last executing test programs:

2.12684357s ago: executing program 3 (id=4235):
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]})
shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000a00)=""/4096)

1.936909628s ago: executing program 0 (id=4238):
r0 = syz_usb_connect(0x3, 0x2d, &(0x7f00000003c0)={{0x12, 0x1, 0x0, 0x5a, 0xe4, 0xc4, 0x10, 0x596, 0x1, 0x5f5, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0xd6, 0x0, 0x1, 0xb5, 0xe1, 0x45, 0x0, [], [{{0x9, 0x5, 0x83, 0x0, 0x3ff, 0x3, 0x7, 0x4}}]}}]}}]}}, 0x0)
syz_usb_control_io(r0, 0x0, &(0x7f0000001480)={0x84, &(0x7f0000001000)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0})

1.899538783s ago: executing program 3 (id=4239):
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fff7ffc}]})
fchown(0xffffffffffffffff, 0x0, 0xffffffffffffffff)

1.822713737s ago: executing program 4 (id=4240):
r0 = socket(0x10, 0x3, 0x0)
sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x18, 0x19, 0x1, 0x0, 0x0, {0x1d, 0xd601, 0x9}, [@nested={0x4, 0x12}]}, 0x18}, 0x1, 0x0, 0x0, 0x5}, 0x0)

1.709167091s ago: executing program 3 (id=4241):
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, &(0x7f0000000040)=0x1e)

1.686009881s ago: executing program 4 (id=4242):
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)={0x78, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_SEQ_ADJ_REPLY={0x14, 0xf, 0x0, 0x1, [@CTA_SEQADJ_CORRECTION_POS={0x8}, @CTA_SEQADJ_OFFSET_BEFORE={0x8}]}]}, 0x78}}, 0x0)

1.609813182s ago: executing program 3 (id=4244):
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x16, 0x8, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x8, 0x0, 0xff12, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x2800000002000000, 0x2d, 0x55, &(0x7f0000000540)="a06ad876d56a0064d082778c393848e47aafb93e825bc86755a2eacec33fc952dd561507bc6b135f56dbf06a9d9ceee56670596ed92308d08c59eca23dcc6b6ba358116f41e4d9ab66a8203331c0763188fac61ebb4303d19d417546d16adca03aa17717ad74a5ef4f998c04575bb63a549646e527acde027974c3cd1cfd4b6b0f8e2d00"/153, &(0x7f0000000380)=""/85, 0x400000, 0x4000000, 0x30, 0x0, &(0x7f0000000180)="63f48972dae3f4a86c0349357f1a22fe48450f85daf04828cd1a18ffb8ab4359ecbcfb78ef46d047d95d8091652b56000000", &(0x7f0000000180), 0x0, 0x0, 0x1}, 0x24)

1.466972268s ago: executing program 3 (id=4246):
r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0)
close_range(r0, 0xffffffffffffffff, 0x0)

1.265350562s ago: executing program 0 (id=4250):
r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0)
getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, 0x0, &(0x7f0000000fc0))

1.1223548s ago: executing program 1 (id=4251):
r0 = gettid()
ioprio_set$pid(0x2, r0, 0x2000)

1.07330054s ago: executing program 0 (id=4252):
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x5c}]}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_REVISION={0x5}]}, 0x58}}, 0x0)

1.07034413s ago: executing program 2 (id=4253):
r0 = socket(0x2b, 0x1, 0x0)
getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x11e, 0x1, 0x0, 0x20000000)

905.185331ms ago: executing program 3 (id=4254):
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f0000001480)=0x5, 0x4)

905.051287ms ago: executing program 2 (id=4255):
r0 = syz_open_dev$I2C(&(0x7f0000000000), 0x0, 0x0)
read$FUSE(r0, 0x0, 0x0)

897.408728ms ago: executing program 0 (id=4256):
pipe2(&(0x7f0000000040)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x800)
fcntl$addseals(r0, 0x409, 0x8)

829.840043ms ago: executing program 4 (id=4257):
r0 = syz_open_dev$video4linux(&(0x7f0000000000), 0x5, 0x400)
ioctl$VIDIOC_SUBDEV_S_FMT(r0, 0xc0585605, &(0x7f0000000140)={0x1, 0x14100000, {0x3, 0x8, 0x1014, 0x2, 0x8, 0x3, 0x1, 0x4}})

753.826126ms ago: executing program 1 (id=4258):
r0 = syz_open_dev$media(&(0x7f0000004800), 0x5, 0x100)
ppoll(&(0x7f0000004840)=[{r0, 0x28}], 0x1, &(0x7f0000004880), 0x0, 0x0)

699.966548ms ago: executing program 4 (id=4259):
r0 = socket$inet(0x10, 0x3, 0x0)
ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'syz_tun\x00', &(0x7f0000000480)=@ethtool_link_settings={0x2, 0x0, 0x8, 0x0, 0x0, 0x7f, 0x10, 0x0, 0x0, 0x0, [0x2, 0x5, 0x11]}})

692.160567ms ago: executing program 2 (id=4260):
r0 = socket(0x1, 0x2, 0x0)
ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'netdevsim0\x00', &(0x7f0000000000)=@ethtool_perm_addr={0x11}})

609.014666ms ago: executing program 1 (id=4261):
r0 = fsopen(&(0x7f0000000000)='befs\x00', 0x0)
fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000ac0)='gid', &(0x7f0000000440)='0\x00#\x00\xd0\x00 \x00\x00qS\x00\x00\x00\x00\x00\x00\x00\x00$\xf6_\xbdI\x1c\xf2\xa9]\xcc\xe0*\xef\x01\x8d\x15\xd2h\x93\xc9\xb57\xc3\xea\\Eb\xf8\xe6,\xdf\xd4\xfae\x84\xcc\xd5\"d\xf0D-\x98\x9f\x81{\xfc$\xc4\xbcF\xf8\xc8\x8d\xcb\xb8\xf2\x1e\xe4\'U\xb3\xb8\xd3\xe6\xd7\x80Y\xc2\xeb\n\xb8_\xe8\x96YY\xe3\xc7\xe6\xf28\x19\xa6\xa7\xfa\xdb\x1ce\xc1\x03\x86J\xb2fh\x19\xee#\xcc\x0f\xed\xfea\xdc\x88\xcb%bW\xd35\xda=\xac\x1d\xae\x93\xfd\'T6\x94\n\xa4\x9cU\xc4\fA~[\xbf\x8b\x90\xfe\x04\xe7U\xf3h\x81\x14l7u\x95\x96t\\\x0f\xef;\x03\xa4C\xbc(Vc!a\xc1\xe39\xc6b\x905\xf8\xc9@h\x01\xf5\xcb\x88\xdf9\xaf5\xc8a:z\xe4\xcbag&67\x814\xf6}\xe10v6l\xd6,\x1e\xa0\xcc\xbf\xfdkm\b?\x839\x85N\x1c\xc1\xcb\xfc\x85\xd2\n\x02\"\xf2\x81g\x90\x01n%\x7f_\xe1.f>>\xa5\xfb\"\xab\xdb\x06\x12e\x14\x11~\x9a\bR-\x85\xc3\xa9\xe6\xf6R\x11\"\xc3\xc9\xfc\x14s X\xec\xdd\xc2qB\x85\xf0\xd7\x04\xdd<\x9a\x84\'\xa3\xf1\xd9<\xb9k', 0x0)

507.778977ms ago: executing program 4 (id=4262):
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
sendmmsg$inet(r0, &(0x7f0000003e00)=[{{&(0x7f0000000140)={0x2, 0x4e20, @broadcast}, 0x10, 0x0, 0x0, &(0x7f0000000640)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}, @ip_retopts={{0x10}}], 0x30}}], 0x1, 0x8000)

503.018995ms ago: executing program 2 (id=4263):
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_TYPE(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000004c0)={0x30, 0xd, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}]}, 0x30}}, 0x0)

420.891928ms ago: executing program 1 (id=4264):
r0 = socket$inet_udp(0x2, 0x2, 0x0)
getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f0000000700)=0xed)

314.855141ms ago: executing program 2 (id=4265):
r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0)
fcntl$setownex(r0, 0xf, &(0x7f0000000100)={0x3})

292.473873ms ago: executing program 4 (id=4266):
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000300)={0x24, 0x4, 0x8, 0x201, 0x0, 0x0, {0x1, 0x0, 0x8}, [@CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x88e7}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x3a}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x4010)

232.677179ms ago: executing program 1 (id=4267):
r0 = gettid()
getpriority(0x0, r0)

180.207354ms ago: executing program 0 (id=4268):
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)=@newtaction={0x14, 0x1e, 0x109}, 0x14}, 0x1, 0x2b1e}, 0x0)

97.556135ms ago: executing program 2 (id=4269):
r0 = syz_open_dev$usbfs(&(0x7f00000000c0), 0x201, 0x0)
lseek(r0, 0x3, 0x0)

37.487597ms ago: executing program 1 (id=4270):
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, 0x0, 0x0)

0s ago: executing program 0 (id=4271):
r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000), 0x20040, 0x0)
ioctl$SNDCTL_DSP_POST(r0, 0x5008, 0x0)

kernel console output (not intermixed with test programs):

h own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:33:35 syzkaller kern.warn kernel: [  251.960882][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:33:35 syzkaller kern.warn kernel: [  251.974396][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  255.101102][T13890] xt_limit: Overflow, try lower: 1207959552/384
May 18 03:33:38 syzkaller kern.info kernel: [  255.101102][T13890] xt_limit: Overflow, try lower: 1207959552/384
[  255.257532][   T29] kauditd_printk_skb: 128 callbacks suppressed
[  255.257549][   T29] audit: type=1400 audit(2000000018.633:8850): avc:  denied  { create } for  pid=13868 comm="syz.3.3726" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=0
May 18 03:33:38 syzkaller kern.warn kernel: [  255.257532][   T29] kauditd_printk_skb: 128 callbacks suppressed
May 18 03:33:38 syzkaller kern.notice kernel: [  255.257549][   T29] audit: type=1400 audit(2000000018.633:8850): avc:  denied  { create } for  pid=13868 comm="syz.3.3726" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=0
[  255.334535][   T29] audit: type=1400 audit(2000000018.665:8851): avc:  denied  { read } for  pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0
[  255.416156][   T29] audit: type=1400 audit(2000000018.665:8852): avc:  denied  { read } for  pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0
May 18 03:33:38 syzkaller kern.notice kernel: [  255.334535][   T29] audit: type=1400 audit(2000000018.665:8851): avc:  denied  { read } for  pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=
May 18 03:33:38 syzkaller kern.notice kernel: [  255.416156][   T29] audit: type=1400 audit(2000000018.665:8852): avc:  denied  { read } for  pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=
[  255.722684][   T29] audit: type=1400 audit(2000000018.675:8853): avc:  denied  { read write } for  pid=5825 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0
May 18 03:33:39 syzkaller kern.notice kernel: [  255.722684][   T29] audit: type=1400 audit(2000000018.675:8853): avc:  denied  { read write } for  pid=5825 comm="syz-executor" name="loop2" dev="devtmpfs" ino[  255.769135][   T29] audit: type=1400 audit(2000000018.686:8854): avc:  denied  { read write } for  pid=5812 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0
=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi
May 18 03:33:39 [  255.801367][   T29] audit: type=1400 audit(2000000018.759:8855): avc:  denied  { read write } for  pid=13884 comm="syz.4.3734" name="vbi8" dev="devtmpfs" ino=1004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l_device_t tclass=chr_file permissive=0
syzkaller kern.notice kernel: [  255.769135][   T29] audit: type=1400 audit(2000000018.686:8854): avc:  denied  { read write } for  pid=5812 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi
[  255.919506][   T29] audit: type=1400 audit(2000000018.780:8856): avc:  denied  { create } for  pid=13899 comm="syz.2.3740" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=0
[  255.979768][   T29] audit: type=1400 audit(2000000018.833:8857): avc:  denied  { read write } for  pid=5822 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0
[  256.004112][   T29] audit: type=1400 audit(2000000018.875:8858): avc:  denied  { read } for  pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0
[  256.026188][   T29] audit: type=1400 audit(2000000018.875:8859): avc:  denied  { read } for  pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0
[  256.094615][T13918] No such timeout policy "syz0"
May 18 03:33:39 syzkaller kern.notice kernel: [  255.801367][   T29] audit: type=1400 audit(2000000018.759:8855): avc:  denied  { read write } for  pid=13884 comm="syz.4.3734" name="vbi8" dev="devtmpfs" ino=1004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l
May 18 03:33:39 syzkaller kern.notice kernel: [  255.919506][   T29] audit: type=1400 audit(2000000018.780:8856): avc:  denied  { create } for  pid=13899 comm="syz.2.3740" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=0
May 18 03:33:39 syzkaller kern.notice kernel: [  255.979768][   T29] audit: type=1400 audit(2000000018.833:8857): avc:  denied  { read write } for  pid=5822 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi
May 18 03:33:39 syzkaller kern.notice kernel: [  256.004112][   T29] audit: type=1400 audit(2000000018.875:8858): avc:  denied  { read } for  pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=
May 18 03:33:39 syzkaller kern.notice kernel: [  256.026188][   T29] audit: type=1400 audit(2000000018.875:8859): avc:  denied  { read } for  pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=
May 18 03:33:39 syzkaller kern.info kernel: [  256.094615][T13918] No such timeout policy "syz0"
[  256.618259][    C0] net_ratelimit: 18401 callbacks suppressed
[  256.618278][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  256.636517][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:33:40 [  256.648801][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
syzkaller kern.w[  256.662268][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
arn kernel: [  2[  256.675489][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
56.618259][    C[  256.688810][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
0] net_ratelimit[  256.702182][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
: 18401 callback[  256.716398][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
s suppressed
Ma[  256.728708][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
y 18 03:33:40 sy[  256.741969][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
zkaller kern.warn kernel: [  256.618278][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:33:40 syzkaller kern.warn kernel: [  256.636517][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:33:40 syzkaller kern.warn kernel: [  256.648801][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:33:40 syzkaller kern.warn kernel: [  256.662268][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:33:40 syzkaller kern.warn kernel: [  256.675489][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:33:40 syzkaller kern.warn kernel: [  256.688810][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:33:40 syzkaller kern.warn kernel: [  256.702182][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:33:40 syzkaller kern.warn kernel: [  256.716398][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:33:40 syzkaller kern.warn kernel: [  256.728708][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:33:40 syzkaller kern.warn kernel: [  256.741969][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  257.070366][T13955] xt_policy: neither incoming nor outgoing policy selected
May 18 03:33:40 syzkaller kern.info kernel: [  257.070366][T13955] xt_policy: neither incoming nor outgoing policy selected
[  260.041367][   T29] kauditd_printk_skb: 121 callbacks suppressed
[  260.041386][   T29] audit: type=1400 audit(2000000023.505:8981): avc:  denied  { read write } for  pid=14052 comm="syz.3.3815" name="vbi2" dev="devtmpfs" ino=965 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l_device_t tclass=chr_file permissive=0
May 18 03:33:43 [  260.111181][   T29] audit: type=1400 audit(2000000023.547:8982): avc:  denied  { read write } for  pid=5822 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0
syzkaller kern.warn kernel: [  260.041367][   T29] kauditd_printk_skb: 121 callbacks suppressed
May 18 03:33:43 syzkaller kern.notice kernel: [  260.041386][   T29] audit: type=1400 audit(2000000023.505:8981): avc:  denied  { read write } for  pid=14052 comm="syz.3.3815" name="vbi2" dev="devtmpfs" ino=965 scontext=root:sysadm_r:sysadm_t tcontext=sys[  260.166294][   T29] audit: type=1400 audit(2000000023.557:8983): avc:  denied  { read write } for  pid=5816 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0
tem_u:object_r:v4l_
May 18 03:33:43 syzkaller kern.notice kernel: [  260.111181][   T29] audit: type=1400 audit(2000000023.547:8982): avc:  denied  { read write } for  pid=5822 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi
May 18 03:33:43 syzkaller kern.notice kernel: [  260.166294][   T29] audit: type=1400 audit(2000000023.557:8983): avc:  denied  { read write } for  pid=5816 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi
[  260.241992][   T29] audit: type=1400 audit(2000000023.704:8984): avc:  denied  { read write } for  pid=5822 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0
[  260.343784][   T29] audit: type=1400 audit(2000000023.714:8985): avc:  denied  { read write } for  pid=5816 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0
[  260.494909][   T29] audit: type=1400 audit(2000000023.725:8986): avc:  denied  { read } for  pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0
[  260.573481][   T29] audit: type=1400 audit(2000000023.725:8987): avc:  denied  { read } for  pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0
May 18 03:33:44 syzkaller kern.n[  260.656170][   T29] audit: type=1400 audit(2000000023.767:8988): avc:  denied  { read } for  pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0
otice kernel: [  260.241992][   T29] audit: type=1400 audit(2000000023.704:8984): avc:  denied  { read write } for  pid=5822 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi
May 18 03:33:44 syzkaller kern.notice kernel: [  260.343784][   T29] audit: type=1400 audit(2000000023.714:8985): avc:  denied  { read write } for  pid=5816 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi
May 18 03:33:44 syzkaller kern.notice kernel: [  260.494909][   T29] audit: type=1400 audit(2000000023.725:8986): avc:  denied  { read } for  pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=
May 18 03:33:44 syzkaller kern.notice kernel: [  260.573481][   T29] audit: type=1400 audit(2000000023.725:8987): avc:  denied  { re[  260.759349][   T29] audit: type=1400 audit(2000000023.830:8989): avc:  denied  { create } for  pid=14062 comm="syz.0.3812" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=0
ad } for  pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=
May 18 03:33:44 syzkaller kern.notice kernel: [  260.656170][   T29] audit: type=1400 audit(2000000023.767:8988): avc:  denied  { read } for  pi[  260.805503][T14082] ���]-�: renamed from lo
d=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=
May 18 03:33:44 syzkaller kern.notice kernel: [  260.759349][   T29] audit: type=1400 audit(2000000023.830:8989): avc:  denied  { create } for  pid=14062 comm="syz.0.3812" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t[  260.842513][   T29] audit: type=1400 audit(2000000023.830:8990): avc:  denied  { read } for  pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0
 tclass=chr_file permi
May 18 03:33:44 syzkaller kern.info kernel: [  260.805503][T14082] ���]-�: renamed from lo
[  260.922731][T14086] netlink: 'syz.2.3827': attribute type 3 has an invalid length.
May 18 03:33:44 syzkaller kern.notice kernel: [  260.842513][   T29] audit: type=1400 audit(2000000023.830:8990): avc:  denied  { read } for  pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=
May 18 03:33:44 syzkaller kern.warn kernel: [  260.922731][T14086] netlink: 'syz.2.3827': attribute type 3 has an invalid length.
[  261.390166][    C0] net_ratelimit: 19339 callbacks suppressed
[  261.390181][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:33:45 [  261.408460][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
syzkaller kern.warn kernel: [  261.390166][    C0] net_ratelimit: 19339 callbacks suppressed
[  261.422684][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  261.422945][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  261.423205][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  261.423441][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  261.423731][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  261.423983][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  261.424201][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  261.424453][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:33:45 syzkaller kern.warn kernel: [  261.390181][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:33:45 syzkaller kern.warn kernel: [  261.408460][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:33:45 syzkaller kern.warn kernel: [  261.422684][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:33:45 syzkaller kern.warn kernel: [  261.422945][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:33:45 syzkaller kern.warn kernel: [  261.423205][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:33:45 syzkaller kern.warn kernel: [  261.423441][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:33:45 syzkaller kern.warn kernel: [  261.423731][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:33:45 syzkaller kern.warn kernel: [  261.423983][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:33:45 syzkaller kern.warn kernel: [  261.424201][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:33:45 syzkaller kern.warn kernel: [  261.424453][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  262.143012][T14126] netlink: 36 bytes leftover after parsing attributes in process `syz.1.3844'.
May 18 03:33:45 syzkaller kern.warn kernel: [  262.143012][T14126] netlink: 36 bytes leftover after parsing attributes in process `syz.1.3844'.
[  262.393458][T14116] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(3)
[  262.400187][T14116] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless)
May 18 03:33:46 syzkaller kern.info kernel: [  262.393458][T14116] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(3)
May 18 03:33:46 syzkaller kern.info kernel: [  262.400187][T14116] vhci_hcd[  262.424177][T14116] vhci_hcd vhci_hcd.0: Device attached
 vhci_hcd.0: devid(0) speed(4) speed_str(wireless)
May 18 03:33:46 syzkaller kern.i[  262.459513][T14117] vhci_hcd: connection closed
nfo kernel: [  2[  262.459855][ T5042] vhci_hcd: stop threads
62.424177][T14116] vhci_hcd vhci_hcd.0: Device attached
May 18 03:33:46 syzkaller kern.info kernel: [  262.459513][T14117] vhci_hcd: connection closed
May 18 03:33:46 syzkaller kern.info kernel: [  262.459855][ T5042] vhci_hcd: stop threads
[  262.509215][ T5042] vhci_hcd: release socket
May 18 03:33:46 syzkaller kern.info kernel: [  262.509215][ T5042] vhci_hcd: release socket
[  262.541288][ T5042] vhci_hcd: disconnect device
May 18 03:33:46 syzkaller kern.info kernel: [  262.541288][ T5042] vhci_hcd: disconnect device
[  262.591147][ T5913] vhci_hcd: vhci_device speed not set
May 18 03:33:46 syzkaller kern.err kernel: [  262.591147][ T5913] vhci_hcd: vhci_device speed not set
[  263.154614][T14161] xt_recent: Unsupported userspace flags (000000da)
May 18 03:33:46 syzkaller kern.info kernel: [  263.154614][T14161] xt_recent: Unsupported userspace flags (000000da)
[  264.856942][   T29] kauditd_printk_skb: 126 callbacks suppressed
[  264.856958][   T29] audit: type=1400 audit(2000000028.701:9117): avc:  denied  { write } for  pid=14224 comm="syz.0.3894" name="xfrm_stat" dev="proc" ino=4026532888 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=0
May 18 03:33:48 syzkaller kern.warn kernel: [  264.856942][   T29] kauditd_printk_skb: 126 callbacks suppressed
May 18 03:33:48 syzkaller kern.notice kernel: [  264.856958][   T29] audit: type=1400 audit(2000000028.701:9117): avc:  denied  { write } for  pid=14224 comm="syz.0.3894" name="xfrm_stat" dev="proc" ino=4026532888 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:p
[  265.058343][   T29] audit: type=1400 audit(2000000028.796:9118): avc:  denied  { read write } for  pid=5821 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0
May 18 03:33:48 syzkaller kern.notice kernel: [  265.058343][   T29] audit: type=1400 audit(2000000028.796:9118): avc:  denied  { read write } f[  265.111443][   T29] audit: type=1400 audit(2000000028.859:9119): avc:  denied  { read write } for  pid=5812 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0
or  pid=5821 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=sy[  265.145575][   T29] audit: type=1400 audit(2000000028.869:9120): avc:  denied  { read write } for  pid=5816 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0
stem_u:object_r:fi
May 18 03:33:49 syzkaller kern.notice kernel: [  265.111443][   T29] audit: type=1400 audit(2000000028.859:9119): avc:  denied  { read write } for  pid=5812 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi
May 18 03:33:49 syzkaller kern.notice kernel: [  265.145575][   T29] audit: type=1400 audit(2000000028.869:9120): avc:  denied  { read write } for  pid=5816 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi
[  266.162563][    C0] net_ratelimit: 20186 callbacks suppressed
[  266.162581][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:33:50 [  266.180898][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
syzkaller kern.w[  266.194395][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  266.194636][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
arn kernel: [  2[  266.219728][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
66.162563][    C[  266.232937][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
0] net_ratelimit[  266.246276][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
: 20186 callback[  266.259598][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
s suppressed
[  266.272960][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  266.286028][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:33:50 syzkaller kern.warn kernel: [  266.162581][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:33:50 syzkaller kern.warn kernel: [  266.180898][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:33:50 syzkaller kern.warn kernel: [  266.194395][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:33:50 syzkaller kern.warn kernel: [  266.194636][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:33:50 syzkaller kern.warn kernel: [  266.219728][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:33:50 syzkaller kern.warn kernel: [  266.232937][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:33:50 syzkaller kern.warn kernel: [  266.246276][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:33:50 syzkaller kern.warn kernel: [  266.259598][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:33:50 syzkaller kern.warn kernel: [  266.272960][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:33:50 syzkaller kern.warn kernel: [  266.286028][    C0] b[  266.463041][   T29] audit: type=1400 audit(2000000028.869:9121): avc:  denied  { read } for  pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0
ridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:33:50 syzkaller kern.notice kernel: [  266.463041][   T29] audit: type=1400 audit(2000000028.869:9121): avc:  denied  { read } for  pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=
[  266.551553][   T29] audit: type=1400 audit(2000000028.869:9122): avc:  denied  { read } for  pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0
May 18 03:33:50 syzkaller kern.notice kernel: [  266.551553][   T29] audit: type=1400 audit(2000000028.869:9122): avc:  denied  { read } for  pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=
[  266.637750][   T29] audit: type=1400 audit(2000000028.880:9123): avc:  denied  { read write } for  pid=5822 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0
[  267.171906][ T5822] audit: audit_backlog=65 > audit_backlog_limit=64
[  267.208003][ T5821] audit: audit_backlog=65 > audit_backlog_limit=64
[  267.215904][T14307] netlink: 16 bytes leftover after parsing attributes in process `syz.1.3931'.
[  267.225596][ T5822] audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64
May 18 03:33:51 syzkaller kern.notice kernel: [  266.637750][   T29] audit: type=1400 audit(2000000028.880:9123): avc:  denied  { read write } for  pid=5822 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi
May 18 03:33:51 syzkaller kern.warn kernel: [  267.171906][ T5822] audit: audit_backlog=65 > audit_backlog_limit=64
May 18 03:33:51 syzkaller kern.warn kernel: [  267.208003][ T5821] audit: audit_backlog=65 > audit_backlog_limit=64
May 18 03:33:51 syzkaller kern.warn kernel: [  267.215904][T14307] netlink: 16 bytes leftover after parsing attributes in process `syz.1.3931'.
May 18 03:33:51 syzkaller kern.warn kernel: [  267.225596][ T5822] audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64
[  267.689304][T14323] JFS: charset not found
May 18 03:33:51 syzkaller kern.err kernel: [  267.689304][T14323] JFS: charset not found
[  269.644924][   T29] kauditd_printk_skb: 202 callbacks suppressed
[  269.644940][   T29] audit: type=1400 audit(2000000033.730:9215): avc:  denied  { read write } for  pid=5816 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0
[  269.783006][   T29] audit: type=1400 audit(2000000033.824:9216): avc:  denied  { read write } for  pid=5812 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0
May 18 03:33:53 syzkaller kern.warn kernel: [  269.644924][   T29] kauditd_printk_skb: 202 callbacks suppressed
May 18 03:33:53 syzkaller kern.notice kernel: [  269.644940][   T29] audit: type=1400 audit(2000000033.730:9215): avc:  denied  { read write } for  pid=5816 comm="syz-executor[  269.867358][   T29] audit: type=1400 audit(2000000033.866:9217): avc:  denied  { read write } for  pid=14358 comm="syz.4.3956" name="nvram" dev="devtmpfs" ino=623 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nvram_device_t tclass=chr_file permissive=0
" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi
May 18 03:33:53 syzkaller kern.notice kernel: [  269.783006][   T29] audit: type=1400 audit(2000000033.824:9216): avc:  denied  { read write } for  pid=5812 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi
[  269.982956][   T29] audit: type=1400 audit(2000000033.940:9218): avc:  denied  { read } for  pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0
May 18 03:33:54 syzkaller kern.notice kernel: [  269.867358][   T29] audit: type=1400 audit(2000000033.866:9217): avc:  denied  { read write } for  pid=14358 comm="syz.4.3956" name="nvram" dev[  270.054143][   T29] audit: type=1400 audit(2000000033.940:9219): avc:  denied  { read } for  pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0
="devtmpfs" ino=623 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nvr
May 18 03:33:54 syzkaller kern.notice kernel: [  269.982956][   T29] audit: type=1400 audit(2000000033.940:9218): avc:  denied  { read } for  pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=
May 18 03:33:54 syzkaller kern.notice kernel: [  270.054143][   T29] audit: type=1400 audit(2000000033.940:9219): avc:  denied  { read }[  270.119162][   T29] audit: type=1400 audit(2000000033.940:9220): avc:  denied  { read } for  pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0
 for  pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=
May 18 03:33:54 syzkaller kern.notice kernel: [  270.119162][   T29] audit: type=1400 audit(2000000033.940:9220): avc:  denied  { read } for  pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=
[  270.210780][   T29] audit: type=1400 audit(2000000033.950:9221): avc:  denied  { read write } for  pid=5816 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0
[  270.251163][   T29] audit: type=1400 audit(2000000034.003:9222): avc:  denied  { read write } for  pid=5821 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0
[  270.251204][   T29] audit: type=1400 audit(2000000034.024:9223): avc:  denied  { read write } for  pid=5822 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0
[  270.251240][   T29] audit: type=1400 audit(2000000034.150:9224): avc:  denied  { read } for  pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0
May 18 03:33:54 syzkaller kern.notice kernel: [  270.210780][   T29] audit: type=1400 audit(2000000033.950:9221): avc:  denied  { read write } for  pid=5816 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi
May 18 03:33:54 syzkaller kern.notice kernel: [  270.251163][   T29] audit: type=1400 audit(2000000034.003:9222): avc:  denied  { read write } for  pid=5821 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi
May 18 03:33:54 syzkaller kern.notice kernel: [  270.251204][   T29] audit: type=1400 audit(2000000034.024:9223): avc:  denied  { read write } for  pid=5822 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi
May 18 03:33:54 syzkaller kern.notice kernel: [  270.251240][   T29] audit: type=1400 audit(2000000034.150:9224): avc:  denied  { read } for  pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=
[  270.934847][    C0] net_ratelimit: 19917 callbacks suppressed
[  270.934867][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  270.953151][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  270.953430][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  270.953703][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  270.953945][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  270.954254][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  270.954498][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  270.954723][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  270.954976][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  270.955275][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:33:55 syzkaller kern.warn kernel: [  270.934847][    C0] net_ratelimit: 19917 callbacks suppressed
May 18 03:33:55 syzkaller kern.warn kernel: [  270.934867][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:33:55 syzkaller kern.warn kernel: [  270.953151][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:33:55 syzkaller kern.warn kernel: [  270.953430][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:33:55 syzkaller kern.warn kernel: [  270.953703][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:33:55 syzkaller kern.warn kernel: [  270.953945][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:33:55 syzkaller kern.warn kernel: [  270.954254][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:33:55 syzkaller kern.warn kernel: [  270.954498][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:33:55 syzkaller kern.warn kernel: [  270.954723][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:33:55 syzkaller kern.warn kernel: [  270.954976][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:33:55 syzkaller kern.warn kernel: [  270.955275][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  274.463928][   T29] kauditd_printk_skb: 122 callbacks suppressed
[  274.463946][   T29] audit: type=1400 audit(2000000038.790:9347): avc:  denied  { create } for  pid=14558 comm="syz.3.4051" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0
May 18 03:33:58 syzkaller kern.warn kernel: [  274.463928][   T29] kauditd_printk_skb: 122 callbacks suppressed
May 18 03:33:58 syzkaller kern.notice kernel: [[  274.597544][   T29] audit: type=1400 audit(2000000038.832:9348): avc:  denied  { read write } for  pid=5821 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0
  274.463946][   T29] audit: type=1400 audit(2000000038.790:9347): avc:  denied  { create } for  pid=14558 comm="syz.3.4051" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=
May 18 03:33:58 syzkaller kern.notice kernel: [  274.597544][   T29] audit: type=1400 audit(2000000038.832:9348): avc:  denied  { read write } for  pid=5821 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi
[  274.704828][   T29] audit: type=1400 audit(2000000038.916:9349): avc:  denied  { read write } for  pid=5822 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0
May 18 03:33:59 syzkaller kern.notice kernel: [  274.704828][   T29] audit: type=1400 audit(2000000038.916:9349): avc:  denied  { read write } for  pid=5822 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi
[  274.813009][   T29] audit: type=1400 audit(2000000038.926:9350): avc:  denied  { read } for  pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0
May 18 03:33:59 syzkaller kern.notice kernel: [  274.813009][   T29] audit: type=1400 audit(2000000038.926:9350): avc:  denied  { read } for  pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=
[  274.908813][   T29] audit: type=1400 audit(2000000038.926:9351): avc:  denied  { read } for  pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0
May 18 03:33:59 syzkaller kern.notice kernel: [  274.908813][   T29] audit: type=1400 audit(2000000038.926:9351): avc:  denied  { read } for  pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=
[  275.024054][   T29] audit: type=1400 audit(2000000038.926:9352): avc:  denied  { read write } for  pid=5816 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0
May 18 03:33:59 syzkaller kern.notice kernel: [  275.024054][   T29] audit: type=1400 audit(2000000038.926:9352): avc:  denied  { read write } for  pid=5816 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi
May 18 03:33:59 syzkaller daemon.err dhcpcd[5484]: ps_sendpsmmsg: Connection refused
May 18 03:33:59 syzkaller daemon.err dhcpcd[5484]: ps_root_recvmsgcb: failed to send message to pid 11134: Connection refused
[  275.160833][   T29] audit: type=1400 audit(2000000038.968:9353): avc:  denied  { read } for  pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0
May 18 03:33:59 syzkaller kern.notice kernel: [  275.160833][   T29] audit: type=1400 audit(2000000038.968:9353): avc:  denied  { read } for  pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=
[  275.267946][   T29] audit: type=1400 audit(2000000039.000:9354): avc:  denied  { read write } for  pid=5825 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0
May 18 03:33:59 syzkaller kern.notice kernel: [  275.267946][   T29] audit: type=1400 audit(2000000039.000:9354): avc:  denied  { read write } for  pid=5825 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi
[  275.418373][   T29] audit: type=1400 audit(2000000039.021:9355): avc:  denied  { read write } for  pid=14565 comm="syz.3.4053" name="video5" dev="devtmpfs" ino=937 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l_device_t tclass=chr_file permissive=0
May 18 03:33:59 syzkaller kern.notice kernel: [  275.418373][   T29] audit: type=1400 audit(2000000039.021:9355): avc:  denied  { read write } for  pid=14565 comm="syz.3.4053" name="video5" dev="devtmpfs" ino=937 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4
[  275.541213][   T29] audit: type=1400 audit(2000000039.073:9356): avc:  denied  { read } for  pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0
May 18 03:33:59 syzkaller kern.notice kernel: [  275.541213][   T29] audit: type=1400 audit(2000000039.073:9356): avc:  denied  { read } for  pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=
[  275.707255][    C0] net_ratelimit: 20244 callbacks suppressed
[  275.707274][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:34:00 [  275.725506][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
syzkaller kern.w[  275.738995][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
arn kernel: [  2[  275.752280][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
75.707255][    C[  275.765568][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
0] net_ratelimit[  275.778843][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
: 20244 callback[  275.792111][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
s suppressed
Ma[  275.805405][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
y 18 03:34:00 sy[  275.818707][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
zkaller kern.war[  275.832016][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
n kernel: [  275.707274][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:34:00 syzkaller kern.warn kernel: [  275.725506][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:34:00 syzkaller kern.warn kernel: [  275.738995][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:34:00 syzkaller kern.warn kernel: [  275.752280][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:34:00 syzkaller kern.warn kernel: [  275.765568][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:34:00 syzkaller kern.warn kernel: [  275.778843][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:34:00 syzkaller kern.warn kernel: [  275.792111][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:34:00 syzkaller kern.warn kernel: [  275.805405][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:34:00 syzkaller kern.warn kernel: [  275.818707][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:34:00 syzkaller daemon.err dhcpcd[5484]: ps_sendpsmmsg: Connection refused
May 18 03:34:00 syzkaller daemon.err dhcpcd[5484]: ps_root_recvmsgcb: failed to send message to pid 11192: Connection refused
May 18 03:34:00 syzkaller kern.warn kernel: [  275.832016][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:34:00 syzkaller daemon.err dhcpcd[5484]: ps_sendpsmmsg: Connection refused
May 18 03:34:00 syzkaller daemon.err dhcpcd[5484]: ps_root_recvmsgcb: failed to send message to pid 11169: Connection refused
May 18 03:34:01 syzkaller daemon.err dhcpcd[5484]: ps_sendpsmmsg: Connection refused
May 18 03:34:01 syzkaller daemon.err dhcpcd[5484]: ps_root_recvmsgcb: failed to send message to pid 11251: Connection refused
[  276.652075][T14615] xt_TPROXY: Can be used only with -p tcp or -p udp
May 18 03:34:01 syzkaller kern.info kernel: [  276.652075][T14615] xt_TPROXY: Can be used only with -p tcp or -p udp
[  279.294917][   T29] kauditd_printk_skb: 97 callbacks suppressed
[  279.294935][   T29] audit: type=1400 audit(2000000043.860:9454): avc:  denied  { read write } for  pid=5825 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0
May 18 03:34:03 syzkaller kern.warn kernel: [  279.294917][   T29] kauditd_printk_skb: 97 callbacks suppressed
May 18 03:34:03 syzkaller kern.notice kernel: [  279.294935][   T29] audit: type=1400 audit(2000000043.860:9454): avc:  denied  { read write } for  pid=5825 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi
[  280.278114][T14713] Cannot find del_set index 0 as target
May 18 03:34:04 syzkaller kern.info kernel: [  280.278114][T14713] Cannot find del_set index 0 as target
[  280.480088][    C0] net_ratelimit: 19674 callbacks suppressed
[  280.480106][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  280.498302][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  280.510624][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  280.522901][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  280.535263][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  280.535496][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  280.535757][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  280.536033][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  280.536254][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  280.536534][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:34:05 syzkaller kern.warn kernel: [  280.480088][    C0] net_ratelimit: 19674 callbacks suppressed
May 18 03:34:05 syzkaller kern.warn kernel: [  280.480106][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:34:05 syzkaller kern.warn kernel: [  280.498302][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:a[  280.926116][   T29] audit: type=1400 audit(2000000043.902:9455): avc:  denied  { read } for  pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0
a:aa:aa:0c, vlan:0)
May 18 03:34:05 syzkaller kern.warn kernel: [  280.510624][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:34:05 syzkaller kern.warn kernel: [  280.522901][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:34:05 syzkaller kern.warn kernel: [  280.535263][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:34:05 syzkaller kern.warn kernel: [  280.535496][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:34:05 syzkaller kern.warn kernel: [  280.535757][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:34:05 syzkaller kern.warn kernel: [  280.536033][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:34:05 syzkaller kern.warn kernel: [  280.536254][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:34:05 syzkaller kern.warn kernel: [  280.536534][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:34:05 syzkaller kern.notice kernel: [  280.926116][   T29] audit: type=1400 audit(2000000043.902:9455): avc:  denied  { read } for  pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=
[  281.737073][T14760] audit: audit_backlog=65 > audit_backlog_limit=64
[  281.772403][T14760] audit: audit_lost=40 audit_rate_limit=0 audit_backlog_limit=64
[  281.780647][ T5172] audit: audit_backlog=65 > audit_backlog_limit=64
[  281.881095][ T5812] audit: audit_backlog=65 > audit_backlog_limit=64
[  281.887642][ T5812] audit: audit_lost=41 audit_rate_limit=0 audit_backlog_limit=64
[  281.895599][   T29] audit: type=1400 audit(2000000043.902:9456): avc:  denied  { read } for  pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0
[  281.918244][ T5812] audit: backlog limit exceeded
[  281.928786][   T29] audit: type=1400 audit(2000000043.955:9457): avc:  denied  { read write } for  pid=5812 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0
[  281.988794][T14765] netdevsim netdevsim0: loading /lib/firmware/. failed with error -22
[  281.997334][T14765] netdevsim netdevsim0: Direct firmware load for . failed with error -22
[  282.005839][T14765] netdevsim netdevsim0: Falling back to sysfs fallback for: .
May 18 03:34:06 syzkaller kern.warn kernel: [  281.737073][T14760] audit: audit_backlog=65 > audit_backlog_limit=64
May 18 03:34:06 syzkaller kern.warn kernel: [  281.772403][T14760] audit: audit_lost=40 audit_rate_limit=0 audit_backlog_limit=64
May 18 03:34:06 syzkaller kern.warn kernel: [  281.780647][ T5172] audit: audit_backlog=65 > audit_backlog_limit=64
May 18 03:34:06 syzkaller kern.warn kernel: [  281.881095][ T5812] audit: audit_backlog=65 > audit_backlog_limit=64
May 18 03:34:06 syzkaller kern.warn kernel: [  281.887642][ T5812] audit: audit_lost=41 audit_rate_limit=0 audit_backlog_limit=64
May 18 03:34:06 syzkaller kern.notice kernel: [  281.895599][   T29] audit: type=1400 audit(2000000043.902:9456): avc:  denied  { read } for  pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=
May 18 03:34:06 syzkaller kern.err kernel: [  281.918244][ T5812] audit: backlog limit exceeded
May 18 03:34:06 syzkaller kern.notice kernel: [  281.928786][   T29] audit: type=1400 audit(2000000043.955:9457): avc:  denied  { read write } for  pid=5812 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi
May 18 03:34:06 syzkaller kern.warn kernel: [  281.988794][T14765] netdevsim netdevsim0: loading /lib/firmware/. failed with error -22
May 18 03:34:06 syzkaller kern.warn kernel: [  281.997334][T14765] netdevsim netdevsim0: Direct firmware load for . failed with error -22
May 18 03:34:06 syzkaller kern.warn kernel: [  282.005839][T14765] netdevsim netdevsim0: Falling back to sysfs fallback for: .
[  284.080016][   T29] kauditd_printk_skb: 103 callbacks suppressed
[  284.080039][   T29] audit: type=1400 audit(2000000048.889:9558): avc:  denied  { read write } for  pid=5821 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0
May 18 03:34:08 syzkaller kern.warn kernel: [  284.080016][   T29] kauditd_printk_skb: 103 callbacks suppressed
May 18 03:34:08 syzkaller kern.notice kernel: [  284.080039][   T29] audit: type=1400 audit(2000000048.889:9558): avc:  denied  { read write } for  pid=5821 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi
[  284.156015][   T29] audit: type=1400 audit(2000000048.931:9559): avc:  denied  { read } for  pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0
May 18 03:34:08 syzkaller kern.notice kernel: [  284.156015][   T29] audit: type=1400 audit(2000000048.931:9559): avc:  denied  { read } for  pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=
[  284.223286][   T29] audit: type=1400 audit(2000000048.931:9560): avc:  denied  { read } for  pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0
May 18 03:34:09 syzkaller kern.notice kernel: [  284.223286][   T29] audit: type=1400 audit(2000000048.931:9560): avc:  denied  { read } for  pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=
[  284.285895][   T29] audit: type=1400 audit(2000000048.962:9561): avc:  denied  { create } for  pid=14808 comm="syz.4.4167" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0
May 18 03:34:09 syzkaller kern.notice kernel: [  284.285895][   T29] audit: type=1400 audit(2000000048.962:9561): avc:  denied  { create } for  pid=14808 comm="syz.4.4167" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permis
[  284.346123][   T29] audit: type=1400 audit(2000000049.004:9562): avc:  denied  { read } for  pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0
May 18 03:34:09 syzkaller kern.notice kernel: [  284.346123][   T29] audit: type=1400 audit(2000000049.004:9562): avc:  denied  { read } for  pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=
[  284.400076][   T29] audit: type=1400 audit(2000000049.025:9563): avc:  denied  { read write } for  pid=5821 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0
May 18 03:34:09 syzkaller kern.notice kernel: [  284.400076][   T29] audit: type=1400 audit(2000000049.025:9563): avc:  denied  { read write } for  pid=5821 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi
[  284.465564][   T29] audit: type=1400 audit(2000000049.067:9564): avc:  denied  { read } for  pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0
May 18 03:34:09 syzkaller kern.notice kernel: [  284.465564][   T29] audit: type=1400 audit(2000000049.067:9564): avc:  denied  { read } for  pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=
[  284.523114][   T29] audit: type=1400 audit(2000000049.130:9565): avc:  denied  { read } for  pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0
May 18 03:34:09 syzkaller kern.notice kernel: [  284.523114][   T29] audit: type=1400 audit(2000000049.130:9565): avc:  denied  { read } for  pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=
[  284.589309][   T29] audit: type=1400 audit(2000000049.151:9566): avc:  denied  { read write } for  pid=5821 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0
May 18 03:34:09 syzkaller kern.notice kernel: [  284.589309][   T29] audit: type=1400 audit(2000000049.151:9566): avc:  denied  { read write } for  pid=5821 comm="syz-executor"[  284.629017][   T29] audit: type=1400 audit(2000000049.193:9567): avc:  denied  { read } for  pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0
 name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi
May 18 03:34:09 syzkaller kern.notice kernel: [  284.629017][   T29] audit: type=1400 audit(2000000049.193:9567): avc:  denied  { read } for  pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=
[  285.251865][    C0] net_ratelimit: 23473 callbacks suppressed
[  285.251879][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  285.270034][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  285.282327][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  285.282549][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  285.282802][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  285.318919][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:34:10 [  285.331202][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
syzkaller kern.w[  285.344541][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
arn kernel: [  2[  285.357953][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
85.251865][    C[  285.371201][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
0] net_ratelimit: 23473 callbacks suppressed
May 18 03:34:10 syzkaller kern.warn kernel: [  285.251879][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:34:10 syzkaller kern.warn kernel: [  285.270034][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:34:10 syzkaller kern.warn kernel: [  285.282327][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:34:10 syzkaller kern.warn kernel: [  285.282549][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:34:10 syzkaller kern.warn kernel: [  285.282802][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:34:10 syzkaller kern.warn kernel: [  285.318919][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:34:10 syzkaller kern.warn kernel: [  285.331202][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:34:10 syzkaller kern.warn kernel: [  285.344541][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:34:10 syzkaller kern.warn kernel: [  285.357953][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:34:10 syzkaller kern.warn kernel: [  285.371201][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  286.308495][T14841] xt_cluster: you have exceeded the maximum number of cluster nodes (127 > 32)
May 18 03:34:11 syzkaller kern.info kernel: [  286.308495][T14841] xt_cluster: you have exceeded the maximum number of cluster nodes (127 > 32)
[  290.024517][    C0] net_ratelimit: 29752 callbacks suppressed
[  290.030472][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  290.041010][   T29] kauditd_printk_skb: 44 callbacks suppressed
[  290.041024][   T29] audit: type=1400 audit(2000000055.146:9612): avc:  denied  { read } for  pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0
[  290.042728][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  290.082775][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  290.083037][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  290.083270][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  290.083520][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  290.083802][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  290.084024][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  290.084316][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  290.084555][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:34:15 [  290.279068][   T29] audit: type=1400 audit(2000000055.397:9613): avc:  denied  { read } for  pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0
syzkaller kern.warn kernel: [  290.024517][    C0] net_ratelimit: 29752 callbacks suppressed
May 18 03:34:15 syzkaller kern.warn kernel: [  290.030472][    C0][  290.315252][   T29] audit: type=1400 audit(2000000055.429:9614): avc:  denied  { read } for  pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0
 bridge0: received packet on veth0_to_bridge with own address as source address [  290.344704][   T29] audit: type=1400 audit(2000000055.429:9615): avc:  denied  { read } for  pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0
(addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:34:15 syzkaller kern.warn kernel: [  290.041010][   [  290.374579][   T29] audit: type=1400 audit(2000000055.429:9616): avc:  denied  { read } for  pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0
T29] kauditd_printk_skb: 44 callbacks suppressed
May 18 03:34:15 syzkaller kern[  290.403094][   T29] audit: type=1400 audit(2000000055.429:9617): avc:  denied  { read } for  pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0
.notice kernel: [  290.041024][   T29] audit: type=1400 audit(2000000055.146:9612): avc:  denied[  290.433494][   T29] audit: type=1400 audit(2000000055.429:9618): avc:  denied  { read } for  pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0
  { read } for  pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcon[  290.465978][   T29] audit: type=1400 audit(2000000055.429:9619): avc:  denied  { read } for  pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0
text=system_u:object_r:var_t tclass=
May 18 03:34:15 syzkaller kern.warn kernel[  290.494079][   T29] audit: type=1400 audit(2000000055.429:9620): avc:  denied  { read } for  pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0
: [  290.042728][    C0] bridge0: received packet on bridge_slave_0 with own add[  290.523001][   T29] audit: type=1400 audit(2000000055.429:9621): avc:  denied  { read } for  pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0
ress as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:34:15 syzkaller kern.warn kernel: [  290.082775][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:34:15 syzkaller kern.warn kernel: [  290.083037][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:34:15 syzkaller kern.warn kernel: [  290.083270][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:34:15 syzkaller kern.warn kernel: [  290.083520][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:34:15 syzkaller kern.warn kernel: [  290.083802][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:34:15 syzkaller kern.warn kernel: [  290.084024][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:34:15 syzkaller kern.warn kernel: [  290.084316][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:34:15 syzkaller kern.warn kernel: [  290.084555][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:34:15 syzkaller kern.notice kernel: [  290.279068][   T29] audit: type=1400 audit(2000000055.397:9613): avc:  denied  { read } for  pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=
May 18 03:34:15 syzkaller kern.notice kernel: [  290.315252][   T29] audit: type=1400 audit(2000000055.429:9614): avc:  denied  { read } for  pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=
May 18 03:34:15 syzkaller kern.notice kernel: [  290.344704][   T29] audit: type=1400 audit(2000000055.429:9615): avc:  denied  { read } for  pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=
May 18 03:34:15 syzkaller kern.notice kernel: [  290.374579][   T29] audit: type=1400 audit(2000000055.429:9616): avc:  denied  { read } for  pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=
May 18 03:34:15 syzkaller kern.notice kernel: [  290.403094][   T29] audit: type=1400 audit(2000000055.429:9617): avc:  denied  { read } for  pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=
May 18 03:34:15 syzkaller kern.notice kernel: [  290.433494][   T29] audit: type=1400 audit(2000000055.429:9618): avc:  denied  { read } for  pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=
May 18 03:34:15 syzkaller kern.notice kernel: [  290.465978][   T29] audit: type=1400 audit(2000000055.429:9619): avc:  denied  { read } for  pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=
May 18 03:34:15 syzkaller kern.notice kernel: [  290.494079][   T29] audit: type=1400 audit(2000000055.429:9620): avc:  denied  { read } for  pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=
May 18 03:34:15 syzkaller kern.notice kernel: [  290.523001][   T29] audit: type=1400 audit(2000000055.429:9621): avc:  denied  { read } for  pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=
[  294.609938][T14856] TCP: TCP_TX_DELAY enabled
May 18 03:34:19 syzkaller kern.info kernel: [  294.609938][T14856] TCP: TCP_TX_DELAY enabled
[  294.797074][    C0] net_ratelimit: 30744 callbacks suppressed
[  294.797093][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  294.815304][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  294.819491][   T29] kauditd_printk_skb: 24 callbacks suppressed
[  294.819503][   T29] audit: type=1400 audit(2000000060.164:9646): avc:  denied  { read } for  pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0
[  294.827551][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  294.867695][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  294.868015][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  294.868290][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  294.868492][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  294.880640][T14865] xt_hashlimit: overflow, rate too high: 0
[  294.892583][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  294.904535][   T29] audit: type=1400 audit(2000000060.216:9647): avc:  denied  { create } for  pid=14861 comm="syz.0.4194" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0
[  294.916692][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  294.967141][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  295.035498][   T29] audit: type=1400 audit(2000000060.290:9648): avc:  denied  { create } for  pid=14864 comm="syz.3.4196" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0
May 18 03:34:20 syzkaller kern.warn kernel: [  294.797074][    C0] net_ratelimit: 30744 callbacks suppressed
May 18 03:34:20 syzkaller kern.warn kernel: [  294.797093][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:34:20 syzkaller kern.warn kernel: [  294.815304][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:34:20 syzkaller kern.warn kernel: [  294.819491][   T29] kauditd_printk_skb: 24 callbacks suppressed
May 18 03:34:20 syzkaller kern.notice kernel: [  294.819503][   T29] audit: type=1400 audit(2000000060.164:9646): avc:  denied  { read } for  pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=
May 18 03:34:20 syzkaller kern.warn kernel: [  294.827551][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:34:20 syzkaller kern.warn kernel: [  294.867695][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:34:20 syzkaller kern.warn kernel: [  294.868015][    C0] bridge0: received packet on veth0_to_bridge with own address a[  295.188582][   T29] audit: type=1400 audit(2000000060.332:9649): avc:  denied  { read write } for  pid=5816 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0
s source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:34:20 syzkaller kern.warn kernel: [  294.868290][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:34:20 syzkaller kern.warn kernel: [  294.868492][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:34:20 syzkaller kern.info kernel: [  294.880640][T14865] xt_hashlimit: overflow, rate too high: 0
May 18 03:34:20 syzkaller kern.warn kernel: [  294.892583][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:34:20 syzkaller kern.notice kernel: [  294.904535][   T29] audit: type=1400 audit(2000000060.216:9647): avc:  denied  { create } for  pid=14861 comm="syz.0.4194" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permis
May 18 03:34:20 syzkaller kern.warn kernel: [  294.916692][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:34:20 syzkaller kern.warn kernel: [  294.967141][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
May 18 03:34:20 syzkaller kern.notice kernel: [  295.035498][   T29] audit: type=1400 audit(2000000060.290:9648): avc:  denied  { create } for  pid=14864 comm="syz.3.4196" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permis
May 18 03:34:20 syzkaller kern.notice kernel: [  295.188582][   T29] audit: type=1400 audit(2000000060.332:9649): avc:  denied  { read write } for  pid=5816 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi
[  295.593655][   T29] audit: type=1400 audit(2000000060.363:9650): avc:  denied  { read write } for  pid=5812 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0
May 18 03:34:21 syzkaller kern.notice kernel: [  295.593655][   [  295.634338][   T29] audit: type=1400 audit(2000000060.384:9651): avc:  denied  { read write } for  pid=5822 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0
T29] audit: type=1400 audit(2000000060.363:9650): avc:  denied  { read write } for  pid=5812 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi
[  295.787022][   T29] audit: type=1400 audit(2000000060.426:9652): avc:  denied  { read write } for  pid=5825 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0
[  295.824600][   T29] audit: type=1400 audit(2000000060.426:9653): avc:  denied  { read } for  pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0
[  295.853369][   T29] audit: type=1400 audit(2000000060.426:9654): avc:  denied  { read } for  pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0
May 18 03:34:21 syzkaller kern.notice kernel: [  295.634338][   T29] audit: type=1400 audit(2000000060.384:9651): avc:  denied  { read write } for  pid=5822 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi
May 18 03:34:21 syzkaller kern.notice kernel: [  295.787022][   T29] audit: type=1400 audit(2000000060.426:9652): avc:  denied  { read write } for  pid=5825 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi
May 18 03:34:21 syzkaller kern.notice ke[  295.968542][   T29] audit: type=1400 audit(2000000060.437:9655): avc:  denied  { read } for  pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0
rnel: [  295.824600][   T29] audit: type=1400 audit(2000000060.426:9653): avc:  denied  { read } for  pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=
May 18 03:34:21 syzkaller kern.notice kernel: [  295.853369][   T29] audit: type=1400 audit(2000000060.426:9654): avc:  denied  { read } for  pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=
May 18 03:34:21 syzkaller kern.notice kernel: [  295.968542][   T29] audit: type=1400 audit(2000000060.437:9655): avc:  denied  { read } for  pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=
[  298.099255][T14973] PKCS8: Unsupported PKCS#8 version
May 18 03:34:23 syzkaller kern.warn kernel: [  298.099255][T14973] PKCS8: Unsupported PKCS#8 version
[  299.569249][    C0] net_ratelimit: 19872 callbacks suppressed
[  299.569268][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  299.569400][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  299.575387][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  299.587382][    C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  299.599342][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  299.611365][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  299.623259][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  299.635044][    C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  299.647041][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  299.658941][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  304.341589][    C0] net_ratelimit: 37141 callbacks suppressed
[  304.341610][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  304.341631][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  304.347712][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  304.359689][    C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  304.371659][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  304.383582][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  304.395437][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  304.407252][    C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  304.419210][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  304.431233][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  309.113958][    C0] net_ratelimit: 31250 callbacks suppressed
[  309.113980][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  309.114066][    C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  309.120083][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  309.132126][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  309.143967][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  309.155806][    C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  309.167865][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  309.179704][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  309.191521][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  309.203493][    C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  310.731247][ T5862] sched: DL replenish lagged too much
[  312.609947][   T29] kauditd_printk_skb: 127 callbacks suppressed
[  312.609969][   T29] audit: type=1400 audit(2000000078.787:9783): avc:  denied  { create } for  pid=14990 comm="syz.3.4254" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0
[  313.024471][ T1290] ieee802154 phy0 wpan0: encryption failed: -22
[  313.038668][ T1290] ieee802154 phy1 wpan1: encryption failed: -22
[  313.886235][    C0] net_ratelimit: 31166 callbacks suppressed
[  313.886255][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  313.886309][    C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  313.892373][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[  313.904312][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  313.916130][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  313.928008][    C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  313.940009][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  313.951865][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  313.963683][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  313.975647][    C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  318.658661][    C0] net_ratelimit: 33877 callbacks suppressed
[  318.658682][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  318.658801][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  318.665293][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  318.676670][    C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  318.688671][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  318.700638][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  318.712560][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  318.724608][    C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  318.736521][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[  318.748404][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  323.430905][    C1] net_ratelimit: 34115 callbacks suppressed
[  323.430925][    C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  323.430931][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  323.431145][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[  323.437072][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  323.448927][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  323.460809][    C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  323.472732][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  323.484674][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  323.496486][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  323.508447][    C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  328.203260][    C1] net_ratelimit: 31977 callbacks suppressed
[  328.203281][    C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  328.203352][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  328.209456][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  328.221303][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  328.233246][    C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  328.245198][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  328.257237][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  328.269146][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[  328.280910][    C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  328.292886][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  330.421221][   T29] audit: type=1400 audit(2000000096.980:9784): avc:  denied  { read } for  pid=5172 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0
May 18 03:34:33 syzkaller kern.warn kernel: [  299.569249][    C0] net_ratelimit: 19872 callbacks suppressed[  332.975681][    C1] net_ratelimit: 30436 callbacks suppressed
[  332.975701][    C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  332.975741][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  332.981869][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:a6:d1:6f:f0:78, vlan:0)
[  332.993715][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[  333.005594][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  333.017564][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  333.029411][    C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  333.041390][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  333.053280][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:a6:d1:6f:f0:78, vlan:0)
[  333.065088][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  337.747908][    C0] net_ratelimit: 32189 callbacks suppressed
[  337.747929][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  337.748095][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  337.754094][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  337.765923][    C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  337.777878][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  337.789904][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:a6:d1:6f:f0:78, vlan:0)
[  337.802260][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  337.813645][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  337.825581][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  337.837551][    C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)

[  342.520346][    C1] net_ratelimit: 31723 callbacks suppressed
[  342.520367][    C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  342.520686][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  342.526513][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:a6:d1:6f:f0:78, vlan:0)
[  342.538364][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  342.550357][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  342.562291][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  342.574246][    C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  342.586222][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[  342.598119][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:a6:d1:6f:f0:78, vlan:0)
[  342.609986][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  347.292750][    C1] net_ratelimit: 33646 callbacks suppressed
[  347.292770][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  347.292867][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  347.298862][    C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  347.310897][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  347.322867][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:a6:d1:6f:f0:78, vlan:0)
[  347.334681][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  347.346685][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  347.358654][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[  347.370477][    C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  347.382459][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  352.065091][    C1] net_ratelimit: 34167 callbacks suppressed
[  352.065111][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  352.065163][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  352.071221][    C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  352.083215][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  352.095262][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:a6:d1:6f:f0:78, vlan:0)
[  352.107033][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  352.119018][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  352.130981][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[  352.142835][    C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  352.154837][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  356.837244][    C0] net_ratelimit: 33589 callbacks suppressed
[  356.837265][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  356.837308][    C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  356.843387][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  356.855395][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:a6:d1:6f:f0:78, vlan:0)
[  356.867771][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  356.879139][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  356.891097][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  356.903040][    C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  356.915005][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  356.927024][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:a6:d1:6f:f0:78, vlan:0)
[  361.609658][    C1] net_ratelimit: 31581 callbacks suppressed
[  361.609677][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:a6:d1:6f:f0:78, vlan:0)
[  361.609906][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  361.615846][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  361.628219][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  361.640276][    C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  361.652736][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  361.664170][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:a6:d1:6f:f0:78, vlan:0)
[  361.676009][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  361.687980][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  361.699884][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  366.381969][    C1] net_ratelimit: 31545 callbacks suppressed
[  366.381988][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  366.382055][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  366.388073][    C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  366.400596][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  366.411987][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:a6:d1:6f:f0:78, vlan:0)
[  366.423828][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  366.435791][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  366.447719][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  366.459696][    C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  366.471670][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[  371.154244][    C1] net_ratelimit: 34079 callbacks suppressed
[  371.154266][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  371.154330][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  371.160363][    C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  371.172870][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  371.184283][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:a6:d1:6f:f0:78, vlan:0)
[  371.196108][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  371.208070][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  371.220010][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  371.231979][    C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  371.243947][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[  375.926703][    C1] net_ratelimit: 34209 callbacks suppressed
[  375.926723][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  375.926762][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  375.932811][    C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  375.944791][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  375.956826][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:a6:d1:6f:f0:78, vlan:0)
[  375.969165][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  375.980551][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  375.992512][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  376.004464][    C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  376.016412][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  380.699022][    C0] net_ratelimit: 33826 callbacks suppressed
[  380.699043][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  380.699126][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:a6:d1:6f:f0:78, vlan:0)
[  380.705154][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  380.717135][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  380.729238][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[  380.741085][    C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  380.753025][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  380.764902][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:a6:d1:6f:f0:78, vlan:0)
[  380.776777][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  380.788704][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  385.471359][    C1] net_ratelimit: 33231 callbacks suppressed
[  385.471378][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:a6:d1:6f:f0:78, vlan:0)
[  385.471435][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  385.477522][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  385.489460][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  385.501524][    C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  385.514020][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  385.525558][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:a6:d1:6f:f0:78, vlan:0)
[  385.537361][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  385.549276][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  385.561260][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  390.243604][    C0] net_ratelimit: 33301 callbacks suppressed
[  390.243624][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  390.243744][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  390.249719][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  390.261702][    C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  390.273699][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[  390.285575][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:a6:d1:6f:f0:78, vlan:0)
[  390.297423][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  390.309320][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  390.321278][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  390.333110][    C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  395.015931][    C1] net_ratelimit: 32565 callbacks suppressed
[  395.015951][    C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  395.016101][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[  395.022203][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:a6:d1:6f:f0:78, vlan:0)
[  395.034190][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  395.045994][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  395.057968][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  395.069789][    C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  395.081763][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  395.093772][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:a6:d1:6f:f0:78, vlan:0)
[  395.106105][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  399.788431][    C0] net_ratelimit: 34167 callbacks suppressed
[  399.788451][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  399.788485][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:a6:d1:6f:f0:78, vlan:0)
[  399.794538][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  399.806552][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  399.818517][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[  399.830359][    C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  399.842337][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  399.854232][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:a6:d1:6f:f0:78, vlan:0)
[  399.866196][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  399.878042][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  404.560621][    C1] net_ratelimit: 34059 callbacks suppressed
[  404.560642][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:a6:d1:6f:f0:78, vlan:0)
[  404.560678][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  404.566779][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  404.578740][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  404.590697][    C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  404.602664][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  404.614669][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:a6:d1:6f:f0:78, vlan:0)
[  404.626545][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[  404.638408][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  404.650626][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  409.333032][    C1] net_ratelimit: 34029 callbacks suppressed
[  409.333053][    C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  409.333166][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  409.339197][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:a6:d1:6f:f0:78, vlan:0)
[  409.351057][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  409.363033][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  409.374975][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  409.386930][    C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  409.398917][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[  409.410825][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:a6:d1:6f:f0:78, vlan:0)
[  409.422672][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  414.105348][    C0] net_ratelimit: 34004 callbacks suppressed
[  414.105368][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[  414.105452][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  414.111494][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  414.123360][    C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  414.135520][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  414.147293][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:a6:d1:6f:f0:78, vlan:0)
[  414.159122][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  414.171072][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  414.183654][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  414.195032][    C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  418.877648][    C0] net_ratelimit: 34065 callbacks suppressed
[  418.877669][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  418.877746][    C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  418.883781][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[  418.895706][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:a6:d1:6f:f0:78, vlan:0)
[  418.907567][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  418.919448][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  418.931402][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  418.943220][    C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  418.955197][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  418.967190][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:a6:d1:6f:f0:78, vlan:0)
[  423.650012][    C0] net_ratelimit: 34052 callbacks suppressed
[  423.650032][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  423.650139][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:a6:d1:6f:f0:78, vlan:0)
[  423.656119][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  423.668196][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  423.680670][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  423.692033][    C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  423.703977][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  423.715956][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:a6:d1:6f:f0:78, vlan:0)
[  423.727770][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  423.739900][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  428.422295][    C1] net_ratelimit: 33923 callbacks suppressed
[  428.422316][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  428.422332][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  428.428417][    C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  428.440442][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  428.452460][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:a6:d1:6f:f0:78, vlan:0)
[  428.464782][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  428.476211][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  428.488158][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  428.500069][    C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  428.512028][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  433.194648][    C0] net_ratelimit: 34141 callbacks suppressed
[  433.194668][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  433.194850][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  433.200801][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  433.212648][    C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  433.224587][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  433.236615][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:a6:d1:6f:f0:78, vlan:0)
[  433.248950][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  433.260342][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  433.272376][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  433.284237][    C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  437.967029][    C1] net_ratelimit: 34096 callbacks suppressed
[  437.967049][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  437.967115][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  437.973143][    C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  437.985126][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  437.997157][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:a6:d1:6f:f0:78, vlan:0)
[  438.008996][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[  438.020848][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  438.032815][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  438.044667][    C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  438.056700][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  442.739404][    C1] net_ratelimit: 34181 callbacks suppressed
[  442.739423][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  442.739578][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  442.745576][    C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  442.757530][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  442.769899][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:a6:d1:6f:f0:78, vlan:0)
[  442.781355][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  442.793325][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  442.805317][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[  442.817135][    C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  442.829122][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  447.511726][    C1] net_ratelimit: 33257 callbacks suppressed
[  447.511748][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  447.512208][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  447.517858][    C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  447.529883][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  447.541850][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:a6:d1:6f:f0:78, vlan:0)
[  447.553756][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  447.565728][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  447.577706][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[  447.589553][    C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  447.601536][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  452.283965][    C1] net_ratelimit: 33603 callbacks suppressed
[  452.283986][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  452.284055][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[  452.290082][    C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  452.302085][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  452.313988][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:a6:d1:6f:f0:78, vlan:0)
[  452.325887][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  452.337750][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  452.349646][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  452.361613][    C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  452.374074][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  457.056271][    C0] net_ratelimit: 34140 callbacks suppressed
[  457.056291][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  457.056395][    C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  457.062500][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  457.074519][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:a6:d1:6f:f0:78, vlan:0)
[  457.086385][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[  457.098245][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  457.110199][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  457.122087][    C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  457.134098][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  457.145978][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:a6:d1:6f:f0:78, vlan:0)
[  458.523196][    C0] rcu: INFO: rcu_preempt detected stalls on CPUs/tasks:
[  458.530169][    C0] rcu: 	Tasks blocked on level-0 rcu_node (CPUs 0-1): P14998/1:b..l P5821/1:b..l
[  458.539773][    C0] rcu: 	(detected by 0, t=10503 jiffies, g=43917, q=136 ncpus=2)
[  458.547495][    C0] task:syz-executor    state:R  running task     stack:22864 pid:5821  tgid:5821  ppid:5811   flags:0x00004002
[  458.560261][    C0] Call Trace:
[  458.563547][    C0]  <TASK>
[  458.566483][    C0]  __schedule+0xe58/0x5ad0
[  458.570919][    C0]  ? is_bpf_text_address+0x8a/0x1a0
[  458.576124][    C0]  ? __pfx_mark_lock+0x10/0x10
[  458.580895][    C0]  ? __pfx_mark_lock+0x10/0x10
[  458.585664][    C0]  ? lock_acquire+0x2f/0xb0
[  458.590181][    C0]  ? __pfx___schedule+0x10/0x10
[  458.595043][    C0]  ? kernel_text_address+0x8d/0x100
[  458.600251][    C0]  ? mark_held_locks+0x9f/0xe0
[  458.605025][    C0]  preempt_schedule_irq+0x51/0x90
[  458.610054][    C0]  irqentry_exit+0x36/0x90
[  458.614478][    C0]  asm_sysvec_apic_timer_interrupt+0x1a/0x20
[  458.620463][    C0] RIP: 0010:lock_acquire.part.0+0x155/0x380
[  458.626366][    C0] Code: b8 ff ff ff ff 65 0f c1 05 d0 d1 8b 7e 83 f8 01 0f 85 d0 01 00 00 9c 58 f6 c4 02 0f 85 e5 01 00 00 48 85 ed 0f 85 b6 01 00 00 <48> b8 00 00 00 00 00 fc ff df 48 01 c3 48 c7 03 00 00 00 00 48 c7
[  458.645988][    C0] RSP: 0018:ffffc90003eff9c8 EFLAGS: 00000206
[  458.652065][    C0] RAX: 0000000000000046 RBX: 1ffff920007dff3a RCX: 000000008d9e25be
[  458.660129][    C0] RDX: 0000000000000001 RSI: ffffffff8b6cdb60 RDI: ffffffff8bd1d340
[  458.668191][    C0] RBP: 0000000000000200 R08: 0000000000000000 R09: fffffbfff2dc9998
[  458.676168][    C0] R10: ffffffff96e4ccc7 R11: 0000000000000003 R12: 0000000000000000
[  458.684139][    C0] R13: ffffffff8e1bb500 R14: 0000000000000000 R15: 0000000000000000
[  458.692132][    C0]  ? __pfx_lock_acquire.part.0+0x10/0x10
[  458.697795][    C0]  ? rcu_is_watching+0x12/0xc0
[  458.702568][    C0]  ? trace_lock_acquire+0x14e/0x1f0
[  458.707775][    C0]  ? do_syscall_64+0xcd/0x250
[  458.712461][    C0]  ? page_ext_get+0x34/0x310
[  458.717059][    C0]  ? lock_acquire+0x2f/0xb0
[  458.721565][    C0]  ? page_ext_get+0x34/0x310
[  458.726163][    C0]  page_ext_get+0x3a/0x310
[  458.730582][    C0]  ? page_ext_get+0x34/0x310
[  458.735176][    C0]  __page_table_check_zero+0xbf/0x360
[  458.740573][    C0]  free_unref_page+0x6c8/0x1080
[  458.745445][    C0]  qlist_free_all+0x4e/0x120
[  458.750048][    C0]  ? shmem_initxattrs+0x168/0x5a0
[  458.755083][    C0]  kasan_quarantine_reduce+0x195/0x1e0
[  458.760551][    C0]  __kasan_slab_alloc+0x69/0x90
[  458.765408][    C0]  __kmalloc_noprof+0x1cd/0x510
[  458.770271][    C0]  shmem_initxattrs+0x168/0x5a0
[  458.775129][    C0]  ? evm_inode_init_security+0x237/0x320
[  458.780768][    C0]  security_inode_init_security+0x26c/0x390
[  458.786672][    C0]  ? __pfx_shmem_initxattrs+0x10/0x10
[  458.792049][    C0]  ? __pfx_security_inode_init_security+0x10/0x10
[  458.798476][    C0]  ? shmem_get_inode+0x73a/0xf00
[  458.803431][    C0]  shmem_mknod+0x22e/0x450
[  458.807859][    C0]  shmem_mkdir+0x31/0x60
[  458.812109][    C0]  vfs_mkdir+0x57d/0x860
[  458.816365][    C0]  do_mkdirat+0x301/0x3a0
[  458.820720][    C0]  ? __pfx_do_mkdirat+0x10/0x10
[  458.825573][    C0]  ? getname_flags.part.0+0x1c5/0x550
[  458.830968][    C0]  __x64_sys_mkdirat+0x83/0xb0
[  458.835741][    C0]  do_syscall_64+0xcd/0x250
[  458.840254][    C0]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[  458.846152][    C0] RIP: 0033:0x7f8d5a984587
[  458.850572][    C0] RSP: 002b:00007ffe8e954b08 EFLAGS: 00000202 ORIG_RAX: 0000000000000102
[  458.858996][    C0] RAX: ffffffffffffffda RBX: 00007ffe8e954b50 RCX: 00007f8d5a984587
[  458.866976][    C0] RDX: 00000000000001ff RSI: 00007ffe8e954b50 RDI: 00000000ffffff9c
[  458.874957][    C0] RBP: 00007ffe8e954b3c R08: 0000000000000005 R09: 00007ffe8e9548a5
[  458.882930][    C0] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000033
[  458.890913][    C0] R13: 000000000004ac71 R14: 00007ffe8e954b90 R15: 0000000000000305
[  458.898911][    C0]  </TASK>
[  458.901948][    C0] task:syz.3.4254      state:R  running task     stack:27680 pid:14998 tgid:14990 ppid:5822   flags:0x00004004
[  458.913706][    C0] Call Trace:
[  458.916988][    C0]  <TASK>
[  458.919927][    C0]  __schedule+0xe58/0x5ad0
[  458.924364][    C0]  ? irqentry_exit+0x3b/0x90
[  458.928964][    C0]  ? __pfx___lock_acquire+0x10/0x10
[  458.934175][    C0]  ? __pfx___schedule+0x10/0x10
[  458.939047][    C0]  ? preempt_schedule_thunk+0x1a/0x30
[  458.944424][    C0]  preempt_schedule_common+0x44/0xc0
[  458.949712][    C0]  preempt_schedule_thunk+0x1a/0x30
[  458.954921][    C0]  _raw_spin_unlock+0x3e/0x50
[  458.959605][    C0]  unmap_page_range+0xb87/0x3d60
[  458.964564][    C0]  ? __pfx_unmap_page_range+0x10/0x10
[  458.969937][    C0]  ? mas_next_slot+0x12d3/0x21b0
[  458.974900][    C0]  unmap_single_vma+0x194/0x2b0
[  458.979761][    C0]  unmap_vmas+0x22f/0x490
[  458.984096][    C0]  ? __pfx_unmap_vmas+0x10/0x10
[  458.988959][    C0]  ? __pfx_lock_release+0x10/0x10
[  458.993992][    C0]  ? lock_acquire+0x2f/0xb0
[  458.998502][    C0]  ? mlock_drain_local+0x6f/0x4f0
[  459.003539][    C0]  exit_mmap+0x1c6/0xb20
[  459.007792][    C0]  ? __pfx_exit_mmap+0x10/0x10
[  459.012651][    C0]  ? __pfx_mark_lock+0x10/0x10
[  459.017437][    C0]  __mmput+0x12a/0x4c0
[  459.021514][    C0]  mmput+0x62/0x70
[  459.025247][    C0]  do_exit+0x9bf/0x2d70
[  459.029414][    C0]  ? get_signal+0x8f7/0x26c0
[  459.034012][    C0]  ? __pfx_do_exit+0x10/0x10
[  459.038609][    C0]  ? do_raw_spin_lock+0x12d/0x2c0
[  459.043640][    C0]  ? __pfx_do_raw_spin_lock+0x10/0x10
[  459.049022][    C0]  do_group_exit+0xd3/0x2a0
[  459.053548][    C0]  get_signal+0x24ed/0x26c0
[  459.058082][    C0]  ? selinux_socket_create+0xee/0x560
[  459.063462][    C0]  ? __pfx_selinux_socket_create+0x10/0x10
[  459.069275][    C0]  ? __pfx_get_signal+0x10/0x10
[  459.074132][    C0]  ? __pfx_do_futex+0x10/0x10
[  459.078820][    C0]  arch_do_signal_or_restart+0x90/0x7e0
[  459.084379][    C0]  ? __pfx_arch_do_signal_or_restart+0x10/0x10
[  459.090588][    C0]  syscall_exit_to_user_mode+0x150/0x2a0
[  459.096231][    C0]  do_syscall_64+0xda/0x250
[  459.100752][    C0]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[  459.106654][    C0] RIP: 0033:0x7f7a6fd85d19
[  459.111072][    C0] RSP: 002b:00007f7a70ad90e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca
[  459.119491][    C0] RAX: fffffffffffffe00 RBX: 00007f7a6ff75fa8 RCX: 00007f7a6fd85d19
[  459.127466][    C0] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f7a6ff75fa8
[  459.135442][    C0] RBP: 00007f7a6ff75fa0 R08: 0000000000000000 R09: 0000000000000000
[  459.143437][    C0] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7a6ff75fac
[  459.151417][    C0] R13: 0000000000000000 R14: 00007ffe7a235210 R15: 00007ffe7a2352f8
[  459.159409][    C0]  </TASK>
[  459.162428][    C0] rcu: rcu_preempt kthread starved for 10569 jiffies! g43917 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=0
[  459.173624][    C0] rcu: 	Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior.
[  459.183590][    C0] rcu: RCU grace-period kthread stack dump:
[  459.189475][    C0] task:rcu_preempt     state:R  running task     stack:28424 pid:17    tgid:17    ppid:2      flags:0x00004000
[  459.201234][    C0] Call Trace:
[  459.204516][    C0]  <TASK>
[  459.207455][    C0]  __schedule+0xe58/0x5ad0
[  459.211880][    C0]  ? __pfx___lock_acquire+0x10/0x10
[  459.217095][    C0]  ? __pfx___schedule+0x10/0x10
[  459.221959][    C0]  ? schedule+0x298/0x350
[  459.226291][    C0]  ? __pfx_lock_release+0x10/0x10
[  459.231322][    C0]  ? lock_acquire+0x2f/0xb0
[  459.235827][    C0]  ? schedule+0x1fd/0x350
[  459.240164][    C0]  schedule+0xe7/0x350
[  459.244237][    C0]  schedule_timeout+0x124/0x280
[  459.249100][    C0]  ? __pfx_schedule_timeout+0x10/0x10
[  459.254481][    C0]  ? __pfx_process_timeout+0x10/0x10
[  459.259781][    C0]  ? _raw_spin_unlock_irqrestore+0x3b/0x80
[  459.265590][    C0]  ? prepare_to_swait_event+0xf3/0x470
[  459.271059][    C0]  rcu_gp_fqs_loop+0x1eb/0xb00
[  459.275854][    C0]  ? __pfx_rcu_gp_fqs_loop+0x10/0x10
[  459.281165][    C0]  ? rcu_gp_init+0xc82/0x1630
[  459.285850][    C0]  ? _raw_spin_unlock_irq+0x2e/0x50
[  459.291059][    C0]  ? _raw_spin_unlock_irqrestore+0x52/0x80
[  459.296872][    C0]  rcu_gp_kthread+0x271/0x380
[  459.301558][    C0]  ? __pfx_rcu_gp_kthread+0x10/0x10
[  459.306764][    C0]  ? lockdep_hardirqs_on+0x7c/0x110
[  459.311969][    C0]  ? __kthread_parkme+0x148/0x220
[  459.317002][    C0]  ? __pfx_rcu_gp_kthread+0x10/0x10
[  459.322206][    C0]  kthread+0x2c1/0x3a0
[  459.326281][    C0]  ? _raw_spin_unlock_irq+0x23/0x50
[  459.331482][    C0]  ? __pfx_kthread+0x10/0x10
[  459.336084][    C0]  ret_from_fork+0x45/0x80
[  459.340509][    C0]  ? __pfx_kthread+0x10/0x10
[  459.345111][    C0]  ret_from_fork_asm+0x1a/0x30
[  459.349899][    C0]  </TASK>
[  459.352916][    C0] rcu: Stack dump where RCU GP kthread last ran:
[  459.359241][    C0] CPU: 0 UID: 0 PID: 16 Comm: ksoftirqd/0 Not tainted 6.13.0-rc2-syzkaller-00130-g150b567e0d57 #0
[  459.369838][    C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024
[  459.379900][    C0] RIP: 0010:lock_acquire.part.0+0x155/0x380
[  459.385809][    C0] Code: b8 ff ff ff ff 65 0f c1 05 d0 d1 8b 7e 83 f8 01 0f 85 d0 01 00 00 9c 58 f6 c4 02 0f 85 e5 01 00 00 48 85 ed 0f 85 b6 01 00 00 <48> b8 00 00 00 00 00 fc ff df 48 01 c3 48 c7 03 00 00 00 00 48 c7
[  459.405432][    C0] RSP: 0018:ffffc90000157458 EFLAGS: 00000206
[  459.411506][    C0] RAX: 0000000000000046 RBX: 1ffff9200002ae8c RCX: 00000000110053aa
[  459.419481][    C0] RDX: 0000000000000001 RSI: ffffffff8b6cdb60 RDI: ffffffff8bd1d340
[  459.427477][    C0] RBP: 0000000000000200 R08: 0000000000000000 R09: fffffbfff2dc9998
[  459.435451][    C0] R10: ffffffff96e4ccc7 R11: 0000000000000001 R12: 0000000000000000
[  459.443421][    C0] R13: ffffffff8e1bb500 R14: 0000000000000000 R15: 0000000000000000
[  459.451394][    C0] FS:  0000000000000000(0000) GS:ffff8880b8600000(0000) knlGS:0000000000000000
[  459.460329][    C0] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  459.466914][    C0] CR2: 00007f8f9b14c520 CR3: 000000000df7e000 CR4: 00000000003526f0
[  459.474900][    C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  459.482878][    C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  459.490852][    C0] Call Trace:
[  459.494130][    C0]  <IRQ>
[  459.496974][    C0]  ? rcu_check_gp_kthread_starvation+0x31b/0x450
[  459.503312][    C0]  ? do_raw_spin_unlock+0x172/0x230
[  459.508520][    C0]  ? rcu_sched_clock_irq+0x247a/0x3310
[  459.514000][    C0]  ? __pfx_rcu_sched_clock_irq+0x10/0x10
[  459.519639][    C0]  ? tmigr_requires_handle_remote+0x141/0x480
[  459.525715][    C0]  ? __pfx_tmigr_requires_handle_remote+0x10/0x10
[  459.532152][    C0]  ? hrtimer_run_queues+0x97/0x500
[  459.537275][    C0]  ? rcu_read_lock_sched_held+0x3e/0x70
[  459.542827][    C0]  ? update_process_times+0x178/0x2d0
[  459.548207][    C0]  ? __pfx_update_process_times+0x10/0x10
[  459.553932][    C0]  ? read_tsc+0x9/0x20
[  459.558018][    C0]  ? ktime_get+0x1ac/0x300
[  459.562440][    C0]  ? tick_nohz_handler+0x376/0x530
[  459.567561][    C0]  ? __pfx_tick_nohz_handler+0x10/0x10
[  459.573028][    C0]  ? __hrtimer_run_queues+0x5fb/0xae0
[  459.578416][    C0]  ? __pfx___hrtimer_run_queues+0x10/0x10
[  459.584141][    C0]  ? read_tsc+0x9/0x20
[  459.588225][    C0]  ? hrtimer_interrupt+0x392/0x8e0
[  459.593355][    C0]  ? __sysvec_apic_timer_interrupt+0x10f/0x400
[  459.599518][    C0]  ? sysvec_apic_timer_interrupt+0x9f/0xc0
[  459.605325][    C0]  </IRQ>
[  459.608260][    C0]  <TASK>
[  459.611198][    C0]  ? asm_sysvec_apic_timer_interrupt+0x1a/0x20
[  459.617373][    C0]  ? lock_acquire.part.0+0x155/0x380
[  459.622667][    C0]  ? __pfx_lock_acquire.part.0+0x10/0x10
[  459.628302][    C0]  ? rcu_is_watching+0x12/0xc0
[  459.633073][    C0]  ? trace_lock_acquire+0x14e/0x1f0
[  459.638278][    C0]  ? rcu_is_watching+0x12/0xc0
[  459.643051][    C0]  ? net_generic+0x30/0x2a0
[  459.647562][    C0]  ? lock_acquire+0x2f/0xb0
[  459.652069][    C0]  ? net_generic+0x30/0x2a0
[  459.656582][    C0]  net_generic+0x36/0x2a0
[  459.660914][    C0]  ? net_generic+0x30/0x2a0
[  459.665428][    C0]  brnf_get_logical_dev+0x22/0x290
[  459.670548][    C0]  setup_pre_routing+0x1d2/0x4d0
[  459.675495][    C0]  br_nf_pre_routing_ipv6+0x113/0x8c0
[  459.680874][    C0]  ? __pfx_br_nf_pre_routing_ipv6+0x10/0x10
[  459.686776][    C0]  ? __pfx_lock_release+0x10/0x10
[  459.691801][    C0]  ? trace_lock_acquire+0x14e/0x1f0
[  459.697019][    C0]  ? ebt_broute+0x14f/0x700
[  459.701547][    C0]  br_nf_pre_routing+0x860/0x15b0
[  459.706595][    C0]  br_handle_frame+0x9eb/0x1490
[  459.711466][    C0]  ? __pfx_br_handle_frame+0x10/0x10
[  459.716767][    C0]  ? __pfx_br_handle_frame_finish+0x10/0x10
[  459.722671][    C0]  ? mark_lock+0xb5/0xc60
[  459.727014][    C0]  ? __pfx_br_handle_frame+0x10/0x10
[  459.732305][    C0]  __netif_receive_skb_core.constprop.0+0xa76/0x4470
[  459.738993][    C0]  ? kasan_quarantine_put+0x70/0x240
[  459.744286][    C0]  ? kmem_cache_free+0x152/0x4c0
[  459.749227][    C0]  ? kfree_skbmem+0x1a4/0x1f0
[  459.753914][    C0]  ? __pfx___netif_receive_skb_core.constprop.0+0x10/0x10
[  459.761036][    C0]  ? hlock_class+0x4e/0x130
[  459.765552][    C0]  ? __lock_acquire+0xcc5/0x3c40
[  459.770507][    C0]  ? __pfx___lock_acquire+0x10/0x10
[  459.775706][    C0]  ? __pfx_ip6_rcv_finish+0x10/0x10
[  459.780916][    C0]  ? process_backlog+0x3f1/0x15f0
[  459.785962][    C0]  __netif_receive_skb_one_core+0xb1/0x1e0
[  459.791774][    C0]  ? __pfx___netif_receive_skb_one_core+0x10/0x10
[  459.798195][    C0]  ? rcu_is_watching+0x12/0xc0
[  459.802975][    C0]  ? __pfx_do_raw_spin_lock+0x10/0x10
[  459.808351][    C0]  ? process_backlog+0x3f1/0x15f0
[  459.813387][    C0]  ? process_backlog+0x3f1/0x15f0
[  459.818422][    C0]  __netif_receive_skb+0x1d/0x160
[  459.823453][    C0]  process_backlog+0x443/0x15f0
[  459.828323][    C0]  __napi_poll.constprop.0+0xb7/0x550
[  459.833716][    C0]  net_rx_action+0xa94/0x1010
[  459.838412][    C0]  ? tmigr_handle_remote+0x153/0xdd0
[  459.843719][    C0]  ? __pfx_net_rx_action+0x10/0x10
[  459.848844][    C0]  ? __pfx_tmigr_handle_remote+0x10/0x10
[  459.854489][    C0]  ? run_timer_base+0x11c/0x190
[  459.859358][    C0]  ? run_timer_base+0x121/0x190
[  459.864216][    C0]  ? __pfx_run_timer_base+0x10/0x10
[  459.869420][    C0]  handle_softirqs+0x213/0x8f0
[  459.874196][    C0]  ? __pfx_handle_softirqs+0x10/0x10
[  459.879495][    C0]  ? rcu_is_watching+0x12/0xc0
[  459.884273][    C0]  ? __pfx_run_ksoftirqd+0x10/0x10
[  459.889392][    C0]  ? smpboot_thread_fn+0x59d/0xa30
[  459.894518][    C0]  run_ksoftirqd+0x3a/0x60
[  459.898946][    C0]  smpboot_thread_fn+0x661/0xa30
[  459.903898][    C0]  ? __kthread_parkme+0x148/0x220
[  459.908944][    C0]  ? __pfx_smpboot_thread_fn+0x10/0x10
[  459.914414][    C0]  kthread+0x2c1/0x3a0
[  459.918488][    C0]  ? _raw_spin_unlock_irq+0x23/0x50
[  459.923692][    C0]  ? __pfx_kthread+0x10/0x10
[  459.928292][    C0]  ret_from_fork+0x45/0x80
[  459.932710][    C0]  ? __pfx_kthread+0x10/0x10
[  459.937310][    C0]  ret_from_fork_asm+0x1a/0x30
[  459.942093][    C0]  </TASK>
[  461.828666][    C1] net_ratelimit: 30777 callbacks suppressed
[  461.828687][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  461.828756][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  461.834773][    C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  461.846806][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  461.858705][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:a6:d1:6f:f0:78, vlan:0)
[  461.870514][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  461.882492][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  461.894965][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  461.906316][    C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  461.918282][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  466.600974][    C1] net_ratelimit: 34131 callbacks suppressed
[  466.600994][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  466.601053][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  466.607081][    C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  466.619683][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  466.631109][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:a6:d1:6f:f0:78, vlan:0)
[  466.642938][    C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  466.654913][    C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  466.666832][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  466.678788][    C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[  466.690814][    C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)