last executing test programs: 2m30.740458734s ago: executing program 0 (id=5524): r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_RES_CM_ID_GET(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000013b80)=ANY=[@ANYBLOB="280000001b140100000000000000000008"], 0x28}, 0x1, 0x0, 0x0, 0xc0}, 0x0) 2m30.577905344s ago: executing program 0 (id=5525): r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x4, &(0x7f00000002c0)={@local={0xac, 0x2, 0x44, 0xa}, @private=0x5000000}, 0xc) 2m30.330946279s ago: executing program 0 (id=5526): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="1c0000001d008102e00f80ecdb4cb9f207c804a00d00000088081afb", 0x1c}], 0x1, 0x0, 0x0, 0x5865}, 0x0) 2m30.045839453s ago: executing program 0 (id=5527): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000008c0)=ANY=[@ANYBLOB="6c0000001000010400d201000072f60000020000", @ANYRES32=0x0, @ANYBLOB="0524060000000000300012800b0001006272696467650000200002800c002e00fffff6ffffffffff050007001f000000020027000000000008000a00a8"], 0x6c}}, 0x0) 2m28.926679536s ago: executing program 1 (id=5529): r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000), 0x8000, 0x0) readv(r0, &(0x7f00000001c0)=[{&(0x7f0000000200)=""/4082, 0xff2}, {&(0x7f0000001ac0)=""/14, 0xe}, {0x0, 0x18}], 0x3) 2m28.320395313s ago: executing program 1 (id=5531): r0 = syz_open_dev$loop(&(0x7f0000000040), 0x7, 0x2480) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f0000000000)) 2m28.06886328s ago: executing program 1 (id=5533): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="040000000000000008003f006563060008001b"], 0x30}}, 0x0) 2m16.885435472s ago: executing program 1 (id=5554): r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2082) read(r0, 0x0, 0x0) 2m16.779352263s ago: executing program 0 (id=5556): r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xd8}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) 2m16.766102648s ago: executing program 2 (id=5558): unshare(0x2040600) flock(0xffffffffffffffff, 0x8) 2m16.080806852s ago: executing program 2 (id=5559): r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000440), 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0xc0f85403, &(0x7f0000000480)={{0x3, 0x0, 0x1, 0x1, 0x4}, 0x0, 0x6, 'id0\x00', 'timer0\x00'}) 2m16.000907648s ago: executing program 1 (id=5561): r0 = socket(0x2c, 0x803, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000500)={'ip_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x7800, 0x7, 0x0, 0x3, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x4, 0x0, @remote, @multicast1}}}}) 2m15.547280867s ago: executing program 2 (id=5562): r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000140)={0x100000, 0xff, 0xffffffb8}) 2m15.346608236s ago: executing program 1 (id=5564): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x400c004) 2m15.333650511s ago: executing program 0 (id=5565): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@ipv4_newrule={0x24, 0x20, 0x301, 0x0, 0x0, {}, [@FRA_GENERIC_POLICY=@FRA_SPORT_RANGE={0x8, 0x17, {0x4e24, 0x4e24}}]}, 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x0) 2m15.033862478s ago: executing program 4 (id=5566): r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000140)={0x500, 0x0, &(0x7f0000000800)={&(0x7f0000000040)=ANY=[@ANYBLOB="02"], 0x10}, 0x19}, 0x0) 2m15.033639799s ago: executing program 2 (id=5567): r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x16) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x3, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000000c000000b400000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb7020000080000003f00000000000000850000000600000095"], &(0x7f00000006c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 2m14.600380157s ago: executing program 2 (id=5568): capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000dc0)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x45}, 0x48) 2m13.572907341s ago: executing program 2 (id=5569): r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000240)=ANY=[@ANYBLOB="48000000100005ff00000000000000000000004a", @ANYRES32=0x0, @ANYBLOB="0000000000000000140012800b00010062617461647600000400028008000a00", @ANYBLOB='\n\x00'], 0x48}, 0x1, 0x0, 0x0, 0x45844}, 0x0) 2m13.57047966s ago: executing program 4 (id=5571): r0 = syz_open_dev$video4linux(&(0x7f00000025c0), 0x5, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc040564a, &(0x7f0000002580)={0x0, 0x1, 0x100c, 0xffffffffffffffff, 0x0, 0x0}) 2m12.357729843s ago: executing program 4 (id=5572): r0 = socket$igmp6(0xa, 0x3, 0x3a) getsockopt$MRT6(r0, 0x3a, 0x1, 0x0, &(0x7f0000000100)) 2m6.6782851s ago: executing program 4 (id=5574): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x7}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x44, 0x9, 0xa, 0x409, 0x0, 0x0, {0x7}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x31}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x3}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x0, 0x84}}}, 0x8c}, 0x1, 0x0, 0x0, 0x4008084}, 0x0) 2m2.008560542s ago: executing program 4 (id=5583): r0 = syz_init_net_socket$bt_rfcomm(0x1f, 0x1, 0x3) setsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, 0x0, 0x1b) 2m2.008113099s ago: executing program 4 (id=5585): r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000b40)={'dummy0\x00'}) 1m59.996745777s ago: executing program 32 (id=5565): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@ipv4_newrule={0x24, 0x20, 0x301, 0x0, 0x0, {}, [@FRA_GENERIC_POLICY=@FRA_SPORT_RANGE={0x8, 0x17, {0x4e24, 0x4e24}}]}, 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x0) 1m59.770959366s ago: executing program 33 (id=5564): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x400c004) 1m56.295309497s ago: executing program 34 (id=5569): r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000240)=ANY=[@ANYBLOB="48000000100005ff00000000000000000000004a", @ANYRES32=0x0, @ANYBLOB="0000000000000000140012800b00010062617461647600000400028008000a00", @ANYBLOB='\n\x00'], 0x48}, 0x1, 0x0, 0x0, 0x45844}, 0x0) 1m47.176790999s ago: executing program 35 (id=5585): r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000b40)={'dummy0\x00'}) 1m1.928344276s ago: executing program 3 (id=5633): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@deltaction={0x54, 0x18, 0x1, 0x70bd2a, 0x25dfdc00, {0xa}, [@TCA_ACT_TAB={0x40, 0x1, [{0xc, 0x8f, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}, {0x14, 0x5, 0x0, 0x0, @TCA_ACT_KIND={0xf, 0x1, 'tunnel_key\x00'}}, {0xc, 0x9, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x37}}, {0x10, 0x8, 0x0, 0x0, @TCA_ACT_KIND={0xc, 0x1, 'skbedit\x00'}}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x44000}, 0x20040844) 1m1.789133978s ago: executing program 3 (id=5634): r0 = socket(0x2000000000000021, 0x2, 0x2) shutdown(r0, 0x2) 1m1.593434483s ago: executing program 3 (id=5635): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=@dellink={0x34, 0x11, 0x1, 0x709d23, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, 0x4228, 0x28}, [@IFLA_ALT_IFNAME={0x14, 0x35, 'ip6erspan0\x00'}]}, 0x34}, 0x1, 0x0, 0x0, 0x8000}, 0x0) 59.973410473s ago: executing program 3 (id=5636): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)={0x24, 0x7, 0x6, 0x5, 0x0, 0x0, {0x7, 0x0, 0x7}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FLAGS={0x8, 0x6, 0x1, 0x0, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x8800}, 0x20040000) 59.576181321s ago: executing program 3 (id=5637): r0 = syz_open_dev$hidraw(&(0x7f00000004c0), 0x0, 0x14a042) read$char_usb(r0, 0x0, 0x0) 59.199564366s ago: executing program 3 (id=5638): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x3c, 0x10, 0x49920d862a92153b, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vxcan={{0xa}, {0x4, 0x2, 0x0, 0x1, @void}}}, @IFLA_MTU={0x8, 0x3}]}, 0x3c}}, 0x0) 0s ago: executing program 36 (id=5638): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x3c, 0x10, 0x49920d862a92153b, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vxcan={{0xa}, {0x4, 0x2, 0x0, 0x1, @void}}}, @IFLA_MTU={0x8, 0x3}]}, 0x3c}}, 0x0) kernel console output (not intermixed with test programs): packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 591.175613][ T37] kauditd_printk_skb: 304 callbacks suppressed [ 591.175629][ T37] audit: type=1400 audit(1756670449.280:372015): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 591.226525][ T37] audit: type=1400 audit(1756670449.330:372016): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5826 comm="syz-executor" opid=5923 ocomm="syz-executor" [ 591.387615][ T37] audit: type=1400 audit(1756670449.490:372017): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5923 comm="syz-executor" opid=5931 ocomm="syz-executor" [ 591.419844][ T37] audit: type=1400 audit(1756670449.510:372018): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 591.419894][ T37] audit: type=1400 audit(1756670449.520:372019): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 591.419936][ T37] audit: type=1400 audit(1756670449.520:372020): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 591.532509][ T37] audit: type=1400 audit(1756670449.630:372021): lsm=SMACK fn=smack_task_setpgid action=granted subject="_" object="_" requested=w pid=17663 comm="syz-executor" opid=17663 ocomm="syz-executor" [ 591.532558][ T37] audit: type=1400 audit(1756670449.630:372022): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17663 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 591.532598][ T37] audit: type=1400 audit(1756670449.630:372023): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17663 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 591.532638][ T37] audit: type=1400 audit(1756670449.630:372024): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17663 comm="syz-executor" name="syz-executor" dev="sda1" ino=2020 [ 592.459372][T17636] Bluetooth: hci8: unexpected cc 0x0c03 length: 249 > 1 [ 592.481509][T17636] Bluetooth: hci8: unexpected cc 0x1003 length: 249 > 9 [ 592.482872][T17636] Bluetooth: hci8: unexpected cc 0x1001 length: 249 > 9 [ 592.484099][T17636] Bluetooth: hci8: unexpected cc 0x0c23 length: 249 > 4 [ 592.484908][T17636] Bluetooth: hci8: unexpected cc 0x0c38 length: 249 > 2 [ 593.117690][T17570] team0: Port device geneve1 removed [ 594.551099][T17636] Bluetooth: hci8: command tx timeout [ 595.800902][ C0] net_ratelimit: 9151 callbacks suppressed [ 595.800925][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 595.801416][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 595.801987][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 595.802354][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 595.803792][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 595.804170][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 595.804581][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 595.805027][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 595.805439][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 595.805801][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 596.640892][T17636] Bluetooth: hci8: command tx timeout [ 596.680628][ T37] kauditd_printk_skb: 444 callbacks suppressed [ 596.680643][ T37] audit: type=1400 audit(1756670454.771:372469): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5934 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 596.681250][ T37] audit: type=1400 audit(1756670454.771:372470): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5934 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 596.681303][ T37] audit: type=1400 audit(1756670454.771:372471): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5934 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 596.681341][ T37] audit: type=1400 audit(1756670454.771:372472): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5934 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 596.681379][ T37] audit: type=1400 audit(1756670454.771:372473): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=5934 comm="syz-executor" name="1156" dev="tmpfs" ino=5804 [ 596.681418][ T37] audit: type=1400 audit(1756670454.771:372474): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=5934 comm="syz-executor" path="/1156" dev="tmpfs" ino=5804 [ 596.681458][ T37] audit: type=1400 audit(1756670454.771:372475): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5934 comm="syz-executor" path="/1156" dev="tmpfs" ino=5804 [ 596.681497][ T37] audit: type=1400 audit(1756670454.771:372476): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5934 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 596.681536][ T37] audit: type=1400 audit(1756670454.771:372477): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5934 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 596.681575][ T37] audit: type=1400 audit(1756670454.771:372478): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5934 comm="syz-executor" name="1156" dev="tmpfs" ino=5804 [ 597.790852][ T2176] usb 4-1: new high-speed USB device number 7 using dummy_hcd [ 598.030846][ T2176] usb 4-1: Using ep0 maxpacket: 32 [ 598.080468][ T2176] usb 4-1: config 0 interface 0 altsetting 0 has an endpoint descriptor with address 0xFF, changing to 0x8F [ 598.080498][ T2176] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x8F has an invalid bInterval 255, changing to 11 [ 598.080523][ T2176] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x8F has invalid maxpacket 59391, setting to 1024 [ 598.080563][ T2176] usb 4-1: New USB device found, idVendor=046d, idProduct=c314, bcdDevice= 0.40 [ 598.124706][ T2176] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 598.152937][ T2176] usb 4-1: config 0 descriptor?? [ 598.197185][T17676] raw-gadget.0 gadget.3: fail, usb_ep_enable returned -22 [ 598.213394][ T2176] hub 4-1:0.0: USB hub found [ 598.491982][ T2176] hub 4-1:0.0: config failed, hub doesn't have any ports! (err -19) [ 598.701546][ T2176] usbhid 4-1:0.0: can't add hid device: -71 [ 598.701663][ T2176] usbhid 4-1:0.0: probe with driver usbhid failed with error -71 [ 598.710886][T17636] Bluetooth: hci8: command tx timeout [ 598.786965][ T2176] usb 4-1: USB disconnect, device number 7 [ 600.792398][T17636] Bluetooth: hci8: command tx timeout [ 600.813307][ C0] net_ratelimit: 9080 callbacks suppressed [ 600.813326][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 600.813812][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 600.814297][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 600.814688][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 600.815052][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 600.816476][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 600.816821][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 600.817238][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 600.817683][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 600.818072][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 601.688608][ T37] kauditd_printk_skb: 2072 callbacks suppressed [ 601.688625][ T37] audit: type=1400 audit(1756670459.791:374506): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 602.150873][ T37] audit: type=1400 audit(1756670460.251:374507): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5210 comm="udevd" name="/" dev="sda1" ino=2 [ 602.150923][ T37] audit: type=1400 audit(1756670460.251:374508): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5210 comm="udevd" name="etc" dev="sda1" ino=116 [ 602.150962][ T37] audit: type=1400 audit(1756670460.251:374509): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5210 comm="udevd" name="udev" dev="sda1" ino=259 [ 602.151000][ T37] audit: type=1400 audit(1756670460.251:374510): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5210 comm="udevd" path="/etc/udev/rules.d" dev="sda1" ino=261 [ 602.151039][ T37] audit: type=1400 audit(1756670460.251:374511): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5210 comm="udevd" name="/" dev="sda1" ino=2 [ 602.151078][ T37] audit: type=1400 audit(1756670460.251:374512): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5210 comm="udevd" name="lib" dev="sda1" ino=264 [ 602.151123][ T37] audit: type=1400 audit(1756670460.251:374513): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5210 comm="udevd" name="udev" dev="sda1" ino=1222 [ 602.151163][ T37] audit: type=1400 audit(1756670460.251:374514): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5210 comm="udevd" path="/lib/udev/rules.d" dev="sda1" ino=1229 [ 602.151203][ T37] audit: type=1400 audit(1756670460.251:374515): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5210 comm="udevd" name="/" dev="sda1" ino=2 [ 605.820553][ C0] net_ratelimit: 9991 callbacks suppressed [ 605.820575][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 605.820967][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 605.821439][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 605.821922][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 605.822307][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 605.822662][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 605.824089][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 605.824461][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 605.824870][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 605.825313][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 607.202670][ T37] kauditd_printk_skb: 417 callbacks suppressed [ 607.202695][ T37] audit: type=1400 audit(1756670465.301:374933): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 607.684086][ T37] audit: type=1400 audit(1756670465.791:374934): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 607.960715][T17581] bond0: (slave syz_tun): Releasing backup interface [ 608.189421][ T37] audit: type=1400 audit(1756670466.291:374935): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 608.697066][ T37] audit: type=1400 audit(1756670466.801:374936): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 609.197588][ T37] audit: type=1400 audit(1756670467.301:374937): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 609.240528][ T37] audit: type=1400 audit(1756670467.351:374938): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5934 comm="syz-executor" opid=17690 ocomm="syz.3.5614" [ 609.240575][ T37] audit: type=1400 audit(1756670467.351:374939): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5934 comm="syz-executor" opid=17690 ocomm="syz.3.5614" [ 609.377450][ T37] audit: type=1400 audit(1756670467.481:374940): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5934 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 609.377704][ T37] audit: type=1400 audit(1756670467.481:374941): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5934 comm="syz-executor" name="/" dev="sysfs" ino=1 [ 609.377940][ T37] audit: type=1400 audit(1756670467.481:374942): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5934 comm="syz-executor" name="fs" dev="sysfs" ino=2 [ 610.831179][ C0] net_ratelimit: 10112 callbacks suppressed [ 610.831200][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 610.831551][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 610.832017][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 610.832467][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 610.832850][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 610.833213][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 610.834667][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 610.835015][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 610.835424][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 610.835867][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 612.613900][ T37] kauditd_printk_skb: 36 callbacks suppressed [ 612.613918][ T37] audit: type=1400 audit(1756670470.712:374979): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17692 comm="dhcpcd" name="/" dev="sda1" ino=2 [ 612.613960][ T37] audit: type=1400 audit(1756670470.722:374980): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17692 comm="dhcpcd" name="lib" dev="sda1" ino=264 [ 612.613999][ T37] audit: type=1400 audit(1756670470.722:374981): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17692 comm="dhcpcd" name="dhcpcd" dev="sda1" ino=265 [ 612.614038][ T37] audit: type=1400 audit(1756670470.722:374982): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17692 comm="dhcpcd" name="dhcpcd-run-hooks" dev="sda1" ino=273 [ 612.614078][ T37] audit: type=1400 audit(1756670470.722:374983): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=17692 comm="dhcpcd" path="/lib/dhcpcd/dhcpcd-run-hooks" dev="sda1" ino=273 [ 612.614118][ T37] audit: type=1400 audit(1756670470.722:374984): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17692 comm="dhcpcd" name="/" dev="sda1" ino=2 [ 612.614157][ T37] audit: type=1400 audit(1756670470.722:374985): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17692 comm="dhcpcd" name="lib" dev="sda1" ino=264 [ 612.614196][ T37] audit: type=1400 audit(1756670470.722:374986): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17692 comm="dhcpcd" name="dhcpcd" dev="sda1" ino=265 [ 612.614241][ T37] audit: type=1400 audit(1756670470.722:374987): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17692 comm="dhcpcd" name="/" dev="sda1" ino=2 [ 612.614280][ T37] audit: type=1400 audit(1756670470.722:374988): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17692 comm="dhcpcd" name="bin" dev="sda1" ino=13 [ 615.688605][ T1580] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 615.840117][ C0] net_ratelimit: 9506 callbacks suppressed [ 615.840139][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 615.840501][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 615.840946][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 615.841391][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 615.841808][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 615.842161][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 615.843578][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 615.843992][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 615.844400][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 615.844849][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 617.703068][ T37] kauditd_printk_skb: 2178 callbacks suppressed [ 617.703085][ T37] audit: type=1400 audit(1756670475.812:377071): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 617.864049][ T37] audit: type=1400 audit(1756670475.972:377072): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5934 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 617.886868][ T37] audit: type=1400 audit(1756670475.992:377073): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 617.888088][ T37] audit: type=1400 audit(1756670475.992:377074): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 617.909741][ T37] audit: type=1400 audit(1756670476.012:377075): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/32-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 617.909788][ T37] audit: type=1400 audit(1756670476.012:377076): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/32-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 617.929787][ T37] audit: type=1400 audit(1756670476.032:377077): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5934 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 617.929832][ T37] audit: type=1400 audit(1756670476.032:377078): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5934 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 617.929871][ T37] audit: type=1400 audit(1756670476.032:377079): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5934 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 617.929910][ T37] audit: type=1400 audit(1756670476.032:377080): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=5934 comm="syz-executor" name="1171" dev="tmpfs" ino=5880 [ 620.798003][ T1580] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 620.851146][ C0] net_ratelimit: 10046 callbacks suppressed [ 620.851166][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 620.851552][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 620.851960][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 620.852406][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 620.852795][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 620.853152][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 620.854582][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 620.854929][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 620.855334][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 620.855780][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 621.294983][T17664] wlan0 speed is unknown, defaulting to 1000 [ 621.301906][T17640] wlan0 speed is unknown, defaulting to 1000 [ 621.325374][T17638] wlan0 speed is unknown, defaulting to 1000 [ 621.329038][T17634] wlan0 speed is unknown, defaulting to 1000 [ 622.279571][ T5967] usb 4-1: new high-speed USB device number 8 using dummy_hcd [ 622.440861][ T5967] usb 4-1: Using ep0 maxpacket: 16 [ 622.446627][ T5967] usb 4-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 622.446648][ T5967] usb 4-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 622.484305][ T5967] usb 4-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 622.484331][ T5967] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 622.484350][ T5967] usb 4-1: Product: syz [ 622.484363][ T5967] usb 4-1: Manufacturer: syz [ 622.484376][ T5967] usb 4-1: SerialNumber: syz [ 622.710957][ T37] kauditd_printk_skb: 738 callbacks suppressed [ 622.710974][ T37] audit: type=1400 audit(1756670480.822:377813): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17727 comm="udevd" name="/" dev="sda1" ino=2 [ 622.711532][ T37] audit: type=1400 audit(1756670480.822:377814): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17727 comm="udevd" name="/" dev="sysfs" ino=1 [ 622.712263][ T37] audit: type=1400 audit(1756670480.822:377815): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17727 comm="udevd" name="devices" dev="sysfs" ino=7 [ 622.712960][ T37] audit: type=1400 audit(1756670480.822:377816): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17727 comm="udevd" name="platform" dev="sysfs" ino=36 [ 622.713399][ T37] audit: type=1400 audit(1756670480.822:377817): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17727 comm="udevd" name="dummy_hcd.3" dev="sysfs" ino=26170 [ 622.713866][ T37] audit: type=1400 audit(1756670480.822:377818): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17727 comm="udevd" name="usb4" dev="sysfs" ino=26199 [ 622.714509][ T37] audit: type=1400 audit(1756670480.822:377819): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17727 comm="udevd" name="4-1" dev="sysfs" ino=224787 [ 622.718964][ T37] audit: type=1400 audit(1756670480.822:377820): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=17727 comm="udevd" path="/sys/devices/platform/dummy_hcd.3/usb4/4-1/idProduct" dev="sysfs" ino=224796 [ 622.719069][ T37] audit: type=1400 audit(1756670480.822:377821): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 622.860674][ T37] audit: type=1400 audit(1756670480.822:377822): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17727 comm="udevd" name="/" dev="sda1" ino=2 [ 622.972592][ T5967] usb 4-1: 0:2 : does not exist [ 622.989469][ T5967] usb 4-1: 5:0: failed to get current value for ch 0 (-22) [ 623.040839][ T5967] usb 4-1: 5:0: cannot get min/max values for control 3 (id 5) [ 623.068637][ T5967] usb 4-1: 5:0: cannot get min/max values for control 4 (id 5) [ 623.095273][ T5967] usb 4-1: 5:0: cannot get min/max values for control 8 (id 5) [ 623.175268][ T5967] usb 4-1: 5:0: cannot get min/max values for control 3 (id 5) [ 623.206696][ T5967] usb 4-1: USB disconnect, device number 8 [ 623.464777][T17727] udevd[17727]: error opening ATTR{/sys/devices/platform/dummy_hcd.3/usb4/4-1/4-1:1.0/sound/card3/controlC3/../uevent} for writing: No such file or directory [ 624.182880][ T1324] ieee802154 phy0 wpan0: encryption failed: -22 [ 624.182954][ T1324] ieee802154 phy1 wpan1: encryption failed: -22 [ 625.859595][ C0] net_ratelimit: 9236 callbacks suppressed [ 625.859616][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 625.859980][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 625.860423][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 625.861306][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 625.861695][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 625.862059][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 625.863180][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 625.863370][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 625.863648][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 625.863896][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 626.105533][ T1580] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 626.229557][ T59] Bluetooth: hci8: command 0x0405 tx timeout [ 627.856458][ T37] kauditd_printk_skb: 2182 callbacks suppressed [ 627.856475][ T37] audit: type=1400 audit(1756670485.962:379774): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 628.131060][T17742] bridge0: port 2(bridge_slave_1) entered disabled state [ 628.131307][T17742] bridge0: port 1(bridge_slave_0) entered disabled state [ 628.224815][ T37] audit: type=1400 audit(1756670486.332:379775): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 628.603412][ T37] audit: type=1400 audit(1756670486.712:379776): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5934 comm="syz-executor" opid=17741 ocomm="syz.3.5629" [ 628.603459][ T37] audit: type=1400 audit(1756670486.712:379777): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5934 comm="syz-executor" opid=17741 ocomm="syz.3.5629" [ 628.720950][ T37] audit: type=1400 audit(1756670486.832:379778): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 628.810352][ T37] audit: type=1400 audit(1756670486.922:379779): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5934 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 628.810631][ T37] audit: type=1400 audit(1756670486.922:379780): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5934 comm="syz-executor" name="/" dev="sysfs" ino=1 [ 628.810865][ T37] audit: type=1400 audit(1756670486.922:379781): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5934 comm="syz-executor" name="fs" dev="sysfs" ino=2 [ 628.811102][ T37] audit: type=1400 audit(1756670486.922:379782): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5934 comm="syz-executor" name="fuse" dev="sysfs" ino=5240 [ 628.811347][ T37] audit: type=1400 audit(1756670486.922:379783): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=5934 comm="syz-executor" name="/" dev="fusectl" ino=1 [ 630.869097][ C0] net_ratelimit: 10138 callbacks suppressed [ 630.869118][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 630.869593][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 630.870007][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 630.870364][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 630.871804][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 630.872185][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 630.872593][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 630.873051][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 630.873441][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 630.873804][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 631.182355][T17742] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 631.290719][T17742] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 633.221754][ T37] kauditd_printk_skb: 10 callbacks suppressed [ 633.221771][ T37] audit: type=1400 audit(1756670491.333:379794): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 633.724455][ T37] audit: type=1400 audit(1756670491.833:379795): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 634.231910][ T37] audit: type=1400 audit(1756670492.343:379796): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 634.739260][ T37] audit: type=1400 audit(1756670492.833:379797): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 635.242047][ T37] audit: type=1400 audit(1756670493.353:379798): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 635.722726][ T37] audit: type=1400 audit(1756670493.833:379799): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 635.873754][T17742] syz.3.5629 (17742) used greatest stack depth: 17528 bytes left [ 635.875288][ T37] audit: type=1400 audit(1756670493.983:379800): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5934 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 635.875540][ T37] audit: type=1400 audit(1756670493.983:379801): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5934 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 635.875883][ T37] audit: type=1400 audit(1756670493.983:379802): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5934 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 635.879028][ C0] net_ratelimit: 9879 callbacks suppressed [ 635.879051][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 635.879454][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 635.879828][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 635.881270][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 635.881617][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 635.882084][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 635.882511][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 635.882871][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 635.883213][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 635.884545][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 635.894815][ T37] audit: type=1400 audit(1756670494.003:379803): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 636.141007][ T43] netdevsim netdevsim3 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 636.725055][T17756] IPv6: NLM_F_CREATE should be specified when creating new route [ 637.931232][ T1580] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 638.139090][ T43] netdevsim netdevsim3 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 638.234976][ T43] netdevsim netdevsim3 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 638.243172][ T37] kauditd_printk_skb: 603 callbacks suppressed [ 638.243187][ T37] audit: type=1400 audit(1756670496.333:380407): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17640 comm="syz-executor" name="/" dev="sda1" ino=2 [ 638.243232][ T37] audit: type=1400 audit(1756670496.353:380408): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 638.299952][ T37] audit: type=1400 audit(1756670496.413:380409): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17640 comm="syz-executor" name="/" dev="devtmpfs" ino=1 [ 638.300177][ T37] audit: type=1400 audit(1756670496.413:380410): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17640 comm="syz-executor" name="net" dev="devtmpfs" ino=707 [ 638.300401][ T37] audit: type=1400 audit(1756670496.413:380411): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=rw pid=17640 comm="syz-executor" name="tun" dev="devtmpfs" ino=708 [ 638.408438][ T37] audit: type=1400 audit(1756670496.483:380412): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=17640 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=708 [ 638.408485][ T37] audit: type=1400 audit(1756670496.513:380413): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17664 comm="syz-executor" name="/" dev="sda1" ino=2 [ 638.408764][ T37] audit: type=1400 audit(1756670496.513:380414): lsm=SMACK fn=smack_file_ioctl action=granted subject="_" object="_" requested=w pid=17640 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=708 [ 638.431530][ T37] audit: type=1400 audit(1756670496.543:380415): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17664 comm="syz-executor" name="/" dev="proc" ino=1 [ 638.431574][ T37] audit: type=1400 audit(1756670496.543:380416): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17664 comm="syz-executor" name="sys" dev="proc" ino=4026531854 [ 638.463287][ T43] netdevsim netdevsim3 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 640.539568][T17778] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 640.547097][T17778] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 640.553296][T17778] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 640.588903][T17778] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 640.590841][T17778] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 640.629163][T17778] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 640.636141][T17778] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 640.670036][ T59] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 640.671414][ T59] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 640.720782][T17778] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 640.888832][ C0] net_ratelimit: 9017 callbacks suppressed [ 640.888852][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 640.889223][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 640.889649][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 640.890116][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 640.890502][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 640.890883][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 640.892335][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 640.892687][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 640.893096][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 640.893553][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 642.645931][T17636] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 642.668570][T17636] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 642.669890][T17636] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 642.671342][T17636] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 642.672896][T17636] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 642.708818][T17778] Bluetooth: hci0: command tx timeout [ 642.788561][T17636] Bluetooth: hci1: command tx timeout [ 643.735122][ T37] kauditd_printk_skb: 1244 callbacks suppressed [ 643.735138][ T37] audit: type=1400 audit(1756670501.843:381655): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 644.240522][ T37] audit: type=1400 audit(1756670502.353:381656): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 644.861309][T17636] Bluetooth: hci0: command tx timeout [ 644.926862][T17636] Bluetooth: hci1: command tx timeout [ 645.252292][ T37] audit: type=1400 audit(1756670502.833:381657): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 645.252344][ T37] audit: type=1400 audit(1756670503.343:381658): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 645.898227][ C1] net_ratelimit: 12457 callbacks suppressed [ 645.898247][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 645.898453][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 645.898646][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 645.898901][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 645.899041][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 645.899315][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 645.899441][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 645.899681][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 645.899860][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 645.900285][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 646.920949][T17636] Bluetooth: hci0: command tx timeout [ 646.969284][ T37] audit: type=1400 audit(1756670503.843:381659): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 646.969335][ T37] audit: type=1400 audit(1756670504.343:381660): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 646.969378][ T37] audit: type=1400 audit(1756670504.353:381661): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5210 comm="udevd" opid=17784 ocomm="udevd" [ 646.969424][ T37] audit: type=1400 audit(1756670504.353:381662): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5210 comm="udevd" opid=17780 ocomm="udevd" [ 646.969463][ T37] audit: type=1400 audit(1756670504.353:381663): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5210 comm="udevd" opid=17782 ocomm="udevd" [ 646.969501][ T37] audit: type=1400 audit(1756670504.353:381664): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5210 comm="udevd" opid=17783 ocomm="udevd" [ 647.120800][T17636] Bluetooth: hci1: command tx timeout [ 648.806772][ T37] kauditd_printk_skb: 45 callbacks suppressed [ 648.806792][ T37] audit: type=1400 audit(1756670506.853:381710): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 648.806837][ T37] audit: type=1400 audit(1756670506.853:381711): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 648.806878][ T37] audit: type=1400 audit(1756670506.853:381712): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 649.035643][T17636] Bluetooth: hci0: command tx timeout [ 649.252272][ T37] audit: type=1400 audit(1756670507.343:381713): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 649.275248][T17636] Bluetooth: hci1: command tx timeout [ 649.813387][ T37] audit: type=1400 audit(1756670507.843:381714): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 650.252272][ T37] audit: type=1400 audit(1756670508.343:381715): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 650.857803][ T37] audit: type=1400 audit(1756670508.843:381716): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 650.908019][ C1] net_ratelimit: 19979 callbacks suppressed [ 650.908040][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 650.908261][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 650.908434][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 650.908649][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 650.908837][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 650.909257][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 650.909653][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 650.910074][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 650.910078][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 650.910419][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 651.301926][ T37] audit: type=1400 audit(1756670509.344:381717): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 652.273585][ T37] audit: type=1400 audit(1756670509.444:381718): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5210 comm="udevd" name="/" dev="sda1" ino=2 [ 652.273636][ T37] audit: type=1400 audit(1756670509.444:381719): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5210 comm="udevd" name="etc" dev="sda1" ino=116 [ 653.892979][ T37] kauditd_printk_skb: 38 callbacks suppressed [ 653.892998][ T37] audit: type=1400 audit(1756670511.954:381758): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 653.893044][ T37] audit: type=1400 audit(1756670511.954:381759): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 654.352683][ T37] audit: type=1400 audit(1756670512.354:381760): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 655.728347][ T37] audit: type=1400 audit(1756670512.884:381761): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 655.728410][ T37] audit: type=1400 audit(1756670513.354:381762): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 655.917923][ C1] net_ratelimit: 20235 callbacks suppressed [ 655.917943][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 655.918344][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 655.918616][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 655.918747][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 655.919031][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 655.919143][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 655.919522][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 655.919540][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 655.919997][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 655.920080][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 656.767826][ T37] audit: type=1400 audit(1756670513.854:381763): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 656.767879][ T37] audit: type=1400 audit(1756670514.354:381764): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 656.767922][ T37] audit: type=1400 audit(1756670514.854:381765): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 657.545112][ T37] audit: type=1400 audit(1756670515.354:381766): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 657.945129][ T37] audit: type=1400 audit(1756670515.854:381767): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 659.532975][ T37] kauditd_printk_skb: 1 callbacks suppressed [ 659.532993][ T37] audit: type=1400 audit(1756670517.634:381769): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5826 comm="syz-executor" opid=17663 ocomm="syz-executor" [ 659.613290][ T37] audit: type=1400 audit(1756670517.714:381770): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=17663 comm="syz-executor" opid=17664 ocomm="syz-executor" [ 660.210311][ T37] audit: type=1400 audit(1756670518.314:381771): lsm=SMACK fn=smack_task_setpgid action=granted subject="_" object="_" requested=w pid=17795 comm="syz-executor" opid=17795 ocomm="syz-executor" [ 660.210859][ T37] audit: type=1400 audit(1756670518.314:381772): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 660.211286][ T37] audit: type=1400 audit(1756670518.314:381773): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 660.211643][ T37] audit: type=1400 audit(1756670518.314:381774): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 660.211982][ T37] audit: type=1400 audit(1756670518.314:381775): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 660.212031][ T37] audit: type=1400 audit(1756670518.314:381776): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17795 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 660.212316][ T37] audit: type=1400 audit(1756670518.314:381777): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17795 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 660.212361][ T37] audit: type=1400 audit(1756670518.314:381778): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 660.927656][ C1] net_ratelimit: 19717 callbacks suppressed [ 660.927656][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 660.927676][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 660.928067][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 660.928079][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 660.928501][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 660.928522][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 660.928897][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 660.928907][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 660.929271][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 660.929324][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 665.246419][ T37] kauditd_printk_skb: 51 callbacks suppressed [ 665.246436][ T37] audit: type=1400 audit(1756670523.344:381830): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17795 comm="syz-executor" name="/" dev="sda1" ino=2 [ 665.246685][ T37] audit: type=1400 audit(1756670523.344:381831): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17795 comm="syz-executor" name="/" dev="sysfs" ino=1 [ 665.246907][ T37] audit: type=1400 audit(1756670523.344:381832): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17795 comm="syz-executor" name="kernel" dev="sysfs" ino=1392 [ 665.247188][ T37] audit: type=1400 audit(1756670523.344:381833): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17795 comm="syz-executor" name="/" dev="debugfs" ino=1 [ 665.247408][ T37] audit: type=1400 audit(1756670523.354:381834): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=rw pid=17795 comm="syz-executor" name="kcov" dev="debugfs" ino=1107 [ 665.247772][ T37] audit: type=1400 audit(1756670523.354:381835): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=17795 comm="syz-executor" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1107 [ 665.248133][ T37] audit: type=1400 audit(1756670523.354:381836): lsm=SMACK fn=smack_file_ioctl action=granted subject="_" object="_" requested=r pid=17795 comm="syz-executor" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1107 [ 665.860043][ T37] audit: type=1400 audit(1756670523.914:381837): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 665.937330][ C0] net_ratelimit: 20075 callbacks suppressed [ 665.937330][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 665.937349][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 665.937707][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 665.937761][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 665.938116][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 665.938195][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 665.938571][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 665.938622][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 665.939008][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 665.939199][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 666.844851][ T37] audit: type=1400 audit(1756670524.944:381838): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 667.274085][ T37] audit: type=1400 audit(1756670525.364:381839): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 668.477603][ C1] sched: DL replenish lagged too much [ 670.313936][ T37] kauditd_printk_skb: 22 callbacks suppressed [ 670.313955][ T37] audit: type=1400 audit(1756670528.374:381862): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 670.646464][ T37] audit: type=1400 audit(1756670528.745:381863): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17795 comm="syz-executor" name="/" dev="sda1" ino=2 [ 670.646707][ T37] audit: type=1400 audit(1756670528.745:381864): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17795 comm="syz-executor" name="/" dev="sysfs" ino=1 [ 670.646973][ T37] audit: type=1400 audit(1756670528.745:381865): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17795 comm="syz-executor" name="kernel" dev="sysfs" ino=1392 [ 670.647199][ T37] audit: type=1400 audit(1756670528.755:381866): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17795 comm="syz-executor" name="/" dev="debugfs" ino=1 [ 670.647422][ T37] audit: type=1400 audit(1756670528.755:381867): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=rw pid=17795 comm="syz-executor" name="kcov" dev="debugfs" ino=1107 [ 670.647786][ T37] audit: type=1400 audit(1756670528.755:381868): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=17795 comm="syz-executor" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1107 [ 670.648168][ T37] audit: type=1400 audit(1756670528.755:381869): lsm=SMACK fn=smack_file_ioctl action=granted subject="_" object="_" requested=r pid=17795 comm="syz-executor" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1107 [ 670.670207][ T37] audit: type=1400 audit(1756670528.775:381870): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17795 comm="syz-executor" name="/" dev="sda1" ino=2 [ 670.670450][ T37] audit: type=1400 audit(1756670528.775:381871): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17795 comm="syz-executor" name="/" dev="sysfs" ino=1 [ 670.947157][ C1] net_ratelimit: 20083 callbacks suppressed [ 670.947178][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 670.947388][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 670.947580][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 670.947890][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 670.947976][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 670.948247][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 670.948474][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 670.948650][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 670.948873][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 670.949185][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 675.384241][ T37] kauditd_printk_skb: 29 callbacks suppressed [ 675.384261][ T37] audit: type=1400 audit(1756670533.395:381901): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 675.453242][ T37] audit: type=1400 audit(1756670533.545:381902): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 675.956876][ C0] net_ratelimit: 20349 callbacks suppressed [ 675.956880][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 675.956897][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 675.957284][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 675.957324][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 675.957733][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 675.958128][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 675.958525][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 675.958892][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 675.958920][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 675.959321][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 676.539247][ T37] audit: type=1400 audit(1756670533.695:381903): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1187 comm="irq/33-virtio1-" saddr=10.128.0.169 src=43852 daddr=10.128.0.234 dest=22 netif=eth0 [ 676.539304][ T37] audit: type=1400 audit(1756670533.695:381904): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1187 comm="irq/33-virtio1-" saddr=10.128.0.169 src=43852 daddr=10.128.0.234 dest=22 netif=eth0 [ 676.539344][ T37] audit: type=1400 audit(1756670533.695:381905): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1187 comm="irq/33-virtio1-" saddr=10.128.0.169 src=43852 daddr=10.128.0.234 dest=22 netif=eth0 [ 676.539385][ T37] audit: type=1400 audit(1756670534.485:381906): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=43852 daddr=10.128.0.234 dest=22 netif=eth0 [ 676.556732][ T37] audit: type=1400 audit(1756670534.655:381907): lsm=SMACK fn=smack_file_ioctl action=granted subject="_" object="_" requested=w pid=17795 comm="syz-executor" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1107 [ 676.573782][ T37] audit: type=1400 audit(1756670534.675:381908): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17799 comm="syz-executor" name="/" dev="sda1" ino=2 [ 676.574002][ T37] audit: type=1400 audit(1756670534.675:381909): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17799 comm="syz-executor" name="/" dev="devtmpfs" ino=1 [ 676.574203][ T37] audit: type=1400 audit(1756670534.675:381910): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=rw pid=17799 comm="syz-executor" name="vhci" dev="devtmpfs" ino=1268 [ 680.547564][ T37] kauditd_printk_skb: 32 callbacks suppressed [ 680.547583][ T37] audit: type=1400 audit(1756670538.255:381943): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 680.966478][ C1] net_ratelimit: 20157 callbacks suppressed [ 680.966498][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 680.966898][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 680.967294][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 680.967535][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 680.967721][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 680.968015][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 680.968121][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 680.968385][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 680.968525][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 680.968824][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 682.701061][ T37] audit: type=1400 audit(1756670540.775:381944): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 685.976160][ C1] net_ratelimit: 20449 callbacks suppressed [ 685.976181][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 685.976385][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 685.976684][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 685.977160][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 685.977678][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 685.977829][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 685.978129][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 685.978288][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 685.978570][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 685.978647][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 686.538192][ T37] audit: type=1400 audit(1756670544.625:381945): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 690.986075][ C1] net_ratelimit: 20053 callbacks suppressed [ 690.986096][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 690.986499][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 690.986901][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 690.987029][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 690.987328][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 690.987533][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 690.987724][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 690.987950][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 690.988154][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 690.988546][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 695.294491][ T37] audit: type=1400 audit(1756670552.796:381946): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 695.294544][ T37] audit: type=1400 audit(1756670552.796:381947): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 695.294585][ T37] audit: type=1400 audit(1756670552.796:381948): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 695.995889][ C1] net_ratelimit: 20249 callbacks suppressed [ 695.995910][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 695.996077][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 695.996336][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 695.996542][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 695.996738][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 695.996968][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 695.997134][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 695.997562][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 695.997958][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 695.998384][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 699.828634][ T37] audit: type=1400 audit(1756670556.416:381949): lsm=SMACK fn=smack_file_ioctl action=granted subject="_" object="*" requested=w pid=17799 comm="syz-executor" path="socket:[46751]" dev="sockfs" ino=46751 [ 699.828688][ T37] audit: type=1400 audit(1756670556.496:381950): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 699.828729][ T37] audit: type=1400 audit(1756670556.696:381951): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 699.828775][ T37] audit: type=1400 audit(1756670556.696:381952): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 699.828816][ T37] audit: type=1400 audit(1756670556.696:381953): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 699.828858][ T37] audit: type=1400 audit(1756670556.696:381954): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 699.828898][ T37] audit: type=1400 audit(1756670556.696:381955): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 700.446123][ T37] kauditd_printk_skb: 10 callbacks suppressed [ 700.446141][ T37] audit: type=1400 audit(1756670558.496:381966): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 700.882779][ T59] Bluetooth: hci3: Opcode 0x0c03 failed: -110 [ 700.924865][ T37] audit: type=1400 audit(1756670558.946:381967): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 701.005536][ C0] net_ratelimit: 20241 callbacks suppressed [ 701.005557][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 701.005955][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 701.006329][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 701.007654][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 701.008130][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 701.008477][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 701.008875][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 701.009329][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 701.009707][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 701.010071][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 701.398101][ T37] audit: type=1400 audit(1756670559.446:381968): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 701.989504][ T37] audit: type=1400 audit(1756670559.946:381969): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 703.054706][ T37] audit: type=1400 audit(1756670560.446:381970): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 703.054760][ T37] audit: type=1400 audit(1756670560.936:381971): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 703.585265][ T37] audit: type=1400 audit(1756670561.446:381972): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 703.935248][ T37] audit: type=1400 audit(1756670561.956:381973): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 704.577678][ T37] audit: type=1400 audit(1756670562.456:381974): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 705.076641][ T37] audit: type=1400 audit(1756670562.946:381975): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 705.850842][ T37] kauditd_printk_skb: 1 callbacks suppressed [ 705.850862][ T37] audit: type=1400 audit(1756670563.946:381977): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 706.015152][ C1] net_ratelimit: 20504 callbacks suppressed [ 706.015171][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 706.015322][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 706.015598][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 706.015773][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 706.016017][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 706.016184][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 706.016465][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 706.016584][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 706.016929][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 706.017356][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 706.355839][ T37] audit: type=1400 audit(1756670564.446:381978): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 706.868678][ T37] audit: type=1400 audit(1756670564.946:381979): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 707.379277][ T37] audit: type=1400 audit(1756670565.456:381980): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 707.882805][ T37] audit: type=1400 audit(1756670565.946:381981): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 708.409974][ T37] audit: type=1400 audit(1756670566.446:381982): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 708.913356][ T37] audit: type=1400 audit(1756670566.956:381983): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 709.439215][ T37] audit: type=1400 audit(1756670567.456:381984): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 709.944627][ T37] audit: type=1400 audit(1756670567.957:381985): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 710.387927][ T37] audit: type=1400 audit(1756670568.457:381986): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 710.871763][ T37] audit: type=1400 audit(1756670568.947:381987): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 711.024858][ C1] net_ratelimit: 20116 callbacks suppressed [ 711.024885][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 711.024974][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 711.025306][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 711.025465][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 711.025732][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 711.025881][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 711.026154][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 711.026339][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 711.026579][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 711.026820][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 711.359628][ T37] audit: type=1400 audit(1756670569.447:381988): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 711.879654][ T37] audit: type=1400 audit(1756670569.957:381989): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 712.410343][ T37] audit: type=1400 audit(1756670570.467:381990): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 712.410485][ T1324] ieee802154 phy0 wpan0: encryption failed: -22 [ 712.453395][ T1324] ieee802154 phy1 wpan1: encryption failed: -22 [ 713.067898][ T37] audit: type=1400 audit(1756670570.967:381991): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 713.823411][ T37] audit: type=1400 audit(1756670571.887:381992): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 716.034776][ C1] net_ratelimit: 20474 callbacks suppressed [ 716.034797][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 716.034842][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 716.035263][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 716.035376][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 716.035714][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 716.035810][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 716.036100][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 716.036209][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 716.036455][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 716.036626][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 716.385790][T17799] Bluetooth: hci3: Opcode 0x0c03 failed: -4 [ 717.338612][ T37] audit: type=1400 audit(1756670575.437:381993): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ktimers/0" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 721.044399][ C0] net_ratelimit: 20238 callbacks suppressed [ 721.044399][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 721.044419][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 721.044843][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 721.044948][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 721.045287][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 721.045346][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 721.045729][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 721.045831][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 721.046195][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 721.046333][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 724.492822][ T37] audit: type=1400 audit(1756670582.497:381994): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5582 comm="crond" name="/" dev="sda1" ino=2 [ 724.492876][ T37] audit: type=1400 audit(1756670582.557:381995): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 725.438599][ T37] audit: type=1400 audit(1756670583.507:381996): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5582 comm="crond" name="etc" dev="sda1" ino=116 [ 725.438650][ T37] audit: type=1400 audit(1756670583.507:381997): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5582 comm="crond" name="cron" dev="sda1" ino=120 [ 726.054255][ C1] net_ratelimit: 20196 callbacks suppressed [ 726.054276][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 726.054671][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 726.054730][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 726.055073][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 726.055177][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 726.055468][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 726.055525][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 726.055896][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 726.055939][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 726.056289][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 729.451774][ T5928] Bluetooth: hci7: command tx timeout [ 730.454836][ T37] audit: type=1400 audit(1756670588.558:381998): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5582 comm="crond" path="/etc/cron/crontabs" dev="sda1" ino=121 [ 730.454885][ T37] audit: type=1400 audit(1756670588.568:381999): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5582 comm="crond" name="crontabs" dev="sda1" ino=121 [ 730.454924][ T37] audit: type=1400 audit(1756670588.568:382000): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5582 comm="crond" name="/" dev="sda1" ino=2 [ 730.454963][ T37] audit: type=1400 audit(1756670588.568:382001): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5582 comm="crond" name="etc" dev="sda1" ino=116 [ 730.465956][ T37] audit: type=1400 audit(1756670588.578:382002): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5210 comm="udevd" name="/" dev="sda1" ino=2 [ 730.466191][ T37] audit: type=1400 audit(1756670588.578:382003): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5210 comm="udevd" name="/" dev="tmpfs" ino=1 [ 730.466413][ T37] audit: type=1400 audit(1756670588.578:382004): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5210 comm="udevd" name="udev" dev="tmpfs" ino=9 [ 730.466764][ T37] audit: type=1400 audit(1756670588.578:382005): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=5210 comm="udevd" name="udev" dev="tmpfs" ino=9 [ 730.468436][ T37] audit: type=1400 audit(1756670588.578:382006): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=5210 comm="udevd" path="/run/udev/queue" dev="tmpfs" ino=13400 [ 730.468717][ T37] audit: type=1400 audit(1756670588.578:382007): lsm=SMACK fn=smack_inode_setattr action=granted subject="_" object="_" requested=w pid=5210 comm="udevd" name="queue" dev="tmpfs" ino=13400 [ 731.063844][ C0] net_ratelimit: 20026 callbacks suppressed [ 731.063867][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 731.063931][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 731.064317][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 731.064398][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 731.064680][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 731.064821][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 731.065120][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 731.065278][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 731.065602][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 731.065703][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 735.523741][ T37] kauditd_printk_skb: 12 callbacks suppressed [ 735.523760][ T37] audit: type=1400 audit(1756670591.668:382020): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5210 comm="udevd" name="/" dev="sda1" ino=2 [ 735.524020][ T37] audit: type=1400 audit(1756670593.638:382021): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5210 comm="udevd" name="lib" dev="sda1" ino=264 [ 735.524233][ T37] audit: type=1400 audit(1756670593.638:382022): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5210 comm="udevd" name="udev" dev="sda1" ino=1222 [ 735.653273][ T37] audit: type=1400 audit(1756670593.758:382023): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5210 comm="udevd" path="/lib/udev/rules.d" dev="sda1" ino=1229 [ 736.073678][ C0] net_ratelimit: 19930 callbacks suppressed [ 736.073700][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 736.073862][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 736.074294][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 736.074691][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 736.075119][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 736.075180][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 736.075516][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 736.075662][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 736.075912][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 736.076071][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 738.313457][ T37] audit: type=1400 audit(1756670593.768:382024): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5210 comm="udevd" name="/" dev="sda1" ino=2 [ 738.313510][ T37] audit: type=1400 audit(1756670596.408:382025): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5210 comm="udevd" name="lib" dev="sda1" ino=264 [ 738.313550][ T37] audit: type=1400 audit(1756670596.408:382026): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5210 comm="udevd" name="udev" dev="sda1" ino=1222 [ 738.333450][ T37] audit: type=1400 audit(1756670596.438:382027): lsm=SMACK fn=smack_task_setpgid action=granted subject="_" object="_" requested=w pid=17808 comm="syz-executor" opid=17808 ocomm="syz-executor" [ 738.561126][ T37] audit: type=1400 audit(1756670596.628:382028): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 739.430708][ T37] audit: type=1400 audit(1756670597.518:382029): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5210 comm="udevd" path="/lib/udev/rules.d" dev="sda1" ino=1229 [ 741.083363][ C1] net_ratelimit: 20028 callbacks suppressed [ 741.083384][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 741.083791][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 741.083962][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 741.084187][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 741.084450][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 741.084582][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 741.084801][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 741.084982][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 741.085240][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 741.085429][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 742.543343][ T37] kauditd_printk_skb: 9 callbacks suppressed [ 742.543363][ T37] audit: type=1400 audit(1756670599.638:382039): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5210 comm="udevd" name="/" dev="sda1" ino=2 [ 742.543409][ T37] audit: type=1400 audit(1756670600.638:382040): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5210 comm="udevd" name="etc" dev="sda1" ino=116 [ 742.543450][ T37] audit: type=1400 audit(1756670600.638:382041): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5210 comm="udevd" name="udev" dev="sda1" ino=259 [ 746.093047][ C1] net_ratelimit: 20699 callbacks suppressed [ 746.093069][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 746.093474][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 746.093685][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 746.093872][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 746.094191][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 746.094275][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 746.094585][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 746.094672][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 746.095047][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 746.095123][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 747.475312][ T37] audit: type=1400 audit(1756670605.478:382042): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5210 comm="udevd" path="/etc/udev/hwdb.bin" dev="sda1" ino=260 [ 749.777047][ T37] audit: type=1400 audit(1756670607.819:382043): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17807 comm="udevd" name="/" dev="sda1" ino=2 [ 749.777300][ T37] audit: type=1400 audit(1756670607.889:382044): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17807 comm="udevd" name="/" dev="proc" ino=1 [ 749.790635][ T37] audit: type=1400 audit(1756670607.899:382045): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17807 comm="udevd" name="/" dev="proc" ino=1 [ 749.791008][ T37] audit: type=1400 audit(1756670607.899:382046): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17807 comm="udevd" name="17807" dev="proc" ino=46758 [ 749.791432][ T37] audit: type=1400 audit(1756670607.899:382047): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=w pid=17807 comm="udevd" name="oom_score_adj" dev="proc" ino=46759 [ 749.791770][ T37] audit: type=1400 audit(1756670607.899:382048): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=17807 comm="udevd" path="/proc/17807/oom_score_adj" dev="proc" ino=46759 [ 749.792091][ T37] audit: type=1400 audit(1756670607.899:382049): lsm=SMACK fn=smack_inode_setattr action=granted subject="_" object="_" requested=w pid=17807 comm="udevd" name="oom_score_adj" dev="proc" ino=46759 [ 749.799669][ T37] audit: type=1400 audit(1756670607.909:382050): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=17807 comm="udevd" path="/proc/17807/oom_score_adj" dev="proc" ino=46759 [ 749.800629][ T37] audit: type=1400 audit(1756670607.909:382051): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17807 comm="udevd" name="/" dev="sda1" ino=2 [ 749.800857][ T37] audit: type=1400 audit(1756670607.909:382052): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17807 comm="udevd" name="/" dev="sysfs" ino=1 [ 751.102906][ C0] net_ratelimit: 19729 callbacks suppressed [ 751.102924][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 751.103582][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 751.103894][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 751.104983][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 751.105429][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 751.105490][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 751.105788][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 751.105952][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 751.106230][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 751.106408][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 752.835779][T17802] Bluetooth: hci2: command tx timeout [ 755.942377][T17806] Bluetooth: hci2: command tx timeout [ 756.112553][ C0] net_ratelimit: 20454 callbacks suppressed [ 756.112554][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 756.112574][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 756.112935][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 756.113015][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 756.113472][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 756.113924][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 756.114336][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 756.114381][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 756.114783][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 756.114860][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 756.835249][ T37] kauditd_printk_skb: 129 callbacks suppressed [ 756.835265][ T37] audit: type=1400 audit(1756670614.949:382182): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5826 comm="syz-executor" opid=17767 ocomm="syz-executor" [ 756.853998][ T37] audit: type=1400 audit(1756670614.969:382183): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=17767 comm="syz-executor" opid=17776 ocomm="syz-executor" [ 756.857974][ T37] audit: type=1400 audit(1756670614.969:382184): lsm=SMACK fn=smack_task_setpgid action=granted subject="_" object="_" requested=w pid=17814 comm="syz-executor" opid=17814 ocomm="syz-executor" [ 756.859578][ T37] audit: type=1400 audit(1756670614.969:382185): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17814 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 756.859789][ T37] audit: type=1400 audit(1756670614.969:382186): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17814 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 756.860009][ T37] audit: type=1400 audit(1756670614.969:382187): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17814 comm="syz-executor" name="syz-executor" dev="sda1" ino=2020 [ 756.860277][ T37] audit: type=1400 audit(1756670614.969:382188): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=17814 comm="syz-executor" path="/root/syz-executor" dev="sda1" ino=2020 [ 756.863624][ T37] audit: type=1400 audit(1756670614.969:382189): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17814 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 756.863871][ T37] audit: type=1400 audit(1756670614.979:382190): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17814 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 757.832672][ T37] audit: type=1400 audit(1756670614.979:382191): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=17814 comm="syz-executor" name="syz-executor" dev="sda1" ino=2020 [ 761.122267][ C0] net_ratelimit: 19618 callbacks suppressed [ 761.122289][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 761.122504][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 761.122737][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 761.122927][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 761.123152][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 761.123354][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 761.123512][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 761.123748][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 761.124596][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 761.124990][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 762.745019][T17806] Bluetooth: hci2: command tx timeout [ 764.834564][ T37] kauditd_printk_skb: 85 callbacks suppressed [ 764.834581][ T37] audit: type=1400 audit(1756670622.949:382277): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17817 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 764.834794][ T37] audit: type=1400 audit(1756670622.949:382278): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17817 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 764.835012][ T37] audit: type=1400 audit(1756670622.949:382279): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17817 comm="syz-executor" name="syz-executor" dev="sda1" ino=2020 [ 764.835267][ T37] audit: type=1400 audit(1756670622.949:382280): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=17817 comm="syz-executor" path="/root/syz-executor" dev="sda1" ino=2020 [ 764.837451][ T37] audit: type=1400 audit(1756670622.949:382281): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17817 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 764.837682][ T37] audit: type=1400 audit(1756670622.949:382282): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17817 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 766.132210][ C0] net_ratelimit: 20078 callbacks suppressed [ 766.132232][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 766.132271][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 766.132674][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 766.133092][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 766.133496][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 766.133647][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 766.133917][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 766.134095][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 766.134327][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 766.134452][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 768.185868][ T37] audit: type=1400 audit(1756670625.829:382283): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1185 comm="irq/31-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.0.234 dest=60830 netif=eth0 [ 768.836236][ T37] audit: type=1400 audit(1756670626.950:382284): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=17817 comm="syz-executor" name="syz-executor" dev="sda1" ino=2020 [ 768.955062][ T37] audit: type=1400 audit(1756670627.050:382285): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5210 comm="udevd" name="/" dev="sda1" ino=2 [ 768.971068][ T37] audit: type=1400 audit(1756670627.080:382286): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5210 comm="udevd" name="etc" dev="sda1" ino=116 [ 770.702243][T17802] Bluetooth: hci0: command 0x0406 tx timeout [ 770.702280][T17802] Bluetooth: hci2: command tx timeout [ 770.810301][ T37] kauditd_printk_skb: 2 callbacks suppressed [ 770.810321][ T37] audit: type=1400 audit(1756670628.860:382289): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17814 comm="syz-executor" name="/" dev="sda1" ino=2 [ 770.810364][ T37] audit: type=1400 audit(1756670628.880:382290): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17814 comm="syz-executor" name="/" dev="proc" ino=1 [ 771.141835][ C0] net_ratelimit: 20102 callbacks suppressed [ 771.141848][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 771.141861][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 771.142219][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 771.142256][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 771.142703][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 771.143099][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 771.143496][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 771.143577][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 771.143889][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 771.144055][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 772.865663][T17802] Bluetooth: hci1: command 0x0406 tx timeout [ 775.031565][ T37] audit: type=1400 audit(1756670633.130:382291): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17808 comm="syz-executor" name="/" dev="sda1" ino=2 [ 775.031618][ T37] audit: type=1400 audit(1756670633.130:382292): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17808 comm="syz-executor" name="/" dev="sysfs" ino=1 [ 775.031658][ T37] audit: type=1400 audit(1756670633.130:382293): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17808 comm="syz-executor" name="kernel" dev="sysfs" ino=1392 [ 775.031698][ T37] audit: type=1400 audit(1756670633.130:382294): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17808 comm="syz-executor" name="/" dev="debugfs" ino=1 [ 775.031737][ T37] audit: type=1400 audit(1756670633.130:382295): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=rw pid=17808 comm="syz-executor" name="kcov" dev="debugfs" ino=1107 [ 776.151582][ C1] net_ratelimit: 20786 callbacks suppressed [ 776.151603][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 776.152010][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 776.152438][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 776.152484][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 776.152846][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 776.152933][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 776.153259][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 776.153298][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 776.153689][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 776.153711][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 781.161423][ C1] net_ratelimit: 20782 callbacks suppressed [ 781.161444][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 781.161864][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 781.162012][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 781.162314][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 781.162497][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 781.162728][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 781.162888][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 781.163147][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 781.163388][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 781.163587][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 783.622758][ T37] audit: type=1400 audit(1756670639.020:382296): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17814 comm="syz-executor" name="/" dev="proc" ino=1 [ 785.879052][ T37] audit: type=1400 audit(1756670643.990:382297): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=17808 comm="syz-executor" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1107 [ 786.171241][ C1] net_ratelimit: 20736 callbacks suppressed [ 786.171251][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 786.171261][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 786.171675][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 786.171679][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 786.172041][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 786.172104][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 786.172524][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 786.172952][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 786.173378][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 786.173395][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 789.856370][ T37] audit: type=1400 audit(1756670647.951:382298): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17817 comm="syz-executor" name="/" dev="sda1" ino=2 [ 789.856419][ T37] audit: type=1400 audit(1756670647.951:382299): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17817 comm="syz-executor" name="/" dev="proc" ino=1 [ 790.630792][ T37] audit: type=1400 audit(1756670648.711:382300): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5582 comm="crond" name="/" dev="sda1" ino=2 [ 790.630841][ T37] audit: type=1400 audit(1756670648.741:382301): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5582 comm="crond" name="etc" dev="sda1" ino=116 [ 790.630880][ T37] audit: type=1400 audit(1756670648.741:382302): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5582 comm="crond" name="cron" dev="sda1" ino=120 [ 791.180763][ C0] net_ratelimit: 20473 callbacks suppressed [ 791.180785][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 791.180993][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 791.181323][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 791.181392][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 791.181754][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 791.181794][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 791.182159][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 791.182191][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 791.182623][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 791.183018][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ae:d0:12:fa:82:b6, vlan:0) [ 792.496153][ T38] INFO: task kworker/u8:10:1464 blocked for more than 144 seconds. [ 792.496189][ T38] Not tainted syzkaller #0 [ 792.496200][ T38] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 792.496213][ T38] task:kworker/u8:10 state:D stack:19192 pid:1464 tgid:1464 ppid:2 task_flags:0x4208160 flags:0x00004000 [ 792.496268][ T38] Workqueue: events_unbound linkwatch_event [ 792.496301][ T38] Call Trace: [ 792.496308][ T38] [ 792.496323][ T38] __schedule+0x16f3/0x4c20 [ 792.496368][ T38] ? do_raw_spin_lock+0x121/0x290 [ 792.496399][ T38] ? __pfx___schedule+0x10/0x10 [ 792.496440][ T38] ? _raw_spin_unlock_irq+0x23/0x50 [ 792.496466][ T38] rt_mutex_schedule+0x77/0xf0 [ 792.496484][ T38] rt_mutex_slowlock_block+0x5ba/0x6d0 [ 792.496503][ T38] ? task_blocks_on_rt_mutex+0xf12/0x1380 [ 792.496546][ T38] rt_mutex_slowlock+0x2b1/0x6e0 [ 792.496568][ T38] ? rt_mutex_slowlock+0x1c9/0x6e0 [ 792.496589][ T38] ? __pfx_rt_mutex_slowlock+0x10/0x10 [ 792.496619][ T38] ? linkwatch_event+0xe/0x60 [ 792.496649][ T38] ? process_scheduled_works+0x9ef/0x17b0 [ 792.496676][ T38] ? linkwatch_event+0xe/0x60 [ 792.496697][ T38] mutex_lock_nested+0x16a/0x1d0 [ 792.496715][ T38] ? _raw_spin_unlock_irq+0x23/0x50 [ 792.496736][ T38] ? process_scheduled_works+0x9ef/0x17b0 [ 792.496764][ T38] linkwatch_event+0xe/0x60 [ 792.496786][ T38] process_scheduled_works+0xade/0x17b0 [ 792.496839][ T38] ? __pfx_process_scheduled_works+0x10/0x10 [ 792.496879][ T38] worker_thread+0x8a0/0xda0 [ 792.496929][ T38] kthread+0x711/0x8a0 [ 792.496958][ T38] ? __pfx_worker_thread+0x10/0x10 [ 792.496979][ T38] ? __pfx_kthread+0x10/0x10 [ 792.497009][ T38] ? __pfx_kthread+0x10/0x10 [ 792.497034][ T38] ret_from_fork+0x3f9/0x770 [ 792.497060][ T38] ? __pfx_ret_from_fork+0x10/0x10 [ 792.497088][ T38] ? __switch_to_asm+0x39/0x70 [ 792.497105][ T38] ? __switch_to_asm+0x33/0x70 [ 792.497121][ T38] ? __pfx_kthread+0x10/0x10 [ 792.497146][ T38] ret_from_fork_asm+0x1a/0x30 [ 792.497180][ T38] [ 792.497189][ T38] INFO: task kworker/u8:13:1580 blocked for more than 144 seconds. [ 792.497203][ T38] Not tainted syzkaller #0 [ 792.497212][ T38] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 792.497221][ T38] task:kworker/u8:13 state:D stack:19624 pid:1580 tgid:1580 ppid:2 task_flags:0x4208160 flags:0x00004000 [ 792.497266][ T38] Workqueue: netns cleanup_net [ 792.497286][ T38] Call Trace: [ 792.497293][ T38] [ 792.497305][ T38] __schedule+0x16f3/0x4c20 [ 792.497353][ T38] ? lockdep_hardirqs_on+0x9c/0x150 [ 792.497380][ T38] ? __pfx___schedule+0x10/0x10 [ 792.497421][ T38] ? _raw_spin_unlock_irq+0x23/0x50 [ 792.497447][ T38] rt_mutex_schedule+0x77/0xf0 [ 792.497465][ T38] rt_mutex_slowlock_block+0x5ba/0x6d0 [ 792.497484][ T38] ? task_blocks_on_rt_mutex+0xf12/0x1380 [ 792.497522][ T38] rt_mutex_slowlock+0x2b1/0x6e0 [ 792.497544][ T38] ? rt_mutex_slowlock+0x1c9/0x6e0 [ 792.497564][ T38] ? __pfx_rt_mutex_slowlock+0x10/0x10 [ 792.497581][ T38] ? __lock_acquire+0xab9/0xd20 [ 792.497614][ T38] ? unregister_netdevice_notifier_net+0x8d/0x2a0 [ 792.497641][ T38] ? reacquire_held_locks+0x127/0x1d0 [ 792.497665][ T38] ? __pfx_migrate_enable+0x10/0x10 [ 792.497691][ T38] ? unregister_netdevice_notifier_net+0x8d/0x2a0 [ 792.497712][ T38] mutex_lock_nested+0x16a/0x1d0 [ 792.497736][ T38] unregister_netdevice_notifier_net+0x8d/0x2a0 [ 792.497760][ T38] ? mntput_no_expire+0x2eb/0x9d0 [ 792.497781][ T38] ? __pfx_unregister_netdevice_notifier_net+0x10/0x10 [ 792.497807][ T38] ? __pfx_mntput_no_expire+0x10/0x10 [ 792.497825][ T38] ? rt_spin_unlock+0x65/0x80 [ 792.497850][ T38] ? simple_release_fs+0x9c/0xd0 [ 792.497874][ T38] nsim_dev_hwstats_exit+0x83/0x2a0 [ 792.497893][ T38] ? kfree+0x195/0x550 [ 792.497920][ T38] nsim_dev_reload_destroy+0x2af/0x490 [ 792.497947][ T38] nsim_dev_reload_down+0x8a/0xc0 [ 792.497975][ T38] devlink_reload+0x1b6/0x8d0 [ 792.497997][ T38] ? xa_get_mark+0x67/0x7b0 [ 792.498018][ T38] ? __pfx_devlink_reload+0x10/0x10 [ 792.498034][ T38] ? xa_get_mark+0x70f/0x7b0 [ 792.498065][ T38] devlink_pernet_pre_exit+0x1d9/0x3d0 [ 792.498093][ T38] ? __pfx_devlink_pernet_pre_exit+0x10/0x10 [ 792.498125][ T38] ? class_remove_file_ns+0x124/0x160 [ 792.498149][ T38] ops_undo_list+0x187/0x990 [ 792.498177][ T38] ? __pfx_ops_undo_list+0x10/0x10 [ 792.498210][ T38] cleanup_net+0x4cb/0x800 [ 792.498235][ T38] ? __pfx_cleanup_net+0x10/0x10 [ 792.498259][ T38] ? _raw_spin_unlock_irq+0x23/0x50 [ 792.498280][ T38] ? process_scheduled_works+0x9ef/0x17b0 [ 792.498300][ T38] ? process_scheduled_works+0x9ef/0x17b0 [ 792.498323][ T38] process_scheduled_works+0xade/0x17b0 [ 792.498383][ T38] ? __pfx_process_scheduled_works+0x10/0x10 [ 792.498423][ T38] worker_thread+0x8a0/0xda0 [ 792.498473][ T38] kthread+0x711/0x8a0 [ 792.498500][ T38] ? __pfx_worker_thread+0x10/0x10 [ 792.498521][ T38] ? __pfx_kthread+0x10/0x10 [ 792.498551][ T38] ? __pfx_kthread+0x10/0x10 [ 792.498576][ T38] ret_from_fork+0x3f9/0x770 [ 792.498601][ T38] ? __pfx_ret_from_fork+0x10/0x10 [ 792.498630][ T38] ? __switch_to_asm+0x39/0x70 [ 792.498646][ T38] ? __switch_to_asm+0x33/0x70 [ 792.498662][ T38] ? __pfx_kthread+0x10/0x10 [ 792.498686][ T38] ret_from_fork_asm+0x1a/0x30 [ 792.498721][ T38] [ 792.498801][ T38] INFO: task syz-executor:17664 blocked for more than 144 seconds. [ 792.498815][ T38] Not tainted syzkaller #0