last executing test programs: 16.449792096s ago: executing program 4 (id=8785): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@newtaction={0x64, 0x30, 0xb, 0x0, 0x0, {}, [{0x50, 0x1, [@m_ct={0x4c, 0x1, 0x0, 0x0, {{0x7}, {0x24, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18}, @TCA_CT_ACTION={0x6, 0x3, 0x1d}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x64}}, 0x0) 16.448386576s ago: executing program 2 (id=8786): r0 = epoll_create1(0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40088a01, &(0x7f0000002200)=0xc0100100) 16.442079537s ago: executing program 3 (id=8787): r0 = socket(0x1, 0x803, 0x0) getpeername$packet(r0, 0x0, 0x0) 16.432957658s ago: executing program 0 (id=8788): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.effective_cpus\x00', 0x275a, 0x0) fcntl$lock(r0, 0x24, &(0x7f0000000000)={0x1, 0x2}) 16.363614174s ago: executing program 2 (id=8790): r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r0, 0x0, 0x8008000000010, &(0x7f00000018c0)="17000000020001000003d68c5ee17688a2003208020300ecff3f0000000300000a000000009afc5ad9485bbb6a880000d6c8db0000dba67e694517e3cdff06018000020000f10607bdff59100ac45761407a681f009cee4a5acb3da404001fb700674f19b44e09f9315033bf79ac0800060115003901000000000000ea000000000000000009ffff02dfccebf6ba0008400200000000e90554062a84e605007f71174aa951f3c63e5c83f1ba2112ce68bf17a6e000000000", 0xb8) 16.357471754s ago: executing program 4 (id=8791): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="14000000100001000000000000462a93d100000a58000000090a010400000000000000000000000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000210800034000000040"], 0x80}}, 0x0) 16.355189844s ago: executing program 3 (id=8792): r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000002700)=@raw={'raw\x00', 0x8, 0x3, 0x2a0, 0x208, 0x8, 0xfa04, 0x0, 0x6c02, 0x208, 0x194, 0x194, 0x208, 0x194, 0x3, 0x0, {[{{@ip={@empty=0x1e00, @broadcast, 0x0, 0x0, 'veth0_to_hsr\x00', 'veth0_virt_wifi\x00', {}, {}, 0x6}, 0x0, 0xa0, 0xc8, 0x0, {0x0, 0x74020000}, [@common=@inet=@tcp={{0x30}, {[], [], 0x0, 0x0, 0x7a}}]}, @common=@inet=@TCPMSS={0x28}}, {{@ip={@multicast1, @rand_addr, 0x0, 0x0, 'batadv_slave_0\x00', 'pimreg\x00'}, 0x0, 0xf8, 0x140, 0x0, {}, [@common=@unspec=@helper={{0x48}, {0x0, 'amanda\x00'}}, @common=@unspec=@connlimit={{0x40}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x300) 16.351177645s ago: executing program 0 (id=8793): r0 = syz_open_procfs(0x0, &(0x7f0000002180)='net/mcfilter\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000000)=""/5, 0x5}], 0x1, 0x2f, 0x0) 16.342693135s ago: executing program 1 (id=8794): r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000040), &(0x7f0000000080)=0xffffffffffffff23) 16.271369501s ago: executing program 4 (id=8795): r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x2fc) 16.268656231s ago: executing program 2 (id=8805): r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt(r0, 0xff, 0x0, 0x0, 0x0) 16.264916072s ago: executing program 0 (id=8796): mremap(&(0x7f0000000000/0x9000)=nil, 0x600600, 0x200000, 0x3, &(0x7f0000a00000/0x600000)=nil) epoll_pwait2(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000380), 0x0, 0x0) 16.260830092s ago: executing program 1 (id=8797): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f0000000800)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={r0, 0x0, 0xfffffffffffffffc}, 0x10) 16.210739096s ago: executing program 3 (id=8798): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f0000000000)=0xffffffffffffffff) 16.200588507s ago: executing program 4 (id=8799): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000002e00)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000070000000900010073797a30000000003c000000090a010400000000000000000700000008000a40000000000900020073797a31000000000900010073797a30000000000800054000000021840000000c0a0101000000000000d955070000000900020073797a31000000000900010073797a30000000005800038054000080080003400000000248000b80340001800a0001006c696d697400000024000280080004"], 0x108}}, 0x0) 16.194418138s ago: executing program 2 (id=8800): r0 = add_key(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000340)=""/145, 0x91) 16.179834239s ago: executing program 1 (id=8801): creat(&(0x7f0000000280)='./file0\x00', 0x0) mount$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240), 0x10010, &(0x7f0000000bc0)=ANY=[@ANYBLOB='mode=00000000000000000000004,mode=00000000000000000002536,mpol=local,hu']) 16.176814549s ago: executing program 0 (id=8802): mmap$xdp(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x1000002, 0x42032, 0xffffffffffffffff, 0x100000000) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3, 0x200000005c832, 0xffffffffffffffff, 0x0) 16.127128674s ago: executing program 3 (id=8803): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={&(0x7f00000000c0)=@setlink={0x3c, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'bridge0\x00'}, @IFLA_NET_NS_PID={0x8}]}, 0x3c}}, 0x0) 16.106925315s ago: executing program 2 (id=8804): r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_OPENQRY(r0, 0x4b46, &(0x7f00000000c0)) 16.100607726s ago: executing program 4 (id=8806): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000500)={0x64, 0x2, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_DATA={0x18, 0x7, 0x0, 0x1, [@IPSET_ATTR_CIDR={0x5, 0x3, 0x40}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @dev}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x64}}, 0x0) 16.085684527s ago: executing program 1 (id=8807): r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="200000004f000902000400000000000300000a000100242a2fcd2b0000"], 0x20}}, 0x0) 16.077462507s ago: executing program 0 (id=8808): r0 = socket$inet_icmp(0x2, 0x2, 0x1) close(r0) 16.04607365s ago: executing program 3 (id=8809): iopl(0x3) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x0) 16.024937802s ago: executing program 2 (id=8810): socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x46, &(0x7f0000000100)={@broadcast, @empty, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x3, 0x4, 0x0, 0x3, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0xfffc, 0x0, 0x0, 0x0, 0x1, 0x0, @broadcast, @multicast2}, '\x00\x00\x00\x00\x00\x00 \x00'}}}}}, 0x0) 16.013652573s ago: executing program 4 (id=8811): r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r0, 0x8982, &(0x7f0000000040)={0x8, 'vlan0\x00', {'team_slave_1\x00'}, 0x8}) 16.009276723s ago: executing program 1 (id=8812): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000580)={0xc8, 0x2, 0x9, 0x801, 0x0, 0x0, {0x0, 0x0, 0x5}, [@NFCTH_STATUS={0x8, 0x6, 0x1, 0x0, 0x1}, @NFCTH_TUPLE={0x3c, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={'\x00', '\xff\xff', @multicast2}}, {0x14, 0x4, @private1}}}]}, @NFCTH_QUEUE_NUM={0x8, 0x3, 0x1, 0x0, 0x7}, @NFCTH_NAME={0x9, 0x1, 'syz0\x00'}, @NFCTH_QUEUE_NUM={0x15, 0x3, 0x1, 0x0, 0x7e4893ad}, @NFCTH_STATUS={0x0, 0x6, 0x1, 0x0, 0x1}, @NFCTH_PRIV_DATA_LEN={0x8}, @NFCTH_TUPLE={0x40, 0x2, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x20}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_IP={0x52, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @multicast1}}}]}]}, 0xc8}, 0x1, 0x0, 0x0, 0x4048000}, 0x88c0) 15.984786056s ago: executing program 0 (id=8813): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001280)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000dc0)={0x6, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="1800000000000000000000000000000018200000", @ANYRES32=r0, @ANYBLOB="000000000000000062001c000000000095"], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) 15.884413214s ago: executing program 3 (id=8814): r0 = syz_open_dev$usbfs(&(0x7f0000000100), 0x77, 0x101301) ioctl$USBDEVFS_FREE_STREAMS(r0, 0x802c550a, &(0x7f0000000000)=ANY=[@ANYBLOB="0200a30d060010000500000002000020d3"]) 0s ago: executing program 1 (id=8815): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)=@newtaction={0x48, 0x1e, 0x109, 0x0, 0x0, {}, [{0x34, 0x1, [@m_mirred={0x30, 0x8, 0x0, 0x0, {{0xb, 0x9}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}, 0x48}, 0x1, 0x2b1e}, 0x0) kernel console output (not intermixed with test programs): emon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: receivedJan 1 00:03:35 Jan 1 00:03:35 Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 syzkaller daemon.err dhcpcd[Jan 1 00:03:35 Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL deviceJan 1 00:03:35 Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 Jan 1 00:03:35 Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 syzkaller daemon.eJan 1 00:03:35 Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULJan 1 00:03:35 Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]:Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 syzkaller Jan 1 00:03:35 Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL deviceJan 1 00:03:35 Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 syzkalleJan 1 00:03:35 Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 syzkaller daemJan 1 00:03:35 Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03Jan 1 00:03:35 Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1Jan 1 00:03:35 Jan 1 00:03:35 Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 syzkaller daemon.err dhcpcJan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 syzkaller daemJan 1 00:03:35 Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 syzkalJan 1 00:03:35 Jan 1 00:03:35 syzkaller daemonJan 1 00:03:35 Jan 1 00:03:35 Jan 1 00:03:35 Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL deviceJan 1 00:03:35 Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 syzkalleJan 1 00:03:35 Jan 1 00:03:35 Jan 1 00:03:35 Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:35 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:36 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:36 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:36 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:36 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:36 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:36 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:36 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:36 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:36 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:36 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:36 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:36 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:36 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:36 syzkaller daemon.err dhcpcd[30Jan 1 00:03:36 Jan 1 00:03:36 Jan 1 00:03:36 Jan 1 00:03:36 Jan 1 00:03:36 Jan 1 00:03:36 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:36 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL deviJan 1 00:03:36 Jan 1 00:03:36 Jan 1 00:03:36 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:36 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:36 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:36 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:36 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:36 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:36 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:36 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:36 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:36 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:36 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:36 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:36 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:36 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:36 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:36 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:36 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:36 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:36 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:36 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:36 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:36 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:36 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:36 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:36 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:36 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:36 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:36 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:36 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:36 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:36 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:36 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:36 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:36 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:37 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:37 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:37 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:37 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:37 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:37 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:37 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:37 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:37 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:37 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device [ 221.809122][ C0] net_ratelimit: 46636 callbacks suppressed [ 221.809139][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) [ 221.809433][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 221.815623][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) [ 221.827136][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 221.842209][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) [ 221.850921][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 221.863496][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) [ 221.874856][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 221.886801][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) [ 221.898740][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) Jan 1 00:03:37 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:37 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:37 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:37 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:37 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:37 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:37 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:37 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:37 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:37 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:37 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:37 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:37 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:37 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:37 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:37 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:37 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:37 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:37 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:37 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:37 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:37 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:37 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:37 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:37 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:37 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:37 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:37 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:37 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:37 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:37 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:37 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:37 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:37 syzkaller daemon.err dhcpcd[3006]: libudev: rece[ 222.691090][ T29] kauditd_printk_skb: 1552 callbacks suppressed ived NULL device Jan 1 00:03:3[ 222.691104][ T29] audit: type=1400 audit(218.026:201884): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 7 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03[ 222.728138][ T29] audit: type=1400 audit(218.026:201885): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 :37 syzkaller daemon.err dhcpcd[3006]: libudev: [ 222.753731][ T29] audit: type=1400 audit(218.036:201886): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 received NULL device Jan 1 00:03:37 syzkaller [ 222.779402][ T29] audit: type=1400 audit(218.036:201887): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 daemon.err dhcpcd[3006]: libudev[ 222.804993][ T29] audit: type=1400 audit(218.036:201888): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 : received NULL device Jan 1 0[ 222.829324][ T29] audit: type=1400 audit(218.036:201889): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 0:03:37 syzkaller daemon.err dhc[ 222.853578][ T29] audit: type=1400 audit(218.036:201890): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 pcd[3006]: libudev: received NULL device Jan 1[ 222.877895][ T29] audit: type=1400 audit(218.036:201891): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 00:03:37 syzkaller daemon.err d[ 222.903474][ T29] audit: type=1400 audit(218.036:201892): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 hcpcd[3006]: libudev: received N[ 222.927750][ T29] audit: type=1400 audit(218.036:201893): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ULL device Jan 1 00:03:37 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:37 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:37 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:37 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:03:37 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device [ 227.237142][ C1] net_ratelimit: 51156 callbacks suppressed [ 227.237160][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 227.237419][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) [ 227.243163][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 227.255253][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) [ 227.267133][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 227.279589][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) [ 227.290980][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 227.302895][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) [ 227.314751][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 227.327322][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) [ 232.664997][ C0] net_ratelimit: 52627 callbacks suppressed [ 232.665014][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) [ 232.665264][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 232.671109][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) [ 232.683135][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 232.695573][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) [ 232.706925][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 232.718941][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) [ 232.730821][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 232.743245][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) [ 232.754695][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) Jan 1 00:03:37 syzkaller kern.warn kernel: [ 221.809122][ C0] net_ratelimit: 46636 callbacks suppressed Jan 1 00:03:38 syzkaller kern.warn kernel: [ 221.809139][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) Jan 1 00:03:38 syzkaller kern.warn kernel: [ 221.809433][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) Jan 1 00:03:38 syzkaller kern.warn kernel: [ 221.815623][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) Jan 1 00:03:38 syzkaller kern.warn kernel: [ 221.827136][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) Jan 1 00:03:38 syzkaller kern.warn kernel: [ 221.842209][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) Jan 1 00:03:38 syzkaller kern.warn kernel: [ 221.850921][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:03:38 syzkaller kern.warn kernel: [ 221.863496][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) Jan 1 00:03:38 syzkaller kern.warn kernel: [ 221.874856][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) Jan 1 00:03:38 syzkaller kern.warn kernel: [ 221.886801][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) Jan 1 00:03:38 syzkaller kern.warn kernel: [ 221.898740][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) Jan 1 00:03:37 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device[ 238.092943][ C1] net_ratelimit: 51948 callbacks suppressed [ 238.092961][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 238.093246][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) [ 238.098993][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 238.110930][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) [ 238.122798][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 238.135363][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) [ 238.147005][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 238.158690][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) [ 238.170607][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 238.183017][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) [ 243.520947][ C1] net_ratelimit: 52249 callbacks suppressed [ 243.520963][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 243.521320][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) [ 243.526995][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 243.538917][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) [ 243.550783][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 243.563325][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) [ 243.574987][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 243.586729][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) [ 243.598592][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 243.611066][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) [ 246.631064][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 246.631080][ T29] audit: type=1400 audit(229.001:201895): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 246.661814][ T29] audit: type=1400 audit(229.029:201896): avc: denied { read } for pid=3006 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 246.685739][ T29] audit: type=1400 audit(229.176:201897): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 246.710583][ T29] audit: type=1400 audit(229.195:201898): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 246.735447][ T29] audit: type=1400 audit(229.195:201899): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 246.760194][ T29] audit: type=1400 audit(229.195:201900): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 246.784989][ T29] audit: type=1400 audit(229.195:201901): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 246.809702][ T29] audit: type=1400 audit(229.195:201902): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 246.834428][ T29] audit: type=1400 audit(229.195:201903): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 246.859122][ T29] audit: type=1400 audit(229.204:201904): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 248.948867][ C1] net_ratelimit: 50724 callbacks suppressed [ 248.948885][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 248.948896][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) [ 248.949067][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) [ 248.955113][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 248.967324][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) [ 248.978777][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 248.990777][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) [ 249.002534][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 249.015060][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) [ 249.026498][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) Jan 1 00:03:38 syzkaller kern.warn kernel: [ 222.691090][ T29] kauditd_printk_skb: 1552 callbacks suppressed Jan 1 00:03:54 syzkaller kern.notice kernel: [ 222.691104][ T29] audit: type=1400 audit(218.026:201884): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_f Jan 1 00:03:54 syzkaller kern.notice kernel: [ 222.728138][ T29] audit: type=1400 audit(218.026:201885): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_f Jan 1 00:03:54 syzkaller kern.notice kernel: [ 222.753731][ T29] audit: type=1400 audit(218.036:201886): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_f Jan 1 00:03:54 syzkaller kern.notice kernel: [ 222.779402][ T29] audit: type=1400 audit(218.036:201887): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_f Jan 1 00:03:54 syzkaller kern.notice kernel: [ 222.804993][ T29] audit: type=1400 audit(218.036:201888): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_f Jan 1 00:03:54 syzkaller kern.notice kernel: [ 222.829324][ T29] audit: type=1400 audit(218.036:201889): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_f Jan 1 00:03:54 syzkaller kern.notice kernel: [ 222.853578][ T29] audit: type=1400 audit(218.036:201890): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_f Jan 1 00:03:54 syzkaller kern.notice kernel: [ 222.877895][ T29] audit: type=1400 audit(218.036:201891): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_f Jan 1 00:03:54 syzkaller kern.notice kernel: [ 222.903474][ T29] audit: type=1400 audit(218.036:201892): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_f Jan 1 00:03:54 syzkaller kern.notice kernel: [ 222.927750][ T29] audit: type=1400 audit(218.036:201893): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_f [ 254.376869][ C0] net_ratelimit: 49229 callbacks suppressed [ 254.376887][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) [ 254.376969][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 254.386502][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) [ 254.394934][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 254.406887][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) [ 254.418734][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 254.431345][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) [ 254.442681][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 254.454609][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) [ 254.466543][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 254.614747][ T29] kauditd_printk_skb: 14 callbacks suppressed [ 254.614825][ T29] audit: type=1400 audit(243.732:201919): avc: denied { execmem } for pid=21543 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 259.804740][ C0] net_ratelimit: 49259 callbacks suppressed [ 259.804759][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) [ 259.804828][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 259.811313][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) [ 259.822931][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 259.834681][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) [ 259.846612][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 259.859015][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) [ 259.870390][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 259.882462][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) [ 259.894377][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) Jan 1 00:03:54 syzkaller kern.warn kernel: [ 227.237142][ C1] net_ratelimit: 51156 callbacks suppressed Jan 1 00:04:07 syzkaller kern.warn kernel: [ 227.237160][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 263.145805][ T29] audit: type=1400 audit(254.854:201920): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 263.170104][ T29] audit: type=1400 audit(254.900:201921): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 263.194293][ T29] audit: type=1400 audit(254.928:201922): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 265.232694][ C1] net_ratelimit: 51760 callbacks suppressed [ 265.232712][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 265.233070][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) [ 265.238725][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 265.250681][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) [ 265.262564][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 265.275040][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) [ 265.286350][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 265.298399][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) [ 265.310480][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 265.322835][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) Jan 1 00:04:07 syzkaller kern.warn kernel: [ 227.237419][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) Jan 1 00:04:07 syzkaller kern.warn kernel: [ 227.243163][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)[ 270.660699][ C1] net_ratelimit: 51205 callbacks suppressed [ 270.660716][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 270.660841][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) [ 270.666770][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 270.678731][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) [ 270.690582][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 270.703069][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) [ 270.714497][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 270.726436][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) [ 270.738327][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 270.750652][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) Jan 1 00:04:07 syzkaller kern.warn kernel: [ 2[ 271.204373][ T29] audit: type=1400 audit(261.638:201923): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 27.255253][ C0] bridge0: rece[ 271.229355][ T29] audit: type=1400 audit(262.801:201924): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ived packet on veth0_to_bridge w[ 271.253728][ T29] audit: type=1400 audit(262.801:201925): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ith own address as source address (addr:ae:7c:18:97:47:f1, vlan:[ 271.278062][ T29] audit: type=1400 audit(262.810:201926): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 0) Jan 1 00:04:07 syzkaller kern.warn kernel: [ 227.267133][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) Jan 1 00:04:07 syzkaller kern.warn kernel: [ 227.279589][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) Jan 1 00:04:07 syzkaller kern.warn kernel: [ 227.290980][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) Jan 1 00:04:07 syzkaller kern.warn kernel: [ 227.302895][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) Jan 1 00:04:07 syzkaller kern.warn kernel: [ 227.314751][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:04:07 syzkaller kern.warn kernel: [ 227.327322][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) Jan 1 00:04:07 syzkaller kern.warn kernel: [ 232.664997][ C0] net_ratelimit: 52627 callbacks suppressed Jan 1 00:04:15 syzkaller kern.warn kernel: [ 232.665014][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) Jan 1 00:04:15 syzkaller kern.warn kernel: [ 232.665264][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) Jan 1 00:03:49 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:04:22 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:04:22 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:04:22 syzkaller daemon.err dhcpcd[3006]: ps_sendpsmmsg: Connection refused [ 275.601280][ T29] audit: type=1400 audit(262.930:201927): avc: denied { read } for pid=3006 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 275.625260][ T29] audit: type=1400 audit(262.930:201928): avc: denied { read } for pid=3006 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 275.649150][ T29] audit: type=1400 audit(262.958:201929): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 275.673968][ T29] audit: type=1400 audit(262.958:201930): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 275.702209][ T29] audit: type=1400 audit(262.958:201931): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 275.727112][ T29] audit: type=1400 audit(262.958:201932): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:04:15 syzkaller kern.warn kernel: [ 232.671109][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) Jan 1 00:04:27 syzkaller kern.warn kernel: [ 232.683135][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) Jan 1 00:04:27 syzkaller kern.warn kernel: [ 232.695573][ C0] bridge0: received packet on veth0_to_bridge w[ 276.088623][ C1] net_ratelimit: 50121 callbacks suppressed [ 276.088640][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) ith own address [ 276.091823][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) as source addres[ 276.107405][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) s (addr:9e:25:46[ 276.120643][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) :ad:b4:6e, vlan:[ 276.134041][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 276.147836][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) 0)[ 276.172641][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) [ 276.172826][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 276.185251][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) [ 276.196663][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 281.516733][ C1] net_ratelimit: 51090 callbacks suppressed [ 281.516752][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 281.516755][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) [ 281.517160][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) [ 281.522793][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 281.534691][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) [ 281.546611][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 281.558788][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) [ 281.570552][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 281.582868][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) [ 281.594447][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) Jan 1 00:04:27 syzkaller kern.warn kernel: [ 232.706925][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:[ 286.799812][ T29] kauditd_printk_skb: 7 callbacks suppressed aa:aa:1b, vlan:0) Jan 1 00:04:[ 286.799829][ T29] audit: type=1400 audit(267.028:201940): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 27 syzkaller kern.warn kernel: [[ 286.833436][ T29] audit: type=1400 audit(267.213:201941): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 232.718941][ C0] bridge0: received packet on veth0_to_bridg[ 286.860182][ T29] audit: type=1400 audit(267.315:201942): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 e with own address as source add[ 286.884732][ T29] audit: type=1400 audit(267.758:201943): avc: denied { execmem } for pid=21544 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 ress (addr:ae:7c:18:97:47:f1, vlan:0) Jan 1 00[ 286.906597][ T29] audit: type=1400 audit(277.191:201944): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 :04:27 syzkaller kern.warn kernel: [ 232.730821[ 286.932208][ T29] audit: type=1400 audit(277.191:201945): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ][ C1] bridge0: received pack[ 286.955127][ C0] net_ratelimit: 55827 callbacks suppressed et on bridge_sla[ 286.955142][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) ve_0 with own address as source address (addr:aa[ 286.955347][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) :aa:aa:aa:aa:0c, vlan:0) Jan 1[ 286.955348][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) 00:04:27 syzkaller kern.warn ke[ 286.955503][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) rnel: [ 232.743245][ C0] bri[ 286.955617][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) dge0: received packet on veth0_t[ 286.955715][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) o_bridge with own address as sou[ 286.955729][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) rce address (addr:9e:25:46:ad:b4[ 286.955880][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) :6e, vlan:0) Jan 1 00:04:27 sy[ 286.955993][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) zkaller kern.warn kernel: [ 232[ 286.956098][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) .754695][ C1] bridge0: receiv[ 287.113424][ T29] audit: type=1400 audit(277.191:201946): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ed packet on veth0_to_bridge with own address as[ 287.137693][ T29] audit: type=1400 audit(277.191:201947): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)[ 287.163406][ T29] audit: type=1400 audit(277.191:201948): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:04:27 syzkaller kern.warn kernel: [ [ 287.189063][ T29] audit: type=1400 audit(277.191:201949): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 238.092943][ C1] net_ratelimit: 51948 callbacks suppressed Jan 1 00:04:27 syzkaller kern.warn kernel: [ 238.092961][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) Jan 1 00:04:27 syzkaller kern.warn kernel: [ 238.093246][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) Jan 1 00:04:27 syzkaller kern.warn kernel: [ 238.098993][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) Jan 1 00:04:27 syzkaller kern.warn kernel: [ 238.110930][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) Jan 1 00:04:27 syzkaller kern.warn kernel: [ 238.122798][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:04:22 syzkaller daemon.err dhcpcd[3006]: ps_root_recvmsgcb: failed to send message to pid 21522: Connection refused Jan 1 00:04:27 syzkaller kern.warn kernel: [ 238.135363][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) Jan 1 00:04:37 syzkaller kern.warn kernel: [ 238.147005][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) Jan 1 00:04:37 syzkaller kern.warn kernel: [ 238.158690][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) Jan 1 00:04:37 syzkaller kern.warn kernel: [ 238.170607][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) Jan 1 00:04:37 syzkaller kern.warn kernel: [ 238.183017][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) Jan 1 00:04:37 syzkaller kern.warn kernel: [ 243.520947][ C1] net_ratelimit: 52249 callbacks suppressed Jan 1 00:04:37 syzkaller kern.warn kernel: [ 243.520963][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) Jan 1 00:04:37 syzkaller kern.warn kernel: [ 243.521320][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) Jan 1 00:04:37 syzkaller kern.warn kernel: [ 243.526995][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) Jan 1 00:04:37 syzkaller kern.warn kernel: [ 243.538917][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) Jan 1 00:04:37 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:04:38 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:04:38 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:04:38 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:04:38 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:04:38 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:04:38 syzkaller daemon.err dhcpcd[3006]: ps_sendpsmmsg: Connection refused Jan 1 00:04:38 syzkaller daemon.err dhcpcd[3006]: ps_root_recvmsgcb: failed to send message to pid 21524: Connection refused Jan 1 00:04:37 syzkaller kern.warn kernel: [ 243.550783][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:04:38 syzkaller kern.warn kernel: [ 243.563325][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) Jan 1 00:04:38 syzkaller kern.warn kernel: [ 243.574987][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) Jan 1 00:04:38 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:04:38 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:04:38 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:04:38 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:04:38 syzkaller daemon.err dhcpcd[3006]: ps_sendpsmmsg: Connection refused Jan 1 00:04:38 syzkaller daemon.err dhcpcd[3006]: ps_root_recvmsgcb: failed to send message to pid 21527: Connection refused Jan 1 00:04:38 syzkaller kern.warn kernel: [ 243.586729][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) Jan 1 00:04:38 syzkaller kern.warn kernel: [ 243.598592][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) Jan 1 00:04:38 syzkaller kern.warn kernel: [ 243.611066][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) Jan 1 00:04:38 syzkaller kern.warn kernel: [ 246.631064][ T29] kauditd_printk_skb: 1 callbacks suppressed Jan 1 00:04:38 syzkaller kern.notice kernel: [ 246.631080][ T29] audit: type=1400 audit(229.001:201895): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_f Jan 1 00:04:38 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:04:38 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:04:38 syzkaller daemon.err dhcpcd[3006]: ps_sendpsmmsg: Connection refused Jan 1 00:04:38 syzkaller daemon.err dhcpcd[3006]: ps_root_recvmsgcb: failed to send message to pid 21525: Connection refused Jan 1 00:04:38 syzkaller kern.notice kernel: [ 246.661814][ T29] audit: type=1400 audit(229.029:201896): avc: denied { read } for pid=3006 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permiss Jan 1 00:04:38 syzkaller kern.notice kernel: [ 246.685739][ T29] audit: type=1400 audit(229.176:201897): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_f Jan 1 00:04:38 syzkaller kern.notice kernel: [ 246.710583][ T29] audit: type=1400 audit(229.195:201898): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_f Jan 1 00:04:38 syzkaller kern.notice kernel: [ 246.735447][ T29] audit: type=1400 audit(229.195:201899): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_f Jan 1 00:04:38 syzkaller kern.notice kernel: [ 246.760194][ T29] audit: type=1400 audit(229.195:201900): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_f Jan 1 00:04:38 syzkaller kern.notice kernel: [ 246.784989][ T29] audit: type=1400 audit(229.195:201901): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_f Jan 1 00:04:38 syzkaller kern.notice kernel: [ 246.809702][ T29] audit: type=1400 audit(229.195:201902): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_f Jan 1 00:04:38 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:04:39 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:04:39 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:04:39 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:04:39 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:04:39 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:04:39 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:04:39 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:04:39 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:04:39 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:04:39 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:04:38 syzkaller kern.notice kernel: [ 246.834428][ T29] audit: type=1400 audit(229.195:201903): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_f Jan 1 00:04:39 syzkaller kern.notice kernel: [ 246.859122][ T29] audit: type=1400 audit(229.204:201904): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_f Jan 1 00:04:39 syzkaller kern.warn kernel: [ 248.948867][ C1] net_ratelimit: 50724 callbacks suppressed Jan 1 00:04:39 syzkaller kern.warn kernel: [ 248.948885][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:04:39 syzkaller kern.warn kernel: [ 248.948896][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) Jan 1 00:04:39 syzkaller kern.warn kernel: [ 248.949067][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) Jan 1 00:04:39 syzkaller kern.warn kernel: [ 248.955113][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) Jan 1 00:04:39 syzkaller kern.warn kernel: [ 248.967324][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) Jan 1 00:04:39 syzkaller kern.warn kernel: [ 248.978777][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) Jan 1 00:04:39 syzkaller kern.warn kernel: [ 248.990777][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) Jan 1 00:04:39 syzkaller kern.warn kernel: [ 249.002534][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:04:39 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:04:39 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:04:39 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:04:39 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:04:39 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:04:39 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:04:39 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:04:39 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:04:39 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:04:39 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:04:39 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:04:39 syzkaller keJan 1 00:04:39 Jan 1 00:04:39 Jan 1 00:04:39 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:04:39 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:04Jan 1 00:04:39 Jan 1 00:04:39 Jan 1 00:04:39 Jan 1 00:04:39 Jan 1 00:04:39 Jan 1 00:04:39 Jan 1 00:04:39 syzkaller daemonJan 1 00:04:39 syzkaller kern.notice kernel: [ 275.601280][ T29] audit: type=1400 audit(262.930:201927): avc: denied { read } for pid=3006 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permiss Jan 1 00:04:39 syzkaller kern.notice kernel: [ 275.625260][ T29] audit: type=1400 audit(262.930:201928): avc: denied { read } for pid=3006 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permiss Jan 1 00:04:39 syzkalleJan 1 00:04:39 Jan 1 00:04:39 syzkaller kern.warn kernel: [ 276.107405][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) Jan 1 00:04:39 syzkaller kern.warn kernel: [ 276.120643][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) Jan 1 00:04:39 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:04:39 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:04:39 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:04:39 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:04:39 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:04:3Jan 1 00:04:39 syzkaller kern.warn kernel: [ 276.134041][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:04:39 syzkaller kern.warn kernel: [ 276.147836][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) Jan 1 00:04:39 syzkaller kern.warn kernel: [ 276.172641][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) Jan 1 00:04:39 syzkaller kern.warn kernel: [ 276.172826][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) Jan 1 00:04:39 syzkaller kern.warn kernel: [ 276.185251][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) Jan 1 00:04:39 syzkaller kern.warn kernel: [ 276.196663][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) Jan 1 00:04:39 syzkaller kern.warn kernel: [ 281.516733][ C1] net_ratelimit: 51090 callbacks suppressed Jan 1 00:04:39 syzkaller kern.warn kernel: [ 281.516752][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) Jan 1 00:04:39 syzkaller kern.warn kernel: [ 281.516755][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) Jan 1 00:04:39 syzkaller kern.warn kernel: [ 281.517160][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) Jan 1 00:04:39 syzkaller kern.warn kernel: [ 281.522793][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 292.340003][ T29] kauditd_printk_skb: 698 callbacks suppressed [ 292.340021][ T29] audit: type=1400 audit(277.726:201955): avc: denied { read } for pid=3006 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 292.369372][ T29] audit: type=1400 audit(277.901:201956): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 292.391015][ C1] net_ratelimit: 53857 callbacks suppressed [ 292.391038][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 292.391158][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) [ 292.391160][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 292.391351][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) [ 292.391394][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 292.391628][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 292.391714][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) [ 292.391788][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 292.391875][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 292.391994][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 292.548802][ T29] audit: type=1400 audit(277.901:201957): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 292.573130][ T29] audit: type=1400 audit(277.901:201958): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 292.597357][ T29] audit: type=1400 audit(277.901:201959): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 292.621801][ T29] audit: type=1400 audit(277.901:201960): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 292.646092][ T29] audit: type=1400 audit(277.901:201961): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 292.670376][ T29] audit: type=1400 audit(277.901:201962): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 292.694568][ T29] audit: type=1400 audit(277.901:201963): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 292.718784][ T29] audit: type=1400 audit(277.901:201964): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:04:39 syzkaller kern.warn kernel: [ 281.534691][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) Jan 1 00:04:43 syzkaller kern.warn kernel: [ 281.546611][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:04:43 syzkaller kern.warn kernel: [ 281.558788][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) Jan 1 00:04:43 syzkaller kern.warn kernel: [ 281.570552][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) Jan 1 00:04:43 syzkaller kern.warn kernel: [ 281.582868][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) Jan 1 00:04:43 syzkaller kern.warn kernel: [ 281.594447][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) Jan 1 00:04:43 syzkaller kern.warn kernel: [ 286.799812][ T29] kauditd_printk_skb: 7 callbacks suppressed Jan 1 00:04:43 syzkaller kern.notice kernel: [ 286.799829][ T29] audit: type=1400 audit(267.028:201940): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_f Jan 1 00:04:43 syzkaller kern.notice kernel: [ 286.833436][ T29] audit: type=1400 audit(267.213:201941): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_f Jan 1 00:04:43 syzkaller kern.notice kernel: [ 286.860182][ T29] audit: type=1400 audit(267.315:201942): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_f Jan 1 00:04:43 syzkaller kern.notice kernel: [ 286.884732][ T29] audit: type=1400 audit(267.758:201943): avc: denied { execmem } for pid=21544 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 Jan 1 00:04:43 syzkaller kern.notice kernel: [ 286.906597][ T29] audit: type=1400 audit(277.191:201944): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_f Jan 1 00:04:43 syzkaller kern.notice kernel: [ 286.932208][ T29] audit: type=1400 audit(277.191:201945): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_f Jan 1 00:04:43 syzkaller kern.warn kernel: [ 286.955127][ C0] net_ratelimit: 55827 callbacks suppressed Jan 1 00:04:43 syzkaller kern.warn kernel: [ 286.955142][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) Jan 1 00:04:43 syzkaller kern.warn kernel: [ 286.955347][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) Jan 1 00:04:43 syzkaller kern.warn kernel: [ 286.955348][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) Jan 1 00:04:43 syzkaller kern.warn kernel: [ 286.955503][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) Jan 1 00:04:43 syzkaller kern.warn kernel: [ 286.955617][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:04:43 syzkaller kern.warn kernel: [ 286.955715][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) Jan 1 00:04:43 syzkaller kern.warn kernel: [ 286.955729][ C1] bridge0: received packet on bridge_slave_0 with own addreJan 1 00:04:43 Jan 1 00:04:39 syzkaller daemonJan 1 00:04:43 Jan 1 00:04:43 Jan 1 00:04:43 syzkaller kern.warn kernel: [ 286.955993][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:04:43 syzkaller kern.warn kernel: [ 286.956098][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) Jan 1 00:04:43 syzkaller kern.notice kernel: [ 287.113424][ T29] audit: type=1400 audit(277.191:201946): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_f Jan 1 00:04:43 syzkaller kern.notice kernel: [ 287.137693][ T29] audit: type=1400 audit(277.191:201947): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_Jan 1 00:04:43 syzkaller kern.warn kernel: [ 292.391158][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) Jan 1 00:04:43 syzkaller kern.warn kernel: [ 292.391160][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:04:43 syzkaller kern.warn kernel: [ 292.391351][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) Jan 1 00:04:43 syzkaller kern.warn kernel: [ 292.391394][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:04:43 syzkaller kern.warn kernel: [ 292.391628][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) Jan 1 00:04:43 syzkaller kern.warn kernel: [ 292.391714][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) Jan 1 00:04:43 syzkaller kern.warn kernel: [ 292.391788][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) Jan 1 00:04:43 syzkaller kern.warn kernel: [ 292.391875][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:04:43 syzkaller kern.warn kernel: [ 292.391994][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) Jan 1 00:04:43 syzkaller kern.noJan 1 00:04:43 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:04:43 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:04:43 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:04:43 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:04:43 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:04:43 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:04:43 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:04:43 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:04:43 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:04:4Jan 1 00:04:43 syzkaller kern.notice kernel: [ 292.597357][ T29] audit: type=1400 audit(277.901:201959): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:sysloJan 1 00:04:43 Jan 1 00:04:43 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:04:43 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:04:43 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:04:43 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:04:43 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:04:43 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:04:43 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:04:43 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:04:43 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:04:43 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:04:43 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:04:43 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:04:43 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:04:43 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:04:43 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:04:43 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:04:43 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:04:43 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:04:43 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:04:43 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:04:43 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:04:43 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:04:43 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device [ 297.811273][ C0] net_ratelimit: 56981 callbacks suppressed [ 297.811290][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) [ 297.811345][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 297.817553][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) [ 297.829289][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 297.841203][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) [ 297.853092][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 297.865319][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) [ 297.877023][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 297.889203][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) [ 297.900867][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) Jan 1 00:04:43 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:04:43 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:04:43 syzkaller daemon[ 300.084050][ T29] kauditd_printk_skb: 218 callbacks suppressed .err dhcpcd[3006]: libudev: rece[ 300.084064][ T29] audit: type=1400 audit(289.180:202183): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ived NULL device[ 300.117930][ T29] audit: type=1400 audit(289.300:202184): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 300.142227][ T29] audit: type=1400 audit(289.467:202185): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:04:43 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:04:43 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:04:43 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:04:43 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:04:43 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:04:43 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:04:43 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:04:43 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:04:49 syzkaller kern.warn kernel: [ 297.811273][ C0] net_ratelimit: 56981 callbacks suppressed Jan 1 00:04:49 syzkaller kern.warn kernel: [ 297.811290][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) [ 303.239229][ C0] net_ratelimit: 58975 callbacks suppressed [ 303.239244][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) [ 303.239334][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 303.245561][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) [ 303.257247][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 303.269245][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) [ 303.281084][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 303.293200][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) [ 303.304864][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 303.317144][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) [ 303.328860][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 308.667221][ C1] net_ratelimit: 58097 callbacks suppressed [ 308.667238][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 308.667401][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) [ 308.673367][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 308.685579][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) [ 308.697099][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 308.709056][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) [ 308.720977][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 308.733110][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) [ 308.744751][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 308.757278][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) [ 314.095151][ C1] net_ratelimit: 53702 callbacks suppressed [ 314.095168][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 314.095248][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) [ 314.101201][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 314.113298][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) [ 314.124995][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 314.137435][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) [ 314.148924][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 314.160845][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) [ 314.172773][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 314.184858][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) [ 316.988657][ T29] audit: type=1400 audit(289.596:202186): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 317.013078][ T29] audit: type=1400 audit(289.596:202187): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 317.037253][ T29] audit: type=1400 audit(289.596:202188): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 317.061592][ T29] audit: type=1400 audit(289.596:202189): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 317.085867][ T29] audit: type=1400 audit(289.596:202190): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 317.110166][ T29] audit: type=1400 audit(289.596:202191): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 317.134492][ T29] audit: type=1400 audit(289.596:202192): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 317.158906][ T29] audit: type=1400 audit(289.596:202193): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 317.183407][ T29] audit: type=1400 audit(289.596:202194): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 317.207737][ T29] audit: type=1400 audit(289.596:202195): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 319.523080][ C1] net_ratelimit: 50507 callbacks suppressed [ 319.523099][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 319.523160][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) [ 319.529163][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 319.541180][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) [ 319.552963][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 319.565245][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) [ 319.576911][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 319.588791][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) [ 319.600714][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 319.613182][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) [ 324.951117][ C1] net_ratelimit: 53534 callbacks suppressed [ 324.951134][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 324.951258][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) [ 324.957173][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 324.969094][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) [ 324.980955][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 324.993204][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) [ 325.004902][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 325.016745][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) [ 325.028739][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 325.041075][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) [ 325.345366][ T29] audit: type=1400 audit(312.671:202196): avc: denied { execmem } for pid=21550 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 Jan 1 00:04:49 syzkaller kern.warn kernel: [ 297.811345][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 325.615798][ T29] audit: type=1400 audit(312.874:202197): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 325.640594][ T29] audit: type=1400 audit(313.003:202198): avc: denied { execmem } for pid=21551 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 Jan 1 00:05:05 syzkaller kern.warn kernel: [ 297.817553][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0)[ 329.470133][ T29] audit: type=1400 audit(313.086:202199): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:05:05 syzkaller kern.warn kernel: [ 297.829289][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) Jan 1 00:05:05 syzkaller kern.warn kernel: [ 297.841203][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) Jan 1 00:05:05 syzkaller kern.warn kernel: [ 297.853092][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:05:05 syzkaller kern.warn kernel: [ 297.865319][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) Jan 1 00:05:05 syzkaller kern.warn kernel: [ 297.877023][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) Jan 1 00:05:05 syzkaller kern.warn kernel: [ 297.889203][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) Jan 1 00:05:05 syzkaller kern.warn kernel: [ 297.900867][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) Jan 1 00:05:05 syzkaller kern.warn kernel: [ 300.084050][ T29] kauditd_printk_skb: 218 callbacks suppressed Jan 1 00:05:05 syzkaller kern.notice kernel: [ 300.084064][ T29] audit: type=1400 audit(289.180:202183): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_f Jan 1 00:05:05 syzkaller kern.notice kernel: [ 300.117930][ T29] audit: type=1400 audit(289.300:202184): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_f [ 330.378974][ C1] net_ratelimit: 48520 callbacks suppressed [ 330.378991][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 330.379165][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) [ 330.385017][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 330.396963][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) [ 330.408841][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 330.421119][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) [ 330.432787][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 330.444652][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) [ 330.456637][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 330.468972][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) [ 330.683593][ T29] audit: type=1400 audit(317.175:202200): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 330.707886][ T29] audit: type=1400 audit(317.175:202201): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 330.732265][ T29] audit: type=1400 audit(317.175:202202): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 330.756681][ T29] audit: type=1400 audit(317.175:202203): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 330.780927][ T29] audit: type=1400 audit(317.175:202204): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 330.805292][ T29] audit: type=1400 audit(317.175:202205): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 330.829780][ T29] audit: type=1400 audit(317.175:202206): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 330.854243][ T29] audit: type=1400 audit(317.175:202207): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 330.878554][ T29] audit: type=1400 audit(317.175:202208): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 330.902900][ T29] audit: type=1400 audit(317.175:202209): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:05:13 syzkaller kern.notice kernel: [ [ 332.076280][ T29] audit: type=1400 audit(318.993:202210): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 300.142227][ T29] audit: type=1400 audit(289.[ 332.101789][ T29] audit: type=1400 audit(318.993:202211): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 467:202185): avc: denied { read } for pid=295[ 332.127429][ T29] audit: type=1400 audit(318.993:202212): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 0 comm="syslogd" name="log" dev=[ 332.153046][ T29] audit: type=1400 audit(318.993:202213): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 "sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_f Jan 1 00:05:17 syzkaller kern.warn kernel: [ 303.239229][ C0] net_ratelimit: 58975 callbacks suppressed Jan 1 00:05:17 syzkaller kern.warn kernel: [ 303.239244][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) Jan 1 00:05:17 syzkaller kern.warn kernel: [ 303.239334][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) Jan 1 00:05:17 syzkaller kern.warn kernel: [ 303.245561][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) Jan 1 00:05:17 syzkaller kern.warn kernel: [ 303.257247][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:05:17 syzkaller kern.warn kernel: [ 303.269245][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) Jan 1 00:05:17 syzkaller kern.warn kernel: [ 303.281084][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) Jan 1 00:05:17 syzkaller kern.warn kernel: [ 303.293200][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) Jan 1 00:05:17 syzkaller kern.warn kernel: [ 303.304864][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:05:17 syzkaller kern.warn kernel: [ 303.317144][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) [ 335.806964][ C1] net_ratelimit: 53294 callbacks suppressed [ 335.806982][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 335.807142][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) [ 335.813198][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 335.824909][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) [ 335.836903][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 335.849190][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) [ 335.860721][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 335.872708][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) [ 335.884583][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 335.896722][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) [ 341.234828][ C1] net_ratelimit: 55474 callbacks suppressed [ 341.234846][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 341.234850][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) [ 341.240872][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 341.253245][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) [ 341.264745][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 341.276651][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) [ 341.288503][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 341.300761][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) [ 341.312457][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 341.324308][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) [ 346.662772][ C1] net_ratelimit: 56897 callbacks suppressed [ 346.662788][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 346.662854][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) [ 346.668830][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 346.681243][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) [ 346.692615][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 346.704637][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) [ 346.716543][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 346.728658][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) [ 346.740410][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 346.752269][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) [ 352.090747][ C1] net_ratelimit: 56715 callbacks suppressed [ 352.090763][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 352.090937][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) [ 352.096898][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 352.108767][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) [ 352.120831][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 352.132788][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) [ 352.144490][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 352.156353][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) [ 352.168270][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 352.180734][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) Jan 1 00:04:43 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:05:18 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:05:18 syzkaller da[ 357.353225][ T29] kauditd_printk_skb: 18 callbacks suppressed emon.err dhcpcd[3006]: libudev: received NULL de[ 357.353240][ T29] audit: type=1400 audit(342.318:202232): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 vice Jan 1 00:05:18 syzkaller daemon.err dhcpc[ 357.388098][ T29] audit: type=1400 audit(342.318:202233): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 d[3006]: libudev: received NULL device Jan 1 0[ 357.413695][ T29] audit: type=1400 audit(342.318:202234): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 0:05:18 syzkaller daemon.err dhcpcd[3006]: libud[ 357.439414][ T29] audit: type=1400 audit(342.318:202235): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ev: received NULL device Jan 1[ 357.464942][ T29] audit: type=1400 audit(342.318:202236): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 00:05:18 syzkaller daemon.err dhcpcd[3006]: lib[ 357.489418][ T29] audit: type=1400 audit(342.318:202237): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 udev: received NULL device Jan 1 00:05:18 syzk[ 357.515061][ T29] audit: type=1400 audit(342.318:202238): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 aller daemon.err dhcpcd[3006]: libudev: received[ 357.538146][ C0] net_ratelimit: 56626 callbacks suppressed NULL device Ja[ 357.538161][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) n 1 00:05:18 syzkaller daemon.err dhcpcd[3006]:[ 357.538239][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) libudev: received NULL device Jan 1 00:05:18 [ 357.538358][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) syzkaller daemon.err dhcpcd[3006]: libudev: rece[ 357.538422][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) ived NULL device Jan 1 00:05:1[ 357.538519][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) 8 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:05[ 357.538641][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) :18 syzkaller daemon.err dhcpcd[3006]: libudev: [ 357.538715][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) received NULL device [ 357.538753][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 357.538833][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) [ 357.538893][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 357.706078][ T29] audit: type=1400 audit(342.318:202239): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 357.730603][ T29] audit: type=1400 audit(342.318:202240): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 357.755027][ T29] audit: type=1400 audit(342.318:202241): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 362.957524][ C1] net_ratelimit: 56825 callbacks suppressed [ 362.957542][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 362.957612][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) [ 362.963539][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 362.975533][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) [ 362.987431][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 362.999953][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) [ 363.011474][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 363.023359][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) [ 363.035369][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 363.047356][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) [ 368.385410][ C1] net_ratelimit: 56717 callbacks suppressed [ 368.385428][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 368.385431][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) [ 368.391484][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 368.403409][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) [ 368.415318][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 368.427607][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) [ 368.439095][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 368.451143][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) [ 368.463123][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 368.475477][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) [ 373.813397][ C1] net_ratelimit: 56353 callbacks suppressed [ 373.813415][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 373.813455][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) [ 373.819415][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 373.831689][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) [ 373.843387][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 373.855248][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) [ 373.867189][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 373.879615][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) [ 373.891077][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 373.903135][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) [ 379.241301][ C0] net_ratelimit: 56413 callbacks suppressed [ 379.241321][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) [ 379.241360][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 379.247429][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) [ 379.259321][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 379.271585][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) [ 379.283352][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 379.295154][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) [ 379.307344][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 379.319536][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) [ 379.331226][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 384.669321][ C1] net_ratelimit: 56546 callbacks suppressed [ 384.669339][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 384.669781][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) [ 384.675330][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 384.687678][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) [ 384.699352][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 384.711643][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) [ 384.723208][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 384.735240][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) [ 384.747169][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 384.759839][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) [ 390.097189][ C1] net_ratelimit: 56347 callbacks suppressed [ 390.097207][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 390.097470][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) [ 390.103194][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 390.115258][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) [ 390.127182][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 390.139252][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) [ 390.150976][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 390.162927][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) [ 390.174834][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 390.187359][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) Jan 1 00:05:17 syzkaller kern.warn kernel: [ 303.328860][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 390.745140][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 390.745156][ T29] audit: type=1400 audit(373.081:202243): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:05:43 syzkaller kern.warn kernel: [ 308.667221][ C1] net_ratelimit: 58097 callbacks suppressed [ 392.193376][ T29] audit: type=1400 audit(373.266:202244): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 392.218180][ T29] audit: type=1400 audit(374.383:202245): avc: denied { read } for pid=3006 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 392.242018][ T29] audit: type=1400 audit(374.383:202246): avc: denied { read } for pid=3006 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 Jan 1 00:05:43 syzkaller kern.warn kernel: [ 308.667238][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:05:43 syzkaller kern.warn kernel: [ 308.667401][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) Jan 1 00:05:43 syzkaller kern.warn kernel: [ 308.673367][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)[ 395.525214][ C0] net_ratelimit: 56155 callbacks suppressed [ 395.525232][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) [ 395.525306][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 395.531262][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) [ 395.543313][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 395.555567][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) [ 395.567243][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 395.579088][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) [ 395.590912][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 395.603006][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) [ 395.614677][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:05:43 syzkaller kern.warn kernel: [ 308.685579][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) Jan 1 00:05:43 syzkaller kern.warn kernel: [ 308.697099][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:05:43 syzkaller kern.warn kernel: [ 308.709056][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) Jan 1 00:05:43 syzkaller kern.warn kernel: [ 308.720977][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) Jan 1 00:05:43 syzkaller kern.warn kernel: [ 308.733110][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) Jan 1 00:05:43 syzkaller kern.warn kernel: [ 308.744751][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:05:18 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:06:14 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device [ 399.750644][ C0] ================================================================== [ 399.758749][ C0] BUG: KCSAN: data-race in br_fdb_update / br_fdb_update [ 399.765787][ C0] [ 399.768114][ C0] write to 0xffff88810700edc0 of 8 bytes by interrupt on cpu 1: [ 399.775745][ C0] br_fdb_update+0x142/0x480 [ 399.780367][ C0] br_handle_frame_finish+0x32e/0xe70 [ 399.785754][ C0] br_nf_hook_thresh+0x1e5/0x220 [ 399.790708][ C0] br_nf_pre_routing_finish_ipv6+0x575/0x5a0 [ 399.796697][ C0] br_nf_pre_routing_ipv6+0x1f6/0x2a0 [ 399.802077][ C0] br_nf_pre_routing+0x517/0xbc0 [ 399.807022][ C0] br_handle_frame+0x4dd/0x9a0 [ 399.811805][ C0] __netif_receive_skb_core+0xb00/0x2310 [ 399.817454][ C0] __netif_receive_skb+0x5a/0x280 [ 399.822509][ C0] process_backlog+0x22e/0x440 [ 399.827271][ C0] __napi_poll+0x63/0x3c0 [ 399.831609][ C0] net_rx_action+0x3a1/0x7f0 [ 399.836202][ C0] handle_softirqs+0xbf/0x280 [ 399.840885][ C0] run_ksoftirqd+0x1c/0x30 [ 399.845305][ C0] smpboot_thread_fn+0x31c/0x4c0 [ 399.850249][ C0] kthread+0x1d1/0x210 [ 399.854328][ C0] ret_from_fork+0x4b/0x60 [ 399.858750][ C0] ret_from_fork_asm+0x1a/0x30 [ 399.863532][ C0] [ 399.865850][ C0] read to 0xffff88810700edc0 of 8 bytes by interrupt on cpu 0: [ 399.873392][ C0] br_fdb_update+0x10e/0x480 [ 399.877991][ C0] br_handle_frame_finish+0x32e/0xe70 [ 399.883374][ C0] br_handle_frame+0x5a0/0x9a0 [ 399.888151][ C0] __netif_receive_skb_core+0xb00/0x2310 [ 399.893806][ C0] __netif_receive_skb+0x5a/0x280 [ 399.898844][ C0] process_backlog+0x22e/0x440 [ 399.903611][ C0] __napi_poll+0x63/0x3c0 [ 399.907955][ C0] net_rx_action+0x3a1/0x7f0 [ 399.912549][ C0] handle_softirqs+0xbf/0x280 [ 399.917227][ C0] do_softirq+0x5e/0x90 [ 399.921387][ C0] __local_bh_enable_ip+0x6e/0x70 [ 399.926509][ C0] _raw_spin_unlock_bh+0x36/0x40 [ 399.931463][ C0] batadv_tt_purge+0x2e8/0x630 [ 399.936228][ C0] process_scheduled_works+0x483/0x9a0 [ 399.941708][ C0] worker_thread+0x51d/0x6f0 [ 399.946298][ C0] kthread+0x1d1/0x210 [ 399.950373][ C0] ret_from_fork+0x4b/0x60 [ 399.954801][ C0] ret_from_fork_asm+0x1a/0x30 [ 399.959572][ C0] [ 399.961888][ C0] value changed: 0x0000000100001fa3 -> 0x0000000100001fa4 [ 399.968991][ C0] [ 399.971309][ C0] Reported by Kernel Concurrency Sanitizer on: [ 399.977464][ C0] CPU: 0 UID: 0 PID: 11 Comm: kworker/u8:0 Not tainted 6.12.0-rc2-syzkaller-00307-g36c254515dc6 #0 [ 399.988141][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 399.998195][ C0] Workqueue: bat_events batadv_tt_purge [ 400.003753][ C0] ================================================================== [ 400.953115][ C1] net_ratelimit: 55982 callbacks suppressed [ 400.953130][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 400.953527][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) [ 400.959161][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 400.971123][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) [ 400.982967][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 400.995206][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) [ 401.006907][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 401.018806][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) [ 401.030752][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 401.043103][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) Jan 1 00:06:14 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:06:26 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device[ 405.874843][ T29] audit: type=1400 audit(374.595:202247): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 405.899693][ T29] audit: type=1400 audit(374.687:202248): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 405.924804][ T29] audit: type=1400 audit(374.881:202249): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 405.949579][ T29] audit: type=1400 audit(377.724:202250): avc: denied { execmem } for pid=21553 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 405.971822][ T29] audit: type=1400 audit(380.022:202251): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 405.996715][ T29] audit: type=1400 audit(380.151:202252): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 406.021609][ T29] audit: type=1400 audit(380.244:202253): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 406.046541][ T29] audit: type=1400 audit(380.262:202254): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 406.071385][ T29] audit: type=1400 audit(380.262:202255): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 406.096349][ T29] audit: type=1400 audit(380.262:202256): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Jan 1 00:06:26 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:06:26 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device [ 406.381191][ C1] net_ratelimit: 52484 callbacks suppressed [ 406.381208][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 406.382929][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) [ 406.387322][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 406.399198][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) [ 406.411271][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 406.423218][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) [ 406.434978][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 406.446818][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) [ 406.458735][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 406.471220][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) Jan 1 00:05:43 syzkaller kern.warn kernel: [ 308.757278][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) Jan 1 00:06:26 syzkaller kern.warn kernel: [ 314.095151][ C1] net_ratelimit: 53702 callbacks suppressed Jan 1 00:06:26 syzkaller kern.warn kernel: [ 314.095168][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:06:26 syzkaller kern.warn kernel: [ 314.095248][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) Jan 1 00:06:26 syzkaller kern.warn kernel: [ 314.101201][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) Jan 1 00:06:26 syzkaller kern.warn kernel: [ 314.113298][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) Jan 1 00:06:26 syzkaller kern.warn kernel: [ 314.124995][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) Jan 1 00:06:26 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:06:26 syzkaller daemon.err dhcpcd[3006]: libudev: received NULL device Jan 1 00:06:26 syzkaller kern.warn kernel: [ 314.137435][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:25:46:ad:b4:6e, vlan:0) Jan 1 00:06:28 syzkaller kern.warn kernel: [ 314.148924][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) Jan 1 00:06:28 syzkaller kern.warn kernel: [ 314.160845][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) Jan 1 00:06:28 syzkaller kern.warn kernel: [ 314.172773][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) Jan 1 00:06:28 syzkaller kern.warn kernel: [ 314.184858][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:7c:18:97:47:f1, vlan:0) Jan 1 00:06:28 syzkaller kern.notice kernel: [ 316.988657][ T29] audit: type=1400 audit(289.596:202186): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_f Jan 1 00:06:28 syzkaller kern.notice kernel: [ 317.013078][ T29] audit: type=1400 audit(289.596:202187): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_f Jan 1 00:06:28 syzkaller kern.notice kernel: [ 317.037253][ T29] audit: type=1400 audit(289.596:202188): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_f Jan 1 00:06:28 syzkaller kern.notice kernel: [ 317.061592][ T29] audit: type=1400 audit(289.596:202189): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_f