [ 256.094615][T13918] No such timeout policy "syz0" [ 256.618259][ C0] net_ratelimit: 18401 callbacks suppressed [ 256.618278][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 256.636517][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:33:40 [ 256.648801][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) syzkaller kern.w[ 256.662268][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) arn kernel: [ 2[ 256.675489][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) 56.618259][ C[ 256.688810][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) 0] net_ratelimit[ 256.702182][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) : 18401 callback[ 256.716398][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) s suppressed Ma[ 256.728708][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) y 18 03:33:40 sy[ 256.741969][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) zkaller kern.warn kernel: [ 256.618278][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:33:40 syzkaller kern.warn kernel: [ 256.636517][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:33:40 syzkaller kern.warn kernel: [ 256.648801][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:33:40 syzkaller kern.warn kernel: [ 256.662268][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:33:40 syzkaller kern.warn kernel: [ 256.675489][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:33:40 syzkaller kern.warn kernel: [ 256.688810][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:33:40 syzkaller kern.warn kernel: [ 256.702182][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:33:40 syzkaller kern.warn kernel: [ 256.716398][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:33:40 syzkaller kern.warn kernel: [ 256.728708][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:33:40 syzkaller kern.warn kernel: [ 256.741969][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 257.070366][T13955] xt_policy: neither incoming nor outgoing policy selected May 18 03:33:40 syzkaller kern.info kernel: [ 257.070366][T13955] xt_policy: neither incoming nor outgoing policy selected [ 260.041367][ T29] kauditd_printk_skb: 121 callbacks suppressed [ 260.041386][ T29] audit: type=1400 audit(2000000023.505:8981): avc: denied { read write } for pid=14052 comm="syz.3.3815" name="vbi2" dev="devtmpfs" ino=965 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l_device_t tclass=chr_file permissive=0 May 18 03:33:43 [ 260.111181][ T29] audit: type=1400 audit(2000000023.547:8982): avc: denied { read write } for pid=5822 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 syzkaller kern.warn kernel: [ 260.041367][ T29] kauditd_printk_skb: 121 callbacks suppressed May 18 03:33:43 syzkaller kern.notice kernel: [ 260.041386][ T29] audit: type=1400 audit(2000000023.505:8981): avc: denied { read write } for pid=14052 comm="syz.3.3815" name="vbi2" dev="devtmpfs" ino=965 scontext=root:sysadm_r:sysadm_t tcontext=sys[ 260.166294][ T29] audit: type=1400 audit(2000000023.557:8983): avc: denied { read write } for pid=5816 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 tem_u:object_r:v4l_ May 18 03:33:43 syzkaller kern.notice kernel: [ 260.111181][ T29] audit: type=1400 audit(2000000023.547:8982): avc: denied { read write } for pid=5822 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi May 18 03:33:43 syzkaller kern.notice kernel: [ 260.166294][ T29] audit: type=1400 audit(2000000023.557:8983): avc: denied { read write } for pid=5816 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 260.241992][ T29] audit: type=1400 audit(2000000023.704:8984): avc: denied { read write } for pid=5822 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 260.343784][ T29] audit: type=1400 audit(2000000023.714:8985): avc: denied { read write } for pid=5816 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 260.494909][ T29] audit: type=1400 audit(2000000023.725:8986): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 260.573481][ T29] audit: type=1400 audit(2000000023.725:8987): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 18 03:33:44 syzkaller kern.n[ 260.656170][ T29] audit: type=1400 audit(2000000023.767:8988): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 otice kernel: [ 260.241992][ T29] audit: type=1400 audit(2000000023.704:8984): avc: denied { read write } for pid=5822 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi May 18 03:33:44 syzkaller kern.notice kernel: [ 260.343784][ T29] audit: type=1400 audit(2000000023.714:8985): avc: denied { read write } for pid=5816 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi May 18 03:33:44 syzkaller kern.notice kernel: [ 260.494909][ T29] audit: type=1400 audit(2000000023.725:8986): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= May 18 03:33:44 syzkaller kern.notice kernel: [ 260.573481][ T29] audit: type=1400 audit(2000000023.725:8987): avc: denied { re[ 260.759349][ T29] audit: type=1400 audit(2000000023.830:8989): avc: denied { create } for pid=14062 comm="syz.0.3812" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=0 ad } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= May 18 03:33:44 syzkaller kern.notice kernel: [ 260.656170][ T29] audit: type=1400 audit(2000000023.767:8988): avc: denied { read } for pi[ 260.805503][T14082] ÛÌî]-Ñ: renamed from lo d=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= May 18 03:33:44 syzkaller kern.notice kernel: [ 260.759349][ T29] audit: type=1400 audit(2000000023.830:8989): avc: denied { create } for pid=14062 comm="syz.0.3812" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t[ 260.842513][ T29] audit: type=1400 audit(2000000023.830:8990): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 tclass=chr_file permi May 18 03:33:44 syzkaller kern.info kernel: [ 260.805503][T14082] ÛÌî]-Ñ: renamed from lo [ 260.922731][T14086] netlink: 'syz.2.3827': attribute type 3 has an invalid length. May 18 03:33:44 syzkaller kern.notice kernel: [ 260.842513][ T29] audit: type=1400 audit(2000000023.830:8990): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= May 18 03:33:44 syzkaller kern.warn kernel: [ 260.922731][T14086] netlink: 'syz.2.3827': attribute type 3 has an invalid length. [ 261.390166][ C0] net_ratelimit: 19339 callbacks suppressed [ 261.390181][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:33:45 [ 261.408460][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) syzkaller kern.warn kernel: [ 261.390166][ C0] net_ratelimit: 19339 callbacks suppressed [ 261.422684][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 261.422945][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 261.423205][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 261.423441][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 261.423731][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 261.423983][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 261.424201][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 261.424453][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:33:45 syzkaller kern.warn kernel: [ 261.390181][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:33:45 syzkaller kern.warn kernel: [ 261.408460][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:33:45 syzkaller kern.warn kernel: [ 261.422684][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:33:45 syzkaller kern.warn kernel: [ 261.422945][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:33:45 syzkaller kern.warn kernel: [ 261.423205][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:33:45 syzkaller kern.warn kernel: [ 261.423441][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:33:45 syzkaller kern.warn kernel: [ 261.423731][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:33:45 syzkaller kern.warn kernel: [ 261.423983][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:33:45 syzkaller kern.warn kernel: [ 261.424201][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:33:45 syzkaller kern.warn kernel: [ 261.424453][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 262.143012][T14126] netlink: 36 bytes leftover after parsing attributes in process `syz.1.3844'. May 18 03:33:45 syzkaller kern.warn kernel: [ 262.143012][T14126] netlink: 36 bytes leftover after parsing attributes in process `syz.1.3844'. [ 262.393458][T14116] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(3) [ 262.400187][T14116] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) May 18 03:33:46 syzkaller kern.info kernel: [ 262.393458][T14116] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(3) May 18 03:33:46 syzkaller kern.info kernel: [ 262.400187][T14116] vhci_hcd[ 262.424177][T14116] vhci_hcd vhci_hcd.0: Device attached vhci_hcd.0: devid(0) speed(4) speed_str(wireless) May 18 03:33:46 syzkaller kern.i[ 262.459513][T14117] vhci_hcd: connection closed nfo kernel: [ 2[ 262.459855][ T5042] vhci_hcd: stop threads 62.424177][T14116] vhci_hcd vhci_hcd.0: Device attached May 18 03:33:46 syzkaller kern.info kernel: [ 262.459513][T14117] vhci_hcd: connection closed May 18 03:33:46 syzkaller kern.info kernel: [ 262.459855][ T5042] vhci_hcd: stop threads [ 262.509215][ T5042] vhci_hcd: release socket May 18 03:33:46 syzkaller kern.info kernel: [ 262.509215][ T5042] vhci_hcd: release socket [ 262.541288][ T5042] vhci_hcd: disconnect device May 18 03:33:46 syzkaller kern.info kernel: [ 262.541288][ T5042] vhci_hcd: disconnect device [ 262.591147][ T5913] vhci_hcd: vhci_device speed not set May 18 03:33:46 syzkaller kern.err kernel: [ 262.591147][ T5913] vhci_hcd: vhci_device speed not set [ 263.154614][T14161] xt_recent: Unsupported userspace flags (000000da) May 18 03:33:46 syzkaller kern.info kernel: [ 263.154614][T14161] xt_recent: Unsupported userspace flags (000000da) [ 264.856942][ T29] kauditd_printk_skb: 126 callbacks suppressed [ 264.856958][ T29] audit: type=1400 audit(2000000028.701:9117): avc: denied { write } for pid=14224 comm="syz.0.3894" name="xfrm_stat" dev="proc" ino=4026532888 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=0 May 18 03:33:48 syzkaller kern.warn kernel: [ 264.856942][ T29] kauditd_printk_skb: 126 callbacks suppressed May 18 03:33:48 syzkaller kern.notice kernel: [ 264.856958][ T29] audit: type=1400 audit(2000000028.701:9117): avc: denied { write } for pid=14224 comm="syz.0.3894" name="xfrm_stat" dev="proc" ino=4026532888 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:p [ 265.058343][ T29] audit: type=1400 audit(2000000028.796:9118): avc: denied { read write } for pid=5821 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 18 03:33:48 syzkaller kern.notice kernel: [ 265.058343][ T29] audit: type=1400 audit(2000000028.796:9118): avc: denied { read write } f[ 265.111443][ T29] audit: type=1400 audit(2000000028.859:9119): avc: denied { read write } for pid=5812 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 or pid=5821 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=sy[ 265.145575][ T29] audit: type=1400 audit(2000000028.869:9120): avc: denied { read write } for pid=5816 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 stem_u:object_r:fi May 18 03:33:49 syzkaller kern.notice kernel: [ 265.111443][ T29] audit: type=1400 audit(2000000028.859:9119): avc: denied { read write } for pid=5812 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi May 18 03:33:49 syzkaller kern.notice kernel: [ 265.145575][ T29] audit: type=1400 audit(2000000028.869:9120): avc: denied { read write } for pid=5816 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 266.162563][ C0] net_ratelimit: 20186 callbacks suppressed [ 266.162581][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:33:50 [ 266.180898][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) syzkaller kern.w[ 266.194395][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 266.194636][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) arn kernel: [ 2[ 266.219728][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) 66.162563][ C[ 266.232937][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) 0] net_ratelimit[ 266.246276][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) : 20186 callback[ 266.259598][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) s suppressed [ 266.272960][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 266.286028][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:33:50 syzkaller kern.warn kernel: [ 266.162581][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:33:50 syzkaller kern.warn kernel: [ 266.180898][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:33:50 syzkaller kern.warn kernel: [ 266.194395][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:33:50 syzkaller kern.warn kernel: [ 266.194636][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:33:50 syzkaller kern.warn kernel: [ 266.219728][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:33:50 syzkaller kern.warn kernel: [ 266.232937][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:33:50 syzkaller kern.warn kernel: [ 266.246276][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:33:50 syzkaller kern.warn kernel: [ 266.259598][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:33:50 syzkaller kern.warn kernel: [ 266.272960][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:33:50 syzkaller kern.warn kernel: [ 266.286028][ C0] b[ 266.463041][ T29] audit: type=1400 audit(2000000028.869:9121): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:33:50 syzkaller kern.notice kernel: [ 266.463041][ T29] audit: type=1400 audit(2000000028.869:9121): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 266.551553][ T29] audit: type=1400 audit(2000000028.869:9122): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 18 03:33:50 syzkaller kern.notice kernel: [ 266.551553][ T29] audit: type=1400 audit(2000000028.869:9122): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 266.637750][ T29] audit: type=1400 audit(2000000028.880:9123): avc: denied { read write } for pid=5822 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 267.171906][ T5822] audit: audit_backlog=65 > audit_backlog_limit=64 [ 267.208003][ T5821] audit: audit_backlog=65 > audit_backlog_limit=64 [ 267.215904][T14307] netlink: 16 bytes leftover after parsing attributes in process `syz.1.3931'. [ 267.225596][ T5822] audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 May 18 03:33:51 syzkaller kern.notice kernel: [ 266.637750][ T29] audit: type=1400 audit(2000000028.880:9123): avc: denied { read write } for pid=5822 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi May 18 03:33:51 syzkaller kern.warn kernel: [ 267.171906][ T5822] audit: audit_backlog=65 > audit_backlog_limit=64 May 18 03:33:51 syzkaller kern.warn kernel: [ 267.208003][ T5821] audit: audit_backlog=65 > audit_backlog_limit=64 May 18 03:33:51 syzkaller kern.warn kernel: [ 267.215904][T14307] netlink: 16 bytes leftover after parsing attributes in process `syz.1.3931'. May 18 03:33:51 syzkaller kern.warn kernel: [ 267.225596][ T5822] audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 [ 267.689304][T14323] JFS: charset not found May 18 03:33:51 syzkaller kern.err kernel: [ 267.689304][T14323] JFS: charset not found [ 269.644924][ T29] kauditd_printk_skb: 202 callbacks suppressed [ 269.644940][ T29] audit: type=1400 audit(2000000033.730:9215): avc: denied { read write } for pid=5816 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 269.783006][ T29] audit: type=1400 audit(2000000033.824:9216): avc: denied { read write } for pid=5812 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 18 03:33:53 syzkaller kern.warn kernel: [ 269.644924][ T29] kauditd_printk_skb: 202 callbacks suppressed May 18 03:33:53 syzkaller kern.notice kernel: [ 269.644940][ T29] audit: type=1400 audit(2000000033.730:9215): avc: denied { read write } for pid=5816 comm="syz-executor[ 269.867358][ T29] audit: type=1400 audit(2000000033.866:9217): avc: denied { read write } for pid=14358 comm="syz.4.3956" name="nvram" dev="devtmpfs" ino=623 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nvram_device_t tclass=chr_file permissive=0 " name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi May 18 03:33:53 syzkaller kern.notice kernel: [ 269.783006][ T29] audit: type=1400 audit(2000000033.824:9216): avc: denied { read write } for pid=5812 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 269.982956][ T29] audit: type=1400 audit(2000000033.940:9218): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 18 03:33:54 syzkaller kern.notice kernel: [ 269.867358][ T29] audit: type=1400 audit(2000000033.866:9217): avc: denied { read write } for pid=14358 comm="syz.4.3956" name="nvram" dev[ 270.054143][ T29] audit: type=1400 audit(2000000033.940:9219): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ="devtmpfs" ino=623 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nvr May 18 03:33:54 syzkaller kern.notice kernel: [ 269.982956][ T29] audit: type=1400 audit(2000000033.940:9218): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= May 18 03:33:54 syzkaller kern.notice kernel: [ 270.054143][ T29] audit: type=1400 audit(2000000033.940:9219): avc: denied { read }[ 270.119162][ T29] audit: type=1400 audit(2000000033.940:9220): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= May 18 03:33:54 syzkaller kern.notice kernel: [ 270.119162][ T29] audit: type=1400 audit(2000000033.940:9220): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 270.210780][ T29] audit: type=1400 audit(2000000033.950:9221): avc: denied { read write } for pid=5816 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 270.251163][ T29] audit: type=1400 audit(2000000034.003:9222): avc: denied { read write } for pid=5821 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 270.251204][ T29] audit: type=1400 audit(2000000034.024:9223): avc: denied { read write } for pid=5822 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 270.251240][ T29] audit: type=1400 audit(2000000034.150:9224): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 18 03:33:54 syzkaller kern.notice kernel: [ 270.210780][ T29] audit: type=1400 audit(2000000033.950:9221): avc: denied { read write } for pid=5816 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi May 18 03:33:54 syzkaller kern.notice kernel: [ 270.251163][ T29] audit: type=1400 audit(2000000034.003:9222): avc: denied { read write } for pid=5821 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi May 18 03:33:54 syzkaller kern.notice kernel: [ 270.251204][ T29] audit: type=1400 audit(2000000034.024:9223): avc: denied { read write } for pid=5822 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi May 18 03:33:54 syzkaller kern.notice kernel: [ 270.251240][ T29] audit: type=1400 audit(2000000034.150:9224): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 270.934847][ C0] net_ratelimit: 19917 callbacks suppressed [ 270.934867][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 270.953151][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 270.953430][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 270.953703][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 270.953945][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 270.954254][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 270.954498][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 270.954723][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 270.954976][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 270.955275][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:33:55 syzkaller kern.warn kernel: [ 270.934847][ C0] net_ratelimit: 19917 callbacks suppressed May 18 03:33:55 syzkaller kern.warn kernel: [ 270.934867][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:33:55 syzkaller kern.warn kernel: [ 270.953151][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:33:55 syzkaller kern.warn kernel: [ 270.953430][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:33:55 syzkaller kern.warn kernel: [ 270.953703][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:33:55 syzkaller kern.warn kernel: [ 270.953945][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:33:55 syzkaller kern.warn kernel: [ 270.954254][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:33:55 syzkaller kern.warn kernel: [ 270.954498][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:33:55 syzkaller kern.warn kernel: [ 270.954723][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:33:55 syzkaller kern.warn kernel: [ 270.954976][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:33:55 syzkaller kern.warn kernel: [ 270.955275][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 274.463928][ T29] kauditd_printk_skb: 122 callbacks suppressed [ 274.463946][ T29] audit: type=1400 audit(2000000038.790:9347): avc: denied { create } for pid=14558 comm="syz.3.4051" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 May 18 03:33:58 syzkaller kern.warn kernel: [ 274.463928][ T29] kauditd_printk_skb: 122 callbacks suppressed May 18 03:33:58 syzkaller kern.notice kernel: [[ 274.597544][ T29] audit: type=1400 audit(2000000038.832:9348): avc: denied { read write } for pid=5821 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 274.463946][ T29] audit: type=1400 audit(2000000038.790:9347): avc: denied { create } for pid=14558 comm="syz.3.4051" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive= May 18 03:33:58 syzkaller kern.notice kernel: [ 274.597544][ T29] audit: type=1400 audit(2000000038.832:9348): avc: denied { read write } for pid=5821 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 274.704828][ T29] audit: type=1400 audit(2000000038.916:9349): avc: denied { read write } for pid=5822 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 18 03:33:59 syzkaller kern.notice kernel: [ 274.704828][ T29] audit: type=1400 audit(2000000038.916:9349): avc: denied { read write } for pid=5822 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 274.813009][ T29] audit: type=1400 audit(2000000038.926:9350): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 18 03:33:59 syzkaller kern.notice kernel: [ 274.813009][ T29] audit: type=1400 audit(2000000038.926:9350): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 274.908813][ T29] audit: type=1400 audit(2000000038.926:9351): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 18 03:33:59 syzkaller kern.notice kernel: [ 274.908813][ T29] audit: type=1400 audit(2000000038.926:9351): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 275.024054][ T29] audit: type=1400 audit(2000000038.926:9352): avc: denied { read write } for pid=5816 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 18 03:33:59 syzkaller kern.notice kernel: [ 275.024054][ T29] audit: type=1400 audit(2000000038.926:9352): avc: denied { read write } for pid=5816 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi May 18 03:33:59 syzkaller daemon.err dhcpcd[5484]: ps_sendpsmmsg: Connection refused May 18 03:33:59 syzkaller daemon.err dhcpcd[5484]: ps_root_recvmsgcb: failed to send message to pid 11134: Connection refused [ 275.160833][ T29] audit: type=1400 audit(2000000038.968:9353): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 18 03:33:59 syzkaller kern.notice kernel: [ 275.160833][ T29] audit: type=1400 audit(2000000038.968:9353): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 275.267946][ T29] audit: type=1400 audit(2000000039.000:9354): avc: denied { read write } for pid=5825 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 18 03:33:59 syzkaller kern.notice kernel: [ 275.267946][ T29] audit: type=1400 audit(2000000039.000:9354): avc: denied { read write } for pid=5825 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 275.418373][ T29] audit: type=1400 audit(2000000039.021:9355): avc: denied { read write } for pid=14565 comm="syz.3.4053" name="video5" dev="devtmpfs" ino=937 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l_device_t tclass=chr_file permissive=0 May 18 03:33:59 syzkaller kern.notice kernel: [ 275.418373][ T29] audit: type=1400 audit(2000000039.021:9355): avc: denied { read write } for pid=14565 comm="syz.3.4053" name="video5" dev="devtmpfs" ino=937 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4 [ 275.541213][ T29] audit: type=1400 audit(2000000039.073:9356): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 18 03:33:59 syzkaller kern.notice kernel: [ 275.541213][ T29] audit: type=1400 audit(2000000039.073:9356): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 275.707255][ C0] net_ratelimit: 20244 callbacks suppressed [ 275.707274][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:34:00 [ 275.725506][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) syzkaller kern.w[ 275.738995][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) arn kernel: [ 2[ 275.752280][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) 75.707255][ C[ 275.765568][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) 0] net_ratelimit[ 275.778843][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) : 20244 callback[ 275.792111][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) s suppressed Ma[ 275.805405][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) y 18 03:34:00 sy[ 275.818707][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) zkaller kern.war[ 275.832016][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) n kernel: [ 275.707274][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:34:00 syzkaller kern.warn kernel: [ 275.725506][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:34:00 syzkaller kern.warn kernel: [ 275.738995][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:34:00 syzkaller kern.warn kernel: [ 275.752280][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:34:00 syzkaller kern.warn kernel: [ 275.765568][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:34:00 syzkaller kern.warn kernel: [ 275.778843][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:34:00 syzkaller kern.warn kernel: [ 275.792111][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:34:00 syzkaller kern.warn kernel: [ 275.805405][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:34:00 syzkaller kern.warn kernel: [ 275.818707][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:34:00 syzkaller daemon.err dhcpcd[5484]: ps_sendpsmmsg: Connection refused May 18 03:34:00 syzkaller daemon.err dhcpcd[5484]: ps_root_recvmsgcb: failed to send message to pid 11192: Connection refused May 18 03:34:00 syzkaller kern.warn kernel: [ 275.832016][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:34:00 syzkaller daemon.err dhcpcd[5484]: ps_sendpsmmsg: Connection refused May 18 03:34:00 syzkaller daemon.err dhcpcd[5484]: ps_root_recvmsgcb: failed to send message to pid 11169: Connection refused May 18 03:34:01 syzkaller daemon.err dhcpcd[5484]: ps_sendpsmmsg: Connection refused May 18 03:34:01 syzkaller daemon.err dhcpcd[5484]: ps_root_recvmsgcb: failed to send message to pid 11251: Connection refused [ 276.652075][T14615] xt_TPROXY: Can be used only with -p tcp or -p udp May 18 03:34:01 syzkaller kern.info kernel: [ 276.652075][T14615] xt_TPROXY: Can be used only with -p tcp or -p udp [ 279.294917][ T29] kauditd_printk_skb: 97 callbacks suppressed [ 279.294935][ T29] audit: type=1400 audit(2000000043.860:9454): avc: denied { read write } for pid=5825 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 18 03:34:03 syzkaller kern.warn kernel: [ 279.294917][ T29] kauditd_printk_skb: 97 callbacks suppressed May 18 03:34:03 syzkaller kern.notice kernel: [ 279.294935][ T29] audit: type=1400 audit(2000000043.860:9454): avc: denied { read write } for pid=5825 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 280.278114][T14713] Cannot find del_set index 0 as target May 18 03:34:04 syzkaller kern.info kernel: [ 280.278114][T14713] Cannot find del_set index 0 as target [ 280.480088][ C0] net_ratelimit: 19674 callbacks suppressed [ 280.480106][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 280.498302][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 280.510624][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 280.522901][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 280.535263][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 280.535496][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 280.535757][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 280.536033][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 280.536254][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 280.536534][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:34:05 syzkaller kern.warn kernel: [ 280.480088][ C0] net_ratelimit: 19674 callbacks suppressed May 18 03:34:05 syzkaller kern.warn kernel: [ 280.480106][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:34:05 syzkaller kern.warn kernel: [ 280.498302][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:a[ 280.926116][ T29] audit: type=1400 audit(2000000043.902:9455): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 a:aa:aa:0c, vlan:0) May 18 03:34:05 syzkaller kern.warn kernel: [ 280.510624][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:34:05 syzkaller kern.warn kernel: [ 280.522901][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:34:05 syzkaller kern.warn kernel: [ 280.535263][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:34:05 syzkaller kern.warn kernel: [ 280.535496][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:34:05 syzkaller kern.warn kernel: [ 280.535757][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:34:05 syzkaller kern.warn kernel: [ 280.536033][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:34:05 syzkaller kern.warn kernel: [ 280.536254][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:34:05 syzkaller kern.warn kernel: [ 280.536534][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:34:05 syzkaller kern.notice kernel: [ 280.926116][ T29] audit: type=1400 audit(2000000043.902:9455): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 281.737073][T14760] audit: audit_backlog=65 > audit_backlog_limit=64 [ 281.772403][T14760] audit: audit_lost=40 audit_rate_limit=0 audit_backlog_limit=64 [ 281.780647][ T5172] audit: audit_backlog=65 > audit_backlog_limit=64 [ 281.881095][ T5812] audit: audit_backlog=65 > audit_backlog_limit=64 [ 281.887642][ T5812] audit: audit_lost=41 audit_rate_limit=0 audit_backlog_limit=64 [ 281.895599][ T29] audit: type=1400 audit(2000000043.902:9456): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 281.918244][ T5812] audit: backlog limit exceeded [ 281.928786][ T29] audit: type=1400 audit(2000000043.955:9457): avc: denied { read write } for pid=5812 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 281.988794][T14765] netdevsim netdevsim0: loading /lib/firmware/. failed with error -22 [ 281.997334][T14765] netdevsim netdevsim0: Direct firmware load for . failed with error -22 [ 282.005839][T14765] netdevsim netdevsim0: Falling back to sysfs fallback for: . May 18 03:34:06 syzkaller kern.warn kernel: [ 281.737073][T14760] audit: audit_backlog=65 > audit_backlog_limit=64 May 18 03:34:06 syzkaller kern.warn kernel: [ 281.772403][T14760] audit: audit_lost=40 audit_rate_limit=0 audit_backlog_limit=64 May 18 03:34:06 syzkaller kern.warn kernel: [ 281.780647][ T5172] audit: audit_backlog=65 > audit_backlog_limit=64 May 18 03:34:06 syzkaller kern.warn kernel: [ 281.881095][ T5812] audit: audit_backlog=65 > audit_backlog_limit=64 May 18 03:34:06 syzkaller kern.warn kernel: [ 281.887642][ T5812] audit: audit_lost=41 audit_rate_limit=0 audit_backlog_limit=64 May 18 03:34:06 syzkaller kern.notice kernel: [ 281.895599][ T29] audit: type=1400 audit(2000000043.902:9456): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= May 18 03:34:06 syzkaller kern.err kernel: [ 281.918244][ T5812] audit: backlog limit exceeded May 18 03:34:06 syzkaller kern.notice kernel: [ 281.928786][ T29] audit: type=1400 audit(2000000043.955:9457): avc: denied { read write } for pid=5812 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi May 18 03:34:06 syzkaller kern.warn kernel: [ 281.988794][T14765] netdevsim netdevsim0: loading /lib/firmware/. failed with error -22 May 18 03:34:06 syzkaller kern.warn kernel: [ 281.997334][T14765] netdevsim netdevsim0: Direct firmware load for . failed with error -22 May 18 03:34:06 syzkaller kern.warn kernel: [ 282.005839][T14765] netdevsim netdevsim0: Falling back to sysfs fallback for: . [ 284.080016][ T29] kauditd_printk_skb: 103 callbacks suppressed [ 284.080039][ T29] audit: type=1400 audit(2000000048.889:9558): avc: denied { read write } for pid=5821 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 18 03:34:08 syzkaller kern.warn kernel: [ 284.080016][ T29] kauditd_printk_skb: 103 callbacks suppressed May 18 03:34:08 syzkaller kern.notice kernel: [ 284.080039][ T29] audit: type=1400 audit(2000000048.889:9558): avc: denied { read write } for pid=5821 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 284.156015][ T29] audit: type=1400 audit(2000000048.931:9559): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 18 03:34:08 syzkaller kern.notice kernel: [ 284.156015][ T29] audit: type=1400 audit(2000000048.931:9559): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 284.223286][ T29] audit: type=1400 audit(2000000048.931:9560): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 18 03:34:09 syzkaller kern.notice kernel: [ 284.223286][ T29] audit: type=1400 audit(2000000048.931:9560): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 284.285895][ T29] audit: type=1400 audit(2000000048.962:9561): avc: denied { create } for pid=14808 comm="syz.4.4167" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 May 18 03:34:09 syzkaller kern.notice kernel: [ 284.285895][ T29] audit: type=1400 audit(2000000048.962:9561): avc: denied { create } for pid=14808 comm="syz.4.4167" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permis [ 284.346123][ T29] audit: type=1400 audit(2000000049.004:9562): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 18 03:34:09 syzkaller kern.notice kernel: [ 284.346123][ T29] audit: type=1400 audit(2000000049.004:9562): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 284.400076][ T29] audit: type=1400 audit(2000000049.025:9563): avc: denied { read write } for pid=5821 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 18 03:34:09 syzkaller kern.notice kernel: [ 284.400076][ T29] audit: type=1400 audit(2000000049.025:9563): avc: denied { read write } for pid=5821 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 284.465564][ T29] audit: type=1400 audit(2000000049.067:9564): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 18 03:34:09 syzkaller kern.notice kernel: [ 284.465564][ T29] audit: type=1400 audit(2000000049.067:9564): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 284.523114][ T29] audit: type=1400 audit(2000000049.130:9565): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 18 03:34:09 syzkaller kern.notice kernel: [ 284.523114][ T29] audit: type=1400 audit(2000000049.130:9565): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 284.589309][ T29] audit: type=1400 audit(2000000049.151:9566): avc: denied { read write } for pid=5821 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 18 03:34:09 syzkaller kern.notice kernel: [ 284.589309][ T29] audit: type=1400 audit(2000000049.151:9566): avc: denied { read write } for pid=5821 comm="syz-executor"[ 284.629017][ T29] audit: type=1400 audit(2000000049.193:9567): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi May 18 03:34:09 syzkaller kern.notice kernel: [ 284.629017][ T29] audit: type=1400 audit(2000000049.193:9567): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 285.251865][ C0] net_ratelimit: 23473 callbacks suppressed [ 285.251879][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 285.270034][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 285.282327][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 285.282549][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 285.282802][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 285.318919][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:34:10 [ 285.331202][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) syzkaller kern.w[ 285.344541][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) arn kernel: [ 2[ 285.357953][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) 85.251865][ C[ 285.371201][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) 0] net_ratelimit: 23473 callbacks suppressed May 18 03:34:10 syzkaller kern.warn kernel: [ 285.251879][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:34:10 syzkaller kern.warn kernel: [ 285.270034][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:34:10 syzkaller kern.warn kernel: [ 285.282327][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:34:10 syzkaller kern.warn kernel: [ 285.282549][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:34:10 syzkaller kern.warn kernel: [ 285.282802][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:34:10 syzkaller kern.warn kernel: [ 285.318919][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:34:10 syzkaller kern.warn kernel: [ 285.331202][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:34:10 syzkaller kern.warn kernel: [ 285.344541][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:34:10 syzkaller kern.warn kernel: [ 285.357953][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:34:10 syzkaller kern.warn kernel: [ 285.371201][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 286.308495][T14841] xt_cluster: you have exceeded the maximum number of cluster nodes (127 > 32) May 18 03:34:11 syzkaller kern.info kernel: [ 286.308495][T14841] xt_cluster: you have exceeded the maximum number of cluster nodes (127 > 32) [ 290.024517][ C0] net_ratelimit: 29752 callbacks suppressed [ 290.030472][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 290.041010][ T29] kauditd_printk_skb: 44 callbacks suppressed [ 290.041024][ T29] audit: type=1400 audit(2000000055.146:9612): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 290.042728][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 290.082775][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 290.083037][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 290.083270][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 290.083520][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 290.083802][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 290.084024][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 290.084316][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 290.084555][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:34:15 [ 290.279068][ T29] audit: type=1400 audit(2000000055.397:9613): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.warn kernel: [ 290.024517][ C0] net_ratelimit: 29752 callbacks suppressed May 18 03:34:15 syzkaller kern.warn kernel: [ 290.030472][ C0][ 290.315252][ T29] audit: type=1400 audit(2000000055.429:9614): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 bridge0: received packet on veth0_to_bridge with own address as source address [ 290.344704][ T29] audit: type=1400 audit(2000000055.429:9615): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:34:15 syzkaller kern.warn kernel: [ 290.041010][ [ 290.374579][ T29] audit: type=1400 audit(2000000055.429:9616): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 T29] kauditd_printk_skb: 44 callbacks suppressed May 18 03:34:15 syzkaller kern[ 290.403094][ T29] audit: type=1400 audit(2000000055.429:9617): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 .notice kernel: [ 290.041024][ T29] audit: type=1400 audit(2000000055.146:9612): avc: denied[ 290.433494][ T29] audit: type=1400 audit(2000000055.429:9618): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcon[ 290.465978][ T29] audit: type=1400 audit(2000000055.429:9619): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 text=system_u:object_r:var_t tclass= May 18 03:34:15 syzkaller kern.warn kernel[ 290.494079][ T29] audit: type=1400 audit(2000000055.429:9620): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 : [ 290.042728][ C0] bridge0: received packet on bridge_slave_0 with own add[ 290.523001][ T29] audit: type=1400 audit(2000000055.429:9621): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ress as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:34:15 syzkaller kern.warn kernel: [ 290.082775][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:34:15 syzkaller kern.warn kernel: [ 290.083037][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:34:15 syzkaller kern.warn kernel: [ 290.083270][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:34:15 syzkaller kern.warn kernel: [ 290.083520][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:34:15 syzkaller kern.warn kernel: [ 290.083802][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:34:15 syzkaller kern.warn kernel: [ 290.084024][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:34:15 syzkaller kern.warn kernel: [ 290.084316][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:34:15 syzkaller kern.warn kernel: [ 290.084555][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:34:15 syzkaller kern.notice kernel: [ 290.279068][ T29] audit: type=1400 audit(2000000055.397:9613): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= May 18 03:34:15 syzkaller kern.notice kernel: [ 290.315252][ T29] audit: type=1400 audit(2000000055.429:9614): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= May 18 03:34:15 syzkaller kern.notice kernel: [ 290.344704][ T29] audit: type=1400 audit(2000000055.429:9615): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= May 18 03:34:15 syzkaller kern.notice kernel: [ 290.374579][ T29] audit: type=1400 audit(2000000055.429:9616): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= May 18 03:34:15 syzkaller kern.notice kernel: [ 290.403094][ T29] audit: type=1400 audit(2000000055.429:9617): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= May 18 03:34:15 syzkaller kern.notice kernel: [ 290.433494][ T29] audit: type=1400 audit(2000000055.429:9618): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= May 18 03:34:15 syzkaller kern.notice kernel: [ 290.465978][ T29] audit: type=1400 audit(2000000055.429:9619): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= May 18 03:34:15 syzkaller kern.notice kernel: [ 290.494079][ T29] audit: type=1400 audit(2000000055.429:9620): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= May 18 03:34:15 syzkaller kern.notice kernel: [ 290.523001][ T29] audit: type=1400 audit(2000000055.429:9621): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 294.609938][T14856] TCP: TCP_TX_DELAY enabled May 18 03:34:19 syzkaller kern.info kernel: [ 294.609938][T14856] TCP: TCP_TX_DELAY enabled [ 294.797074][ C0] net_ratelimit: 30744 callbacks suppressed [ 294.797093][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 294.815304][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 294.819491][ T29] kauditd_printk_skb: 24 callbacks suppressed [ 294.819503][ T29] audit: type=1400 audit(2000000060.164:9646): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 294.827551][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 294.867695][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 294.868015][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 294.868290][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 294.868492][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 294.880640][T14865] xt_hashlimit: overflow, rate too high: 0 [ 294.892583][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 294.904535][ T29] audit: type=1400 audit(2000000060.216:9647): avc: denied { create } for pid=14861 comm="syz.0.4194" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 294.916692][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 294.967141][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 295.035498][ T29] audit: type=1400 audit(2000000060.290:9648): avc: denied { create } for pid=14864 comm="syz.3.4196" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 May 18 03:34:20 syzkaller kern.warn kernel: [ 294.797074][ C0] net_ratelimit: 30744 callbacks suppressed May 18 03:34:20 syzkaller kern.warn kernel: [ 294.797093][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:34:20 syzkaller kern.warn kernel: [ 294.815304][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:34:20 syzkaller kern.warn kernel: [ 294.819491][ T29] kauditd_printk_skb: 24 callbacks suppressed May 18 03:34:20 syzkaller kern.notice kernel: [ 294.819503][ T29] audit: type=1400 audit(2000000060.164:9646): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= May 18 03:34:20 syzkaller kern.warn kernel: [ 294.827551][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:34:20 syzkaller kern.warn kernel: [ 294.867695][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:34:20 syzkaller kern.warn kernel: [ 294.868015][ C0] bridge0: received packet on veth0_to_bridge with own address a[ 295.188582][ T29] audit: type=1400 audit(2000000060.332:9649): avc: denied { read write } for pid=5816 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 s source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:34:20 syzkaller kern.warn kernel: [ 294.868290][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:34:20 syzkaller kern.warn kernel: [ 294.868492][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:34:20 syzkaller kern.info kernel: [ 294.880640][T14865] xt_hashlimit: overflow, rate too high: 0 May 18 03:34:20 syzkaller kern.warn kernel: [ 294.892583][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:34:20 syzkaller kern.notice kernel: [ 294.904535][ T29] audit: type=1400 audit(2000000060.216:9647): avc: denied { create } for pid=14861 comm="syz.0.4194" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permis May 18 03:34:20 syzkaller kern.warn kernel: [ 294.916692][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:34:20 syzkaller kern.warn kernel: [ 294.967141][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:34:20 syzkaller kern.notice kernel: [ 295.035498][ T29] audit: type=1400 audit(2000000060.290:9648): avc: denied { create } for pid=14864 comm="syz.3.4196" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permis May 18 03:34:20 syzkaller kern.notice kernel: [ 295.188582][ T29] audit: type=1400 audit(2000000060.332:9649): avc: denied { read write } for pid=5816 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 295.593655][ T29] audit: type=1400 audit(2000000060.363:9650): avc: denied { read write } for pid=5812 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 18 03:34:21 syzkaller kern.notice kernel: [ 295.593655][ [ 295.634338][ T29] audit: type=1400 audit(2000000060.384:9651): avc: denied { read write } for pid=5822 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 T29] audit: type=1400 audit(2000000060.363:9650): avc: denied { read write } for pid=5812 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 295.787022][ T29] audit: type=1400 audit(2000000060.426:9652): avc: denied { read write } for pid=5825 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 295.824600][ T29] audit: type=1400 audit(2000000060.426:9653): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 295.853369][ T29] audit: type=1400 audit(2000000060.426:9654): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 18 03:34:21 syzkaller kern.notice kernel: [ 295.634338][ T29] audit: type=1400 audit(2000000060.384:9651): avc: denied { read write } for pid=5822 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi May 18 03:34:21 syzkaller kern.notice kernel: [ 295.787022][ T29] audit: type=1400 audit(2000000060.426:9652): avc: denied { read write } for pid=5825 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi May 18 03:34:21 syzkaller kern.notice ke[ 295.968542][ T29] audit: type=1400 audit(2000000060.437:9655): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 rnel: [ 295.824600][ T29] audit: type=1400 audit(2000000060.426:9653): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= May 18 03:34:21 syzkaller kern.notice kernel: [ 295.853369][ T29] audit: type=1400 audit(2000000060.426:9654): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= May 18 03:34:21 syzkaller kern.notice kernel: [ 295.968542][ T29] audit: type=1400 audit(2000000060.437:9655): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 298.099255][T14973] PKCS8: Unsupported PKCS#8 version May 18 03:34:23 syzkaller kern.warn kernel: [ 298.099255][T14973] PKCS8: Unsupported PKCS#8 version [ 299.569249][ C0] net_ratelimit: 19872 callbacks suppressed [ 299.569268][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 299.569400][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 299.575387][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 299.587382][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 299.599342][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 299.611365][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 299.623259][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 299.635044][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 299.647041][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 299.658941][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 304.341589][ C0] net_ratelimit: 37141 callbacks suppressed [ 304.341610][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 304.341631][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 304.347712][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 304.359689][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 304.371659][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 304.383582][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 304.395437][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 304.407252][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 304.419210][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 304.431233][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 309.113958][ C0] net_ratelimit: 31250 callbacks suppressed [ 309.113980][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 309.114066][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 309.120083][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 309.132126][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 309.143967][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 309.155806][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 309.167865][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 309.179704][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 309.191521][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 309.203493][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 310.731247][ T5862] sched: DL replenish lagged too much [ 312.609947][ T29] kauditd_printk_skb: 127 callbacks suppressed [ 312.609969][ T29] audit: type=1400 audit(2000000078.787:9783): avc: denied { create } for pid=14990 comm="syz.3.4254" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 313.024471][ T1290] ieee802154 phy0 wpan0: encryption failed: -22 [ 313.038668][ T1290] ieee802154 phy1 wpan1: encryption failed: -22 [ 313.886235][ C0] net_ratelimit: 31166 callbacks suppressed [ 313.886255][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 313.886309][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 313.892373][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 313.904312][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 313.916130][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 313.928008][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 313.940009][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 313.951865][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 313.963683][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 313.975647][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 318.658661][ C0] net_ratelimit: 33877 callbacks suppressed [ 318.658682][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 318.658801][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 318.665293][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 318.676670][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 318.688671][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 318.700638][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 318.712560][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 318.724608][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 318.736521][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 318.748404][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 323.430905][ C1] net_ratelimit: 34115 callbacks suppressed [ 323.430925][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 323.430931][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 323.431145][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 323.437072][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 323.448927][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 323.460809][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 323.472732][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 323.484674][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 323.496486][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 323.508447][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 328.203260][ C1] net_ratelimit: 31977 callbacks suppressed [ 328.203281][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 328.203352][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 328.209456][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 328.221303][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 328.233246][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 328.245198][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 328.257237][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 328.269146][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 328.280910][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 328.292886][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 330.421221][ T29] audit: type=1400 audit(2000000096.980:9784): avc: denied { read } for pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 18 03:34:33 syzkaller kern.warn kernel: [ 299.569249][ C0] net_ratelimit: 19872 callbacks suppressed[ 332.975681][ C1] net_ratelimit: 30436 callbacks suppressed [ 332.975701][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 332.975741][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 332.981869][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:a6:d1:6f:f0:78, vlan:0) [ 332.993715][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 333.005594][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 333.017564][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 333.029411][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 333.041390][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 333.053280][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:a6:d1:6f:f0:78, vlan:0) [ 333.065088][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 337.747908][ C0] net_ratelimit: 32189 callbacks suppressed [ 337.747929][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 337.748095][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 337.754094][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 337.765923][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 337.777878][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 337.789904][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:a6:d1:6f:f0:78, vlan:0) [ 337.802260][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 337.813645][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 337.825581][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 337.837551][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 342.520346][ C1] net_ratelimit: 31723 callbacks suppressed [ 342.520367][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 342.520686][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 342.526513][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:a6:d1:6f:f0:78, vlan:0) [ 342.538364][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 342.550357][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 342.562291][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 342.574246][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 342.586222][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 342.598119][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:a6:d1:6f:f0:78, vlan:0) [ 342.609986][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 347.292750][ C1] net_ratelimit: 33646 callbacks suppressed [ 347.292770][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 347.292867][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 347.298862][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 347.310897][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 347.322867][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:a6:d1:6f:f0:78, vlan:0) [ 347.334681][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 347.346685][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 347.358654][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 347.370477][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 347.382459][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 352.065091][ C1] net_ratelimit: 34167 callbacks suppressed [ 352.065111][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 352.065163][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 352.071221][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 352.083215][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 352.095262][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:a6:d1:6f:f0:78, vlan:0) [ 352.107033][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 352.119018][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 352.130981][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 352.142835][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 352.154837][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 356.837244][ C0] net_ratelimit: 33589 callbacks suppressed [ 356.837265][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 356.837308][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 356.843387][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 356.855395][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:a6:d1:6f:f0:78, vlan:0) [ 356.867771][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 356.879139][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 356.891097][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 356.903040][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 356.915005][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 356.927024][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:a6:d1:6f:f0:78, vlan:0) [ 361.609658][ C1] net_ratelimit: 31581 callbacks suppressed [ 361.609677][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:a6:d1:6f:f0:78, vlan:0) [ 361.609906][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 361.615846][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 361.628219][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 361.640276][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 361.652736][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 361.664170][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:a6:d1:6f:f0:78, vlan:0) [ 361.676009][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 361.687980][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 361.699884][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 366.381969][ C1] net_ratelimit: 31545 callbacks suppressed [ 366.381988][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 366.382055][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 366.388073][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 366.400596][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 366.411987][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:a6:d1:6f:f0:78, vlan:0) [ 366.423828][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 366.435791][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 366.447719][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 366.459696][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 366.471670][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 371.154244][ C1] net_ratelimit: 34079 callbacks suppressed [ 371.154266][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 371.154330][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 371.160363][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 371.172870][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 371.184283][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:a6:d1:6f:f0:78, vlan:0) [ 371.196108][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 371.208070][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 371.220010][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 371.231979][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 371.243947][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 375.926703][ C1] net_ratelimit: 34209 callbacks suppressed [ 375.926723][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 375.926762][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 375.932811][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 375.944791][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 375.956826][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:a6:d1:6f:f0:78, vlan:0) [ 375.969165][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 375.980551][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 375.992512][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 376.004464][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 376.016412][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 380.699022][ C0] net_ratelimit: 33826 callbacks suppressed [ 380.699043][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 380.699126][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:a6:d1:6f:f0:78, vlan:0) [ 380.705154][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 380.717135][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 380.729238][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 380.741085][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 380.753025][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 380.764902][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:a6:d1:6f:f0:78, vlan:0) [ 380.776777][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 380.788704][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 385.471359][ C1] net_ratelimit: 33231 callbacks suppressed [ 385.471378][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:a6:d1:6f:f0:78, vlan:0) [ 385.471435][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 385.477522][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 385.489460][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 385.501524][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 385.514020][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 385.525558][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:a6:d1:6f:f0:78, vlan:0) [ 385.537361][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 385.549276][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 385.561260][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 390.243604][ C0] net_ratelimit: 33301 callbacks suppressed [ 390.243624][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 390.243744][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 390.249719][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 390.261702][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 390.273699][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 390.285575][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:a6:d1:6f:f0:78, vlan:0) [ 390.297423][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 390.309320][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 390.321278][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 390.333110][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 395.015931][ C1] net_ratelimit: 32565 callbacks suppressed [ 395.015951][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 395.016101][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 395.022203][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:a6:d1:6f:f0:78, vlan:0) [ 395.034190][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 395.045994][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 395.057968][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 395.069789][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 395.081763][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 395.093772][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:a6:d1:6f:f0:78, vlan:0) [ 395.106105][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 399.788431][ C0] net_ratelimit: 34167 callbacks suppressed [ 399.788451][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 399.788485][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:a6:d1:6f:f0:78, vlan:0) [ 399.794538][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 399.806552][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 399.818517][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 399.830359][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 399.842337][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 399.854232][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:a6:d1:6f:f0:78, vlan:0) [ 399.866196][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 399.878042][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 404.560621][ C1] net_ratelimit: 34059 callbacks suppressed [ 404.560642][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:a6:d1:6f:f0:78, vlan:0) [ 404.560678][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 404.566779][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 404.578740][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 404.590697][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 404.602664][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 404.614669][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:a6:d1:6f:f0:78, vlan:0) [ 404.626545][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 404.638408][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 404.650626][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 409.333032][ C1] net_ratelimit: 34029 callbacks suppressed [ 409.333053][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 409.333166][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 409.339197][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:a6:d1:6f:f0:78, vlan:0) [ 409.351057][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 409.363033][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 409.374975][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 409.386930][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 409.398917][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 409.410825][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:a6:d1:6f:f0:78, vlan:0) [ 409.422672][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 414.105348][ C0] net_ratelimit: 34004 callbacks suppressed [ 414.105368][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 414.105452][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 414.111494][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 414.123360][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 414.135520][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 414.147293][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:a6:d1:6f:f0:78, vlan:0) [ 414.159122][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 414.171072][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 414.183654][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 414.195032][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 418.877648][ C0] net_ratelimit: 34065 callbacks suppressed [ 418.877669][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 418.877746][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 418.883781][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 418.895706][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:a6:d1:6f:f0:78, vlan:0) [ 418.907567][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 418.919448][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 418.931402][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 418.943220][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 418.955197][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 418.967190][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:a6:d1:6f:f0:78, vlan:0) [ 423.650012][ C0] net_ratelimit: 34052 callbacks suppressed [ 423.650032][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 423.650139][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:a6:d1:6f:f0:78, vlan:0) [ 423.656119][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 423.668196][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 423.680670][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 423.692033][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 423.703977][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 423.715956][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:a6:d1:6f:f0:78, vlan:0) [ 423.727770][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 423.739900][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 428.422295][ C1] net_ratelimit: 33923 callbacks suppressed [ 428.422316][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 428.422332][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 428.428417][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 428.440442][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 428.452460][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:a6:d1:6f:f0:78, vlan:0) [ 428.464782][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 428.476211][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 428.488158][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 428.500069][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 428.512028][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 433.194648][ C0] net_ratelimit: 34141 callbacks suppressed [ 433.194668][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 433.194850][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 433.200801][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 433.212648][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 433.224587][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 433.236615][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:a6:d1:6f:f0:78, vlan:0) [ 433.248950][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 433.260342][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 433.272376][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 433.284237][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 437.967029][ C1] net_ratelimit: 34096 callbacks suppressed [ 437.967049][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 437.967115][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 437.973143][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 437.985126][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 437.997157][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:a6:d1:6f:f0:78, vlan:0) [ 438.008996][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 438.020848][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 438.032815][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 438.044667][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 438.056700][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 442.739404][ C1] net_ratelimit: 34181 callbacks suppressed [ 442.739423][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 442.739578][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 442.745576][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 442.757530][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 442.769899][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:a6:d1:6f:f0:78, vlan:0) [ 442.781355][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 442.793325][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 442.805317][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 442.817135][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 442.829122][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 447.511726][ C1] net_ratelimit: 33257 callbacks suppressed [ 447.511748][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 447.512208][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 447.517858][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 447.529883][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 447.541850][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:a6:d1:6f:f0:78, vlan:0) [ 447.553756][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 447.565728][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 447.577706][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 447.589553][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 447.601536][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 452.283965][ C1] net_ratelimit: 33603 callbacks suppressed [ 452.283986][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 452.284055][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 452.290082][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 452.302085][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 452.313988][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:a6:d1:6f:f0:78, vlan:0) [ 452.325887][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 452.337750][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 452.349646][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 452.361613][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 452.374074][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 457.056271][ C0] net_ratelimit: 34140 callbacks suppressed [ 457.056291][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 457.056395][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 457.062500][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 457.074519][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:a6:d1:6f:f0:78, vlan:0) [ 457.086385][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 457.098245][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 457.110199][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 457.122087][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 457.134098][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 457.145978][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:a6:d1:6f:f0:78, vlan:0) [ 458.523196][ C0] rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: [ 458.530169][ C0] rcu: Tasks blocked on level-0 rcu_node (CPUs 0-1): P14998/1:b..l P5821/1:b..l [ 458.539773][ C0] rcu: (detected by 0, t=10503 jiffies, g=43917, q=136 ncpus=2) [ 458.547495][ C0] task:syz-executor state:R running task stack:22864 pid:5821 tgid:5821 ppid:5811 flags:0x00004002 [ 458.560261][ C0] Call Trace: [ 458.563547][ C0] [ 458.566483][ C0] __schedule+0xe58/0x5ad0 [ 458.570919][ C0] ? is_bpf_text_address+0x8a/0x1a0 [ 458.576124][ C0] ? __pfx_mark_lock+0x10/0x10 [ 458.580895][ C0] ? __pfx_mark_lock+0x10/0x10 [ 458.585664][ C0] ? lock_acquire+0x2f/0xb0 [ 458.590181][ C0] ? __pfx___schedule+0x10/0x10 [ 458.595043][ C0] ? kernel_text_address+0x8d/0x100 [ 458.600251][ C0] ? mark_held_locks+0x9f/0xe0 [ 458.605025][ C0] preempt_schedule_irq+0x51/0x90 [ 458.610054][ C0] irqentry_exit+0x36/0x90 [ 458.614478][ C0] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 458.620463][ C0] RIP: 0010:lock_acquire.part.0+0x155/0x380 [ 458.626366][ C0] Code: b8 ff ff ff ff 65 0f c1 05 d0 d1 8b 7e 83 f8 01 0f 85 d0 01 00 00 9c 58 f6 c4 02 0f 85 e5 01 00 00 48 85 ed 0f 85 b6 01 00 00 <48> b8 00 00 00 00 00 fc ff df 48 01 c3 48 c7 03 00 00 00 00 48 c7 [ 458.645988][ C0] RSP: 0018:ffffc90003eff9c8 EFLAGS: 00000206 [ 458.652065][ C0] RAX: 0000000000000046 RBX: 1ffff920007dff3a RCX: 000000008d9e25be [ 458.660129][ C0] RDX: 0000000000000001 RSI: ffffffff8b6cdb60 RDI: ffffffff8bd1d340 [ 458.668191][ C0] RBP: 0000000000000200 R08: 0000000000000000 R09: fffffbfff2dc9998 [ 458.676168][ C0] R10: ffffffff96e4ccc7 R11: 0000000000000003 R12: 0000000000000000 [ 458.684139][ C0] R13: ffffffff8e1bb500 R14: 0000000000000000 R15: 0000000000000000 [ 458.692132][ C0] ? __pfx_lock_acquire.part.0+0x10/0x10 [ 458.697795][ C0] ? rcu_is_watching+0x12/0xc0 [ 458.702568][ C0] ? trace_lock_acquire+0x14e/0x1f0 [ 458.707775][ C0] ? do_syscall_64+0xcd/0x250 [ 458.712461][ C0] ? page_ext_get+0x34/0x310 [ 458.717059][ C0] ? lock_acquire+0x2f/0xb0 [ 458.721565][ C0] ? page_ext_get+0x34/0x310 [ 458.726163][ C0] page_ext_get+0x3a/0x310 [ 458.730582][ C0] ? page_ext_get+0x34/0x310 [ 458.735176][ C0] __page_table_check_zero+0xbf/0x360 [ 458.740573][ C0] free_unref_page+0x6c8/0x1080 [ 458.745445][ C0] qlist_free_all+0x4e/0x120 [ 458.750048][ C0] ? shmem_initxattrs+0x168/0x5a0 [ 458.755083][ C0] kasan_quarantine_reduce+0x195/0x1e0 [ 458.760551][ C0] __kasan_slab_alloc+0x69/0x90 [ 458.765408][ C0] __kmalloc_noprof+0x1cd/0x510 [ 458.770271][ C0] shmem_initxattrs+0x168/0x5a0 [ 458.775129][ C0] ? evm_inode_init_security+0x237/0x320 [ 458.780768][ C0] security_inode_init_security+0x26c/0x390 [ 458.786672][ C0] ? __pfx_shmem_initxattrs+0x10/0x10 [ 458.792049][ C0] ? __pfx_security_inode_init_security+0x10/0x10 [ 458.798476][ C0] ? shmem_get_inode+0x73a/0xf00 [ 458.803431][ C0] shmem_mknod+0x22e/0x450 [ 458.807859][ C0] shmem_mkdir+0x31/0x60 [ 458.812109][ C0] vfs_mkdir+0x57d/0x860 [ 458.816365][ C0] do_mkdirat+0x301/0x3a0 [ 458.820720][ C0] ? __pfx_do_mkdirat+0x10/0x10 [ 458.825573][ C0] ? getname_flags.part.0+0x1c5/0x550 [ 458.830968][ C0] __x64_sys_mkdirat+0x83/0xb0 [ 458.835741][ C0] do_syscall_64+0xcd/0x250 [ 458.840254][ C0] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 458.846152][ C0] RIP: 0033:0x7f8d5a984587 [ 458.850572][ C0] RSP: 002b:00007ffe8e954b08 EFLAGS: 00000202 ORIG_RAX: 0000000000000102 [ 458.858996][ C0] RAX: ffffffffffffffda RBX: 00007ffe8e954b50 RCX: 00007f8d5a984587 [ 458.866976][ C0] RDX: 00000000000001ff RSI: 00007ffe8e954b50 RDI: 00000000ffffff9c [ 458.874957][ C0] RBP: 00007ffe8e954b3c R08: 0000000000000005 R09: 00007ffe8e9548a5 [ 458.882930][ C0] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000033 [ 458.890913][ C0] R13: 000000000004ac71 R14: 00007ffe8e954b90 R15: 0000000000000305 [ 458.898911][ C0] [ 458.901948][ C0] task:syz.3.4254 state:R running task stack:27680 pid:14998 tgid:14990 ppid:5822 flags:0x00004004 [ 458.913706][ C0] Call Trace: [ 458.916988][ C0] [ 458.919927][ C0] __schedule+0xe58/0x5ad0 [ 458.924364][ C0] ? irqentry_exit+0x3b/0x90 [ 458.928964][ C0] ? __pfx___lock_acquire+0x10/0x10 [ 458.934175][ C0] ? __pfx___schedule+0x10/0x10 [ 458.939047][ C0] ? preempt_schedule_thunk+0x1a/0x30 [ 458.944424][ C0] preempt_schedule_common+0x44/0xc0 [ 458.949712][ C0] preempt_schedule_thunk+0x1a/0x30 [ 458.954921][ C0] _raw_spin_unlock+0x3e/0x50 [ 458.959605][ C0] unmap_page_range+0xb87/0x3d60 [ 458.964564][ C0] ? __pfx_unmap_page_range+0x10/0x10 [ 458.969937][ C0] ? mas_next_slot+0x12d3/0x21b0 [ 458.974900][ C0] unmap_single_vma+0x194/0x2b0 [ 458.979761][ C0] unmap_vmas+0x22f/0x490 [ 458.984096][ C0] ? __pfx_unmap_vmas+0x10/0x10 [ 458.988959][ C0] ? __pfx_lock_release+0x10/0x10 [ 458.993992][ C0] ? lock_acquire+0x2f/0xb0 [ 458.998502][ C0] ? mlock_drain_local+0x6f/0x4f0 [ 459.003539][ C0] exit_mmap+0x1c6/0xb20 [ 459.007792][ C0] ? __pfx_exit_mmap+0x10/0x10 [ 459.012651][ C0] ? __pfx_mark_lock+0x10/0x10 [ 459.017437][ C0] __mmput+0x12a/0x4c0 [ 459.021514][ C0] mmput+0x62/0x70 [ 459.025247][ C0] do_exit+0x9bf/0x2d70 [ 459.029414][ C0] ? get_signal+0x8f7/0x26c0 [ 459.034012][ C0] ? __pfx_do_exit+0x10/0x10 [ 459.038609][ C0] ? do_raw_spin_lock+0x12d/0x2c0 [ 459.043640][ C0] ? __pfx_do_raw_spin_lock+0x10/0x10 [ 459.049022][ C0] do_group_exit+0xd3/0x2a0 [ 459.053548][ C0] get_signal+0x24ed/0x26c0 [ 459.058082][ C0] ? selinux_socket_create+0xee/0x560 [ 459.063462][ C0] ? __pfx_selinux_socket_create+0x10/0x10 [ 459.069275][ C0] ? __pfx_get_signal+0x10/0x10 [ 459.074132][ C0] ? __pfx_do_futex+0x10/0x10 [ 459.078820][ C0] arch_do_signal_or_restart+0x90/0x7e0 [ 459.084379][ C0] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 459.090588][ C0] syscall_exit_to_user_mode+0x150/0x2a0 [ 459.096231][ C0] do_syscall_64+0xda/0x250 [ 459.100752][ C0] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 459.106654][ C0] RIP: 0033:0x7f7a6fd85d19 [ 459.111072][ C0] RSP: 002b:00007f7a70ad90e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 459.119491][ C0] RAX: fffffffffffffe00 RBX: 00007f7a6ff75fa8 RCX: 00007f7a6fd85d19 [ 459.127466][ C0] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f7a6ff75fa8 [ 459.135442][ C0] RBP: 00007f7a6ff75fa0 R08: 0000000000000000 R09: 0000000000000000 [ 459.143437][ C0] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7a6ff75fac [ 459.151417][ C0] R13: 0000000000000000 R14: 00007ffe7a235210 R15: 00007ffe7a2352f8 [ 459.159409][ C0] [ 459.162428][ C0] rcu: rcu_preempt kthread starved for 10569 jiffies! g43917 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=0 [ 459.173624][ C0] rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. [ 459.183590][ C0] rcu: RCU grace-period kthread stack dump: [ 459.189475][ C0] task:rcu_preempt state:R running task stack:28424 pid:17 tgid:17 ppid:2 flags:0x00004000 [ 459.201234][ C0] Call Trace: [ 459.204516][ C0] [ 459.207455][ C0] __schedule+0xe58/0x5ad0 [ 459.211880][ C0] ? __pfx___lock_acquire+0x10/0x10 [ 459.217095][ C0] ? __pfx___schedule+0x10/0x10 [ 459.221959][ C0] ? schedule+0x298/0x350 [ 459.226291][ C0] ? __pfx_lock_release+0x10/0x10 [ 459.231322][ C0] ? lock_acquire+0x2f/0xb0 [ 459.235827][ C0] ? schedule+0x1fd/0x350 [ 459.240164][ C0] schedule+0xe7/0x350 [ 459.244237][ C0] schedule_timeout+0x124/0x280 [ 459.249100][ C0] ? __pfx_schedule_timeout+0x10/0x10 [ 459.254481][ C0] ? __pfx_process_timeout+0x10/0x10 [ 459.259781][ C0] ? _raw_spin_unlock_irqrestore+0x3b/0x80 [ 459.265590][ C0] ? prepare_to_swait_event+0xf3/0x470 [ 459.271059][ C0] rcu_gp_fqs_loop+0x1eb/0xb00 [ 459.275854][ C0] ? __pfx_rcu_gp_fqs_loop+0x10/0x10 [ 459.281165][ C0] ? rcu_gp_init+0xc82/0x1630 [ 459.285850][ C0] ? _raw_spin_unlock_irq+0x2e/0x50 [ 459.291059][ C0] ? _raw_spin_unlock_irqrestore+0x52/0x80 [ 459.296872][ C0] rcu_gp_kthread+0x271/0x380 [ 459.301558][ C0] ? __pfx_rcu_gp_kthread+0x10/0x10 [ 459.306764][ C0] ? lockdep_hardirqs_on+0x7c/0x110 [ 459.311969][ C0] ? __kthread_parkme+0x148/0x220 [ 459.317002][ C0] ? __pfx_rcu_gp_kthread+0x10/0x10 [ 459.322206][ C0] kthread+0x2c1/0x3a0 [ 459.326281][ C0] ? _raw_spin_unlock_irq+0x23/0x50 [ 459.331482][ C0] ? __pfx_kthread+0x10/0x10 [ 459.336084][ C0] ret_from_fork+0x45/0x80 [ 459.340509][ C0] ? __pfx_kthread+0x10/0x10 [ 459.345111][ C0] ret_from_fork_asm+0x1a/0x30 [ 459.349899][ C0] [ 459.352916][ C0] rcu: Stack dump where RCU GP kthread last ran: [ 459.359241][ C0] CPU: 0 UID: 0 PID: 16 Comm: ksoftirqd/0 Not tainted 6.13.0-rc2-syzkaller-00130-g150b567e0d57 #0 [ 459.369838][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024 [ 459.379900][ C0] RIP: 0010:lock_acquire.part.0+0x155/0x380 [ 459.385809][ C0] Code: b8 ff ff ff ff 65 0f c1 05 d0 d1 8b 7e 83 f8 01 0f 85 d0 01 00 00 9c 58 f6 c4 02 0f 85 e5 01 00 00 48 85 ed 0f 85 b6 01 00 00 <48> b8 00 00 00 00 00 fc ff df 48 01 c3 48 c7 03 00 00 00 00 48 c7 [ 459.405432][ C0] RSP: 0018:ffffc90000157458 EFLAGS: 00000206 [ 459.411506][ C0] RAX: 0000000000000046 RBX: 1ffff9200002ae8c RCX: 00000000110053aa [ 459.419481][ C0] RDX: 0000000000000001 RSI: ffffffff8b6cdb60 RDI: ffffffff8bd1d340 [ 459.427477][ C0] RBP: 0000000000000200 R08: 0000000000000000 R09: fffffbfff2dc9998 [ 459.435451][ C0] R10: ffffffff96e4ccc7 R11: 0000000000000001 R12: 0000000000000000 [ 459.443421][ C0] R13: ffffffff8e1bb500 R14: 0000000000000000 R15: 0000000000000000 [ 459.451394][ C0] FS: 0000000000000000(0000) GS:ffff8880b8600000(0000) knlGS:0000000000000000 [ 459.460329][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 459.466914][ C0] CR2: 00007f8f9b14c520 CR3: 000000000df7e000 CR4: 00000000003526f0 [ 459.474900][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 459.482878][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 459.490852][ C0] Call Trace: [ 459.494130][ C0] [ 459.496974][ C0] ? rcu_check_gp_kthread_starvation+0x31b/0x450 [ 459.503312][ C0] ? do_raw_spin_unlock+0x172/0x230 [ 459.508520][ C0] ? rcu_sched_clock_irq+0x247a/0x3310 [ 459.514000][ C0] ? __pfx_rcu_sched_clock_irq+0x10/0x10 [ 459.519639][ C0] ? tmigr_requires_handle_remote+0x141/0x480 [ 459.525715][ C0] ? __pfx_tmigr_requires_handle_remote+0x10/0x10 [ 459.532152][ C0] ? hrtimer_run_queues+0x97/0x500 [ 459.537275][ C0] ? rcu_read_lock_sched_held+0x3e/0x70 [ 459.542827][ C0] ? update_process_times+0x178/0x2d0 [ 459.548207][ C0] ? __pfx_update_process_times+0x10/0x10 [ 459.553932][ C0] ? read_tsc+0x9/0x20 [ 459.558018][ C0] ? ktime_get+0x1ac/0x300 [ 459.562440][ C0] ? tick_nohz_handler+0x376/0x530 [ 459.567561][ C0] ? __pfx_tick_nohz_handler+0x10/0x10 [ 459.573028][ C0] ? __hrtimer_run_queues+0x5fb/0xae0 [ 459.578416][ C0] ? __pfx___hrtimer_run_queues+0x10/0x10 [ 459.584141][ C0] ? read_tsc+0x9/0x20 [ 459.588225][ C0] ? hrtimer_interrupt+0x392/0x8e0 [ 459.593355][ C0] ? __sysvec_apic_timer_interrupt+0x10f/0x400 [ 459.599518][ C0] ? sysvec_apic_timer_interrupt+0x9f/0xc0 [ 459.605325][ C0] [ 459.608260][ C0] [ 459.611198][ C0] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 459.617373][ C0] ? lock_acquire.part.0+0x155/0x380 [ 459.622667][ C0] ? __pfx_lock_acquire.part.0+0x10/0x10 [ 459.628302][ C0] ? rcu_is_watching+0x12/0xc0 [ 459.633073][ C0] ? trace_lock_acquire+0x14e/0x1f0 [ 459.638278][ C0] ? rcu_is_watching+0x12/0xc0 [ 459.643051][ C0] ? net_generic+0x30/0x2a0 [ 459.647562][ C0] ? lock_acquire+0x2f/0xb0 [ 459.652069][ C0] ? net_generic+0x30/0x2a0 [ 459.656582][ C0] net_generic+0x36/0x2a0 [ 459.660914][ C0] ? net_generic+0x30/0x2a0 [ 459.665428][ C0] brnf_get_logical_dev+0x22/0x290 [ 459.670548][ C0] setup_pre_routing+0x1d2/0x4d0 [ 459.675495][ C0] br_nf_pre_routing_ipv6+0x113/0x8c0 [ 459.680874][ C0] ? __pfx_br_nf_pre_routing_ipv6+0x10/0x10 [ 459.686776][ C0] ? __pfx_lock_release+0x10/0x10 [ 459.691801][ C0] ? trace_lock_acquire+0x14e/0x1f0 [ 459.697019][ C0] ? ebt_broute+0x14f/0x700 [ 459.701547][ C0] br_nf_pre_routing+0x860/0x15b0 [ 459.706595][ C0] br_handle_frame+0x9eb/0x1490 [ 459.711466][ C0] ? __pfx_br_handle_frame+0x10/0x10 [ 459.716767][ C0] ? __pfx_br_handle_frame_finish+0x10/0x10 [ 459.722671][ C0] ? mark_lock+0xb5/0xc60 [ 459.727014][ C0] ? __pfx_br_handle_frame+0x10/0x10 [ 459.732305][ C0] __netif_receive_skb_core.constprop.0+0xa76/0x4470 [ 459.738993][ C0] ? kasan_quarantine_put+0x70/0x240 [ 459.744286][ C0] ? kmem_cache_free+0x152/0x4c0 [ 459.749227][ C0] ? kfree_skbmem+0x1a4/0x1f0 [ 459.753914][ C0] ? __pfx___netif_receive_skb_core.constprop.0+0x10/0x10 [ 459.761036][ C0] ? hlock_class+0x4e/0x130 [ 459.765552][ C0] ? __lock_acquire+0xcc5/0x3c40 [ 459.770507][ C0] ? __pfx___lock_acquire+0x10/0x10 [ 459.775706][ C0] ? __pfx_ip6_rcv_finish+0x10/0x10 [ 459.780916][ C0] ? process_backlog+0x3f1/0x15f0 [ 459.785962][ C0] __netif_receive_skb_one_core+0xb1/0x1e0 [ 459.791774][ C0] ? __pfx___netif_receive_skb_one_core+0x10/0x10 [ 459.798195][ C0] ? rcu_is_watching+0x12/0xc0 [ 459.802975][ C0] ? __pfx_do_raw_spin_lock+0x10/0x10 [ 459.808351][ C0] ? process_backlog+0x3f1/0x15f0 [ 459.813387][ C0] ? process_backlog+0x3f1/0x15f0 [ 459.818422][ C0] __netif_receive_skb+0x1d/0x160 [ 459.823453][ C0] process_backlog+0x443/0x15f0 [ 459.828323][ C0] __napi_poll.constprop.0+0xb7/0x550 [ 459.833716][ C0] net_rx_action+0xa94/0x1010 [ 459.838412][ C0] ? tmigr_handle_remote+0x153/0xdd0 [ 459.843719][ C0] ? __pfx_net_rx_action+0x10/0x10 [ 459.848844][ C0] ? __pfx_tmigr_handle_remote+0x10/0x10 [ 459.854489][ C0] ? run_timer_base+0x11c/0x190 [ 459.859358][ C0] ? run_timer_base+0x121/0x190 [ 459.864216][ C0] ? __pfx_run_timer_base+0x10/0x10 [ 459.869420][ C0] handle_softirqs+0x213/0x8f0 [ 459.874196][ C0] ? __pfx_handle_softirqs+0x10/0x10 [ 459.879495][ C0] ? rcu_is_watching+0x12/0xc0 [ 459.884273][ C0] ? __pfx_run_ksoftirqd+0x10/0x10 [ 459.889392][ C0] ? smpboot_thread_fn+0x59d/0xa30 [ 459.894518][ C0] run_ksoftirqd+0x3a/0x60 [ 459.898946][ C0] smpboot_thread_fn+0x661/0xa30 [ 459.903898][ C0] ? __kthread_parkme+0x148/0x220 [ 459.908944][ C0] ? __pfx_smpboot_thread_fn+0x10/0x10 [ 459.914414][ C0] kthread+0x2c1/0x3a0 [ 459.918488][ C0] ? _raw_spin_unlock_irq+0x23/0x50 [ 459.923692][ C0] ? __pfx_kthread+0x10/0x10 [ 459.928292][ C0] ret_from_fork+0x45/0x80 [ 459.932710][ C0] ? __pfx_kthread+0x10/0x10 [ 459.937310][ C0] ret_from_fork_asm+0x1a/0x30 [ 459.942093][ C0] [ 461.828666][ C1] net_ratelimit: 30777 callbacks suppressed [ 461.828687][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 461.828756][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 461.834773][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 461.846806][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 461.858705][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:a6:d1:6f:f0:78, vlan:0) [ 461.870514][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 461.882492][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 461.894965][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 461.906316][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 461.918282][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 466.600974][ C1] net_ratelimit: 34131 callbacks suppressed [ 466.600994][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 466.601053][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 466.607081][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 466.619683][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 466.631109][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:a6:d1:6f:f0:78, vlan:0) [ 466.642938][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 466.654913][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 466.666832][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 466.678788][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 466.690814][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)