last executing test programs: 4m34.107247697s ago: executing program 2 (id=12204): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./bus\x00', 0x101042, 0x0) mount_setattr(0xffffffffffffffff, 0x0, 0x100, &(0x7f0000000400)={0x300094, 0x78, 0x20000, {r0}}, 0x20) 4m33.059690319s ago: executing program 2 (id=12213): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x5, 0x41, 0x40, 0x44, 0x41, 0xffffffffffffffff, 0x2000000, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000b80)={r0, &(0x7f0000000a80), 0x0}, 0x20) 4m32.724170432s ago: executing program 2 (id=12220): r0 = openat(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/cgroup.procs\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000080)=""/242, 0xf2}], 0x1, 0x2, 0x2) 4m32.169341278s ago: executing program 2 (id=12225): r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='attr/prev\x00') write$P9_RVERSION(r0, 0x0, 0x0) 4m32.053425019s ago: executing program 2 (id=12230): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000900)=ANY=[@ANYBLOB="440000001000090600"/20, @ANYRES32=0x0, @ANYBLOB="adffa888000000001c00128009000100626f6e64000000000c000280050001000600000008000a0079"], 0x44}}, 0x0) 4m31.229579638s ago: executing program 2 (id=12239): perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc97c, 0x0, @perf_bp={0x0, 0x764922f6ef795283}, 0x8, 0x0, 0x409, 0x4, 0x0, 0x40, 0xfffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fsmount(0xffffffffffffffff, 0x0, 0x0) 4m16.768224583s ago: executing program 32 (id=12239): perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc97c, 0x0, @perf_bp={0x0, 0x764922f6ef795283}, 0x8, 0x0, 0x409, 0x4, 0x0, 0x40, 0xfffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fsmount(0xffffffffffffffff, 0x0, 0x0) 3m23.695323381s ago: executing program 4 (id=12553): mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='nfs4\x00', 0x0, &(0x7f00000001c0)='\x01') 3m16.180459611s ago: executing program 4 (id=12557): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="24000000240035b90000000000000000070000000600040000ef0000060003"], 0x24}}, 0x0) 3m2.717965655s ago: executing program 4 (id=12563): openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/notes', 0x0, 0x122) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') 2m40.710628801s ago: executing program 1 (id=12570): r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'veth1_vlan\x00', &(0x7f0000000080)=@ethtool_gstrings={0x19, 0x6}}) 2m37.776089972s ago: executing program 3 (id=12571): r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000540), 0x2, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0x541b, 0x0) 2m36.682039274s ago: executing program 4 (id=12572): r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x7, 0x0, &(0x7f0000000040)) 2m34.818204413s ago: executing program 3 (id=12573): r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_buf(r0, 0x0, 0x11, &(0x7f0000000540)="17000000020001004003be8c5e687a8a6a003200020100ecff3f00000003a96c6b06169da9c0f8d94d5bbb6a880a00243c5197b29f9368bdd6c8db933e7a2fdfff0a175e0000dba67e06000000e289c46f8ab8b4028a7a63c900000200df0180000003000000000000000080c457681f009cee4a0a003dff010000b7315033bf79ac2df5bc080236e2b68c8eec25a02aff06011500000000010000000affff02dfcc580000000000", 0xa8) 2m25.679192701s ago: executing program 1 (id=12575): r0 = socket$inet(0x2, 0x2, 0x1) setsockopt$inet_opts(r0, 0x0, 0x4, 0x0, 0x0) 2m20.858676373s ago: executing program 1 (id=12577): r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) connect$unix(r0, &(0x7f0000000100)=@abs={0x27}, 0x6e) 2m11.330459715s ago: executing program 1 (id=12579): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_int(r0, 0x29, 0x50, 0x0, &(0x7f0000000100)) 2m9.564924694s ago: executing program 3 (id=12580): prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x0, &(0x7f0000006680)) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffd]}, 0x0, 0x8) 2m6.799575883s ago: executing program 1 (id=12581): creat(&(0x7f0000000040)='./file0\x00', 0x0) openat2$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000480)={0x4100, 0x0, 0x12}, 0x18) 1m58.881793758s ago: executing program 3 (id=12583): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280), 0x400, &(0x7f0000000140)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @val={0x3a, [0x37, 0x38, 0x2d]}}}, 0x4e}]}) 1m57.615466932s ago: executing program 4 (id=12584): r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fallocate(r0, 0x20, 0x400000000000000, 0x2) 1m49.992941983s ago: executing program 1 (id=12586): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000800)=@setneightbl={0x1c, 0x43, 0x1, 0x70bd28, 0x25dfdbfd, {0x2}, [@NDTA_NAME={0x8, 0x1, 'func'}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x4000000) 1m43.144925346s ago: executing program 3 (id=12588): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@bloom_filter={0x1e, 0x0, 0xa, 0x9, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001100)={r0, 0x0, &(0x7f0000001700)=""/53}, 0x20) 1m35.084115683s ago: executing program 3 (id=12590): r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14615, 0x2080}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FWMARK={0x8, 0x14, 0x101}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x89}]}}}]}, 0x40}}, 0x0) 1m31.675851739s ago: executing program 33 (id=12586): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000800)=@setneightbl={0x1c, 0x43, 0x1, 0x70bd28, 0x25dfdbfd, {0x2}, [@NDTA_NAME={0x8, 0x1, 'func'}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x4000000) 1m25.714708753s ago: executing program 4 (id=12593): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000500)=@newlink={0x40, 0x10, 0x437, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4048b}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x6, 0x8, 0x3f}, @IFLA_IPTUN_LOCAL={0x8, 0x2, @private=0xa010100}]}}}]}, 0x40}}, 0x840) 1m15.692308s ago: executing program 34 (id=12590): r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14615, 0x2080}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FWMARK={0x8, 0x14, 0x101}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x89}]}}}]}, 0x40}}, 0x0) 1m7.888503994s ago: executing program 35 (id=12593): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000500)=@newlink={0x40, 0x10, 0x437, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4048b}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_FLAGS={0x6, 0x8, 0x3f}, @IFLA_IPTUN_LOCAL={0x8, 0x2, @private=0xa010100}]}}}]}, 0x40}}, 0x840) 57.399851826s ago: executing program 0 (id=12600): r0 = memfd_create(&(0x7f0000000800)='uid<', 0x4) fstatfs(r0, &(0x7f00000003c0)=""/146) 48.246281384s ago: executing program 0 (id=12601): r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r0, 0x0, 0x8008000000010, &(0x7f0000005e40)="17000000020001000003d68c5ee17688a2003208020300ecff3f0200000300000a000000009afc5ad9485bbb6a880000d6c8db0000dba67e0601800002ef00f10607bdff59100ac45761407a681f009cee4a5acb3da400001fb700674f19b44e09f9315033bf79ac2dff060115003901000000000000ea000000000000000009ffff02dfccebf6ba0008400200000000e90554062a80e605007f71174aa951f3c63e5c83f1ba2112ce68bf17a6e000"/184, 0xb8) 40.559165146s ago: executing program 0 (id=12602): r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x88, 0x80, 0x0, 0x78) 32.305443934s ago: executing program 0 (id=12603): r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x20000007d, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000003640)=""/4092, 0xffc}], 0x1, 0x18, 0x2) 27.378860837s ago: executing program 0 (id=12604): r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x5, &(0x7f0000000000)=0xffff, 0x4) 18.219822985s ago: executing program 0 (id=12605): r0 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000180)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @veth={{0x9}, {0x4, 0x2, 0x0, 0x1, @void}}}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x141}]}, 0x3c}}, 0x0) 0s ago: executing program 36 (id=12605): r0 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000180)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @veth={{0x9}, {0x4, 0x2, 0x0, 0x1, @void}}}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x141}]}, 0x3c}}, 0x0) kernel console output (not intermixed with test programs): C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 700.536752][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 700.548753][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 700.560704][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 701.959158][ T30] audit: type=1400 audit(2000000267.195:452939): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 705.243175][ C1] net_ratelimit: 46108 callbacks suppressed [ 705.243196][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 705.243491][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 705.249228][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 705.261217][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 705.273260][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 705.285263][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 705.297125][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 705.308990][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 705.321168][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 705.332846][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 706.423165][ T30] kauditd_printk_skb: 30 callbacks suppressed [ 706.423184][ T30] audit: type=1400 audit(2000000274.302:452970): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 706.460115][ T30] audit: type=1400 audit(2000000274.302:452971): avc: denied { search } for pid=2982 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 706.486396][ T30] audit: type=1400 audit(2000000274.302:452972): avc: denied { append } for pid=2982 comm="syslogd" name="messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 706.513436][ T30] audit: type=1400 audit(2000000274.302:452973): avc: denied { open } for pid=2982 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 706.540567][ T30] audit: type=1400 audit(2000000274.302:452974): avc: denied { getattr } for pid=2982 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 710.015520][ C0] net_ratelimit: 47925 callbacks suppressed [ 710.015540][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 710.015709][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 710.021579][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 710.033814][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 710.045602][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 710.057828][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 710.069413][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 710.081259][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 710.093243][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 710.105276][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 710.307216][ T30] audit: type=1400 audit(2000000278.490:452975): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 710.333525][ T30] audit: type=1400 audit(2000000278.490:452976): avc: denied { search } for pid=2982 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 710.359350][ T30] audit: type=1400 audit(2000000278.490:452977): avc: denied { append } for pid=2982 comm="syslogd" name="messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 710.385934][ T30] audit: type=1400 audit(2000000278.490:452978): avc: denied { open } for pid=2982 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 710.412565][ T30] audit: type=1400 audit(2000000278.490:452979): avc: denied { getattr } for pid=2982 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 710.831963][ T125] bridge_slave_1: left allmulticast mode [ 710.845762][ T125] bridge_slave_1: left promiscuous mode [ 710.859796][ T125] bridge0: port 2(bridge_slave_1) entered disabled state [ 712.325106][ T30] kauditd_printk_skb: 11 callbacks suppressed [ 712.325127][ T30] audit: type=1400 audit(2000000279.677:452991): avc: denied { sys_module } for pid=29912 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 712.361342][ T30] audit: type=1400 audit(2000000279.677:452992): avc: denied { module_request } for pid=29912 comm="syz-executor" kmod="rose5" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 712.387333][ T30] audit: type=1400 audit(2000000280.286:452993): avc: denied { sys_module } for pid=29926 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 712.413196][ T30] audit: type=1400 audit(2000000280.286:452994): avc: denied { module_request } for pid=29926 comm="syz-executor" kmod="rose9" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 713.182646][ T30] audit: type=1400 audit(2000000281.094:452995): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 713.209138][ T30] audit: type=1400 audit(2000000281.094:452996): avc: denied { search } for pid=2982 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 713.235235][ T30] audit: type=1400 audit(2000000281.094:452997): avc: denied { append } for pid=2982 comm="syslogd" name="messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 713.262734][ T30] audit: type=1400 audit(2000000281.094:452998): avc: denied { open } for pid=2982 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 713.289723][ T30] audit: type=1400 audit(2000000281.094:452999): avc: denied { getattr } for pid=2982 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 714.787840][ C1] net_ratelimit: 45890 callbacks suppressed [ 714.787860][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 714.788048][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 714.793890][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 714.806106][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 714.818017][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 714.830079][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 714.842001][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 714.853819][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 714.866179][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 714.877707][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 715.165077][ T30] audit: type=1400 audit(2000000283.697:453000): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 718.019226][ T30] kauditd_printk_skb: 4 callbacks suppressed [ 718.019247][ T30] audit: type=1400 audit(2000000286.532:453005): avc: denied { execmem } for pid=29955 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 718.363685][ T125] bridge_slave_0: left allmulticast mode [ 718.373641][ T125] bridge_slave_0: left promiscuous mode [ 718.392193][ T125] bridge0: port 1(bridge_slave_0) entered disabled state [ 718.620277][ T30] audit: type=1400 audit(2000000287.214:453006): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 718.651223][ T30] audit: type=1400 audit(2000000287.214:453007): avc: denied { search } for pid=2982 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 718.678453][ T30] audit: type=1400 audit(2000000287.214:453008): avc: denied { append } for pid=2982 comm="syslogd" name="messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 718.705413][ T30] audit: type=1400 audit(2000000287.214:453009): avc: denied { open } for pid=2982 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 718.732682][ T30] audit: type=1400 audit(2000000287.214:453010): avc: denied { getattr } for pid=2982 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 718.760296][ T30] audit: type=1400 audit(2000000287.277:453011): avc: denied { read } for pid=29957 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 718.786156][ T30] audit: type=1400 audit(2000000287.277:453012): avc: denied { open } for pid=29957 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 718.814304][ T30] audit: type=1400 audit(2000000287.277:453013): avc: denied { mounton } for pid=29957 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 719.456955][ T30] audit: type=1400 audit(2000000287.603:453014): avc: denied { module_request } for pid=29957 comm="syz-executor" kmod="netdev-nr6" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 719.560171][ C0] net_ratelimit: 46061 callbacks suppressed [ 719.560191][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 719.560211][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 719.566536][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 719.578339][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 719.590176][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 719.602246][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 719.614218][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 719.625944][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 719.637996][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 719.649881][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 724.332505][ C0] net_ratelimit: 48336 callbacks suppressed [ 724.332526][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 724.332648][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 724.338775][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 724.350605][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 724.362589][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 724.374650][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 724.386471][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 724.398522][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 724.410463][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 724.422730][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 724.499029][ T30] kauditd_printk_skb: 7 callbacks suppressed [ 724.499109][ T30] audit: type=1400 audit(2000000293.482:453022): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 724.536526][ T30] audit: type=1400 audit(2000000293.482:453023): avc: denied { search } for pid=2982 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 724.562412][ T30] audit: type=1400 audit(2000000293.482:453024): avc: denied { append } for pid=2982 comm="syslogd" name="messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 724.589520][ T30] audit: type=1400 audit(2000000293.482:453025): avc: denied { open } for pid=2982 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 724.616622][ T30] audit: type=1400 audit(2000000293.482:453026): avc: denied { getattr } for pid=2982 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 725.043995][ T30] audit: type=1400 audit(2000000294.069:453027): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 725.070952][ T30] audit: type=1400 audit(2000000294.069:453028): avc: denied { search } for pid=2982 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 725.097520][ T30] audit: type=1400 audit(2000000294.069:453029): avc: denied { append } for pid=2982 comm="syslogd" name="messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 725.124549][ T30] audit: type=1400 audit(2000000294.069:453030): avc: denied { open } for pid=2982 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 725.151727][ T30] audit: type=1400 audit(2000000294.069:453031): avc: denied { getattr } for pid=2982 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 729.104918][ C0] net_ratelimit: 45464 callbacks suppressed [ 729.104940][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 729.105038][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 729.111109][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 729.123822][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 729.142037][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 729.154765][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 729.169695][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 729.181821][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 729.194533][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 729.207130][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 729.432969][ T30] kauditd_printk_skb: 7 callbacks suppressed [ 729.432989][ T30] audit: type=1400 audit(2000000298.605:453039): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 729.475420][ T30] audit: type=1400 audit(2000000298.605:453040): avc: denied { search } for pid=2982 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 729.503576][ T30] audit: type=1400 audit(2000000298.605:453041): avc: denied { append } for pid=2982 comm="syslogd" name="messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 729.531152][ T30] audit: type=1400 audit(2000000298.605:453042): avc: denied { open } for pid=2982 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 729.561102][ T30] audit: type=1400 audit(2000000298.605:453043): avc: denied { getattr } for pid=2982 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 733.836076][ T30] audit: type=1400 audit(2000000302.006:453044): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 733.862817][ T30] audit: type=1400 audit(2000000302.006:453045): avc: denied { search } for pid=2982 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 733.877348][ C0] net_ratelimit: 45331 callbacks suppressed [ 733.877370][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 733.891431][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 733.899210][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 733.911762][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 733.926375][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 733.939663][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 733.953210][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 733.966239][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 733.978599][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 733.991278][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 734.041238][ T30] audit: type=1400 audit(2000000302.006:453046): avc: denied { append } for pid=2982 comm="syslogd" name="messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 734.069469][ T30] audit: type=1400 audit(2000000302.006:453047): avc: denied { open } for pid=2982 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 734.100929][ T30] audit: type=1400 audit(2000000302.006:453048): avc: denied { getattr } for pid=2982 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 734.820847][ T30] kauditd_printk_skb: 4 callbacks suppressed [ 734.820867][ T30] audit: type=1400 audit(2000000303.644:453053): avc: denied { module_request } for pid=29966 comm="syz-executor" kmod="netdev-nr7" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 734.853365][ T30] audit: type=1400 audit(2000000304.127:453054): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 734.879632][ T30] audit: type=1400 audit(2000000304.127:453055): avc: denied { search } for pid=2982 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 734.905534][ T30] audit: type=1400 audit(2000000304.127:453056): avc: denied { append } for pid=2982 comm="syslogd" name="messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 734.936220][ T30] audit: type=1400 audit(2000000304.127:453057): avc: denied { open } for pid=2982 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 734.968178][ T30] audit: type=1400 audit(2000000304.127:453058): avc: denied { getattr } for pid=2982 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 736.560747][ T30] audit: type=1400 audit(2000000305.964:453059): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 736.602565][ T30] audit: type=1400 audit(2000000305.964:453060): avc: denied { search } for pid=2982 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 736.641775][ T30] audit: type=1400 audit(2000000305.964:453061): avc: denied { append } for pid=2982 comm="syslogd" name="messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 736.678186][ T30] audit: type=1400 audit(2000000305.964:453062): avc: denied { append open } for pid=2982 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 738.649835][ C0] net_ratelimit: 42558 callbacks suppressed [ 738.649854][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 738.649866][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 738.650004][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 738.656589][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 738.676330][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 738.691437][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 738.708590][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 738.725317][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 738.738199][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 738.752265][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 741.724855][ T30] kauditd_printk_skb: 8 callbacks suppressed [ 741.724908][ T30] audit: type=1400 audit(2000000311.580:453071): avc: denied { execmem } for pid=29969 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 743.421937][ C0] net_ratelimit: 44823 callbacks suppressed [ 743.421954][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 743.422103][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 743.433888][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 743.454594][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 743.475126][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 743.492051][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 743.504519][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 743.518322][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 743.530508][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 743.543171][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 744.354433][ T30] audit: type=1400 audit(2000000311.622:453072): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 744.393549][ T30] audit: type=1400 audit(2000000311.622:453073): avc: denied { search } for pid=2982 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 744.424669][ T30] audit: type=1400 audit(2000000311.622:453074): avc: denied { append } for pid=2982 comm="syslogd" name="messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 744.454371][ T30] audit: type=1400 audit(2000000311.622:453075): avc: denied { open } for pid=2982 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 744.491540][ T30] audit: type=1400 audit(2000000311.622:453076): avc: denied { getattr } for pid=2982 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 746.371359][ T30] audit: type=1400 audit(2000000315.055:453077): avc: denied { read } for pid=29970 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 746.405680][ T30] audit: type=1400 audit(2000000315.055:453078): avc: denied { open } for pid=29970 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 746.440802][ T30] audit: type=1400 audit(2000000315.055:453079): avc: denied { mounton } for pid=29970 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 746.472242][ T30] audit: type=1400 audit(2000000315.149:453080): avc: denied { module_request } for pid=29970 comm="syz-executor" kmod="netdev-nr8" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 746.501949][ T30] audit: type=1400 audit(2000000315.338:453081): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 746.531255][ T30] audit: type=1400 audit(2000000315.338:453082): avc: denied { search } for pid=2982 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 746.562485][ T30] audit: type=1400 audit(2000000315.338:453083): avc: denied { append } for pid=2982 comm="syslogd" name="messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 746.589823][ T30] audit: type=1400 audit(2000000315.338:453084): avc: denied { open } for pid=2982 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 746.616871][ T30] audit: type=1400 audit(2000000315.338:453085): avc: denied { getattr } for pid=2982 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 746.644687][ T30] audit: type=1400 audit(2000000315.622:453086): avc: denied { execmem } for pid=29972 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 746.669041][ T30] audit: type=1400 audit(2000000315.884:453087): avc: denied { sys_module } for pid=29970 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 746.695170][ T30] audit: type=1400 audit(2000000315.884:453088): avc: denied { module_request } for pid=29970 comm="syz-executor" kmod="nr8" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 747.579255][ T30] audit: type=1400 audit(2000000317.711:453089): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 747.614803][ T30] audit: type=1400 audit(2000000317.711:453090): avc: denied { search } for pid=2982 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 748.194220][ C0] net_ratelimit: 41107 callbacks suppressed [ 748.194241][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 748.194304][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 748.201941][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 748.216400][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 748.228889][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 748.244266][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 748.264501][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 748.283106][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 748.300770][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 748.318283][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 752.966561][ C0] net_ratelimit: 45142 callbacks suppressed [ 752.966581][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 752.966602][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 752.966802][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 752.972938][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 752.984642][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 752.996626][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 753.009576][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 753.021950][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 753.033776][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 753.045601][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 755.020330][ T30] kauditd_printk_skb: 14 callbacks suppressed [ 755.020415][ T30] audit: type=1400 audit(2000000325.542:453105): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 755.065704][ T30] audit: type=1400 audit(2000000325.542:453106): avc: denied { search } for pid=2982 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 755.095655][ T30] audit: type=1400 audit(2000000325.542:453107): avc: denied { append } for pid=2982 comm="syslogd" name="messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 755.126591][ T30] audit: type=1400 audit(2000000325.542:453108): avc: denied { open } for pid=2982 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 755.158013][ T30] audit: type=1400 audit(2000000325.542:453109): avc: denied { getattr } for pid=2982 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 757.738973][ C0] net_ratelimit: 45357 callbacks suppressed [ 757.738993][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 757.739245][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 757.745659][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 757.761233][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 757.775162][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 757.787789][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 757.801725][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 757.818478][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 757.832321][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 757.847777][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 759.518395][ T30] audit: type=1400 audit(2000000329.784:453110): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 759.550327][ T30] audit: type=1400 audit(2000000329.784:453111): avc: denied { search } for pid=2982 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 759.581525][ T30] audit: type=1400 audit(2000000329.784:453112): avc: denied { append } for pid=2982 comm="syslogd" name="messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 759.612090][ T30] audit: type=1400 audit(2000000329.784:453113): avc: denied { open } for pid=2982 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 759.639368][ T30] audit: type=1400 audit(2000000329.784:453114): avc: denied { getattr } for pid=2982 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 760.409435][ T30] audit: type=1400 audit(2000000331.201:453115): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 760.439339][ T30] audit: type=1400 audit(2000000331.201:453116): avc: denied { search } for pid=2982 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 760.468963][ T30] audit: type=1400 audit(2000000331.201:453117): avc: denied { append } for pid=2982 comm="syslogd" name="messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 760.502213][ T30] audit: type=1400 audit(2000000331.201:453118): avc: denied { open } for pid=2982 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 760.536898][ T30] audit: type=1400 audit(2000000331.201:453119): avc: denied { getattr } for pid=2982 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 762.511261][ C0] net_ratelimit: 45039 callbacks suppressed [ 762.511279][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 762.511284][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 762.511391][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 762.517910][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 762.529696][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 762.542147][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 762.554234][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 762.566197][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 762.578456][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 762.590147][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 763.764078][ T30] audit: type=1400 audit(2000000334.718:453120): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 763.790874][ T30] audit: type=1400 audit(2000000334.718:453121): avc: denied { search } for pid=2982 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 763.817601][ T30] audit: type=1400 audit(2000000334.718:453122): avc: denied { append } for pid=2982 comm="syslogd" name="messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 763.844858][ T30] audit: type=1400 audit(2000000334.718:453123): avc: denied { open } for pid=2982 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 763.872052][ T30] audit: type=1400 audit(2000000334.718:453124): avc: denied { getattr } for pid=2982 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 765.656971][ T30] audit: type=1400 audit(2000000335.085:453125): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 765.683704][ T30] audit: type=1400 audit(2000000335.085:453126): avc: denied { search } for pid=2982 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 765.709606][ T30] audit: type=1400 audit(2000000335.085:453127): avc: denied { append } for pid=2982 comm="syslogd" name="messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 765.736740][ T30] audit: type=1400 audit(2000000335.085:453128): avc: denied { open } for pid=2982 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 765.764541][ T30] audit: type=1400 audit(2000000335.085:453129): avc: denied { getattr } for pid=2982 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 767.283549][ C0] net_ratelimit: 46828 callbacks suppressed [ 767.283569][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 767.283622][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 767.289665][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 767.301679][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 767.313694][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 767.325826][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 767.337600][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 767.349676][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 767.361795][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 767.373715][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 767.930801][ T30] audit: type=1400 audit(2000000336.891:453130): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 767.956911][ T30] audit: type=1400 audit(2000000336.891:453131): avc: denied { search } for pid=2982 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 767.982894][ T30] audit: type=1400 audit(2000000336.891:453132): avc: denied { append } for pid=2982 comm="syslogd" name="messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 768.013650][ T30] audit: type=1400 audit(2000000336.891:453133): avc: denied { open } for pid=2982 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 768.041004][ T30] audit: type=1400 audit(2000000336.891:453134): avc: denied { getattr } for pid=2982 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 772.055925][ C0] net_ratelimit: 46870 callbacks suppressed [ 772.055944][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 772.056104][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 772.061997][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 772.074164][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 772.086294][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 772.101541][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 772.114876][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 772.130404][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 772.143841][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 772.157234][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 772.308333][ T30] kauditd_printk_skb: 5 callbacks suppressed [ 772.308354][ T30] audit: type=1400 audit(2000000343.652:453140): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 772.345460][ T30] audit: type=1400 audit(2000000343.652:453141): avc: denied { search } for pid=2982 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 772.376310][ T30] audit: type=1400 audit(2000000343.652:453142): avc: denied { append } for pid=2982 comm="syslogd" name="messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 772.404317][ T30] audit: type=1400 audit(2000000343.652:453143): avc: denied { open } for pid=2982 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 772.431448][ T30] audit: type=1400 audit(2000000343.652:453144): avc: denied { getattr } for pid=2982 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 776.828193][ C1] net_ratelimit: 46299 callbacks suppressed [ 776.828213][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 776.828217][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 776.828619][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 776.834455][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 776.846710][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 776.859632][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 776.872106][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 776.883944][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 776.896354][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 776.908750][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 781.020520][ T30] audit: type=1400 audit(2000000348.323:453145): avc: denied { execmem } for pid=29977 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 781.044971][ T30] audit: type=1400 audit(2000000351.305:453146): avc: denied { read } for pid=29978 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 781.071396][ T30] audit: type=1400 audit(2000000351.305:453147): avc: denied { open } for pid=29978 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 781.101576][ T30] audit: type=1400 audit(2000000351.368:453148): avc: denied { mounton } for pid=29978 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 781.129343][ T30] audit: type=1400 audit(2000000351.651:453149): avc: denied { module_request } for pid=29978 comm="syz-executor" kmod="netdev-nr6" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 781.158166][ T30] audit: type=1400 audit(2000000352.029:453150): avc: denied { sys_module } for pid=29978 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 781.185890][ T30] audit: type=1400 audit(2000000352.029:453151): avc: denied { module_request } for pid=29978 comm="syz-executor" kmod="nr6" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 781.600570][ C1] net_ratelimit: 46067 callbacks suppressed [ 781.600591][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 781.600756][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 781.607539][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 781.621388][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 781.633942][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 781.647192][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 781.659913][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 781.673932][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 781.687633][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 781.701265][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 782.665656][ T30] audit: type=1400 audit(2000000354.485:453152): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 782.693116][ T30] audit: type=1400 audit(2000000354.485:453153): avc: denied { search } for pid=2982 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 782.723274][ T30] audit: type=1400 audit(2000000354.485:453154): avc: denied { append } for pid=2982 comm="syslogd" name="messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 786.372959][ C0] net_ratelimit: 46433 callbacks suppressed [ 786.372981][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 786.373044][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 786.380185][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 786.392527][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 786.405083][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 786.416939][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 786.429059][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 786.441566][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 786.453956][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 786.465859][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 787.153546][ T30] kauditd_printk_skb: 2 callbacks suppressed [ 787.153564][ T30] audit: type=1400 audit(2000000359.273:453157): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 787.192417][ T30] audit: type=1400 audit(2000000359.273:453158): avc: denied { search } for pid=2982 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 787.218919][ T30] audit: type=1400 audit(2000000359.273:453159): avc: denied { append } for pid=2982 comm="syslogd" name="messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 787.246886][ T30] audit: type=1400 audit(2000000359.273:453160): avc: denied { open } for pid=2982 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 787.275553][ T30] audit: type=1400 audit(2000000359.273:453161): avc: denied { getattr } for pid=2982 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 790.583978][ T30] audit: type=1400 audit(2000000359.588:453162): avc: denied { execmem } for pid=29981 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 790.802979][ T30] audit: type=1400 audit(2000000363.083:453163): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 790.830837][ T30] audit: type=1400 audit(2000000363.083:453164): avc: denied { search } for pid=2982 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 790.859209][ T30] audit: type=1400 audit(2000000363.083:453165): avc: denied { append } for pid=2982 comm="syslogd" name="messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 790.889165][ T30] audit: type=1400 audit(2000000363.083:453166): avc: denied { open } for pid=2982 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 791.145286][ C1] net_ratelimit: 45289 callbacks suppressed [ 791.145306][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 791.145416][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 791.151699][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 791.163753][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 791.177007][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 791.191063][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 791.203459][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 791.216026][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 791.228617][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 791.241098][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 793.190522][ T30] kauditd_printk_skb: 1 callbacks suppressed [ 793.190543][ T30] audit: type=1400 audit(2000000365.561:453168): avc: denied { read } for pid=29982 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 793.225984][ T30] audit: type=1400 audit(2000000365.592:453169): avc: denied { open } for pid=29982 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 793.258718][ T30] audit: type=1400 audit(2000000365.592:453170): avc: denied { mounton } for pid=29982 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 795.283204][ T30] audit: type=1400 audit(2000000365.792:453171): avc: denied { module_request } for pid=29982 comm="syz-executor" kmod="netdev-nr5" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 795.310707][ T30] audit: type=1400 audit(2000000365.928:453172): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 795.339641][ T30] audit: type=1400 audit(2000000365.928:453173): avc: denied { search } for pid=2982 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 795.366252][ T30] audit: type=1400 audit(2000000365.928:453174): avc: denied { append } for pid=2982 comm="syslogd" name="messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 795.395770][ T30] audit: type=1400 audit(2000000365.928:453175): avc: denied { open } for pid=2982 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 795.424602][ T30] audit: type=1400 audit(2000000365.928:453176): avc: denied { getattr } for pid=2982 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 795.452701][ T30] audit: type=1400 audit(2000000366.201:453177): avc: denied { execmem } for pid=29983 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 795.917634][ C0] net_ratelimit: 45058 callbacks suppressed [ 795.917655][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 795.917897][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 795.926722][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 795.942469][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 795.958008][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 795.974858][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 795.992731][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 796.011871][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 796.027726][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 796.047726][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 798.629616][ T30] kauditd_printk_skb: 16 callbacks suppressed [ 798.629638][ T30] audit: type=1400 audit(2000000370.831:453194): avc: denied { sys_module } for pid=29986 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 798.674001][ T30] audit: type=1400 audit(2000000370.831:453195): avc: denied { module_request } for pid=29986 comm="syz-executor" kmod="nr7" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 799.231898][ T30] audit: type=1400 audit(2000000371.723:453196): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 799.262348][ T30] audit: type=1400 audit(2000000371.723:453197): avc: denied { search } for pid=2982 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 799.291229][ T30] audit: type=1400 audit(2000000371.723:453198): avc: denied { append } for pid=2982 comm="syslogd" name="messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 799.319714][ T30] audit: type=1400 audit(2000000371.723:453199): avc: denied { append open } for pid=2982 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 799.350537][ T30] audit: type=1400 audit(2000000371.723:453200): avc: denied { getattr } for pid=2982 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 800.322809][ T30] audit: type=1400 audit(2000000372.353:453201): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 800.357293][ T30] audit: type=1400 audit(2000000372.353:453202): avc: denied { search } for pid=2982 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 800.395694][ T30] audit: type=1400 audit(2000000372.353:453203): avc: denied { append } for pid=2982 comm="syslogd" name="messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 800.690175][ C0] net_ratelimit: 42929 callbacks suppressed [ 800.690196][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 800.690232][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 800.698714][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 800.712558][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 800.724784][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 800.737844][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 800.752079][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 800.765989][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 800.781075][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 800.796354][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 804.282874][ T30] kauditd_printk_skb: 30 callbacks suppressed [ 804.282892][ T30] audit: type=1400 audit(2000000376.815:453234): avc: denied { sys_module } for pid=29990 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 804.323656][ T30] audit: type=1400 audit(2000000376.815:453235): avc: denied { module_request } for pid=29990 comm="syz-executor" kmod="nr8" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 805.462273][ C1] net_ratelimit: 46016 callbacks suppressed [ 805.462293][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 805.462442][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 805.468512][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 805.480463][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 805.492761][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 805.506341][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 805.521500][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 805.535887][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 805.549253][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 805.563236][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 805.610445][ T30] audit: type=1400 audit(2000000378.158:453236): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 805.610489][ T30] audit: type=1400 audit(2000000378.158:453237): avc: denied { search } for pid=2982 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 805.675819][ T30] audit: type=1400 audit(2000000378.158:453238): avc: denied { append } for pid=2982 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 805.706117][ T30] audit: type=1400 audit(2000000378.158:453239): avc: denied { append open } for pid=2982 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 805.737864][ T30] audit: type=1400 audit(2000000378.158:453240): avc: denied { getattr } for pid=2982 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 806.635251][ T30] audit: type=1400 audit(2000000378.851:453241): avc: denied { execmem } for pid=29992 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 806.663033][ T30] audit: type=1400 audit(2000000379.418:453242): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 806.700827][ T30] audit: type=1400 audit(2000000379.418:453243): avc: denied { search } for pid=2982 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 810.234555][ C0] net_ratelimit: 45190 callbacks suppressed [ 810.234576][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 810.234644][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 810.240902][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 810.252897][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 810.265739][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 810.278006][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 810.289849][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 810.302086][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 810.314051][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 810.326060][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 810.709764][ T30] kauditd_printk_skb: 7 callbacks suppressed [ 810.709785][ T30] audit: type=1400 audit(2000000380.080:453251): avc: denied { sys_module } for pid=29994 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 810.746397][ T30] audit: type=1400 audit(2000000380.080:453252): avc: denied { module_request } for pid=29994 comm="syz-executor" kmod="nr9" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 811.035490][ T30] audit: type=1400 audit(2000000384.174:453253): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 811.062249][ T30] audit: type=1400 audit(2000000384.174:453254): avc: denied { search } for pid=2982 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 811.088641][ T30] audit: type=1400 audit(2000000384.174:453255): avc: denied { append } for pid=2982 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 811.115503][ T30] audit: type=1400 audit(2000000384.174:453256): avc: denied { open } for pid=2982 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 811.142729][ T30] audit: type=1400 audit(2000000384.174:453257): avc: denied { getattr } for pid=2982 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 815.006871][ C1] net_ratelimit: 47400 callbacks suppressed [ 815.006892][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 815.006936][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 815.014288][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 815.026379][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 815.038097][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 815.050220][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 815.062088][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 815.074357][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 815.086906][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 815.098917][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 816.621425][ T30] audit: type=1400 audit(2000000390.189:453258): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 816.648074][ T30] audit: type=1400 audit(2000000390.189:453259): avc: denied { search } for pid=2982 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 816.674811][ T30] audit: type=1400 audit(2000000390.189:453260): avc: denied { append } for pid=2982 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 816.701709][ T30] audit: type=1400 audit(2000000390.189:453261): avc: denied { append open } for pid=2982 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 816.729447][ T30] audit: type=1400 audit(2000000390.189:453262): avc: denied { getattr } for pid=2982 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 819.779266][ C1] net_ratelimit: 47725 callbacks suppressed [ 819.779287][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 819.779369][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 819.785341][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 819.797417][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 819.809472][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 819.821606][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 819.833901][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 819.845784][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 819.857952][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 819.869553][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 819.992435][ T30] audit: type=1400 audit(2000000393.727:453263): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 820.019339][ T30] audit: type=1400 audit(2000000393.727:453264): avc: denied { search } for pid=2982 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 820.045500][ T30] audit: type=1400 audit(2000000393.727:453265): avc: denied { append } for pid=2982 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 820.072453][ T30] audit: type=1400 audit(2000000393.727:453266): avc: denied { open } for pid=2982 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 820.100002][ T30] audit: type=1400 audit(2000000393.727:453267): avc: denied { getattr } for pid=2982 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 821.053299][ T125] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 824.551718][ C1] net_ratelimit: 46095 callbacks suppressed [ 824.551737][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 824.551853][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 824.558147][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 824.571057][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 824.583037][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 824.595647][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 824.607562][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 824.619542][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 824.631723][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 824.643760][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 824.900453][ T30] kauditd_printk_skb: 5 callbacks suppressed [ 824.900470][ T30] audit: type=1400 audit(2000000398.903:453273): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 824.937803][ T30] audit: type=1400 audit(2000000398.903:453274): avc: denied { search } for pid=2982 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 824.964038][ T30] audit: type=1400 audit(2000000398.903:453275): avc: denied { append } for pid=2982 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 824.993006][ T30] audit: type=1400 audit(2000000398.903:453276): avc: denied { open } for pid=2982 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 825.020949][ T30] audit: type=1400 audit(2000000398.903:453277): avc: denied { getattr } for pid=2982 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 825.951273][ T30] audit: type=1400 audit(2000000400.005:453278): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 825.979415][ T30] audit: type=1400 audit(2000000400.005:453279): avc: denied { search } for pid=2982 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 826.005285][ T30] audit: type=1400 audit(2000000400.005:453280): avc: denied { append } for pid=2982 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 826.044907][ T30] audit: type=1400 audit(2000000400.005:453281): avc: denied { open } for pid=2982 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 826.077570][ T30] audit: type=1400 audit(2000000400.005:453282): avc: denied { getattr } for pid=2982 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 828.441515][ T125] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 829.323905][ C0] net_ratelimit: 45763 callbacks suppressed [ 829.323926][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 829.324019][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 829.329960][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 829.342028][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 829.354552][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 829.367079][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 829.379805][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 829.391631][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 829.403637][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 829.415594][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 830.752424][ T30] kauditd_printk_skb: 5 callbacks suppressed [ 830.752516][ T30] audit: type=1400 audit(2000000404.970:453288): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 830.791978][ T30] audit: type=1400 audit(2000000404.970:453289): avc: denied { search } for pid=2982 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 830.819106][ T30] audit: type=1400 audit(2000000404.970:453290): avc: denied { append } for pid=2982 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 830.852000][ T30] audit: type=1400 audit(2000000404.970:453291): avc: denied { append open } for pid=2982 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 830.881429][ T30] audit: type=1400 audit(2000000404.970:453292): avc: denied { getattr } for pid=2982 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 831.211158][ T125] bond0 (unregistering): Released all slaves [ 831.534246][ T30] audit: type=1400 audit(2000000405.285:453293): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 831.561758][ T30] audit: type=1400 audit(2000000405.285:453294): avc: denied { search } for pid=2982 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 831.587920][ T30] audit: type=1400 audit(2000000405.285:453295): avc: denied { append } for pid=2982 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 831.615759][ T30] audit: type=1400 audit(2000000405.285:453296): avc: denied { open } for pid=2982 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 831.643989][ T30] audit: type=1400 audit(2000000405.285:453297): avc: denied { getattr } for pid=2982 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 834.096298][ C0] net_ratelimit: 46270 callbacks suppressed [ 834.096316][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 834.096322][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 834.096450][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 834.102490][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 834.114753][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 834.126730][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 834.138879][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 834.151093][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 834.163163][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 834.175017][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 836.719920][ T30] kauditd_printk_skb: 10 callbacks suppressed [ 836.719937][ T30] audit: type=1400 audit(2000000411.301:453308): avc: denied { execmem } for pid=29997 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 837.034399][ T30] audit: type=1400 audit(2000000411.353:453309): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 837.061703][ T30] audit: type=1400 audit(2000000411.353:453310): avc: denied { search } for pid=2982 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 837.087698][ T30] audit: type=1400 audit(2000000411.353:453311): avc: denied { append } for pid=2982 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 837.114690][ T30] audit: type=1400 audit(2000000411.353:453312): avc: denied { open } for pid=2982 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 837.141902][ T30] audit: type=1400 audit(2000000411.353:453313): avc: denied { getattr } for pid=2982 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 838.165705][ T30] audit: type=1400 audit(2000000412.277:453314): avc: denied { read } for pid=29998 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 838.191904][ T30] audit: type=1400 audit(2000000412.277:453315): avc: denied { open } for pid=29998 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 838.220000][ T30] audit: type=1400 audit(2000000412.277:453316): avc: denied { mounton } for pid=29998 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 838.246119][ T30] audit: type=1400 audit(2000000412.319:453317): avc: denied { module_request } for pid=29998 comm="syz-executor" kmod="netdev-nr6" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 838.868663][ C1] net_ratelimit: 46247 callbacks suppressed [ 838.868683][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 838.868770][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 838.875062][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 838.886852][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 838.898671][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 838.910843][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 838.922682][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 838.934485][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 838.946662][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 838.958562][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 843.640969][ C1] net_ratelimit: 47591 callbacks suppressed [ 843.640990][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 843.641217][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 843.648273][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 843.663645][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 843.682131][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 843.699092][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 843.712234][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 843.724455][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 843.736963][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 843.750414][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 844.235806][ T30] kauditd_printk_skb: 7 callbacks suppressed [ 844.235825][ T30] audit: type=1400 audit(2000000419.195:453325): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 844.272882][ T30] audit: type=1400 audit(2000000419.195:453326): avc: denied { search } for pid=2982 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 844.299128][ T30] audit: type=1400 audit(2000000419.195:453327): avc: denied { append } for pid=2982 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 844.327197][ T30] audit: type=1400 audit(2000000419.195:453328): avc: denied { append open } for pid=2982 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 844.355289][ T30] audit: type=1400 audit(2000000419.195:453329): avc: denied { getattr } for pid=2982 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 845.046638][ T30] audit: type=1400 audit(2000000420.056:453330): avc: denied { module_request } for pid=29986 comm="syz-executor" kmod="netdev-nr7" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 845.330505][ T30] audit: type=1400 audit(2000000420.087:453331): avc: denied { module_request } for pid=29990 comm="syz-executor" kmod="netdev-nr8" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 845.357108][ T30] audit: type=1400 audit(2000000420.098:453332): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 845.384107][ T30] audit: type=1400 audit(2000000420.098:453333): avc: denied { search } for pid=2982 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 845.410329][ T30] audit: type=1400 audit(2000000420.098:453334): avc: denied { append } for pid=2982 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 848.413238][ C0] net_ratelimit: 42963 callbacks suppressed [ 848.413258][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 848.413359][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 848.419465][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 848.432100][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 848.443985][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 848.455910][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 848.468797][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 848.480764][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 848.493214][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 848.505206][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 851.759402][ T125] hsr_slave_0: left promiscuous mode [ 851.774476][ T30] kauditd_printk_skb: 22 callbacks suppressed [ 851.774542][ T30] audit: type=1400 audit(2000000427.111:453357): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 851.811799][ T30] audit: type=1400 audit(2000000427.111:453358): avc: denied { search } for pid=2982 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 851.838182][ T30] audit: type=1400 audit(2000000427.111:453359): avc: denied { append } for pid=2982 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 851.865320][ T30] audit: type=1400 audit(2000000427.111:453360): avc: denied { open } for pid=2982 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 851.892417][ T30] audit: type=1400 audit(2000000427.111:453361): avc: denied { getattr } for pid=2982 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 852.164991][ T125] hsr_slave_1: left promiscuous mode [ 852.378153][ T125] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 852.766711][ T125] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 853.185740][ C0] net_ratelimit: 46360 callbacks suppressed [ 853.185764][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 853.185855][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 853.191999][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 853.204527][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 853.216905][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 853.228903][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 853.240774][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 853.252800][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 853.265454][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 853.277293][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 853.398410][ T30] audit: type=1400 audit(2000000427.898:453362): avc: denied { execmem } for pid=30014 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 853.422168][ T30] audit: type=1400 audit(2000000428.202:453363): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 853.449394][ T30] audit: type=1400 audit(2000000428.202:453364): avc: denied { search } for pid=2982 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 853.475189][ T30] audit: type=1400 audit(2000000428.202:453365): avc: denied { append } for pid=2982 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 853.501887][ T30] audit: type=1400 audit(2000000428.202:453366): avc: denied { append open } for pid=2982 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 857.958008][ C1] net_ratelimit: 46923 callbacks suppressed [ 857.958027][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 857.958230][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 857.964113][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 857.976136][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 857.988259][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 858.000280][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 858.012200][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 858.024185][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 858.036696][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 858.048426][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 858.135926][ T30] kauditd_printk_skb: 12 callbacks suppressed [ 858.135965][ T30] audit: type=1400 audit(2000000433.777:453379): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 858.173117][ T30] audit: type=1400 audit(2000000433.777:453380): avc: denied { search } for pid=2982 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 858.199641][ T30] audit: type=1400 audit(2000000433.777:453381): avc: denied { append } for pid=2982 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 858.226794][ T30] audit: type=1400 audit(2000000433.777:453382): avc: denied { open } for pid=2982 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 858.253922][ T30] audit: type=1400 audit(2000000433.777:453383): avc: denied { getattr } for pid=2982 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 860.935603][ T30] audit: type=1400 audit(2000000434.092:453384): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 860.961958][ T30] audit: type=1400 audit(2000000434.092:453385): avc: denied { search } for pid=2982 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 860.987961][ T30] audit: type=1400 audit(2000000434.092:453386): avc: denied { append } for pid=2982 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 861.015003][ T30] audit: type=1400 audit(2000000434.092:453387): avc: denied { open } for pid=2982 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 861.042645][ T30] audit: type=1400 audit(2000000434.092:453388): avc: denied { getattr } for pid=2982 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 862.730228][ C1] net_ratelimit: 46307 callbacks suppressed [ 862.730257][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 862.730526][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 862.738697][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 862.752820][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 862.764847][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 862.776973][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 862.788724][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 862.800686][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 862.812749][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 862.824826][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 863.449645][ T30] kauditd_printk_skb: 10 callbacks suppressed [ 863.449681][ T30] audit: type=1400 audit(2000000439.267:453399): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 863.486964][ T30] audit: type=1400 audit(2000000439.267:453400): avc: denied { search } for pid=2982 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 863.513112][ T30] audit: type=1400 audit(2000000439.267:453401): avc: denied { append } for pid=2982 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 863.540130][ T30] audit: type=1400 audit(2000000439.267:453402): avc: denied { append open } for pid=2982 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 863.576807][ T30] audit: type=1400 audit(2000000439.267:453403): avc: denied { getattr } for pid=2982 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 865.336523][ T30] audit: type=1400 audit(2000000439.981:453404): avc: denied { sys_module } for pid=30019 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 865.363086][ T30] audit: type=1400 audit(2000000439.981:453405): avc: denied { module_request } for pid=30019 comm="syz-executor" kmod="nr8" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 865.389639][ T30] audit: type=1400 audit(2000000440.443:453406): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 865.416131][ T30] audit: type=1400 audit(2000000440.443:453407): avc: denied { search } for pid=2982 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 865.446594][ T30] audit: type=1400 audit(2000000440.443:453408): avc: denied { append } for pid=2982 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 867.502802][ C1] net_ratelimit: 46108 callbacks suppressed [ 867.502821][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 867.502893][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 867.509235][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 867.520811][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 867.532780][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 867.544791][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 867.556690][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 867.568537][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 867.580651][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 867.592754][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 870.734901][ T30] kauditd_printk_skb: 12 callbacks suppressed [ 870.734921][ T30] audit: type=1400 audit(2000000447.004:453421): avc: denied { sys_module } for pid=30023 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 870.772131][ T30] audit: type=1400 audit(2000000447.004:453422): avc: denied { module_request } for pid=30023 comm="syz-executor" kmod="nr9" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 872.259613][ T30] audit: type=1400 audit(2000000447.267:453423): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 872.281912][ C0] net_ratelimit: 47585 callbacks suppressed [ 872.281931][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 872.282022][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 872.282176][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 872.282203][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 872.282330][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 872.282377][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 872.282477][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 872.282658][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 872.282677][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 872.282839][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 872.452544][ T30] audit: type=1400 audit(2000000447.267:453424): avc: denied { search } for pid=2982 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 872.478385][ T30] audit: type=1400 audit(2000000447.267:453425): avc: denied { append } for pid=2982 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 872.505048][ T30] audit: type=1400 audit(2000000447.267:453426): avc: denied { append open } for pid=2982 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 872.532554][ T30] audit: type=1400 audit(2000000447.267:453427): avc: denied { getattr } for pid=2982 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 873.725195][ T30] audit: type=1400 audit(2000000450.122:453428): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 873.751574][ T30] audit: type=1400 audit(2000000450.122:453429): avc: denied { search } for pid=2982 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 873.777429][ T30] audit: type=1400 audit(2000000450.122:453430): avc: denied { append } for pid=2982 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 877.047289][ C1] net_ratelimit: 47619 callbacks suppressed [ 877.047308][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 877.047599][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 877.053370][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 877.065390][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 877.077440][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 877.089429][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 877.101264][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 877.113144][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 877.125424][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 877.137141][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 877.698717][ T30] kauditd_printk_skb: 2 callbacks suppressed [ 877.698737][ T30] audit: type=1400 audit(2000000454.007:453433): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 877.735196][ T30] audit: type=1400 audit(2000000454.007:453434): avc: denied { search } for pid=2982 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 877.765497][ T30] audit: type=1400 audit(2000000454.007:453435): avc: denied { append } for pid=2982 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 877.792230][ T30] audit: type=1400 audit(2000000454.007:453436): avc: denied { open } for pid=2982 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 877.819537][ T30] audit: type=1400 audit(2000000454.007:453437): avc: denied { getattr } for pid=2982 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 881.819745][ C0] net_ratelimit: 47661 callbacks suppressed [ 881.819765][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 881.819804][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 881.825882][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 881.838102][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 881.849965][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 881.861740][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 881.873780][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 881.885853][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 881.897699][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 881.909780][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 882.693297][ T30] audit: type=1400 audit(2000000459.319:453438): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 882.735635][ T30] audit: type=1400 audit(2000000459.319:453439): avc: denied { search } for pid=2982 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 882.771818][ T30] audit: type=1400 audit(2000000459.319:453440): avc: denied { append } for pid=2982 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 882.815498][ T30] audit: type=1400 audit(2000000459.319:453441): avc: denied { append open } for pid=2982 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 882.856488][ T30] audit: type=1400 audit(2000000459.319:453442): avc: denied { getattr } for pid=2982 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 883.880157][ T30] audit: type=1400 audit(2000000460.379:453443): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 883.906543][ T30] audit: type=1400 audit(2000000460.379:453444): avc: denied { search } for pid=2982 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 883.932366][ T30] audit: type=1400 audit(2000000460.494:453445): avc: denied { append } for pid=2982 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 883.959354][ T30] audit: type=1400 audit(2000000460.494:453446): avc: denied { open } for pid=2982 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 883.986276][ T30] audit: type=1400 audit(2000000460.494:453447): avc: denied { getattr } for pid=2982 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 886.591952][ C1] net_ratelimit: 45760 callbacks suppressed [ 886.591972][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 886.591983][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 886.592255][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 886.598080][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 886.610071][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 886.622049][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 886.634147][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 886.646245][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 886.657979][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 886.669821][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 887.777144][ T30] kauditd_printk_skb: 5 callbacks suppressed [ 887.777163][ T30] audit: type=1400 audit(2000000464.851:453453): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 887.824743][ T30] audit: type=1400 audit(2000000464.851:453454): avc: denied { search } for pid=2982 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 887.858812][ T30] audit: type=1400 audit(2000000464.851:453455): avc: denied { append } for pid=2982 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 887.890965][ T30] audit: type=1400 audit(2000000464.851:453456): avc: denied { open } for pid=2982 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 887.929990][ T30] audit: type=1400 audit(2000000464.851:453457): avc: denied { getattr } for pid=2982 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 889.396243][ T30] audit: type=1400 audit(2000000466.594:453458): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 889.422709][ T30] audit: type=1400 audit(2000000466.594:453459): avc: denied { search } for pid=2982 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 889.449031][ T30] audit: type=1400 audit(2000000466.594:453460): avc: denied { append } for pid=2982 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 889.476252][ T30] audit: type=1400 audit(2000000466.594:453461): avc: denied { append open } for pid=2982 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 889.503935][ T30] audit: type=1400 audit(2000000466.594:453462): avc: denied { getattr } for pid=2982 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 890.659564][ C1] ================================================================== [ 890.667764][ C1] BUG: KCSAN: data-race in br_fdb_update / br_fdb_update [ 890.674904][ C1] [ 890.677246][ C1] read to 0xffff8881044deb40 of 8 bytes by interrupt on cpu 0: [ 890.684900][ C1] br_fdb_update+0x10e/0x480 [ 890.689510][ C1] br_handle_frame_finish+0x338/0xe90 [ 890.695086][ C1] br_nf_hook_thresh+0x1e5/0x220 [ 890.700067][ C1] br_nf_pre_routing_finish_ipv6+0x575/0x5a0 [ 890.706153][ C1] br_nf_pre_routing_ipv6+0x1f6/0x2a0 [ 890.711565][ C1] br_nf_pre_routing+0x517/0xbc0 [ 890.716535][ C1] br_handle_frame+0x4e0/0x9b0 [ 890.721335][ C1] __netif_receive_skb_core+0xb1a/0x2350 [ 890.727002][ C1] __netif_receive_skb+0x5a/0x280 [ 890.732928][ C1] process_backlog+0x22e/0x440 [ 890.737726][ C1] __napi_poll+0x63/0x3c0 [ 890.742083][ C1] net_rx_action+0x3a1/0x7f0 [ 890.746707][ C1] handle_softirqs+0xbf/0x280 [ 890.751584][ C1] do_softirq+0x5e/0x90 [ 890.755862][ C1] __local_bh_enable_ip+0x6e/0x70 [ 890.760925][ C1] _raw_spin_unlock_bh+0x36/0x40 [ 890.765900][ C1] batadv_tt_local_purge+0x1a8/0x1f0 [ 890.771217][ C1] batadv_tt_purge+0x2b/0x630 [ 890.776011][ C1] process_scheduled_works+0x4db/0xa20 [ 890.781578][ C1] worker_thread+0x51d/0x6f0 [ 890.786197][ C1] kthread+0x4ae/0x520 [ 890.790311][ C1] ret_from_fork+0x4b/0x60 [ 890.794754][ C1] ret_from_fork_asm+0x1a/0x30 [ 890.799557][ C1] [ 890.801895][ C1] write to 0xffff8881044deb40 of 8 bytes by interrupt on cpu 1: [ 890.809554][ C1] br_fdb_update+0x142/0x480 [ 890.814171][ C1] br_handle_frame_finish+0x338/0xe90 [ 890.819745][ C1] br_nf_hook_thresh+0x1e5/0x220 [ 890.824702][ C1] br_nf_pre_routing_finish_ipv6+0x575/0x5a0 [ 890.830706][ C1] br_nf_pre_routing_ipv6+0x1f6/0x2a0 [ 890.836103][ C1] br_nf_pre_routing+0x517/0xbc0 [ 890.841059][ C1] br_handle_frame+0x4e0/0x9b0 [ 890.845849][ C1] __netif_receive_skb_core+0xb1a/0x2350 [ 890.851525][ C1] __netif_receive_skb+0x5a/0x280 [ 890.856785][ C1] process_backlog+0x22e/0x440 [ 890.861579][ C1] __napi_poll+0x63/0x3c0 [ 890.865943][ C1] net_rx_action+0x3a1/0x7f0 [ 890.870571][ C1] handle_softirqs+0xbf/0x280 [ 890.875279][ C1] do_softirq+0x5e/0x90 [ 890.879499][ C1] __local_bh_enable_ip+0x6e/0x70 [ 890.884551][ C1] update_defense_level+0x575/0x5b0 [ 890.889779][ C1] defense_work_handler+0x1f/0x80 [ 890.895831][ C1] process_scheduled_works+0x4db/0xa20 [ 890.901313][ C1] worker_thread+0x51d/0x6f0 [ 890.906107][ C1] kthread+0x4ae/0x520 [ 890.910387][ C1] ret_from_fork+0x4b/0x60 [ 890.914849][ C1] ret_from_fork_asm+0x1a/0x30 [ 890.919644][ C1] [ 890.921978][ C1] value changed: 0x000000010000f4b3 -> 0x000000010000f4b4 [ 890.929091][ C1] [ 890.931429][ C1] Reported by Kernel Concurrency Sanitizer on: [ 890.937609][ C1] CPU: 1 UID: 0 PID: 36 Comm: kworker/1:1 Tainted: G W 6.14.0-rc6-syzkaller #0 [ 890.947961][ C1] Tainted: [W]=WARN [ 890.951775][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 890.961850][ C1] Workqueue: events_long defense_work_handler [ 890.967951][ C1] ================================================================== [ 891.364242][ C0] net_ratelimit: 44711 callbacks suppressed [ 891.364261][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 891.364301][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 891.364411][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 891.370637][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 891.382430][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 891.394330][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 891.406414][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 891.418531][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 891.430708][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 891.442366][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 892.693858][ T30] kauditd_printk_skb: 12 callbacks suppressed [ 892.693875][ T30] audit: type=1400 audit(2000000470.068:453475): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 892.731059][ T30] audit: type=1400 audit(2000000470.068:453476): avc: denied { search } for pid=2982 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 892.757133][ T30] audit: type=1400 audit(2000000470.068:453477): avc: denied { append } for pid=2982 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 892.784137][ T30] audit: type=1400 audit(2000000470.068:453478): avc: denied { open } for pid=2982 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 892.811402][ T30] audit: type=1400 audit(2000000470.068:453479): avc: denied { getattr } for pid=2982 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 896.136664][ C0] net_ratelimit: 46628 callbacks suppressed [ 896.136687][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 896.136760][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 896.142934][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 896.154900][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 896.166996][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 896.179251][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 896.191191][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 896.203545][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 896.215609][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:08:70:c8:3b:ff, vlan:0) [ 896.228407][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 896.398903][ T30] audit: type=1400 audit(2000000473.900:453480): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 896.426709][ T30] audit: type=1400 audit(2000000473.900:453481): avc: denied { search } for pid=2982 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 896.455205][ T30] audit: type=1400 audit(2000000473.900:453482): avc: denied { append } for pid=2982 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 896.487755][ T30] audit: type=1400 audit(2000000473.900:453483): avc: denied { open } for pid=2982 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 896.517196][ T30] audit: type=1400 audit(2000000473.900:453484): avc: denied { getattr } for pid=2982 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1