last executing test programs: 2m23.810372316s ago: executing program 3 (id=11032): r0 = socket$inet_tcp(0x2, 0x1, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) getsockopt$inet_tcp_int(r0, 0x6, 0x7, 0x0, &(0x7f0000000180)) 2m21.536430642s ago: executing program 2 (id=11035): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000840)=@updpolicy={0xfc, 0x19, 0x1, 0x0, 0x0, {{@in, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}, [@tmpl={0x44, 0x5, [{{@in6=@rand_addr=' \x01\x00', 0x2, 0x2b}, 0xa, @in6=@private1, 0x0, 0x4}]}]}, 0xfc}}, 0x0) syz_emit_ethernet(0x36, &(0x7f00000003c0)={@local, @link_local, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x4e20, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5, 0xc2}}}}}}, 0x0) 2m20.067712185s ago: executing program 2 (id=11039): r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip6_flowlabel\x00') preadv(r0, &(0x7f0000000380)=[{&(0x7f00000014c0)=""/223, 0xdf}], 0x1, 0x2000ff0f, 0x0) lseek(r0, 0x2, 0x0) 2m17.088251262s ago: executing program 2 (id=11044): mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2000004, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, &(0x7f0000000180)) 2m16.716948728s ago: executing program 3 (id=11045): mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000, 0x7, &(0x7f0000ffe000/0x1000)=nil) mlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) 2m16.341601654s ago: executing program 2 (id=11047): r0 = syz_open_procfs(0x0, &(0x7f0000000140)='fdinfo\x00') lseek(r0, 0x1, 0x0) getdents(r0, 0x0, 0x48) 2m13.600835377s ago: executing program 2 (id=11049): syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000000)='./bus\x00', 0x0, &(0x7f0000000040)=ANY=[], 0xfd, 0x386, &(0x7f00000007c0)="$eJzs3c9rI2UYwPFn0jQ/WrbJQRQF6YNe3MvQVs9qkS4IBZfuRtwVFma3Uw0dkzITKhGx8eRVvPkPCC578LDgoaD+A714Wy9ePG0vC4IuIo7MryTTnSZNmqXp9vuB3bzJ+z6Z950f5XkD887hB19/sr3lmVtWS3Klh2KIiDwWqUpOEkb0UpAMnb3L838+ePnajZtFEVnbUL2yev31FVVdWPzp08/LcbP9ohxUbx0+Wvnj4PmDFw//u/5x3dO6p41mSy293fy9Zd12bN2se9um6lXHtjxb6w3PdqP6ZlS/5TR3dtpqNTYvze24tuep1Wjrtt3WVlNbblutj6x6Q03T1EtzWd2NFQfUnVelMWJqdzc2rNUxN3hnzDhM2j++7w+odt1Va0bEDC7GTqqmdvep9w0AAEyddP6v3yYJe1Vy3YTSiOcChbCcngZ05PJ8Ul5fX9vQYLLQy//vvfJLa/79+wv7QcZ963C/kJX/v/FbFJ/K/4OtTzz///7I+/LkduS02Bul8anyf0yHxfQV+bA3Y48F+X9wNXRn9F9+eG8pLJD/AwAAAAAAAAAAAAAAAAAAAABwHjz2/Yrv+5XkNfnXu4Ugfh8yOgNvNMa5k5Ps41+MVxTong94Jl27cVNK4Y17+QUR56vd2m4teo3rk4ZLUpF/w/MhFi04Ea0noIGq/Ozs7dZm44CZ8P/Vgqg4YsuyVKSaig/LV95dX1vWSBQfbn9vt2bk54L4LamH8StSkeey41cy4wvy2qt98aZU5Nc70hRHNsPzuhf/xbLqO++tH4kvh+2yvPV0DwkAAAAAABNnqpbi6XM1Pf+N5u+mqZpVL9VoDc3u/PrJ3we68+ulzPl5vvJS/owHDwAAAADABeEVPtu2HMd2vfaxhbIMa5M8T2Pw92QX8qM0DgoPwsLsoDYzfSM86TcX4idojNB5GW2kluP8VZTMnZks4ZqqKp1ir1pOMv4TNC6NeghcLzf62G3XWwz6o2MNp6+Q/GwUfTLzxK6Tq8eF/2AkUaNtNFk5d1jjF7757u/xxmXEq/b2V715v5Qa6THhxpFPOkNO2ke+P7Q/s9l/LX4c5yEzAAAAAKZEkvSXveSTt8+2QwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAXECnW4ntZIWzHiMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwLf4PAAD//5QI8Zs=") openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x10040, 0xc2) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) 2m10.019071073s ago: executing program 1 (id=11054): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f00000000c0)=[{0x20, 0x0, 0x0, 0xfffff034}, {0x20, 0x0, 0x0, 0xfffff038}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000000180), 0x4000190, 0x0) 2m9.57391586s ago: executing program 2 (id=11055): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 2m9.415962552s ago: executing program 3 (id=11056): close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = open(&(0x7f0000000380)='./file1\x00', 0x42042, 0x0) recvfrom$unix(r0, 0x0, 0x0, 0x2100, 0x0, 0x0) 2m9.322367393s ago: executing program 4 (id=11057): syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x20044e, &(0x7f0000000340)={[{@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x1ff}}, {@stripe}, {@noblock_validity}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x6}}]}, 0x3, 0x451, &(0x7f0000000f80)="$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") setxattr$system_posix_acl(&(0x7f0000002a00)='.\x00', &(0x7f0000002a40)='system.posix_acl_default\x00', &(0x7f0000002b40), 0x24, 0x0) setxattr$system_posix_acl(&(0x7f0000002a00)='.\x00', &(0x7f0000002a40)='system.posix_acl_default\x00', &(0x7f0000002b40)=ANY=[], 0x24, 0x0) 2m7.232117657s ago: executing program 3 (id=11058): r0 = openat$fuse(0xffffffffffffff9c, &(0x7f000001f480), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000002280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}, 0x0, 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f00000005c0)='./file5\x00', 0x4) 2m6.908798541s ago: executing program 1 (id=11059): r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000040)="1c0000001a009b8a140000003b9b301f00"/28, 0x1c) recvmmsg(r0, &(0x7f0000002ec0), 0x400000000000ec0, 0x2, &(0x7f00000001c0)={0x77359400}) 2m5.962260046s ago: executing program 4 (id=11060): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='sys_enter\x00', r0}, 0x10) getrlimit(0x4, &(0x7f0000000000)) 2m3.496486805s ago: executing program 3 (id=11063): r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000300)={0x43, 0x3, 0x3, 0x3}, 0x10) close(r0) 2m3.431032816s ago: executing program 4 (id=11064): r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000580)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4b4, 0xde64, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x9, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, {0x9, 0x21, 0x2000, 0x3, 0x1, {0x22, 0x5}}, {{{0x9, 0x5, 0x81, 0x3, 0x40, 0x2}}}}}]}}]}}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000200)={0x24, 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x22, 0x6, {[@local=@item_012={0x0, 0x2, 0x1}, @main=@item_4={0x3, 0x0, 0xb, "8988f428"}]}}, 0x0}, 0x0) 2m1.861850869s ago: executing program 4 (id=11066): r0 = openat$vcsu(0xffffff9c, &(0x7f0000000080), 0x88080, 0x0) ppoll(&(0x7f0000000200)=[{r0, 0x40}], 0x1, 0x0, 0x0, 0x0) read$eventfd(r0, &(0x7f00000003c0), 0x8) 1m59.286572108s ago: executing program 0 (id=11068): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000180)={0x28, r1, 0x483, 0x0, 0x25dfdbfe, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x10, 0x2, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}]}]}, @ETHTOOL_A_STRSET_HEADER={0x4}]}, 0x28}}, 0x0) 1m58.709085368s ago: executing program 4 (id=11069): r0 = syz_clone(0x10a500, 0x0, 0x59, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(r0, 0x0, 0x20000000, 0x0) 1m57.692802892s ago: executing program 0 (id=11070): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040), 0x101000, 0x0) 1m55.598242065s ago: executing program 1 (id=11071): mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) mount$tmpfs(0x0, &(0x7f0000002040)='./file0\x00', &(0x7f0000002200), 0x1000000, 0x0) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x20080a0, &(0x7f0000000000)={[{@size={'size', 0x3d, [0x35, 0x25]}}]}) 1m55.446328297s ago: executing program 3 (id=11072): r0 = socket$nl_route(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f000000a1c0)=[{{0x0, 0x0, &(0x7f0000003740)=[{&(0x7f000000b580)=""/4110, 0x100e}, {&(0x7f0000000700)=""/47, 0x2f}, {&(0x7f0000000b40)=""/206, 0xce}], 0x3}, 0x6}, {{0x0, 0x0, 0x0}, 0x6}, {{0x0, 0x0, 0x0}, 0x9}], 0x3, 0x2202, 0x0) sendmsg$netlink(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000040)=ANY=[@ANYBLOB="1800000042008991"], 0x18}], 0x1}, 0x2000080) 1m54.216458386s ago: executing program 32 (id=11072): r0 = socket$nl_route(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f000000a1c0)=[{{0x0, 0x0, &(0x7f0000003740)=[{&(0x7f000000b580)=""/4110, 0x100e}, {&(0x7f0000000700)=""/47, 0x2f}, {&(0x7f0000000b40)=""/206, 0xce}], 0x3}, 0x6}, {{0x0, 0x0, 0x0}, 0x6}, {{0x0, 0x0, 0x0}, 0x9}], 0x3, 0x2202, 0x0) sendmsg$netlink(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000040)=ANY=[@ANYBLOB="1800000042008991"], 0x18}], 0x1}, 0x2000080) 1m52.454892912s ago: executing program 4 (id=11073): r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2c, &(0x7f0000000000)={0x7, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0xfffffffd, @mcast2}}}, 0x108) getsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xf9) 1m52.197166716s ago: executing program 0 (id=11074): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000040)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000ffdbdf25100000000800080000ffef001800018014000200776c616e3100000000000000000000000800090000000000"], 0x3c}, 0x1, 0x0, 0x0, 0x20040050}, 0x0) 1m50.700863849s ago: executing program 1 (id=11075): r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040), 0x20001, 0x0) write$vga_arbiter(r0, &(0x7f0000000000)=@other={'decodes', ' ', 'none'}, 0xd) write$vga_arbiter(r0, &(0x7f00000001c0)=@other={'decodes', ' ', 'mem'}, 0xc) 1m46.68427483s ago: executing program 33 (id=11055): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 1m40.438310075s ago: executing program 0 (id=11078): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000640)={0x14, r1, 0x1, 0xd0, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x840}, 0x4008800) 1m38.12849228s ago: executing program 1 (id=11079): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000071000000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x18) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 1m36.572531423s ago: executing program 0 (id=11080): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x12, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3) 1m33.093484396s ago: executing program 34 (id=11073): r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2c, &(0x7f0000000000)={0x7, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0xfffffffd, @mcast2}}}, 0x108) getsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xf9) 56.014328699s ago: executing program 0 (id=11081): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000a8500000005000000850000009e00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000040)='sys_enter\x00', r0}, 0x10) timer_delete(0x0) 36.983132119s ago: executing program 1 (id=11082): r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000000)={0x9}, 0x10) write(r0, &(0x7f00000000c0)="240000001e005f0214fffffffffffff8070000000100000000000000080009000b820000", 0x24) 36.326557539s ago: executing program 35 (id=11081): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000a8500000005000000850000009e00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000040)='sys_enter\x00', r0}, 0x10) timer_delete(0x0) 0s ago: executing program 36 (id=11082): r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000000)={0x9}, 0x10) write(r0, &(0x7f00000000c0)="240000001e005f0214fffffffffffff8070000000100000000000000080009000b820000", 0x24) kernel console output (not intermixed with test programs): e=0 [ 300.157306][ T30] audit: type=1400 audit(2000000011.423:20981): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 300.187284][ T30] audit: type=1400 audit(2000000011.423:20982): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 300.213600][ T30] audit: type=1400 audit(2000000011.423:20983): avc: denied { read write } for pid=305 comm="syz-executor" name="loop3" dev="devtmpfs" ino=115 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 300.272687][ T30] audit: type=1400 audit(2000000011.442:20984): avc: denied { read write } for pid=304 comm="syz-executor" name="loop1" dev="devtmpfs" ino=113 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 300.300592][ T30] audit: type=1400 audit(2000000011.442:20985): avc: denied { read } for pid=17448 comm="syz.0.8130" name="msr" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=0 [ 300.358272][ T30] audit: type=1400 audit(2000000011.451:20986): avc: denied { read write } for pid=302 comm="syz-executor" name="loop2" dev="devtmpfs" ino=114 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 300.485716][T17569] xt_l2tp: wrong L2TP version: 0 [ 300.820172][T17655] xt_hashlimit: max too large, truncated to 1048576 [ 300.840600][T17655] x_tables: ip6_tables: TCPMSS target: only valid for protocol 6 [ 301.019053][T17699] netlink: 'syz.1.8251': attribute type 29 has an invalid length. [ 301.035171][T17699] netlink: 8 bytes leftover after parsing attributes in process `syz.1.8251'. [ 301.051226][T17699] netlink: 'syz.1.8251': attribute type 29 has an invalid length. [ 301.066398][T17699] netlink: 8 bytes leftover after parsing attributes in process `syz.1.8251'. [ 301.130558][T17718] netlink: 4 bytes leftover after parsing attributes in process `syz.0.8262'. [ 301.179007][T17726] xt_CT: You must specify a L4 protocol and not use inversions on it [ 301.232521][T17740] x_tables: unsorted underflow at hook 4 [ 301.266907][T17744] netlink: 'syz.4.8274': attribute type 1 has an invalid length. [ 301.474587][T17796] xt_bpf: check failed: parse error [ 301.480612][T17798] xt_l2tp: invalid flags combination: c [ 301.607400][T17826] netlink: 276 bytes leftover after parsing attributes in process `syz.0.8316'. [ 301.645691][T17834] netlink: 'syz.4.8318': attribute type 9 has an invalid length. [ 301.653273][T17834] netlink: 'syz.4.8318': attribute type 6 has an invalid length. [ 301.679156][T17834] netlink: 'syz.4.8318': attribute type 7 has an invalid length. [ 301.692770][T17834] netlink: 'syz.4.8318': attribute type 8 has an invalid length. [ 302.022234][T17917] bridge0: port 3(erspan0) entered blocking state [ 302.028680][T17917] bridge0: port 3(erspan0) entered disabled state [ 302.045285][T17917] device erspan0 entered promiscuous mode [ 302.055704][T17917] bridge0: port 3(erspan0) entered blocking state [ 302.062017][T17917] bridge0: port 3(erspan0) entered forwarding state [ 302.077318][T17924] netlink: 'syz.1.8362': attribute type 16 has an invalid length. [ 302.163975][T17943] xt_TCPMSS: Only works on TCP SYN packets [ 302.317030][T17973] xt_policy: input policy not valid in POSTROUTING and OUTPUT [ 302.356341][T17981] xt_hashlimit: overflow, try lower: 17592186044416/9 [ 302.388023][T17987] netlink: 'syz.1.8395': attribute type 30 has an invalid length. [ 302.924981][T18115] xt_TCPMSS: Only works on TCP SYN packets [ 303.057406][T18154] netlink: 36 bytes leftover after parsing attributes in process `syz.1.8475'. [ 303.991343][T18358] netlink: 8 bytes leftover after parsing attributes in process `syz.0.8577'. [ 304.275568][T18425] netlink: 4 bytes leftover after parsing attributes in process `syz.4.8609'. [ 304.368950][T18445] futex_wake_op: syz.4.8618 tries to shift op by 36; fix this program [ 304.393378][T18449] netlink: 64138 bytes leftover after parsing attributes in process `syz.0.8622'. [ 304.463857][T18463] ip6t_REJECT: TCP_RESET illegal for non-tcp [ 304.580027][T18493] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 304.793343][T18550] netlink: 'syz.3.8672': attribute type 3 has an invalid length. [ 305.251834][T18634] xt_TPROXY: Can be used only with -p tcp or -p udp [ 305.266637][ T30] kauditd_printk_skb: 781 callbacks suppressed [ 305.266655][ T30] audit: type=1400 audit(2000000016.409:21768): avc: denied { read write } for pid=304 comm="syz-executor" name="loop1" dev="devtmpfs" ino=113 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 305.299921][ T30] audit: type=1400 audit(2000000016.418:21769): avc: denied { read } for pid=18640 comm="syz.1.8718" dev="nsfs" ino=4026532455 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 305.323329][ T30] audit: type=1400 audit(2000000016.428:21770): avc: denied { read write } for pid=304 comm="syz-executor" name="loop1" dev="devtmpfs" ino=113 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 305.364422][T18648] netlink: 4 bytes leftover after parsing attributes in process `syz.2.8721'. [ 305.375090][ T30] audit: type=1400 audit(2000000016.437:21771): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 305.417919][ T30] audit: type=1400 audit(2000000016.437:21772): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 305.498481][T18675] xt_ecn: cannot match TCP bits for non-tcp packets [ 305.502383][ T30] audit: type=1400 audit(2000000016.437:21773): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 305.555505][ T30] audit: type=1400 audit(2000000016.465:21774): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 305.600722][ T30] audit: type=1400 audit(2000000016.474:21775): avc: denied { read write } for pid=303 comm="syz-executor" name="loop4" dev="devtmpfs" ino=116 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 305.630874][T18701] xt_ecn: cannot match TCP bits for non-tcp packets [ 305.638722][ T30] audit: type=1400 audit(2000000016.484:21776): avc: denied { read write } for pid=302 comm="syz-executor" name="loop2" dev="devtmpfs" ino=114 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 305.704168][ T30] audit: type=1400 audit(2000000016.484:21777): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 306.358631][T18865] Zero length message leads to an empty skb [ 306.414170][T18880] xt_l2tp: missing protocol rule (udp|l2tpip) [ 306.433339][T18886] netlink: 'syz.1.8839': attribute type 29 has an invalid length. [ 306.869881][T19013] xt_hashlimit: invalid interval [ 307.480274][T19160] netlink: 'syz.1.8974': attribute type 3 has an invalid length. [ 307.507466][T19167] bridge0: port 4(veth0_to_bridge) entered blocking state [ 307.520495][T19167] bridge0: port 4(veth0_to_bridge) entered disabled state [ 307.531805][T19167] device veth0_to_bridge entered promiscuous mode [ 307.547238][T19167] bridge0: adding interface veth0_to_bridge with same address as a received packet (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 307.567624][T19167] bridge0: port 4(veth0_to_bridge) entered blocking state [ 307.574627][T19167] bridge0: port 4(veth0_to_bridge) entered listening state [ 307.959481][T19241] netlink: 4 bytes leftover after parsing attributes in process `syz.2.9015'. [ 307.999910][T19252] xt_SECMARK: invalid mode: 2 [ 308.041034][T19262] netlink: 'syz.1.9024': attribute type 8 has an invalid length. [ 308.219630][T19312] xt_policy: too many policy elements [ 308.325977][T19339] ip6t_rpfilter: unknown options [ 308.721613][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 308.733622][ C1] bridge0: port 4(veth0_to_bridge) entered blocking state [ 309.094540][T19549] x_tables: ip_tables: icmp.0 match: invalid size 8 (kernel) != (user) 56 [ 309.140955][T19565] xt_hashlimit: size too large, truncated to 1048576 [ 309.149198][T19565] xt_hashlimit: max too large, truncated to 1048576 [ 309.295723][T19602] netlink: 'syz.0.9190': attribute type 9 has an invalid length. [ 309.313400][T19611] netlink: 188 bytes leftover after parsing attributes in process `syz.1.9196'. [ 309.318909][T19602] netlink: 'syz.0.9190': attribute type 7 has an invalid length. [ 309.335099][T19602] netlink: 'syz.0.9190': attribute type 8 has an invalid length. [ 309.387029][T19625] xt_l2tp: v2 tid > 0xffff: 134217728 [ 309.761442][T19731] netlink: 'syz.4.9256': attribute type 3 has an invalid length. [ 309.856123][T19759] netlink: 'syz.2.9269': attribute type 3 has an invalid length. [ 309.907599][T19774] netlink: 'syz.4.9277': attribute type 9 has an invalid length. [ 309.914778][T19776] netlink: 8 bytes leftover after parsing attributes in process `syz.3.9278'. [ 309.915347][T19774] netlink: 'syz.4.9277': attribute type 6 has an invalid length. [ 310.027533][T19797] netlink: 8 bytes leftover after parsing attributes in process `syz.1.9288'. [ 310.169322][T19828] xt_CT: You must specify a L4 protocol and not use inversions on it [ 310.246546][T19845] netlink: 4 bytes leftover after parsing attributes in process `syz.1.9313'. [ 310.266557][T19845] netlink: 24 bytes leftover after parsing attributes in process `syz.1.9313'. [ 310.285155][T19845] tc_dump_action: action bad kind [ 310.344557][T19862] netlink: 28 bytes leftover after parsing attributes in process `syz.3.9320'. [ 310.420346][T19878] xt_hashlimit: size too large, truncated to 1048576 [ 310.435619][T19878] xt_hashlimit: max too large, truncated to 1048576 [ 310.615834][ T30] kauditd_printk_skb: 826 callbacks suppressed [ 310.615852][ T30] audit: type=1400 audit(2000000021.413:22604): avc: denied { read write } for pid=303 comm="syz-executor" name="loop4" dev="devtmpfs" ino=116 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 310.660378][T19909] netlink: 'syz.4.9341': attribute type 27 has an invalid length. [ 310.688227][ T30] audit: type=1400 audit(2000000021.413:22605): avc: denied { read write } for pid=305 comm="syz-executor" name="loop3" dev="devtmpfs" ino=115 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 310.733845][ T30] audit: type=1400 audit(2000000021.413:22606): avc: denied { read write } for pid=305 comm="syz-executor" name="loop3" dev="devtmpfs" ino=115 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 310.763110][ T30] audit: type=1400 audit(2000000021.441:22607): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 310.792827][ T30] audit: type=1400 audit(2000000021.441:22608): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 310.837700][ T30] audit: type=1400 audit(2000000021.441:22609): avc: denied { read write } for pid=305 comm="syz-executor" name="loop3" dev="devtmpfs" ino=115 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 310.870009][ T30] audit: type=1400 audit(2000000021.441:22610): avc: denied { read write } for pid=304 comm="syz-executor" name="loop1" dev="devtmpfs" ino=113 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 310.928218][ T30] audit: type=1400 audit(2000000021.469:22611): avc: denied { write } for pid=19911 comm="syz.1.9345" name="001" dev="devtmpfs" ino=180 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=0 [ 310.971851][ T30] audit: type=1400 audit(2000000021.469:22612): avc: denied { read write } for pid=19910 comm="syz.3.9344" name="loop3" dev="devtmpfs" ino=115 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 311.002538][ T30] audit: type=1400 audit(2000000021.479:22613): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 311.204558][T19991] bridge0: port 4(veth0_to_bridge) entered blocking state [ 311.223170][T19991] bridge0: port 4(veth0_to_bridge) entered disabled state [ 311.246150][T19991] device veth0_to_bridge entered promiscuous mode [ 311.279910][T19991] bridge0: adding interface veth0_to_bridge with same address as a received packet (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 311.310505][T19991] bridge0: port 4(veth0_to_bridge) entered blocking state [ 311.317497][T19991] bridge0: port 4(veth0_to_bridge) entered forwarding state [ 311.367514][T20010] tc_dump_action: action bad kind [ 311.517765][T20057] xt_hashlimit: max too large, truncated to 1048576 [ 311.775536][T20116] xt_TCPMSS: Only works on TCP SYN packets [ 311.781709][T20118] binfmt_misc: register: failed to install interpreter file ./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa [ 311.844413][T20128] x_tables: duplicate underflow at hook 4 [ 311.874379][T20138] xt_hashlimit: Unknown mode mask 100000, kernel too old? [ 311.972641][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 311.984624][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 311.996668][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 312.008616][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 312.020603][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 312.032598][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 312.044601][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 312.056633][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 312.068621][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 312.239871][T20193] netlink: 24 bytes leftover after parsing attributes in process `syz.3.9484'. [ 313.274073][T20317] xt_CT: You must specify a L4 protocol and not use inversions on it [ 314.077510][ C1] net_ratelimit: 24541 callbacks suppressed [ 314.077529][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 314.088430][T20414] netlink: 4 bytes leftover after parsing attributes in process `syz.0.9591'. [ 314.095342][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 314.115979][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 314.128031][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 314.140037][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 314.151983][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 314.163968][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 314.176014][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 314.187993][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 314.200030][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 315.117493][T20550] netlink: 4 bytes leftover after parsing attributes in process `syz.1.9652'. [ 315.970970][ T30] kauditd_printk_skb: 543 callbacks suppressed [ 315.970988][ T30] audit: type=1400 audit(2000000026.427:23157): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 316.092221][ T30] audit: type=1400 audit(2000000026.455:23158): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 316.219852][ T30] audit: type=1400 audit(2000000026.455:23159): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 316.308431][ T30] audit: type=1400 audit(2000000026.464:23160): avc: denied { read write } for pid=303 comm="syz-executor" name="loop4" dev="devtmpfs" ino=116 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 316.461607][ T30] audit: type=1400 audit(2000000026.474:23161): avc: denied { read write } for pid=302 comm="syz-executor" name="loop2" dev="devtmpfs" ino=114 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 316.545210][ T30] audit: type=1400 audit(2000000026.483:23162): avc: denied { read write } for pid=305 comm="syz-executor" name="loop3" dev="devtmpfs" ino=115 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 316.707956][ T30] audit: type=1400 audit(2000000026.511:23163): avc: denied { read write } for pid=303 comm="syz-executor" name="loop4" dev="devtmpfs" ino=116 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 316.838852][ T30] audit: type=1400 audit(2000000026.530:23164): avc: denied { read write } for pid=302 comm="syz-executor" name="loop2" dev="devtmpfs" ino=114 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 316.993192][ T30] audit: type=1400 audit(2000000026.558:23165): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 317.134145][ T30] audit: type=1400 audit(2000000026.567:23166): avc: denied { prog_load } for pid=20643 comm="syz.2.9703" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 319.041074][T20785] validate_nla: 1 callbacks suppressed [ 319.041097][T20785] netlink: 'syz.2.9767': attribute type 1 has an invalid length. [ 319.433462][ C1] net_ratelimit: 62999 callbacks suppressed [ 319.433484][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 319.451241][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 319.463205][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 319.475303][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 319.487285][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 319.499291][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 319.499426][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 319.499628][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 319.499744][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 319.499832][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 319.667775][T20811] netlink: 12 bytes leftover after parsing attributes in process `syz.3.9779'. [ 319.720346][T20811] netlink: 12 bytes leftover after parsing attributes in process `syz.3.9779'. [ 319.721150][T20811] netlink: 12 bytes leftover after parsing attributes in process `syz.3.9779'. [ 319.721317][T20811] netlink: 12 bytes leftover after parsing attributes in process `syz.3.9779'. [ 319.721466][T20811] netlink: 12 bytes leftover after parsing attributes in process `syz.3.9779'. [ 319.721644][T20811] netlink: 12 bytes leftover after parsing attributes in process `syz.3.9779'. [ 319.721797][T20811] netlink: 12 bytes leftover after parsing attributes in process `syz.3.9779'. [ 319.721949][T20811] netlink: 12 bytes leftover after parsing attributes in process `syz.3.9779'. [ 319.722566][T20811] netlink: 12 bytes leftover after parsing attributes in process `syz.3.9779'. [ 319.722706][T20811] netlink: 12 bytes leftover after parsing attributes in process `syz.3.9779'. [ 321.337572][ T30] kauditd_printk_skb: 267 callbacks suppressed [ 321.337590][ T30] audit: type=1400 audit(2000000031.441:23434): avc: denied { read write } for pid=306 comm="syz-executor" name="loop0" dev="devtmpfs" ino=112 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 321.436306][ T30] audit: type=1400 audit(2000000031.478:23435): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 321.534719][ T30] audit: type=1400 audit(2000000031.478:23436): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 321.630862][ T30] audit: type=1400 audit(2000000031.497:23437): avc: denied { read write } for pid=306 comm="syz-executor" name="loop0" dev="devtmpfs" ino=112 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 321.723505][ T30] audit: type=1400 audit(2000000031.506:23438): avc: denied { read write } for pid=304 comm="syz-executor" name="loop1" dev="devtmpfs" ino=113 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 321.756815][ T30] audit: type=1400 audit(2000000031.516:23439): avc: denied { read write } for pid=20912 comm="syz.2.9828" name="loop2" dev="devtmpfs" ino=114 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 321.783211][ T30] audit: type=1400 audit(2000000031.525:23440): avc: denied { bpf } for pid=20941 comm="syz.0.9840" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 321.825247][ T30] audit: type=1400 audit(2000000031.562:23441): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 321.922484][ T30] audit: type=1400 audit(2000000031.572:23442): avc: denied { read write } for pid=306 comm="syz-executor" name="loop0" dev="devtmpfs" ino=112 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 322.049833][ T30] audit: type=1400 audit(2000000031.581:23443): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 322.575403][T21048] netlink: 'syz.0.9890': attribute type 16 has an invalid length. [ 322.609350][T21048] netlink: 'syz.0.9890': attribute type 3 has an invalid length. [ 324.789496][ C1] net_ratelimit: 65559 callbacks suppressed [ 324.789519][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 324.807285][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 324.819249][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 324.831247][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 324.843277][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 324.855269][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 324.855409][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 324.879169][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 324.891126][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 324.903110][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 326.106419][T21204] __nla_validate_parse: 8 callbacks suppressed [ 326.106442][T21204] netlink: 12 bytes leftover after parsing attributes in process `syz.0.9962'. [ 326.190287][T21204] netlink: 12 bytes leftover after parsing attributes in process `syz.0.9962'. [ 326.255636][T21207] netlink: 12 bytes leftover after parsing attributes in process `syz.0.9962'. [ 326.279255][T21207] netlink: 12 bytes leftover after parsing attributes in process `syz.0.9962'. [ 326.302012][T21207] netlink: 12 bytes leftover after parsing attributes in process `syz.0.9962'. [ 326.338614][T21207] netlink: 12 bytes leftover after parsing attributes in process `syz.0.9962'. [ 326.375042][T21207] netlink: 12 bytes leftover after parsing attributes in process `syz.0.9962'. [ 326.428379][T21207] netlink: 12 bytes leftover after parsing attributes in process `syz.0.9962'. [ 326.471410][T21207] netlink: 12 bytes leftover after parsing attributes in process `syz.0.9962'. [ 326.516491][T21207] netlink: 12 bytes leftover after parsing attributes in process `syz.0.9962'. [ 326.721465][ T30] kauditd_printk_skb: 296 callbacks suppressed [ 326.721483][ T30] audit: type=1400 audit(2000000036.473:23740): avc: denied { read write } for pid=304 comm="syz-executor" name="loop1" dev="devtmpfs" ino=113 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 326.818174][ T30] audit: type=1400 audit(2000000036.511:23741): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 326.902587][ T30] audit: type=1400 audit(2000000036.511:23742): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 327.000799][ T30] audit: type=1400 audit(2000000036.520:23743): avc: denied { prog_load } for pid=21225 comm="syz.1.9973" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 327.050781][ T30] audit: type=1400 audit(2000000036.557:23744): avc: denied { read write } for pid=304 comm="syz-executor" name="loop1" dev="devtmpfs" ino=113 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 327.076877][ T30] audit: type=1400 audit(2000000036.557:23745): avc: denied { read write } for pid=306 comm="syz-executor" name="loop0" dev="devtmpfs" ino=112 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 327.116633][ T30] audit: type=1400 audit(2000000036.595:23746): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 327.175402][ T30] audit: type=1400 audit(2000000036.595:23747): avc: denied { read } for pid=21227 comm="syz.1.9975" dev="nsfs" ino=4026532455 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 327.257294][ T30] audit: type=1400 audit(2000000036.613:23748): avc: denied { read write } for pid=304 comm="syz-executor" name="loop1" dev="devtmpfs" ino=113 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 327.443197][ T30] audit: type=1400 audit(2000000036.670:23749): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 329.399170][T21407] netlink: 'syz.3.10059': attribute type 30 has an invalid length. [ 330.145492][ C1] net_ratelimit: 66395 callbacks suppressed [ 330.145511][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 330.163235][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 330.175179][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 330.187173][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 330.199084][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 330.211061][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 330.223103][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 330.235083][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 330.247100][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 330.259097][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 332.079441][ T30] kauditd_printk_skb: 370 callbacks suppressed [ 332.079459][ T30] audit: type=1400 audit(2000000041.487:24120): avc: denied { read write } for pid=306 comm="syz-executor" name="loop0" dev="devtmpfs" ino=112 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 332.171070][ T30] audit: type=1400 audit(2000000041.524:24121): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 332.308372][ T30] audit: type=1400 audit(2000000041.524:24122): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 332.447627][ T30] audit: type=1400 audit(2000000041.571:24123): avc: denied { read write } for pid=21646 comm="syz.0.10173" name="ppp" dev="devtmpfs" ino=150 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=0 [ 332.576817][ T30] audit: type=1400 audit(2000000041.599:24124): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 332.650354][ T30] audit: type=1400 audit(2000000041.609:24125): avc: denied { read write } for pid=306 comm="syz-executor" name="loop0" dev="devtmpfs" ino=112 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 332.743616][ T30] audit: type=1400 audit(2000000041.637:24126): avc: denied { read write } for pid=305 comm="syz-executor" name="loop3" dev="devtmpfs" ino=115 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 332.835556][ T30] audit: type=1400 audit(2000000041.674:24127): avc: denied { read write } for pid=306 comm="syz-executor" name="loop0" dev="devtmpfs" ino=112 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 332.931228][ T30] audit: type=1400 audit(2000000041.730:24128): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 333.056449][ T30] audit: type=1400 audit(2000000041.730:24129): avc: denied { read } for pid=21652 comm="syz.0.10176" name="kvm" dev="devtmpfs" ino=82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 333.954574][T21776] netlink: 'syz.1.10236': attribute type 1 has an invalid length. [ 335.501714][ C1] net_ratelimit: 54698 callbacks suppressed [ 335.501745][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 335.519577][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 335.531739][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 335.543842][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 335.556005][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 335.567995][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 335.580194][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 335.592255][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 335.604365][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 335.616356][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 336.829259][T21914] futex_wake_op: syz.4.10298 tries to shift op by 36; fix this program [ 337.455688][ T30] kauditd_printk_skb: 259 callbacks suppressed [ 337.455705][ T30] audit: type=1400 audit(2000000046.510:24389): avc: denied { read write } for pid=303 comm="syz-executor" name="loop4" dev="devtmpfs" ino=116 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 337.629319][ T30] audit: type=1400 audit(2000000046.547:24390): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 337.713014][ T30] audit: type=1400 audit(2000000046.547:24391): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 337.864286][ T30] audit: type=1400 audit(2000000046.585:24392): avc: denied { read write } for pid=302 comm="syz-executor" name="loop2" dev="devtmpfs" ino=114 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 338.033011][ T30] audit: type=1400 audit(2000000046.585:24393): avc: denied { prog_load } for pid=21939 comm="syz.4.10311" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 338.112708][ T30] audit: type=1400 audit(2000000046.585:24394): avc: denied { map_create } for pid=21939 comm="syz.4.10311" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 338.238338][ T30] audit: type=1400 audit(2000000046.594:24395): avc: denied { read write } for pid=306 comm="syz-executor" name="loop0" dev="devtmpfs" ino=112 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 338.381543][ T30] audit: type=1400 audit(2000000046.604:24396): avc: denied { read write } for pid=21938 comm="syz.2.10312" name="loop2" dev="devtmpfs" ino=114 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 338.624106][ T30] audit: type=1400 audit(2000000046.613:24397): avc: denied { read write } for pid=303 comm="syz-executor" name="loop4" dev="devtmpfs" ino=116 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 338.654856][T21989] bridge0: port 5(syz_tun) entered blocking state [ 338.687443][T21989] bridge0: port 5(syz_tun) entered disabled state [ 338.698646][ T83] audit: audit_backlog=65 > audit_backlog_limit=64 [ 338.716719][T21989] device syz_tun entered promiscuous mode [ 338.737597][T21989] bridge0: port 5(syz_tun) entered blocking state [ 338.743927][T21989] bridge0: port 5(syz_tun) entered forwarding state [ 339.041241][T22007] futex_wake_op: syz.3.10342 tries to shift op by 36; fix this program [ 340.857470][ C1] net_ratelimit: 28114 callbacks suppressed [ 340.857491][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 340.857812][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 340.857910][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 340.858225][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 340.858326][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 340.858627][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 340.935587][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 340.935916][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 340.936001][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 340.936312][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 342.807725][ T30] kauditd_printk_skb: 386 callbacks suppressed [ 342.807744][ T30] audit: type=1400 audit(2000000051.524:24767): avc: denied { create } for pid=22312 comm="syz.4.10494" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 342.874826][ T30] audit: type=1400 audit(2000000051.552:24768): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 342.963428][ T30] audit: type=1400 audit(2000000051.561:24769): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 343.081759][ T30] audit: type=1400 audit(2000000051.571:24770): avc: denied { read write } for pid=303 comm="syz-executor" name="loop4" dev="devtmpfs" ino=116 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 343.167258][ T30] audit: type=1400 audit(2000000051.608:24771): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 343.299869][ T30] audit: type=1400 audit(2000000051.627:24772): avc: denied { read write } for pid=306 comm="syz-executor" name="loop0" dev="devtmpfs" ino=112 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 343.436867][ T30] audit: type=1400 audit(2000000051.692:24773): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 343.552461][ T30] audit: type=1400 audit(2000000051.701:24774): avc: denied { read write } for pid=303 comm="syz-executor" name="loop4" dev="devtmpfs" ino=116 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 343.682935][ T30] audit: type=1400 audit(2000000051.720:24775): avc: denied { read write } for pid=304 comm="syz-executor" name="loop1" dev="devtmpfs" ino=113 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 343.786760][ T30] audit: type=1400 audit(2000000051.758:24776): avc: denied { read write } for pid=302 comm="syz-executor" name="loop2" dev="devtmpfs" ino=114 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 344.321334][T22358] __nla_validate_parse: 24 callbacks suppressed [ 344.321358][T22358] netlink: 4 bytes leftover after parsing attributes in process `syz.1.10514'. [ 345.937685][T22444] netlink: 'syz.1.10553': attribute type 3 has an invalid length. [ 346.213698][ C1] net_ratelimit: 24685 callbacks suppressed [ 346.213724][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 346.231594][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 346.243723][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 346.255722][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 346.267997][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 346.268090][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 346.292110][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 346.304252][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 346.316421][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 346.328418][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 348.165733][ T30] kauditd_printk_skb: 229 callbacks suppressed [ 348.165752][ T30] audit: type=1400 audit(2000000001.225:25006): avc: denied { prog_load } for pid=22599 comm="syz.0.10626" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 348.259193][ T30] audit: type=1400 audit(2000000001.253:25007): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 348.311638][ T30] audit: type=1400 audit(2000000001.253:25008): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 348.385176][ T30] audit: type=1326 audit(2000000001.253:25009): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22596 comm="syz.3.10629" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fed102bf169 code=0x7ffc0000 [ 348.448768][ T30] audit: type=1326 audit(2000000001.262:25010): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22596 comm="syz.3.10629" exe="/root/syz-executor" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7fed102bf169 code=0x7ffc0000 [ 348.524419][ T30] audit: type=1326 audit(2000000001.262:25011): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22596 comm="syz.3.10629" exe="/root/syz-executor" sig=0 arch=c000003e syscall=9 compat=0 ip=0x7fed102bf1a3 code=0x7ffc0000 [ 348.576126][ T30] audit: type=1400 audit(2000000001.272:25012): avc: denied { read write } for pid=306 comm="syz-executor" name="loop0" dev="devtmpfs" ino=112 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 348.623534][ T30] audit: type=1400 audit(2000000001.337:25013): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 348.669584][ T30] audit: type=1400 audit(2000000001.356:25014): avc: denied { read write } for pid=306 comm="syz-executor" name="loop0" dev="devtmpfs" ino=112 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 348.726182][ T30] audit: type=1400 audit(2000000001.384:25015): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 351.569503][ C1] net_ratelimit: 25202 callbacks suppressed [ 351.569525][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 351.587298][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 351.599476][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 351.611511][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 351.623687][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 351.634140][T22813] xt_hashlimit: max too large, truncated to 1048576 [ 351.635791][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 351.654426][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 351.666552][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 351.666881][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 351.666966][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 352.532516][T22858] netlink: 'syz.1.10750': attribute type 30 has an invalid length. [ 353.524725][ T30] kauditd_printk_skb: 267 callbacks suppressed [ 353.524744][ T30] audit: type=1400 audit(2000000006.229:25283): avc: denied { prog_load } for pid=22908 comm="syz.2.10775" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 353.665461][ T30] audit: type=1400 audit(2000000006.267:25284): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 353.764659][ T30] audit: type=1400 audit(2000000006.267:25285): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 353.816953][ T30] audit: type=1400 audit(2000000006.285:25286): avc: denied { read write } for pid=306 comm="syz-executor" name="loop0" dev="devtmpfs" ino=112 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 354.071664][ T30] audit: type=1400 audit(2000000006.295:25287): avc: denied { read write } for pid=305 comm="syz-executor" name="loop3" dev="devtmpfs" ino=115 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 354.121056][ T30] audit: type=1400 audit(2000000006.295:25288): avc: denied { read write } for pid=22910 comm="syz.4.10767" name="loop4" dev="devtmpfs" ino=116 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 354.211277][ T30] audit: type=1400 audit(2000000006.295:25289): avc: denied { create } for pid=22910 comm="syz.4.10767" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=0 [ 354.301602][ T30] audit: type=1400 audit(2000000006.304:25290): avc: denied { read write } for pid=302 comm="syz-executor" name="loop2" dev="devtmpfs" ino=114 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 354.369064][ T30] audit: type=1400 audit(2000000006.313:25291): avc: denied { create } for pid=22913 comm="syz.0.10776" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 354.456353][ T30] audit: type=1400 audit(2000000006.332:25292): avc: denied { read write } for pid=303 comm="syz-executor" name="loop4" dev="devtmpfs" ino=116 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 356.242223][T23145] netlink: 8 bytes leftover after parsing attributes in process `syz.1.10883'. [ 356.253073][T23145] netlink: 8 bytes leftover after parsing attributes in process `syz.1.10883'. [ 356.466851][T23172] netlink: 'syz.1.10896': attribute type 27 has an invalid length. [ 356.558464][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 356.925588][ C1] net_ratelimit: 24615 callbacks suppressed [ 356.925611][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 356.943365][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 356.957596][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 356.969604][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 356.981902][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 356.982005][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 357.005924][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 357.017945][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 357.030551][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 357.030650][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 358.642265][T23347] netlink: 8 bytes leftover after parsing attributes in process `syz.4.10981'. [ 358.651793][T23347] netlink: 8 bytes leftover after parsing attributes in process `syz.4.10981'. [ 358.991726][ T30] kauditd_printk_skb: 407 callbacks suppressed [ 358.991743][ T30] audit: type=1400 audit(2000000011.355:25682): avc: denied { read write } for pid=305 comm="syz-executor" name="loop3" dev="devtmpfs" ino=115 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 359.086533][ T30] audit: type=1400 audit(2000000011.383:25683): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 359.161035][ T30] audit: type=1400 audit(2000000011.383:25684): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 359.279359][ T30] audit: type=1400 audit(2000000011.458:25685): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 359.761133][ T30] audit: type=1400 audit(2000000011.570:25686): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 360.961848][ T30] audit: type=1400 audit(2000000011.673:25687): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 361.629776][ T30] audit: type=1400 audit(2000000011.842:25688): avc: denied { read write } for pid=304 comm="syz-executor" name="loop1" dev="devtmpfs" ino=113 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 362.281484][ C1] net_ratelimit: 52725 callbacks suppressed [ 362.281507][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 362.281511][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) [ 362.281616][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) [ 362.287655][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 362.299247][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) [ 362.310933][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 362.322675][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) [ 362.334735][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 362.346353][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) [ 362.357987][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 363.700738][ T30] audit: type=1400 audit(2000000012.094:25689): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 364.666689][ T30] audit: type=1400 audit(2000000012.197:25690): avc: denied { read write } for pid=302 comm="syz-executor" name="loop2" dev="devtmpfs" ino=114 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 366.673725][ T30] audit: type=1400 audit(2000000012.235:25691): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 367.637465][ C0] net_ratelimit: 66829 callbacks suppressed [ 367.637489][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) [ 367.637659][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 367.643447][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) [ 367.658620][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 367.667048][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) [ 367.679193][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 367.690664][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) [ 367.702243][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 367.714267][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) [ 367.726380][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 369.621697][ T30] audit: type=1400 audit(2000000012.281:25692): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 370.636614][ T83] audit: audit_backlog=65 > audit_backlog_limit=64 [ 370.647225][ T83] audit: audit_lost=13 audit_rate_limit=0 audit_backlog_limit=64 [ 370.832715][ T303] audit: audit_backlog=65 > audit_backlog_limit=64 [ 371.149363][ T30] audit: type=1400 audit(2000000012.403:25693): avc: denied { read write } for pid=304 comm="syz-executor" name="loop1" dev="devtmpfs" ino=113 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 371.178787][ T83] audit: backlog limit exceeded [ 371.423851][ T303] audit: audit_lost=14 audit_rate_limit=0 audit_backlog_limit=64 [ 371.431510][ T303] audit: backlog limit exceeded [ 371.457297][T23420] binfmt_misc: register: failed to install interpreter file ./file0/../file0 [ 372.153695][ T304] audit: audit_backlog=65 > audit_backlog_limit=64 [ 372.783530][ T304] audit: audit_lost=15 audit_rate_limit=0 audit_backlog_limit=64 [ 372.993434][ C0] net_ratelimit: 70416 callbacks suppressed [ 372.993458][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) [ 372.993802][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 372.999420][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) [ 373.011081][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 373.023011][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) [ 373.035066][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 373.046618][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) [ 373.058348][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 373.070142][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) [ 373.082248][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 373.192351][ T304] audit: backlog limit exceeded [ 376.209001][ T30] kauditd_printk_skb: 143 callbacks suppressed [ 376.209021][ T30] audit: type=1400 audit(2000000027.453:25765): avc: denied { read write } for pid=303 comm="syz-executor" name="loop4" dev="devtmpfs" ino=116 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 378.330527][ T30] audit: type=1400 audit(2000000027.491:25766): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 378.349493][ C0] net_ratelimit: 67998 callbacks suppressed [ 378.349519][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) [ 378.352596][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 378.358223][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) [ 378.370043][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 378.381868][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) [ 378.394750][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 378.406177][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) [ 378.417955][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 378.429883][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) [ 378.441799][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 379.313325][T23444] netlink: 'syz.1.11019': attribute type 13 has an invalid length. [ 379.810868][ T30] audit: type=1400 audit(2000000027.491:25767): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 380.015980][T23446] netlink: 'syz.1.11019': attribute type 13 has an invalid length. [ 381.627308][ T30] audit: type=1400 audit(2000000027.818:25768): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 381.751031][ T30] audit: type=1400 audit(2000000027.902:25769): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 383.705455][ C0] net_ratelimit: 67330 callbacks suppressed [ 383.705478][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) [ 383.705672][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 383.711451][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) [ 383.723299][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 383.735139][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) [ 383.747365][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 383.758655][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) [ 383.770470][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 383.782310][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) [ 383.794382][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 385.513665][ T30] audit: type=1400 audit(2000000028.408:25770): avc: denied { read write } for pid=304 comm="syz-executor" name="loop1" dev="devtmpfs" ino=113 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 386.122759][ T30] audit: type=1400 audit(2000000028.651:25771): avc: denied { read write } for pid=306 comm="syz-executor" name="loop0" dev="devtmpfs" ino=112 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 386.186373][ T30] audit: type=1400 audit(2000000029.240:25772): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 386.463758][ T30] audit: type=1400 audit(2000000029.278:25773): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 386.506580][ T30] audit: type=1400 audit(2000000029.596:25774): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 388.086308][ T30] audit: type=1400 audit(2000000029.596:25775): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 389.019842][ T83] audit: audit_backlog=65 > audit_backlog_limit=64 [ 389.030292][ T83] audit: audit_lost=40 audit_rate_limit=0 audit_backlog_limit=64 [ 389.037848][ T83] audit: backlog limit exceeded [ 389.061434][ C0] net_ratelimit: 65829 callbacks suppressed [ 389.061457][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) [ 389.061605][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 389.067356][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) [ 389.079173][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 389.091158][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) [ 389.103003][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 389.114429][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) [ 389.126197][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 389.138124][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) [ 389.150030][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 389.758778][T23490] audit: audit_backlog=65 > audit_backlog_limit=64 [ 389.837902][ T83] audit: audit_backlog=65 > audit_backlog_limit=64 [ 389.898976][ T30] audit: type=1400 audit(2000000029.596:25776): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 389.930676][ T83] audit: audit_lost=41 audit_rate_limit=0 audit_backlog_limit=64 [ 389.952335][ T83] audit: backlog limit exceeded [ 389.961426][T23490] audit: audit_lost=42 audit_rate_limit=0 audit_backlog_limit=64 [ 393.477407][ T30] kauditd_printk_skb: 157 callbacks suppressed [ 393.477427][ T30] audit: type=1400 audit(2000000043.598:25849): avc: denied { read write } for pid=303 comm="syz-executor" name="loop4" dev="devtmpfs" ino=116 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 394.417470][ C0] net_ratelimit: 66995 callbacks suppressed [ 394.417494][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) [ 394.417522][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 394.423390][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) [ 394.435212][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 394.447095][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) [ 394.459027][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 394.470454][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) [ 394.482239][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 394.494122][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) [ 394.507024][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 396.656941][ T30] audit: type=1400 audit(2000000043.655:25850): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 397.212966][ T30] audit: type=1400 audit(2000000043.655:25851): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 398.790514][ T30] audit: type=1400 audit(2000000043.945:25852): avc: denied { prog_load } for pid=23508 comm="syz.1.11042" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 399.626495][ T30] audit: type=1400 audit(2000000044.450:25853): avc: denied { execmem } for pid=23510 comm="syz.2.11044" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 399.773512][ C0] net_ratelimit: 66849 callbacks suppressed [ 399.773535][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) [ 399.773576][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 399.779400][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) [ 399.791240][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 399.803163][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) [ 399.815095][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 399.826507][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) [ 399.838277][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 399.850193][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) [ 399.862105][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 401.567764][ T30] audit: type=1400 audit(2000000044.581:25854): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 402.163076][ T30] audit: type=1400 audit(2000000044.599:25855): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 404.153541][ T30] audit: type=1400 audit(2000000044.599:25856): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 404.505530][ T30] audit: type=1400 audit(2000000044.599:25857): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 405.129394][ C0] net_ratelimit: 66134 callbacks suppressed [ 405.129416][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) [ 405.129498][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 405.135352][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) [ 405.147170][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 405.159046][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) [ 405.170978][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 405.182404][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) [ 405.194481][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 405.206330][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) [ 405.218429][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 405.259771][ T83] audit: audit_backlog=65 > audit_backlog_limit=64 [ 405.270053][ T83] audit: audit_lost=71 audit_rate_limit=0 audit_backlog_limit=64 [ 405.322506][T23558] audit: audit_backlog=65 > audit_backlog_limit=64 [ 405.336569][T23558] audit: audit_lost=72 audit_rate_limit=0 audit_backlog_limit=64 [ 405.361848][T23558] audit: backlog limit exceeded [ 405.449994][ T83] audit: backlog limit exceeded [ 405.636522][ T303] audit: audit_backlog=65 > audit_backlog_limit=64 [ 405.674793][ T30] audit: type=1400 audit(2000000044.609:25858): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 405.700513][ T83] audit: audit_backlog=65 > audit_backlog_limit=64 [ 405.817219][ T303] audit: audit_lost=73 audit_rate_limit=0 audit_backlog_limit=64 [ 408.252956][ T305] bridge0: port 5(syz_tun) entered disabled state [ 410.485451][ C0] net_ratelimit: 70490 callbacks suppressed [ 410.485476][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) [ 410.485606][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 410.491400][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) [ 410.503213][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 410.515121][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) [ 410.527186][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 410.538631][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) [ 410.550523][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 410.562383][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) [ 410.574412][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 410.660100][ T30] kauditd_printk_skb: 143 callbacks suppressed [ 410.660122][ T30] audit: type=1400 audit(2000000059.631:25936): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 410.884951][ T305] device syz_tun left promiscuous mode [ 410.893904][ T305] bridge0: port 5(syz_tun) entered disabled state [ 412.298583][ T30] audit: type=1400 audit(2000000059.631:25937): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 413.834531][ T30] audit: type=1400 audit(2000000059.631:25938): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 415.192986][ T30] audit: type=1400 audit(2000000059.631:25939): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 415.841511][ C1] net_ratelimit: 29692 callbacks suppressed [ 415.841535][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 415.859331][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 415.871384][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 415.883296][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 415.895739][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 415.907645][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 415.919713][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 415.931654][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 415.943722][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 415.955651][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 420.078424][ T30] audit: type=1400 audit(2000000059.631:25940): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 421.197692][ C1] net_ratelimit: 27314 callbacks suppressed [ 421.197721][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 421.215406][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 421.227553][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 421.227647][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 421.227922][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 421.228000][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 421.228296][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 421.228374][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 421.228650][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 421.228709][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 424.462180][ T30] audit: type=1400 audit(2000000059.641:25941): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 424.462221][ T30] audit: type=1400 audit(2000000059.641:25942): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 424.462251][ T30] audit: type=1400 audit(2000000059.856:25943): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 424.462279][ T30] audit: type=1400 audit(2000000059.856:25944): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 424.462305][ T30] audit: type=1400 audit(2000000059.921:25945): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 424.462332][ T30] audit: type=1400 audit(2000000059.931:25946): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 424.462358][ T30] audit: type=1400 audit(2000000059.931:25947): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 424.462385][ T30] audit: type=1400 audit(2000000059.931:25948): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 424.462412][ T30] audit: type=1400 audit(2000000060.192:25949): avc: denied { read } for pid=23576 comm="syz.0.11067" name="ppp" dev="devtmpfs" ino=150 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=0 [ 426.553436][ C1] net_ratelimit: 28366 callbacks suppressed [ 426.553459][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 426.553554][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 426.553878][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 426.553961][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 426.554266][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 426.554349][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 426.554699][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 426.554810][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 426.555166][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 426.555228][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 429.267749][ T30] kauditd_printk_skb: 42 callbacks suppressed [ 429.267767][ T30] audit: type=1400 audit(2000000077.086:25992): avc: denied { write } for pid=23596 comm="syz.1.11075" name="vga_arbiter" dev="devtmpfs" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=0 [ 429.346356][ T30] audit: type=1400 audit(2000000077.161:25993): avc: denied { execmem } for pid=23597 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 429.390956][ T30] audit: type=1400 audit(2000000077.198:25994): avc: denied { read write } for pid=304 comm="syz-executor" name="loop1" dev="devtmpfs" ino=113 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 429.563972][ T30] audit: type=1400 audit(2000000077.357:25995): avc: denied { execmem } for pid=23599 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 429.780630][ T30] audit: type=1400 audit(2000000077.563:25996): avc: denied { execmem } for pid=23600 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 431.012766][ T30] audit: type=1400 audit(2000000078.723:25997): avc: denied { create } for pid=23602 comm="syz.0.11078" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 431.013712][ T30] audit: type=1400 audit(2000000078.723:25998): avc: denied { create } for pid=23602 comm="syz.0.11078" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 431.083589][ T30] audit: type=1400 audit(2000000078.779:25999): avc: denied { execmem } for pid=23601 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 431.817135][ T30] audit: type=1400 audit(2000000079.378:26000): avc: denied { read write } for pid=306 comm="syz-executor" name="loop0" dev="devtmpfs" ino=112 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 431.909381][ C1] net_ratelimit: 27931 callbacks suppressed [ 431.909405][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 431.909712][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 431.909809][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 431.910096][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 431.910175][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 431.910475][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 431.910575][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 431.910879][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 431.910990][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 431.911309][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 433.458279][ T30] audit: type=1400 audit(2000000081.005:26001): avc: denied { prog_load } for pid=23604 comm="syz.1.11079" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 434.705940][ T30] kauditd_printk_skb: 2 callbacks suppressed [ 434.705958][ T30] audit: type=1400 audit(2000000082.174:26004): avc: denied { execmem } for pid=23608 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 435.019173][ T30] audit: type=1400 audit(2000000082.464:26005): avc: denied { read write } for pid=303 comm="syz-executor" name="loop4" dev="devtmpfs" ino=116 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 435.408298][ T30] audit: type=1400 audit(2000000082.829:26006): avc: denied { read write } for pid=306 comm="syz-executor" name="loop0" dev="devtmpfs" ino=112 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 436.417240][ T30] audit: type=1400 audit(2000000083.774:26007): avc: denied { execmem } for pid=23612 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 437.265670][ C1] net_ratelimit: 27787 callbacks suppressed [ 437.265691][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 437.265779][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 437.266093][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 437.266187][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 437.266624][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 437.266695][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 437.267028][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 437.267113][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 437.267565][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 437.267651][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 438.546619][ T30] audit: type=1400 audit(2000000085.757:26008): avc: denied { execmem } for pid=23613 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 442.621349][ C1] net_ratelimit: 27647 callbacks suppressed [ 442.621372][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 442.621756][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 442.621848][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 442.622193][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 442.622293][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 442.622649][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 442.622739][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 442.623125][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 442.623199][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 442.623553][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 447.977576][ C1] net_ratelimit: 26871 callbacks suppressed [ 447.977599][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 447.977696][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 447.978001][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 447.978085][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 447.978389][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 447.978473][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 447.978826][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 447.978883][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 447.979149][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 447.979215][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 448.904191][ T30] audit: type=1400 audit(2000000095.448:26009): avc: denied { execmem } for pid=23614 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 449.215994][ T30] audit: type=1400 audit(2000000095.738:26010): avc: denied { execmem } for pid=23615 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 452.557720][ T30] audit: type=1400 audit(2000000098.871:26011): avc: denied { execmem } for pid=23616 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 453.333445][ C1] net_ratelimit: 28782 callbacks suppressed [ 453.333469][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 453.333566][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 453.333849][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 453.333911][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 453.334201][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 453.334281][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 453.334573][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 453.334653][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 453.334949][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 453.335028][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 458.689617][ C1] net_ratelimit: 28536 callbacks suppressed [ 458.689646][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 458.689729][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 458.690009][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 458.690102][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 458.690410][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 458.690477][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 458.690773][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 458.690833][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 458.691136][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 458.691196][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 463.481997][ T30] audit: type=1400 audit(2000000109.095:26012): avc: denied { execmem } for pid=23617 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 464.045411][ C1] net_ratelimit: 28750 callbacks suppressed [ 464.045435][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 464.045547][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 464.045854][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 464.045947][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 464.046296][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 464.046388][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 464.046730][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 464.046794][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 464.047129][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 464.047212][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 466.435858][ T30] audit: type=1400 audit(2000000111.855:26013): avc: denied { execmem } for pid=23618 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 469.401503][ C1] net_ratelimit: 28084 callbacks suppressed [ 469.401526][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 469.401613][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 469.401918][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 469.402009][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 469.402298][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 469.402388][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 469.402721][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 469.402823][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 469.403142][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 469.403206][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 469.726382][ T30] audit: type=1400 audit(2000000114.885:26014): avc: denied { execmem } for pid=23619 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 474.757508][ C1] net_ratelimit: 29226 callbacks suppressed [ 474.757535][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 474.757628][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 474.757963][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 474.758024][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 474.758305][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 474.758395][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 474.758729][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 474.758842][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 474.759125][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 474.759186][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 480.113541][ C1] net_ratelimit: 28966 callbacks suppressed [ 480.113564][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 480.113682][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 480.113980][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 480.114066][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 480.114371][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 480.114467][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 480.114805][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 480.114903][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 480.115241][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 480.115301][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 485.469500][ C1] net_ratelimit: 29706 callbacks suppressed [ 485.469523][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 485.469606][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 485.469892][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 485.469972][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 485.470312][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 485.470391][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 485.470701][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 485.470761][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 485.471085][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 485.471191][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 488.867697][ T30] audit: type=1400 audit(2000000132.836:26015): avc: denied { execmem } for pid=23620 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 489.364619][ T30] audit: type=1400 audit(2000000133.303:26016): avc: denied { read write } for pid=306 comm="syz-executor" name="loop0" dev="devtmpfs" ino=112 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 490.825548][ C1] net_ratelimit: 28658 callbacks suppressed [ 490.825569][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 490.825666][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 490.826002][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 490.826087][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 490.826452][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 490.826540][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 490.826920][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 490.827009][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 490.827319][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 490.827406][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 494.444156][ T30] audit: type=1400 audit(2000000138.055:26017): avc: denied { execmem } for pid=23623 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 494.808124][ T30] audit: type=1400 audit(2000000138.392:26018): avc: denied { execmem } for pid=23624 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 496.181520][ C1] net_ratelimit: 27662 callbacks suppressed [ 496.181544][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 496.181631][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 496.181931][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 496.181998][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 496.182339][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 496.182404][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 496.182711][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 496.182797][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 496.183117][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 496.183180][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 501.537517][ C1] net_ratelimit: 27810 callbacks suppressed [ 501.537539][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 501.537621][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 501.537936][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 501.538013][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 501.538298][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 501.538374][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 501.538676][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 501.538753][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 501.539071][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 501.539148][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 506.893601][ C1] net_ratelimit: 28870 callbacks suppressed [ 506.893631][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 506.893721][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 506.894191][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 506.894302][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 506.894596][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 506.894685][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 506.895056][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 506.895159][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 506.895507][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 506.895598][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 510.042013][ T30] audit: type=1400 audit(2000000152.638:26019): avc: denied { read write } for pid=304 comm="syz-executor" name="loop1" dev="devtmpfs" ino=113 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 512.249457][ C1] net_ratelimit: 27166 callbacks suppressed [ 512.249480][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 512.249590][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 512.249897][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 512.249958][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 512.250241][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 512.250319][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 512.250608][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 512.250688][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 512.250981][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 512.251096][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 517.605488][ C1] net_ratelimit: 29100 callbacks suppressed [ 517.605513][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 517.605609][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 517.605925][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 517.606016][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 517.606356][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 517.606438][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 517.606782][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 517.606901][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 517.607197][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 517.607260][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 522.961392][ C1] net_ratelimit: 32271 callbacks suppressed [ 522.961415][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 522.961498][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 522.961619][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 522.961922][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 522.962001][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 522.962076][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 522.962388][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 522.962449][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 522.962552][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 522.962829][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 527.257333][ T30] audit: type=1400 audit(2000000168.746:26020): avc: denied { execmem } for pid=23627 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 528.317525][ C1] net_ratelimit: 34379 callbacks suppressed [ 528.317550][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 528.317639][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 528.317762][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 528.318096][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 528.318167][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 528.318276][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 528.318629][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 528.318711][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 528.318813][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 528.319126][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 532.356871][ T30] audit: type=1400 audit(2000000173.507:26021): avc: denied { execmem } for pid=23626 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 533.673386][ C1] net_ratelimit: 33305 callbacks suppressed [ 533.673409][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 533.673476][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 533.673577][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 533.673882][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 533.673981][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 533.674086][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 533.674430][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 533.674520][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 533.674640][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 533.674969][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 539.029361][ C1] net_ratelimit: 32852 callbacks suppressed [ 539.029385][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 539.029466][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 539.029560][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 539.029851][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 539.029918][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 539.030012][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 539.030339][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 539.030417][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 539.030512][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 539.030822][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 544.385311][ C1] net_ratelimit: 34270 callbacks suppressed [ 544.385336][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 544.385727][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 544.385817][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 544.385934][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 544.386269][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 544.386360][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 544.386469][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 544.386821][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 544.386912][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 544.387019][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 549.741309][ C1] net_ratelimit: 35077 callbacks suppressed [ 549.741330][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 549.741452][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 549.741826][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 549.741939][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 549.742023][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 549.742386][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 549.742477][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 549.742562][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 549.742940][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 549.743039][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 555.097273][ C1] net_ratelimit: 33312 callbacks suppressed [ 555.097297][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 555.097647][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 555.097732][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 555.097832][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 555.098158][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 555.098251][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 555.098379][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 555.098725][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 555.098788][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 555.098886][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 560.453434][ C1] net_ratelimit: 33802 callbacks suppressed [ 560.453457][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 560.453544][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 560.453654][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 560.453982][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 560.454067][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 560.454193][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 560.454521][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 560.454591][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 560.454690][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 560.455040][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 565.809542][ C1] net_ratelimit: 34424 callbacks suppressed [ 565.809564][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 565.809660][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 565.809760][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 565.810136][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 565.810219][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 565.810319][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 565.810634][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 565.810712][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 565.810814][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 565.811155][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 569.824314][ T46] ================================================================== [ 569.824330][ T46] BUG: KASAN: slab-out-of-bounds in unaccount_page_cache_page+0x6d8/0x750 [ 569.824365][ T46] Read of size 4 at addr ffff888117bad470 by task kswapd0/46 [ 569.824385][ T46] [ 569.824391][ T46] CPU: 1 PID: 46 Comm: kswapd0 Not tainted 5.15.178-syzkaller-00034-g5e1b899f19c3 #0 [ 569.824414][ T46] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 569.824428][ T46] Call Trace: [ 569.824434][ T46] [ 569.824443][ T46] dump_stack_lvl+0x151/0x1c0 [ 569.824467][ T46] ? io_uring_drop_tctx_refs+0x190/0x190 [ 569.824489][ T46] ? __wake_up_klogd+0xd5/0x110 [ 569.824513][ T46] ? panic+0x760/0x760 [ 569.824532][ T46] print_address_description+0x87/0x3b0 [ 569.824557][ T46] kasan_report+0x179/0x1c0 [ 569.824577][ T46] ? unaccount_page_cache_page+0x6d8/0x750 [ 569.824600][ T46] ? unaccount_page_cache_page+0x6d8/0x750 [ 569.824623][ T46] __asan_report_load4_noabort+0x14/0x20 [ 569.824646][ T46] unaccount_page_cache_page+0x6d8/0x750 [ 569.824669][ T46] __delete_from_page_cache+0xc6/0x5b0 [ 569.824691][ T46] ? page_referenced+0x2ca/0x6b0 [ 569.824713][ T46] ? __bpf_trace_file_check_and_advance_wb_err+0x30/0x30 [ 569.824737][ T46] ? __kasan_check_write+0x14/0x20 [ 569.824761][ T46] ? __kasan_check_read+0x11/0x20 [ 569.824783][ T46] ? workingset_eviction+0x495/0xa70 [ 569.824809][ T46] __remove_mapping+0x566/0x690 [ 569.824833][ T46] shrink_page_list+0x2723/0x5c50 [ 569.824865][ T46] ? reclaim_clean_pages_from_list+0x9d0/0x9d0 [ 569.824892][ T46] ? isolate_lru_pages+0x119f/0x1390 [ 569.824918][ T46] ? cgroup_rstat_updated+0xe5/0x370 [ 569.824942][ T46] ? __this_cpu_preempt_check+0x13/0x20 [ 569.824965][ T46] ? __count_memcg_events+0xad/0x120 [ 569.824990][ T46] shrink_lruvec+0x17ec/0x4580 [ 569.825022][ T46] ? mem_cgroup_shrink_node+0x680/0x680 [ 569.825046][ T46] ? down_read_trylock+0x3d6/0x7d0 [ 569.825070][ T46] ? __init_rwsem+0x1d0/0x1d0 [ 569.825093][ T46] ? up_read+0x5d/0x220 [ 569.825114][ T46] ? shrink_slab+0xa22/0xbe0 [ 569.825135][ T46] ? __kasan_check_write+0x14/0x20 [ 569.825160][ T46] ? cpumask_next+0x8a/0xb0 [ 569.825181][ T46] ? cgroup_rstat_flush_locked+0xb57/0xc60 [ 569.825207][ T46] ? vmpressure+0x577/0x590 [ 569.825227][ T46] ? __kasan_check_read+0x11/0x20 [ 569.825249][ T46] ? mem_cgroup_calculate_protection+0x4f/0x510 [ 569.825276][ T46] shrink_node+0x1083/0x2550 [ 569.825310][ T46] ? allow_direct_reclaim+0x380/0x380 [ 569.825331][ T46] ? zone_watermark_ok_safe+0x23a/0x270 [ 569.825356][ T46] balance_pgdat+0x15e1/0x2f50 [ 569.825379][ T46] ? update_load_avg+0x43a/0x1150 [ 569.825404][ T46] ? __update_load_avg_cfs_rq+0xb1/0x2f0 [ 569.825429][ T46] ? update_load_avg+0x43a/0x1150 [ 569.825458][ T46] ? kswapd+0xd60/0xd60 [ 569.825481][ T46] ? _raw_spin_unlock+0x4d/0x70 [ 569.825502][ T46] ? finish_task_switch+0x167/0x7b0 [ 569.825527][ T46] ? __kasan_check_write+0x14/0x20 [ 569.825549][ T46] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 569.825571][ T46] ? _raw_spin_lock+0x1b0/0x1b0 [ 569.825594][ T46] ? __kasan_check_read+0x11/0x20 [ 569.825617][ T46] kswapd+0x698/0xd60 [ 569.825642][ T46] ? try_to_free_mem_cgroup_pages+0x850/0x850 [ 569.825666][ T46] ? io_schedule+0x120/0x120 [ 569.825689][ T46] ? __kthread_parkme+0xb2/0x200 [ 569.825712][ T46] kthread+0x421/0x510 [ 569.825732][ T46] ? try_to_free_mem_cgroup_pages+0x850/0x850 [ 569.825757][ T46] ? kthread_blkcg+0xd0/0xd0 [ 569.825779][ T46] ret_from_fork+0x1f/0x30 [ 569.825803][ T46] [ 569.825810][ T46] [ 569.825815][ T46] Allocated by task 23543: [ 569.825825][ T46] ____kasan_kmalloc+0xdb/0x110 [ 569.825845][ T46] __kasan_kmalloc+0x9/0x10 [ 569.825863][ T46] __kmalloc_track_caller+0x13e/0x2c0 [ 569.825885][ T46] pskb_expand_head+0x113/0x1240 [ 569.825907][ T46] erspan_xmit+0x4c5/0x1690 [ 569.825928][ T46] dev_hard_start_xmit+0x228/0x620 [ 569.825947][ T46] sch_direct_xmit+0x298/0x9b0 [ 569.825969][ T46] __dev_queue_xmit+0x15b6/0x2e80 [ 569.825987][ T46] dev_queue_xmit+0x17/0x20 [ 569.826005][ T46] br_dev_queue_push_xmit+0x576/0x700 [ 569.826027][ T46] br_forward_finish+0xd3/0x2d0 [ 569.826048][ T46] __br_forward+0x473/0x5b0 [ 569.826068][ T46] maybe_deliver+0x1c0/0x2a0 [ 569.826089][ T46] br_flood+0x2e5/0x420 [ 569.826109][ T46] br_handle_frame_finish+0xf3f/0x12b0 [ 569.826131][ T46] br_handle_frame+0x8ea/0xf70 [ 569.826152][ T46] __netif_receive_skb_core+0x11af/0x3640 [ 569.826174][ T46] __netif_receive_skb+0x11c/0x530 [ 569.826196][ T46] process_backlog+0x31c/0x650 [ 569.826217][ T46] __napi_poll+0xc4/0x5a0 [ 569.826237][ T46] net_rx_action+0x47d/0xc50 [ 569.826258][ T46] handle_softirqs+0x25e/0x5c0 [ 569.826280][ T46] __do_softirq+0xb/0xd [ 569.826305][ T46] [ 569.826310][ T46] Freed by task 23543: [ 569.826319][ T46] kasan_set_track+0x4b/0x70 [ 569.826336][ T46] kasan_set_free_info+0x23/0x40 [ 569.826357][ T46] ____kasan_slab_free+0x126/0x160 [ 569.826376][ T46] __kasan_slab_free+0x11/0x20 [ 569.826393][ T46] slab_free_freelist_hook+0xbd/0x190 [ 569.826411][ T46] kfree+0xcc/0x270 [ 569.826430][ T46] skb_release_data+0x8a9/0xa80 [ 569.826451][ T46] kfree_skb+0xba/0x360 [ 569.826471][ T46] ip_tunnel_xmit+0x15be/0x2760 [ 569.826490][ T46] erspan_xmit+0xaf8/0x1690 [ 569.826510][ T46] dev_hard_start_xmit+0x228/0x620 [ 569.826529][ T46] sch_direct_xmit+0x298/0x9b0 [ 569.826549][ T46] __dev_queue_xmit+0x15b6/0x2e80 [ 569.826568][ T46] dev_queue_xmit+0x17/0x20 [ 569.826585][ T46] br_dev_queue_push_xmit+0x576/0x700 [ 569.826608][ T46] br_forward_finish+0xd3/0x2d0 [ 569.826629][ T46] __br_forward+0x473/0x5b0 [ 569.826649][ T46] maybe_deliver+0x1c0/0x2a0 [ 569.826670][ T46] br_flood+0x2e5/0x420 [ 569.826690][ T46] br_handle_frame_finish+0xf3f/0x12b0 [ 569.826712][ T46] br_handle_frame+0x8ea/0xf70 [ 569.826734][ T46] __netif_receive_skb_core+0x11af/0x3640 [ 569.826757][ T46] __netif_receive_skb+0x11c/0x530 [ 569.826778][ T46] process_backlog+0x31c/0x650 [ 569.826799][ T46] __napi_poll+0xc4/0x5a0 [ 569.826819][ T46] net_rx_action+0x47d/0xc50 [ 569.826839][ T46] handle_softirqs+0x25e/0x5c0 [ 569.826860][ T46] __do_softirq+0xb/0xd [ 569.826878][ T46] [ 569.826883][ T46] The buggy address belongs to the object at ffff888117bad000 [ 569.826883][ T46] which belongs to the cache kmalloc-1k of size 1024 [ 569.826923][ T46] The buggy address is located 112 bytes to the right of [ 569.826923][ T46] 1024-byte region [ffff888117bad000, ffff888117bad400) [ 569.826942][ T46] The buggy address belongs to the page: [ 569.826950][ T46] page:ffffea00045eea00 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x117ba8 [ 569.826974][ T46] head:ffffea00045eea00 order:3 compound_mapcount:0 compound_pincount:0 [ 569.826991][ T46] flags: 0x4000000000010200(slab|head|zone=1) [ 569.827036][ T46] raw: 4000000000010200 dead000000000100 dead000000000122 ffff888100043080 [ 569.827054][ T46] raw: 0000000000000000 0000000000100010 00000001ffffffff 0000000000000000 [ 569.827065][ T46] page dumped because: kasan: bad access detected [ 569.827079][ T46] page_owner tracks the page as allocated [ 569.827086][ T46] page last allocated via order 3, migratetype Unmovable, gfp_mask 0x1d2a20(GFP_ATOMIC|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC|__GFP_HARDWALL), pid 23543, ts 468617993515, free_ts 468476442610 [ 569.827120][ T46] post_alloc_hook+0x1a3/0x1b0 [ 569.827141][ T46] prep_new_page+0x1b/0x110 [ 569.827161][ T46] get_page_from_freelist+0x3550/0x35d0 [ 569.827183][ T46] __alloc_pages+0x27e/0x8f0 [ 569.827204][ T46] new_slab+0x9a/0x4e0 [ 569.827219][ T46] ___slab_alloc+0x39e/0x830 [ 569.827240][ T46] __slab_alloc+0x4a/0x90 [ 569.827256][ T46] __kmalloc_track_caller+0x171/0x2c0 [ 569.827279][ T46] pskb_expand_head+0x113/0x1240 [ 569.827306][ T46] erspan_xmit+0x4c5/0x1690 [ 569.827327][ T46] dev_hard_start_xmit+0x228/0x620 [ 569.827346][ T46] sch_direct_xmit+0x298/0x9b0 [ 569.827366][ T46] __dev_queue_xmit+0x15b6/0x2e80 [ 569.827384][ T46] dev_queue_xmit+0x17/0x20 [ 569.827402][ T46] br_dev_queue_push_xmit+0x576/0x700 [ 569.827424][ T46] br_forward_finish+0xd3/0x2d0 [ 569.827446][ T46] page last free stack trace: [ 569.827452][ T46] free_unref_page_prepare+0x7c8/0x7d0 [ 569.827473][ T46] free_unref_page+0xe8/0x750 [ 569.827493][ T46] __free_pages+0x61/0xf0 [ 569.827512][ T46] __free_slab+0xec/0x1d0 [ 569.827528][ T46] __unfreeze_partials+0x165/0x1a0 [ 569.827546][ T46] put_cpu_partial+0xc4/0x120 [ 569.827563][ T46] __slab_free+0x1c8/0x290 [ 569.827579][ T46] ___cache_free+0x109/0x120 [ 569.827598][ T46] qlink_free+0x4d/0x90 [ 569.827618][ T46] qlist_free_all+0x44/0xb0 [ 569.827638][ T46] kasan_quarantine_reduce+0x15a/0x180 [ 569.827659][ T46] __kasan_slab_alloc+0x2f/0xe0 [ 569.827678][ T46] slab_post_alloc_hook+0x53/0x2c0 [ 569.827699][ T46] kmem_cache_alloc+0xf5/0x250 [ 569.827720][ T46] __alloc_skb+0xbe/0x550 [ 569.827739][ T46] alloc_skb_with_frags+0xa6/0x680 [ 569.827758][ T46] [ 569.827763][ T46] Memory state around the buggy address: [ 569.827773][ T46] ffff888117bad300: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 569.827787][ T46] ffff888117bad380: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 569.827800][ T46] >ffff888117bad400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 569.827810][ T46] ^ [ 569.827822][ T46] ffff888117bad480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 569.827834][ T46] ffff888117bad500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 569.827844][ T46] ================================================================== [ 569.827852][ T46] Disabling lock debugging due to kernel taint [ 571.165388][ C1] net_ratelimit: 33788 callbacks suppressed [ 571.165411][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 571.165520][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 571.165658][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 571.165994][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 571.166066][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 571.166166][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 571.166493][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 571.166577][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 571.166656][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 571.166990][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 576.521346][ C0] net_ratelimit: 39285 callbacks suppressed [ 576.521371][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8a:02:b8:60:2c:04, vlan:0) [ 576.521492][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 576.521585][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 576.521665][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 576.521709][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8a:02:b8:60:2c:04, vlan:0) [ 576.521991][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 576.522048][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8a:02:b8:60:2c:04, vlan:0) [ 576.522100][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 576.522199][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 576.522385][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8a:02:b8:60:2c:04, vlan:0) [ 578.536077][ T30] audit: type=1400 audit(2000000216.713:26022): avc: denied { execmem } for pid=23628 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 579.422785][ T30] audit: type=1400 audit(2000000217.545:26023): avc: denied { execmem } for pid=23630 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 581.102746][ T30] audit: type=1400 audit(2000000219.108:26024): avc: denied { execmem } for pid=23631 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 581.877277][ C0] net_ratelimit: 50034 callbacks suppressed [ 581.877306][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8a:02:b8:60:2c:04, vlan:0) [ 581.877310][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 581.877373][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 581.877472][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 581.877669][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8a:02:b8:60:2c:04, vlan:0) [ 581.877793][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 581.877878][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 581.877981][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8a:02:b8:60:2c:04, vlan:0) [ 581.878001][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 581.878307][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 581.891851][ T30] audit: type=1400 audit(2000000219.847:26025): avc: denied { execmem } for pid=23632 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0