last executing test programs: 25.840463062s ago: executing program 3 (id=12638): r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='attr\x00') openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_all\x00', 0x275a, 0x0) 25.839650368s ago: executing program 4 (id=12639): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x48, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_IPTUN_REMOTE={0x14, 0x3, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x13}}}]}}}]}, 0x48}}, 0x0) 25.43895585s ago: executing program 3 (id=12643): mount(&(0x7f0000000140)=@nullb, &(0x7f0000000040)='./cgroup\x00', &(0x7f0000000080)='xfs\x00', 0x200013, 0x0) quotactl$Q_SETINFO(0xffffffff80000602, &(0x7f0000000000)=@nullb, 0x0, 0x0) 25.385062951s ago: executing program 4 (id=12645): r0 = syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f0000000c80)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) syz_usb_ep_write$ath9k_ep1(r0, 0x82, 0x0, 0x0) 24.957223676s ago: executing program 3 (id=12649): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)=ANY=[@ANYBLOB="a0010000100013070000000000000000ac1414bb0000000000000000000000000000000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB="ac141400000000000000000000000000000004d23c000000ac14140000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000960000000000000048000200656362286369706865725f6e756c6c29000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020001c0017000000000000000000000000000000000000000000000000004c0014"], 0x1a0}}, 0x0) 24.626330073s ago: executing program 3 (id=12653): r0 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000002240)=[{&(0x7f0000001000)=@in={0x2, 0x4e23, @local}, 0x10, &(0x7f0000001040)=[{&(0x7f00000010c0)="13", 0x1}], 0x1, &(0x7f0000002180)=[@init={0x18, 0x84, 0x0, {0x40, 0xb, 0x101, 0xff}}, @dstaddrv4={0x18, 0x84, 0x7, @loopback}], 0x30, 0x40010}], 0x1, 0x240000c0) 24.374967074s ago: executing program 1 (id=12654): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000500)=ANY=[@ANYBLOB="38000000180001002bbd700000000000020000040000c80900110000060015000200000014001680100008"], 0x38}}, 0x0) 23.879363448s ago: executing program 3 (id=12656): r0 = socket(0x11, 0x800000002, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000540)={'veth0_virt_wifi\x00', {0x2, 0x0, @private=0xf309fffe}}) 23.669249033s ago: executing program 1 (id=12657): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000f00)={'dummy0\x00', &(0x7f0000000640)=@ethtool_perm_addr={0x4b, 0x4e, "4b721b782a17a7b6a00d963e3f7fdafd95073830fb8cfb34eb7cbd173ef6f04cba5a1e6a6f0ef6c61346d54f61bd850519514421d1f30500"}}) 23.402713805s ago: executing program 4 (id=12659): r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x1) ioctl$SIOCAX25GETUID(r0, 0x89e0, &(0x7f0000000480)={0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}) 23.193852552s ago: executing program 1 (id=12661): r0 = socket$igmp(0x2, 0x3, 0x2) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000001b40)={'bond0\x00', {0x2, 0x4e20, @empty}}) 22.998060393s ago: executing program 4 (id=12662): r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f0000000200)=@overlay={0xffffffad, 0x7, 0x4, 0x800, 0x8, {0x77359400}, {0x5, 0x0, 0x7f, 0x7, 0xd, 0x0, "2298ac42"}, 0x20a1, 0x3, {}, 0x81}) 22.84401493s ago: executing program 1 (id=12664): r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=@newqdisc={0x7c, 0x10, 0x1, 0x0, 0xeffffffc, {0x6, 0x0, 0x8100, 0x0, {0x1, 0x10}, {0xd, 0x10}, {0xe, 0x7}}, [@TCA_RATE={0x6}, @TCA_STAB={0x50, 0x8, 0x0, 0x1, [{{0x1c, 0x11, {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x8, 0x2}}, {0x8, 0x1b, [0x0, 0x0]}}, {{0x1c, 0x1, {0x8, 0x80, 0x8, 0x6, 0x2, 0x4, 0x3, 0x3}}, {0xa, 0x2, [0x7, 0xc, 0x80]}}]}]}, 0x7c}, 0x1, 0x0, 0x0, 0x400c010}, 0x0) 22.692425511s ago: executing program 4 (id=12665): r0 = memfd_create(&(0x7f0000000340)='y\x105\xfb\xf7u\x83%:r\xc2\xb9x\xa4q\xc1\xea_\x8cZ7\xe7a\xdenJ\xeb\x87\x9b\x11x\x0e\xa1\xcf\x1a\x98S7\xc9\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x04\x879\xa24\xa9am\xde\xb2\xd3\xcbZJoa\xc4\x1acB\xaa\xc1\xfb Q\xd4\xf4\x01\xa52\xe2DG\xd4\xbd{\x9f\xa9\x97\x9b@\xdb\x00b\xe1br\xb6\x008\xe3\x10\xff\xc2\x9d\r2\x9e\x8e\x04sW\x1b\xb7\xb3\xa2\xc9&@\xca\xda\xdc\xe2/\x97X\xac\x9e\xce\x84\xae\xb3\x92\xab\a\b\xb0\xc2<\x80E\x1a\xbc\xc7W\xda9VsA\xaf\xc6\xcf\xe1\xa1\xb5M\xa2\x85\xa6y\xc4J\xf1\xf7\xfcD\x95\xe3\xeb\xc7\xbc\x91\xb0\xa8\x9eo\xebF(\x9dL\x01vRk\xaacB\x04\xa7I\v\x86EZ\x96\xd5\x14OD\\\xe8R\xe4\xcd\xec\xcc\xd1\x0fre\xe86\xcd\xeb\xc4$\x98\x06J\xd6dD\x8d_U`ji{\xab\x97\xaf;l\x1f\xaf\xb38U\xcb\xfa\xb3j\x92\f\xe0\x81\xa0\xa2-g\b\x99\x0e\x8d\x8d\x16\xd9w\\\xf0\xce\xb0j\x9d\'\x93\xef', 0x6) fcntl$addseals(r0, 0x409, 0x7) 22.218923808s ago: executing program 4 (id=12668): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB="480000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="7b13000000000000200012800b00010067656e657665000010000280060005004e2000000400060008000a00b5"], 0x48}}, 0x4000) 19.165154437s ago: executing program 1 (id=12671): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000002840)={{0x14, 0x10, 0x1, 0x0, 0x40000000}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x5, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}]}, @NFT_MSG_NEWRULE={0x50, 0x6, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_RULE_CHAIN_ID={0x8}, @NFTA_RULE_EXPRESSIONS={0x28, 0x4, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, @payload={{0xc}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_PAYLOAD_OFFSET={0x8}, @NFTA_PAYLOAD_BASE={0x8}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0xc4}}, 0x0) 18.861083863s ago: executing program 3 (id=12673): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000ac0)="d80000001c0081064e81f782db44b9040a1d08040000000000000aa1180002000607002603600e12080b0f0000810401a8001605200001400200000803604e0cfab94dcf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef52a98516277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee422fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db70100000040fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef5d2defd5ccae8d3fb7c27a1059ae31c60e2234d732", 0xd8}], 0x1, 0x0, 0x0, 0x7400}, 0x0) 18.434617181s ago: executing program 2 (id=12675): r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f0000000040)={0x62, 0x2b4, 0xc, 0x5, 0x51ba}) 18.116350536s ago: executing program 2 (id=12677): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x50, 0x2, 0x6, 0x201, 0x0, 0x0, {0x7, 0x0, 0x3}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_NETMASK={0x5, 0x14, 0xc8}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}]}, 0x50}, 0x1, 0x0, 0x0, 0x20000050}, 0x8c0) 18.0010859s ago: executing program 0 (id=12678): r0 = syz_open_dev$loop(&(0x7f0000000200), 0x3ff, 0x4000) sync_file_range(r0, 0x5, 0x4, 0x7) 17.79403598s ago: executing program 2 (id=12679): mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1000, 0x3, &(0x7f0000ffa000/0x1000)=nil) msync(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x3) 17.669712854s ago: executing program 0 (id=12680): r0 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) 17.52920033s ago: executing program 2 (id=12681): r0 = syz_init_net_socket$bt_rfcomm(0x1f, 0x3, 0x3) ioctl$BTRFS_IOC_DEV_INFO(r0, 0x5411, 0x0) 17.432582885s ago: executing program 0 (id=12682): r0 = syz_open_dev$media(&(0x7f0000000280), 0x0, 0x40) vmsplice(r0, &(0x7f0000001080)=[{&(0x7f0000000680)="1dfa", 0x2}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) 17.258460447s ago: executing program 2 (id=12683): r0 = fanotify_init(0x0, 0x0) fanotify_mark(r0, 0x90, 0x40100000, 0xffffffffffffffff, 0x0) 17.182906611s ago: executing program 0 (id=12684): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x13, 0x0, &(0x7f00000001c0)) 17.013623415s ago: executing program 2 (id=12685): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x89b1, &(0x7f0000000040)={'macvlan1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x44e3763ac5239ba7}}) 16.924722422s ago: executing program 0 (id=12686): r0 = syz_open_dev$media(&(0x7f0000000ac0), 0x0, 0x0) ioctl$MEDIA_IOC_SETUP_LINK(r0, 0xc0347c03, &(0x7f0000001240)) 16.724741131s ago: executing program 0 (id=12687): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000580)="d8000000140081054e81f782db44b904021d080225000000040000a118000200fcffffff00000e1208000f0100810401a80016ea1f0006400303000803600cfab94dcf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef075c0100000000000000cb090000001fb791643a5ee4001b146218a07445d6d930dfe1d9d322fe7c9fd68775730d16a4683f5aeb4edbb57a5025ccca9e00360db70100000040fad95667e0060000000000000080bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd68adbef3d93452a00"/216, 0xd8}], 0x1, 0x0, 0x0, 0x7400}, 0x4) 14.772674188s ago: executing program 1 (id=12688): r0 = socket(0x11, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8918, &(0x7f0000000480)={'veth1_macvtap\x00', {0x2, 0x80, @multicast1}}) 7.361047375s ago: executing program 32 (id=12668): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB="480000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="7b13000000000000200012800b00010067656e657665000010000280060005004e2000000400060008000a00b5"], 0x48}}, 0x4000) 3.237313642s ago: executing program 33 (id=12673): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000ac0)="d80000001c0081064e81f782db44b9040a1d08040000000000000aa1180002000607002603600e12080b0f0000810401a8001605200001400200000803604e0cfab94dcf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef52a98516277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee422fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db70100000040fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef5d2defd5ccae8d3fb7c27a1059ae31c60e2234d732", 0xd8}], 0x1, 0x0, 0x0, 0x7400}, 0x0) 2.186088504s ago: executing program 34 (id=12687): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000580)="d8000000140081054e81f782db44b904021d080225000000040000a118000200fcffffff00000e1208000f0100810401a80016ea1f0006400303000803600cfab94dcf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef075c0100000000000000cb090000001fb791643a5ee4001b146218a07445d6d930dfe1d9d322fe7c9fd68775730d16a4683f5aeb4edbb57a5025ccca9e00360db70100000040fad95667e0060000000000000080bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd68adbef3d93452a00"/216, 0xd8}], 0x1, 0x0, 0x0, 0x7400}, 0x4) 2.043932959s ago: executing program 35 (id=12685): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x89b1, &(0x7f0000000040)={'macvlan1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x44e3763ac5239ba7}}) 0s ago: executing program 36 (id=12688): r0 = socket(0x11, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8918, &(0x7f0000000480)={'veth1_macvtap\x00', {0x2, 0x80, @multicast1}}) kernel console output (not intermixed with test programs): idge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1097.838025][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1097.838394][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1097.838753][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1097.839121][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1097.839481][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1097.839849][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1097.840275][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1098.026936][ T5876] Bluetooth: hci8: command tx timeout [ 1098.175242][ T38] audit: type=1400 audit(1634.682:456116): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1098.255487][ T5876] Bluetooth: hci9: command tx timeout [ 1098.659654][ T38] audit: type=1400 audit(1635.218:456117): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1099.158771][ T38] audit: type=1400 audit(1635.732:456118): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1099.667258][ T38] audit: type=1400 audit(1636.267:456119): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1100.160004][ T38] audit: type=1400 audit(1636.782:456120): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1100.660074][ T38] audit: type=1400 audit(1637.317:456121): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1101.161354][ T38] audit: type=1400 audit(1637.842:456122): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1101.662327][ T38] audit: type=1400 audit(1638.367:456123): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1102.162766][ T38] audit: type=1400 audit(1638.892:456124): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1102.608763][ C0] net_ratelimit: 11977 callbacks suppressed [ 1102.608790][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1102.609170][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1102.609579][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1102.609943][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1102.610334][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1102.610705][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1102.611067][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1102.611439][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1102.611809][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1102.612172][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1102.681414][ T38] audit: type=1400 audit(1639.417:456125): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1103.170871][ T38] audit: type=1400 audit(1639.942:456126): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1103.486754][ T1321] ieee802154 phy1 wpan1: encryption failed: -22 [ 1103.664283][ T38] audit: type=1400 audit(1640.467:456127): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1104.166384][ T38] audit: type=1400 audit(1640.992:456128): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1104.667248][ T38] audit: type=1400 audit(1641.527:456129): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1105.167493][ T38] audit: type=1400 audit(1642.041:456130): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1105.668127][ T38] audit: type=1400 audit(1642.577:456131): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1106.093673][T32567] netlink: 132 bytes leftover after parsing attributes in process `syz.3.12673'. [ 1106.170439][ T38] audit: type=1400 audit(1643.091:456132): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1106.670441][ T38] audit: type=1400 audit(1643.627:456133): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1106.800000][ T38] audit: type=1400 audit(1643.753:456134): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5208 comm="udevd" name="/" dev="sda1" ino=2 [ 1107.174985][T32602] lo speed is unknown, defaulting to 1000 [ 1107.228691][T32622] lo speed is unknown, defaulting to 1000 [ 1107.231705][T32620] lo speed is unknown, defaulting to 1000 [ 1107.237468][T32615] lo speed is unknown, defaulting to 1000 [ 1107.287616][T32612] lo speed is unknown, defaulting to 1000 [ 1107.381240][ C0] net_ratelimit: 12131 callbacks suppressed [ 1107.381262][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1107.381641][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1107.381932][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1107.382234][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1107.382558][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1107.382849][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1107.383143][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1107.383453][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1107.383759][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1107.384104][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1107.675264][ T38] kauditd_printk_skb: 245 callbacks suppressed [ 1107.675289][ T38] audit: type=1400 audit(1644.676:456380): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1108.177598][ T38] audit: type=1400 audit(1645.212:456381): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1108.240090][T32602] wg1 speed is unknown, defaulting to 1000 [ 1108.581327][ T38] audit: type=1400 audit(1645.621:456382): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32602 comm="syz-executor" name="/" dev="sda1" ino=2 [ 1108.581385][ T38] audit: type=1400 audit(1645.621:456383): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32602 comm="syz-executor" name="/" dev="proc" ino=1 [ 1108.581434][ T38] audit: type=1400 audit(1645.621:456384): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32602 comm="syz-executor" name="sys" dev="proc" ino=4026531854 [ 1108.581481][ T38] audit: type=1400 audit(1645.621:456385): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32602 comm="syz-executor" name="net" dev="proc" ino=95737 [ 1108.581527][ T38] audit: type=1400 audit(1645.621:456386): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32602 comm="syz-executor" name="ipv4" dev="proc" ino=95738 [ 1108.581573][ T38] audit: type=1400 audit(1645.621:456387): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=w pid=32602 comm="syz-executor" name="ping_group_range" dev="proc" ino=95739 [ 1108.581620][ T38] audit: type=1400 audit(1645.621:456388): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=32602 comm="syz-executor" path="/proc/sys/net/ipv4/ping_group_range" dev="proc" ino=95739 [ 1108.581678][ T38] audit: type=1400 audit(1645.621:456389): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32602 comm="syz-executor" name="/" dev="sda1" ino=2 [ 1109.899144][T32622] wg1 speed is unknown, defaulting to 1000 [ 1110.087865][T32602] chnl_net:caif_netlink_parms(): no params data found [ 1112.153497][ C0] net_ratelimit: 12293 callbacks suppressed [ 1112.153520][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1112.153886][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1112.154233][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1112.154615][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1112.154977][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1112.155344][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1112.155695][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1112.156094][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1112.156464][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1112.157170][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1112.679568][ T38] kauditd_printk_skb: 188 callbacks suppressed [ 1112.679589][ T38] audit: type=1400 audit(1649.936:456578): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1113.183825][ T38] audit: type=1400 audit(1650.450:456579): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1113.680688][ T38] audit: type=1400 audit(1650.986:456580): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1114.191900][ T38] audit: type=1400 audit(1651.511:456581): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1114.682114][ T38] audit: type=1400 audit(1652.035:456582): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1115.192207][ T38] audit: type=1400 audit(1652.560:456583): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1115.682918][ T38] audit: type=1400 audit(1653.085:456584): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1116.183446][ T38] audit: type=1400 audit(1653.610:456585): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1116.684159][ T38] audit: type=1400 audit(1654.135:456586): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1116.925633][ C0] net_ratelimit: 12350 callbacks suppressed [ 1116.925656][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1116.926025][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1116.926380][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1116.926733][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1116.927109][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1116.927467][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1116.927811][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1116.928246][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1116.928628][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1116.928988][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1117.184483][ T38] audit: type=1400 audit(1654.670:456587): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1117.687970][ T38] audit: type=1400 audit(1655.185:456588): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1118.190729][ T38] audit: type=1400 audit(1655.720:456589): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1118.686763][ T38] audit: type=1400 audit(1656.235:456590): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1119.186938][ T38] audit: type=1400 audit(1656.770:456591): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1119.592950][ T38] audit: type=1400 audit(1657.190:456592): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5208 comm="udevd" name="/" dev="sda1" ino=2 [ 1119.593010][ T38] audit: type=1400 audit(1657.190:456593): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5208 comm="udevd" name="etc" dev="sda1" ino=116 [ 1119.593057][ T38] audit: type=1400 audit(1657.190:456594): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5208 comm="udevd" name="udev" dev="sda1" ino=259 [ 1119.593104][ T38] audit: type=1400 audit(1657.190:456595): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5208 comm="udevd" path="/etc/udev/rules.d" dev="sda1" ino=261 [ 1119.593151][ T38] audit: type=1400 audit(1657.190:456596): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5208 comm="udevd" name="/" dev="sda1" ino=2 [ 1119.593198][ T38] audit: type=1400 audit(1657.190:456597): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5208 comm="udevd" name="lib" dev="sda1" ino=264 [ 1121.698140][ C0] net_ratelimit: 12437 callbacks suppressed [ 1121.698163][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1121.698552][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1121.699277][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1121.699663][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1121.700073][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1121.700438][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1121.700804][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1121.701177][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1121.701529][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1121.701898][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1122.283951][T32620] wg1 speed is unknown, defaulting to 1000 [ 1122.696084][ T38] kauditd_printk_skb: 206 callbacks suppressed [ 1122.696108][ T38] audit: type=1400 audit(1660.444:456804): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1122.747230][ T38] audit: type=1400 audit(1660.497:456805): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5208 comm="udevd" opid=32628 ocomm="udevd" [ 1122.747289][ T38] audit: type=1400 audit(1660.497:456806): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5208 comm="udevd" opid=32629 ocomm="udevd" [ 1122.747337][ T38] audit: type=1400 audit(1660.497:456807): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5208 comm="udevd" name="/" dev="sda1" ino=2 [ 1122.747383][ T38] audit: type=1400 audit(1660.497:456808): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5208 comm="udevd" name="etc" dev="sda1" ino=116 [ 1122.761741][ T38] audit: type=1400 audit(1660.518:456809): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5208 comm="udevd" name="udev" dev="sda1" ino=259 [ 1122.761800][ T38] audit: type=1400 audit(1660.518:456810): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5208 comm="udevd" path="/etc/udev/rules.d" dev="sda1" ino=261 [ 1122.761848][ T38] audit: type=1400 audit(1660.518:456811): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5208 comm="udevd" name="/" dev="sda1" ino=2 [ 1122.761895][ T38] audit: type=1400 audit(1660.518:456812): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5208 comm="udevd" name="lib" dev="sda1" ino=264 [ 1122.761942][ T38] audit: type=1400 audit(1660.518:456813): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5208 comm="udevd" name="udev" dev="sda1" ino=1222 [ 1126.470592][ C0] net_ratelimit: 12442 callbacks suppressed [ 1126.470618][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1126.471032][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1126.471399][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1126.471760][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1126.472147][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1126.472517][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1126.473276][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1126.473666][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1126.474020][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1126.474447][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1127.700765][ T38] kauditd_printk_skb: 40 callbacks suppressed [ 1127.700786][ T38] audit: type=1400 audit(1665.704:456854): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1128.202190][ T38] audit: type=1400 audit(1666.229:456855): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1128.704170][ T38] audit: type=1400 audit(1666.754:456856): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1129.213432][ T38] audit: type=1400 audit(1667.279:456857): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1129.702367][ T38] audit: type=1400 audit(1667.803:456858): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1130.203586][ T38] audit: type=1400 audit(1668.328:456859): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1130.711311][ T38] audit: type=1400 audit(1668.864:456860): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1131.211565][ T38] audit: type=1400 audit(1669.389:456861): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1131.242900][ C0] net_ratelimit: 12264 callbacks suppressed [ 1131.242923][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1131.243308][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1131.243665][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1131.244038][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1131.244398][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1131.244755][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1131.245095][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1131.245462][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1131.245814][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1131.246159][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1131.712044][ T38] audit: type=1400 audit(1669.914:456862): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1132.212724][ T38] audit: type=1400 audit(1670.438:456863): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1132.715154][ T38] audit: type=1400 audit(1670.963:456864): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1133.215213][ T38] audit: type=1400 audit(1671.499:456865): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1133.716233][ T38] audit: type=1400 audit(1672.013:456866): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1134.216790][ T38] audit: type=1400 audit(1672.549:456867): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1134.717561][ T38] audit: type=1400 audit(1673.063:456868): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1135.218147][ T38] audit: type=1400 audit(1673.598:456869): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1135.718692][ T38] audit: type=1400 audit(1674.113:456870): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1136.015173][ C0] net_ratelimit: 12218 callbacks suppressed [ 1136.015197][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1136.015620][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1136.015988][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1136.016359][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1136.016729][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1136.017072][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1136.017532][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1136.017907][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1136.018261][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1136.018649][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1136.219643][ T38] audit: type=1400 audit(1674.648:456871): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1136.725262][ T38] audit: type=1400 audit(1675.173:456872): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1137.221497][ T38] audit: type=1400 audit(1675.698:456873): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1137.721983][ T38] audit: type=1400 audit(1676.223:456874): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1138.222689][ T38] audit: type=1400 audit(1676.748:456875): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1138.722958][ T38] audit: type=1400 audit(1677.273:456876): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1139.223480][ T38] audit: type=1400 audit(1677.798:456877): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1139.282392][ T38] audit: type=1400 audit(1677.861:456878): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5826 comm="syz-executor" opid=32599 ocomm="syz-executor" [ 1139.331951][ T38] audit: type=1400 audit(1677.913:456879): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=32599 comm="syz-executor" opid=32602 ocomm="syz-executor" [ 1139.362742][ T38] audit: type=1400 audit(1677.913:456880): lsm=SMACK fn=smack_task_setpgid action=granted subject="_" object="_" requested=w pid=32632 comm="syz-executor" opid=32632 ocomm="syz-executor" [ 1139.417829][ T38] audit: type=1400 audit(1677.987:456881): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32632 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 1139.417891][ T38] audit: type=1400 audit(1678.008:456882): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32632 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 1139.417939][ T38] audit: type=1400 audit(1678.008:456883): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32632 comm="syz-executor" name="syz-executor" dev="sda1" ino=2020 [ 1140.496738][ T59] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 1140.525257][ T59] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 1140.526898][ T59] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 1140.529199][ T59] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 1140.559109][ T59] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 1140.787474][ C0] net_ratelimit: 12170 callbacks suppressed [ 1140.787498][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1140.787980][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1140.788478][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1140.788914][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1140.789758][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1140.791118][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1140.791540][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1140.791961][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1140.792383][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1140.792791][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1142.683349][ T5876] Bluetooth: hci0: command tx timeout [ 1142.731582][ T38] kauditd_printk_skb: 327 callbacks suppressed [ 1142.731605][ T38] audit: type=1400 audit(1681.472:457211): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1143.230299][ T38] audit: type=1400 audit(1682.007:457212): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1143.287475][ T38] audit: type=1400 audit(1682.007:457213): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5826 comm="syz-executor" opid=32609 ocomm="syz-executor" [ 1143.340573][ T38] audit: type=1400 audit(1682.112:457214): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=32609 comm="syz-executor" opid=32612 ocomm="syz-executor" [ 1143.368980][ T38] audit: type=1400 audit(1682.123:457215): lsm=SMACK fn=smack_task_setpgid action=granted subject="_" object="_" requested=w pid=32641 comm="syz-executor" opid=32641 ocomm="syz-executor" [ 1143.372491][ T38] audit: type=1400 audit(1682.154:457216): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32641 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 1143.372552][ T38] audit: type=1400 audit(1682.154:457217): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32641 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 1143.372601][ T38] audit: type=1400 audit(1682.154:457218): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32641 comm="syz-executor" name="syz-executor" dev="sda1" ino=2020 [ 1143.372648][ T38] audit: type=1400 audit(1682.154:457219): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=32641 comm="syz-executor" path="/root/syz-executor" dev="sda1" ino=2020 [ 1143.372697][ T38] audit: type=1400 audit(1682.154:457220): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32641 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 1144.667430][ T5876] Bluetooth: hci0: command tx timeout [ 1144.753629][T32635] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 1144.783724][T32635] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 1144.785399][T32635] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 1144.786721][T32635] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 1144.826996][T32635] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 1145.559626][ C0] net_ratelimit: 12350 callbacks suppressed [ 1145.559648][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1145.560013][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1145.560371][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1145.560794][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1145.561159][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1145.561509][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1145.561881][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1145.562251][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1145.562609][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1145.563334][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1146.413668][ T5876] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 1146.441893][ T5876] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 1146.443986][ T5876] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 1146.445286][ T5876] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 1146.469720][ T5876] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 1146.574289][T32635] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 1146.616444][T32635] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 1146.625765][T32635] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 1146.635208][T32635] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 1146.648993][T32604] Bluetooth: hci0: command tx timeout [ 1146.658159][T32635] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 1146.874396][T32635] Bluetooth: hci1: command tx timeout [ 1147.579226][ T38] kauditd_printk_skb: 1096 callbacks suppressed [ 1147.579251][ T38] audit: type=1400 audit(1686.553:458092): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32650 comm="syz-executor" name="/" dev="sda1" ino=2 [ 1147.579563][ T38] audit: type=1400 audit(1686.574:458093): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32650 comm="syz-executor" name="/" dev="sysfs" ino=1 [ 1147.579814][ T38] audit: type=1400 audit(1686.574:458094): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32650 comm="syz-executor" name="kernel" dev="sysfs" ino=1393 [ 1147.580084][ T38] audit: type=1400 audit(1686.574:458095): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32650 comm="syz-executor" name="/" dev="debugfs" ino=1 [ 1147.580322][ T38] audit: type=1400 audit(1686.574:458096): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=rw pid=32650 comm="syz-executor" name="kcov" dev="debugfs" ino=106 [ 1147.598303][ T38] audit: type=1400 audit(1686.584:458097): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=32650 comm="syz-executor" path="/sys/kernel/debug/kcov" dev="debugfs" ino=106 [ 1147.598369][ T38] audit: type=1400 audit(1686.584:458098): lsm=SMACK fn=smack_file_ioctl action=granted subject="_" object="_" requested=r pid=32650 comm="syz-executor" path="/sys/kernel/debug/kcov" dev="debugfs" ino=106 [ 1147.737198][ T38] audit: type=1400 audit(1686.731:458099): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1147.781069][ T38] audit: type=1400 audit(1686.784:458100): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32654 comm="udevd" name="/" dev="sda1" ino=2 [ 1147.781223][ T38] audit: type=1400 audit(1686.784:458101): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32654 comm="udevd" name="/" dev="tmpfs" ino=1 [ 1148.228598][ T5876] Bluetooth: hci10: unexpected cc 0x0c03 length: 249 > 1 [ 1148.258980][ T5876] Bluetooth: hci10: unexpected cc 0x1003 length: 249 > 9 [ 1148.260980][ T5876] Bluetooth: hci10: unexpected cc 0x1001 length: 249 > 9 [ 1148.262223][ T5876] Bluetooth: hci10: unexpected cc 0x0c23 length: 249 > 4 [ 1148.294958][ T5876] Bluetooth: hci10: unexpected cc 0x0c38 length: 249 > 2 [ 1148.475729][T32635] Bluetooth: hci3: command tx timeout [ 1148.628806][T32635] Bluetooth: hci0: command tx timeout [ 1148.703588][T32635] Bluetooth: hci4: command tx timeout [ 1148.829946][T32595] : (slave syz_tun): Releasing backup interface [ 1148.865407][T32635] Bluetooth: hci1: command tx timeout [ 1150.303675][T32635] Bluetooth: hci10: command tx timeout [ 1150.331945][ C0] net_ratelimit: 11946 callbacks suppressed [ 1150.331968][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1150.332316][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1150.332678][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1150.333046][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1150.333414][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1150.333843][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1150.334187][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1150.334570][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1150.334925][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1150.335270][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1150.456142][T32635] Bluetooth: hci3: command tx timeout [ 1150.684863][T32635] Bluetooth: hci4: command tx timeout [ 1150.837047][T32635] Bluetooth: hci1: command tx timeout [ 1152.287067][T32635] Bluetooth: hci10: command tx timeout [ 1152.438201][T32635] Bluetooth: hci3: command tx timeout [ 1152.666153][T32635] Bluetooth: hci4: command tx timeout [ 1152.743130][ T38] kauditd_printk_skb: 276 callbacks suppressed [ 1152.743151][ T38] audit: type=1400 audit(1691.991:458378): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1152.818698][T32635] Bluetooth: hci1: command tx timeout [ 1153.244356][ T38] audit: type=1400 audit(1692.516:458379): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1153.744360][ T38] audit: type=1400 audit(1693.041:458380): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1154.244652][ T38] audit: type=1400 audit(1693.566:458381): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1154.266328][T32635] Bluetooth: hci10: command tx timeout [ 1154.418843][T32635] Bluetooth: hci3: command tx timeout [ 1154.647460][T32635] Bluetooth: hci4: command tx timeout [ 1154.790158][ T38] audit: type=1400 audit(1694.122:458382): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1155.104445][ C0] net_ratelimit: 12101 callbacks suppressed [ 1155.104468][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1155.104852][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1155.105302][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1155.105688][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1155.106089][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1155.106526][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1155.106914][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1155.107286][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1155.108101][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1155.108495][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1155.246227][ T38] audit: type=1400 audit(1694.615:458383): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1155.746348][ T38] audit: type=1400 audit(1695.140:458384): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1156.246882][ T38] audit: type=1400 audit(1695.665:458385): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1156.250620][ T5876] Bluetooth: hci10: command tx timeout [ 1156.752423][ T38] audit: type=1400 audit(1696.201:458386): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1157.247921][ T38] audit: type=1400 audit(1696.715:458387): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1157.748538][ T38] audit: type=1400 audit(1697.250:458388): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1158.248922][ T38] audit: type=1400 audit(1697.775:458389): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1158.750152][ T38] audit: type=1400 audit(1698.300:458390): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1159.249689][ T38] audit: type=1400 audit(1698.825:458391): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1159.750041][ T38] audit: type=1400 audit(1699.350:458392): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1159.876856][ C0] net_ratelimit: 12525 callbacks suppressed [ 1159.876891][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1159.877306][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1159.877693][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1159.878064][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1159.878441][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1159.878858][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1159.879240][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1159.879616][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1159.879980][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1159.880375][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1160.250022][ T38] audit: type=1400 audit(1699.875:458393): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1160.753271][ T38] audit: type=1400 audit(1700.400:458394): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1161.252067][ T38] audit: type=1400 audit(1700.925:458395): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1161.762938][ T38] audit: type=1400 audit(1701.450:458396): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1161.975129][ T1321] ieee802154 phy1 wpan1: encryption failed: -22 [ 1162.253712][ T38] audit: type=1400 audit(1701.974:458397): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1162.754454][ T38] audit: type=1400 audit(1702.510:458398): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1163.254722][ T38] audit: type=1400 audit(1703.024:458399): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1163.766537][ T38] audit: type=1400 audit(1703.560:458400): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1164.254783][ T38] audit: type=1400 audit(1704.074:458401): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1164.649286][ C0] net_ratelimit: 12551 callbacks suppressed [ 1164.649311][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1164.649712][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1164.650077][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1164.650429][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1164.650800][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1164.651185][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1164.651529][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1164.651931][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1164.652297][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1164.652684][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1164.755412][ T38] audit: type=1400 audit(1704.609:458402): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1165.255602][ T38] audit: type=1400 audit(1705.124:458403): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1165.756747][ T38] audit: type=1400 audit(1705.659:458404): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1166.268466][ T38] audit: type=1400 audit(1706.174:458405): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1166.757307][ T38] audit: type=1400 audit(1706.709:458406): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1167.258332][ T38] audit: type=1400 audit(1707.223:458407): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1167.759234][ T38] audit: type=1400 audit(1707.759:458408): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1168.262011][ T38] audit: type=1400 audit(1708.273:458409): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1168.758955][ T38] audit: type=1400 audit(1708.809:458410): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1169.260483][ T38] audit: type=1400 audit(1709.334:458411): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1169.421284][ C0] net_ratelimit: 12408 callbacks suppressed [ 1169.421319][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1169.421878][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1169.422316][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1169.422718][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1169.423196][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1169.423622][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1169.424042][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1169.424445][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1169.424834][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1169.425297][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1169.764618][ T38] audit: type=1400 audit(1709.858:458412): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1170.262627][ T38] audit: type=1400 audit(1710.383:458413): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1170.761252][ T38] audit: type=1400 audit(1710.908:458414): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1171.261702][ T38] audit: type=1400 audit(1711.433:458415): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1171.765264][ T38] audit: type=1400 audit(1711.958:458416): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1172.263173][ T38] audit: type=1400 audit(1712.483:458417): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1172.763774][ T38] audit: type=1400 audit(1713.008:458418): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1173.266620][ T38] audit: type=1400 audit(1713.533:458419): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1173.764739][ T38] audit: type=1400 audit(1714.058:458420): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1174.193660][ C0] net_ratelimit: 12354 callbacks suppressed [ 1174.193685][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1174.194050][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1174.194418][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1174.194792][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1174.195145][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1174.195494][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1174.195924][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1174.196279][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1174.196651][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1174.197003][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1174.269361][ T38] audit: type=1400 audit(1714.583:458421): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1174.765025][ T38] audit: type=1400 audit(1715.107:458422): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1175.265473][ T38] audit: type=1400 audit(1715.632:458423): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1175.766395][ T38] audit: type=1400 audit(1716.168:458424): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1176.266727][ T38] audit: type=1400 audit(1716.682:458425): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1176.767252][ T38] audit: type=1400 audit(1717.218:458426): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1177.267917][ T38] audit: type=1400 audit(1717.732:458427): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1177.770796][ T38] audit: type=1400 audit(1718.267:458428): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1178.269132][ T38] audit: type=1400 audit(1718.782:458429): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1178.769557][ T38] audit: type=1400 audit(1719.317:458430): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1178.966015][ C0] net_ratelimit: 12490 callbacks suppressed [ 1178.966039][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1178.966423][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1178.966790][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1178.967176][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1178.967667][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1178.968017][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1178.968392][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1178.968745][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1178.969095][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1178.969446][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1179.270052][ T38] audit: type=1400 audit(1719.832:458431): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1179.772335][ T38] audit: type=1400 audit(1720.367:458432): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1180.277917][ T38] audit: type=1400 audit(1720.892:458433): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1180.778882][ T38] audit: type=1400 audit(1721.427:458434): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1181.279295][ T38] audit: type=1400 audit(1721.942:458435): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1181.779663][ T38] audit: type=1400 audit(1722.477:458436): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1182.280220][ T38] audit: type=1400 audit(1722.991:458437): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1182.781567][ T38] audit: type=1400 audit(1723.527:458438): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1183.281937][ T38] audit: type=1400 audit(1724.041:458439): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1183.738296][ C0] net_ratelimit: 12276 callbacks suppressed [ 1183.738320][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1183.738727][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1183.739085][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1183.739429][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1183.739881][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1183.740235][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1183.740579][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1183.740935][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1183.741326][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1183.741719][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1183.783807][ T38] audit: type=1400 audit(1724.577:458440): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1184.282290][ T38] audit: type=1400 audit(1725.102:458441): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1184.783981][ T38] audit: type=1400 audit(1725.626:458442): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1185.282817][ T38] audit: type=1400 audit(1726.151:458443): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1185.786972][ T38] audit: type=1400 audit(1726.676:458444): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1186.283934][ T38] audit: type=1400 audit(1727.201:458445): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1186.784153][ T38] audit: type=1400 audit(1727.726:458446): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1187.284744][ T38] audit: type=1400 audit(1728.251:458447): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1187.787120][ T38] audit: type=1400 audit(1728.776:458448): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1188.285547][ T38] audit: type=1400 audit(1729.301:458449): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1188.510701][ C0] net_ratelimit: 12525 callbacks suppressed [ 1188.510725][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1188.511083][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1188.511457][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1188.511810][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1188.512159][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1188.512894][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1188.513299][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1188.513726][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1188.514104][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1188.514547][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1188.786439][ T38] audit: type=1400 audit(1729.826:458450): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1189.288101][ T38] audit: type=1400 audit(1730.351:458451): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1189.789450][ T38] audit: type=1400 audit(1730.875:458452): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1190.287525][ T38] audit: type=1400 audit(1731.400:458453): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1190.787957][ T38] audit: type=1400 audit(1731.936:458454): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1191.287712][ T38] audit: type=1400 audit(1732.450:458455): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1191.788372][ T38] audit: type=1400 audit(1732.986:458456): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1192.289398][ T38] audit: type=1400 audit(1733.510:458457): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1192.800772][ T38] audit: type=1400 audit(1734.035:458458): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1193.282981][ C0] net_ratelimit: 12495 callbacks suppressed [ 1193.283004][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1193.283365][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1193.283723][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1193.284067][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1193.284446][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1193.284804][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1193.285147][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1193.285530][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1193.286277][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1193.286663][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1193.290059][ T38] audit: type=1400 audit(1734.560:458459): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1193.790882][ T38] audit: type=1400 audit(1735.085:458460): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1194.291239][ T38] audit: type=1400 audit(1735.610:458461): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1194.792559][ T38] audit: type=1400 audit(1736.135:458462): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1195.293684][ T38] audit: type=1400 audit(1736.660:458463): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1195.796023][ T38] audit: type=1400 audit(1737.185:458464): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1196.297120][ T38] audit: type=1400 audit(1737.720:458465): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1196.794013][ T38] audit: type=1400 audit(1738.235:458466): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1196.842281][ T38] audit: type=1400 audit(1738.235:458467): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5826 comm="syz-executor" opid=32632 ocomm="syz-executor" [ 1197.590668][ T38] kauditd_printk_skb: 79 callbacks suppressed [ 1197.590687][ T38] audit: type=1400 audit(1739.074:458547): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32657 comm="syz-executor" name="/" dev="sda1" ino=2 [ 1197.590959][ T38] audit: type=1400 audit(1739.074:458548): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32657 comm="syz-executor" name="/" dev="sysfs" ino=1 [ 1197.591201][ T38] audit: type=1400 audit(1739.074:458549): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32657 comm="syz-executor" name="kernel" dev="sysfs" ino=1393 [ 1197.591474][ T38] audit: type=1400 audit(1739.074:458550): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32657 comm="syz-executor" name="/" dev="debugfs" ino=1 [ 1197.591710][ T38] audit: type=1400 audit(1739.074:458551): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=rw pid=32657 comm="syz-executor" name="kcov" dev="debugfs" ino=106 [ 1197.592131][ T38] audit: type=1400 audit(1739.074:458552): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=32657 comm="syz-executor" path="/sys/kernel/debug/kcov" dev="debugfs" ino=106 [ 1197.592573][ T38] audit: type=1400 audit(1739.074:458553): lsm=SMACK fn=smack_file_ioctl action=granted subject="_" object="_" requested=r pid=32657 comm="syz-executor" path="/sys/kernel/debug/kcov" dev="debugfs" ino=106 [ 1197.795105][ T38] audit: type=1400 audit(1739.284:458554): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1197.947025][ T38] audit: type=1400 audit(1739.442:458555): lsm=SMACK fn=smack_file_ioctl action=granted subject="_" object="_" requested=w pid=32657 comm="syz-executor" path="/sys/kernel/debug/kcov" dev="debugfs" ino=106 [ 1198.013234][ T38] audit: type=1400 audit(1739.515:458556): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32658 comm="syz-executor" name="/" dev="sda1" ino=2 [ 1198.055398][ C0] net_ratelimit: 12511 callbacks suppressed [ 1198.055420][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1198.055734][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1198.056075][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1198.056405][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1198.056754][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1198.057078][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1198.057469][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1198.057921][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1198.058337][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1198.058715][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1198.066949][T32635] Bluetooth: hci11: unexpected cc 0x0c03 length: 249 > 1 [ 1198.258712][T32635] Bluetooth: hci11: unexpected cc 0x1003 length: 249 > 9 [ 1198.272823][T32635] Bluetooth: hci11: unexpected cc 0x1001 length: 249 > 9 [ 1198.290264][T32635] Bluetooth: hci11: unexpected cc 0x0c23 length: 249 > 4 [ 1198.291112][T32635] Bluetooth: hci11: unexpected cc 0x0c38 length: 249 > 2 [ 1200.300770][ T5876] Bluetooth: hci11: command tx timeout [ 1201.758480][T32604] Bluetooth: hci12: unexpected cc 0x0c03 length: 249 > 1 [ 1201.793204][T32604] Bluetooth: hci12: unexpected cc 0x1003 length: 249 > 9 [ 1201.794747][T32604] Bluetooth: hci12: unexpected cc 0x1001 length: 249 > 9 [ 1201.796004][T32604] Bluetooth: hci12: unexpected cc 0x0c23 length: 249 > 4 [ 1201.796838][T32604] Bluetooth: hci12: unexpected cc 0x0c38 length: 249 > 2 [ 1202.275982][T32635] Bluetooth: hci11: command tx timeout [ 1202.404267][ T38] kauditd_printk_skb: 732 callbacks suppressed [ 1202.404291][ T38] audit: type=1400 audit(1744.113:459223): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32670 comm="syz-executor" name="/" dev="sda1" ino=2 [ 1202.404346][ T38] audit: type=1400 audit(1744.113:459224): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32670 comm="syz-executor" name="/" dev="sysfs" ino=1 [ 1202.404394][ T38] audit: type=1400 audit(1744.113:459225): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32670 comm="syz-executor" name="kernel" dev="sysfs" ino=1393 [ 1202.404451][ T38] audit: type=1400 audit(1744.113:459226): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32670 comm="syz-executor" name="/" dev="debugfs" ino=1 [ 1202.404500][ T38] audit: type=1400 audit(1744.113:459227): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=rw pid=32670 comm="syz-executor" name="kcov" dev="debugfs" ino=106 [ 1202.404547][ T38] audit: type=1400 audit(1744.113:459228): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=32670 comm="syz-executor" path="/sys/kernel/debug/kcov" dev="debugfs" ino=106 [ 1202.404596][ T38] audit: type=1400 audit(1744.113:459229): lsm=SMACK fn=smack_file_ioctl action=granted subject="_" object="_" requested=r pid=32670 comm="syz-executor" path="/sys/kernel/debug/kcov" dev="debugfs" ino=106 [ 1202.556522][ T38] audit: type=1400 audit(1744.124:459230): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32667 comm="syz-executor" name="/" dev="sda1" ino=2 [ 1202.556823][ T38] audit: type=1400 audit(1744.281:459231): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32667 comm="syz-executor" name="/" dev="sysfs" ino=1 [ 1202.557071][ T38] audit: type=1400 audit(1744.281:459232): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32667 comm="syz-executor" name="kernel" dev="sysfs" ino=1393 [ 1202.827718][ C0] net_ratelimit: 12410 callbacks suppressed [ 1202.827742][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1202.828105][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1202.828488][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1202.829370][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1202.829788][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1202.830167][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1202.830544][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1202.830943][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1202.831316][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1202.831775][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1202.965747][T32635] Bluetooth: hci5: command 0x0406 tx timeout [ 1203.403903][T32604] Bluetooth: hci13: unexpected cc 0x0c03 length: 249 > 1 [ 1203.432988][T32604] Bluetooth: hci13: unexpected cc 0x1003 length: 249 > 9 [ 1203.434697][T32604] Bluetooth: hci13: unexpected cc 0x1001 length: 249 > 9 [ 1203.435980][T32604] Bluetooth: hci13: unexpected cc 0x0c23 length: 249 > 4 [ 1203.436833][T32604] Bluetooth: hci13: unexpected cc 0x0c38 length: 249 > 2 [ 1203.603586][T32676] Bluetooth: hci14: unexpected cc 0x0c03 length: 249 > 1 [ 1203.633582][T32676] Bluetooth: hci14: unexpected cc 0x1003 length: 249 > 9 [ 1203.636073][T32676] Bluetooth: hci14: unexpected cc 0x1001 length: 249 > 9 [ 1203.653055][T32676] Bluetooth: hci14: unexpected cc 0x0c23 length: 249 > 4 [ 1203.653948][T32676] Bluetooth: hci14: unexpected cc 0x0c38 length: 249 > 2 [ 1203.799359][T32676] Bluetooth: hci12: command tx timeout [ 1204.257372][T32676] Bluetooth: hci11: command tx timeout [ 1204.913125][ T59] Bluetooth: hci15: unexpected cc 0x0c03 length: 249 > 1 [ 1204.932511][ T59] Bluetooth: hci15: unexpected cc 0x1003 length: 249 > 9 [ 1204.944108][ T59] Bluetooth: hci15: unexpected cc 0x1001 length: 249 > 9 [ 1204.960148][ T59] Bluetooth: hci15: unexpected cc 0x0c23 length: 249 > 4 [ 1204.961085][ T59] Bluetooth: hci15: unexpected cc 0x0c38 length: 249 > 2 [ 1205.780938][T32676] Bluetooth: hci12: command tx timeout [ 1206.242039][T32686] Bluetooth: hci11: command tx timeout [ 1207.311426][ T38] kauditd_printk_skb: 650 callbacks suppressed [ 1207.311447][ T38] audit: type=1400 audit(1749.278:459883): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1207.600242][ C0] net_ratelimit: 12279 callbacks suppressed [ 1207.600267][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1207.600616][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1207.601077][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1207.601442][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1207.601828][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1207.602187][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1207.602553][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1207.602973][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1207.603409][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1207.603757][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1207.762163][T32686] Bluetooth: hci12: command tx timeout [ 1207.818515][ T38] audit: type=1400 audit(1749.803:459884): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1207.844884][T32686] Bluetooth: hci6: command 0x0406 tx timeout [ 1207.845037][T32686] Bluetooth: hci7: command 0x0406 tx timeout [ 1207.845067][T32686] Bluetooth: hci8: command 0x0406 tx timeout [ 1207.845174][T32686] Bluetooth: hci9: command 0x0406 tx timeout [ 1207.932024][ T38] audit: type=1400 audit(1749.929:459885): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5208 comm="udevd" opid=32666 ocomm="udevd" [ 1207.971824][ T38] audit: type=1400 audit(1749.950:459886): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5208 comm="udevd" opid=32668 ocomm="udevd" [ 1207.971887][ T38] audit: type=1400 audit(1749.950:459887): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5208 comm="udevd" opid=32669 ocomm="udevd" [ 1207.971935][ T38] audit: type=1400 audit(1749.950:459888): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5208 comm="udevd" name="/" dev="sda1" ino=2 [ 1207.971986][ T38] audit: type=1400 audit(1749.950:459889): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5208 comm="udevd" name="etc" dev="sda1" ino=116 [ 1207.972037][ T38] audit: type=1400 audit(1749.950:459890): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5208 comm="udevd" name="udev" dev="sda1" ino=259 [ 1207.972095][ T38] audit: type=1400 audit(1749.950:459891): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5208 comm="udevd" path="/etc/udev/rules.d" dev="sda1" ino=261 [ 1207.972145][ T38] audit: type=1400 audit(1749.950:459892): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5208 comm="udevd" name="/" dev="sda1" ino=2 [ 1209.743505][T32685] Bluetooth: hci12: command tx timeout [ 1212.318150][ T38] kauditd_printk_skb: 193 callbacks suppressed [ 1212.318171][ T38] audit: type=1400 audit(1754.538:460086): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1212.372403][ C0] net_ratelimit: 12632 callbacks suppressed [ 1212.372434][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1212.372795][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1212.373195][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1212.373559][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1212.373956][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1212.374701][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1212.375045][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1212.375388][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1212.375758][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1212.376113][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1212.684000][ T38] audit: type=1400 audit(1754.895:460087): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32691 comm="udevd" name="/" dev="sda1" ino=2 [ 1212.684060][ T38] audit: type=1400 audit(1754.895:460088): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5208 comm="udevd" name="/" dev="sda1" ino=2 [ 1212.684108][ T38] audit: type=1400 audit(1754.916:460089): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32691 comm="udevd" name="/" dev="proc" ino=1 [ 1212.684159][ T38] audit: type=1400 audit(1754.916:460090): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32691 comm="udevd" name="/" dev="proc" ino=1 [ 1212.684209][ T38] audit: type=1400 audit(1754.916:460091): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32691 comm="udevd" name="32691" dev="proc" ino=96077 [ 1212.684259][ T38] audit: type=1400 audit(1754.916:460092): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=w pid=32691 comm="udevd" name="oom_score_adj" dev="proc" ino=96078 [ 1212.684307][ T38] audit: type=1400 audit(1754.916:460093): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=32691 comm="udevd" path="/proc/32691/oom_score_adj" dev="proc" ino=96078 [ 1212.684369][ T38] audit: type=1400 audit(1754.916:460094): lsm=SMACK fn=smack_inode_setattr action=granted subject="_" object="_" requested=w pid=32691 comm="udevd" name="oom_score_adj" dev="proc" ino=96078 [ 1212.684416][ T38] audit: type=1400 audit(1754.916:460095): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=32691 comm="udevd" path="/proc/32691/oom_score_adj" dev="proc" ino=96078 [ 1217.125839][ T38] kauditd_printk_skb: 48 callbacks suppressed [ 1217.125862][ T38] audit: type=1400 audit(1759.566:460144): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5208 comm="udevd" opid=32691 ocomm="udevd" [ 1217.125925][ T38] audit: type=1400 audit(1759.566:460145): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5208 comm="udevd" name="/" dev="sda1" ino=2 [ 1217.125974][ T38] audit: type=1400 audit(1759.566:460146): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5208 comm="udevd" name="etc" dev="sda1" ino=116 [ 1217.126022][ T38] audit: type=1400 audit(1759.566:460147): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5208 comm="udevd" name="udev" dev="sda1" ino=259 [ 1217.144857][ C0] net_ratelimit: 12506 callbacks suppressed [ 1217.144878][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1217.145285][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1217.145748][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1217.146129][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1217.146538][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1217.146931][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1217.147315][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1217.147711][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1217.148159][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1217.149031][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1217.321174][ T38] audit: type=1400 audit(1759.787:460148): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1217.400900][ T38] audit: type=1400 audit(1759.860:460149): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5208 comm="udevd" path="/etc/udev/rules.d" dev="sda1" ino=261 [ 1217.438268][ T38] audit: type=1400 audit(1759.860:460150): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5208 comm="udevd" name="/" dev="sda1" ino=2 [ 1217.438738][ T38] audit: type=1400 audit(1759.902:460151): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5208 comm="udevd" name="lib" dev="sda1" ino=264 [ 1217.439214][ T38] audit: type=1400 audit(1759.902:460152): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5208 comm="udevd" name="udev" dev="sda1" ino=1222 [ 1217.493748][ T38] audit: type=1400 audit(1759.902:460153): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5208 comm="udevd" path="/lib/udev/rules.d" dev="sda1" ino=1229 [ 1220.499016][ T1321] ieee802154 phy1 wpan1: encryption failed: -22 [ 1220.811388][ T59] Bluetooth: hci15: command tx timeout [ 1221.917175][ C0] net_ratelimit: 12508 callbacks suppressed [ 1221.917199][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1221.917590][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1221.918003][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1221.918399][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1221.918760][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1221.919111][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1221.919541][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1221.919900][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1221.920247][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1221.920634][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1222.327609][ T38] kauditd_printk_skb: 115 callbacks suppressed [ 1222.327630][ T38] audit: type=1400 audit(1765.046:460269): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1222.774641][T32682] Bluetooth: hci13: command tx timeout [ 1222.775369][T32682] Bluetooth: hci15: command tx timeout [ 1222.775530][T32682] Bluetooth: hci14: command tx timeout [ 1222.827644][ T38] audit: type=1400 audit(1765.561:460270): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1223.304550][ T38] audit: type=1400 audit(1766.065:460271): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5208 comm="udevd" name="/" dev="sda1" ino=2 [ 1223.304607][ T38] audit: type=1400 audit(1766.065:460272): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5208 comm="udevd" name="/" dev="tmpfs" ino=1 [ 1223.304657][ T38] audit: type=1400 audit(1766.065:460273): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5208 comm="udevd" name="udev" dev="tmpfs" ino=9 [ 1223.304705][ T38] audit: type=1400 audit(1766.065:460274): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=5208 comm="udevd" name="udev" dev="tmpfs" ino=9 [ 1223.304752][ T38] audit: type=1400 audit(1766.065:460275): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=5208 comm="udevd" path="/run/udev/queue" dev="tmpfs" ino=16465 [ 1223.304803][ T38] audit: type=1400 audit(1766.065:460276): lsm=SMACK fn=smack_inode_setattr action=granted subject="_" object="_" requested=w pid=5208 comm="udevd" name="queue" dev="tmpfs" ino=16465 [ 1223.306513][ T38] audit: type=1400 audit(1766.065:460277): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32692 comm="udevd" name="/" dev="sda1" ino=2 [ 1223.306568][ T38] audit: type=1400 audit(1766.065:460278): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32692 comm="udevd" name="/" dev="tmpfs" ino=1 [ 1224.757648][T32684] Bluetooth: hci13: command tx timeout [ 1224.757686][T32684] Bluetooth: hci14: command tx timeout [ 1224.757712][T32684] Bluetooth: hci15: command tx timeout [ 1226.689641][ C0] net_ratelimit: 12416 callbacks suppressed [ 1226.689665][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1226.690062][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1226.690521][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1226.691014][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1226.691394][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1226.691760][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1226.692481][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1226.692856][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1226.693738][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1226.694164][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1226.737450][T32682] Bluetooth: hci15: command tx timeout [ 1226.737487][T32682] Bluetooth: hci13: command tx timeout [ 1226.756264][T32684] Bluetooth: hci14: command tx timeout [ 1227.334174][ T38] kauditd_printk_skb: 56 callbacks suppressed [ 1227.334198][ T38] audit: type=1400 audit(1770.295:460335): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1227.842123][ T38] audit: type=1400 audit(1770.820:460336): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1228.335073][ T38] audit: type=1400 audit(1771.345:460337): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1228.718729][T32682] Bluetooth: hci13: command tx timeout [ 1228.718767][T32682] Bluetooth: hci14: command tx timeout [ 1228.835299][ T38] audit: type=1400 audit(1771.870:460338): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1229.335999][ T38] audit: type=1400 audit(1772.395:460339): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1229.837182][ T38] audit: type=1400 audit(1772.930:460340): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1230.339140][ T38] audit: type=1400 audit(1773.445:460341): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1230.840461][ T38] audit: type=1400 audit(1773.980:460342): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1231.339126][ T38] audit: type=1400 audit(1774.505:460343): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1231.461691][ C0] net_ratelimit: 12342 callbacks suppressed [ 1231.461714][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1231.462085][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1231.462464][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1231.462967][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1231.463328][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1231.463696][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1231.464049][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1231.464402][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1231.464777][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1231.465127][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1231.839788][ T38] audit: type=1400 audit(1775.030:460344): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1232.340775][ T38] audit: type=1400 audit(1775.555:460345): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1232.839881][ T38] audit: type=1400 audit(1776.080:460346): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1233.340409][ T38] audit: type=1400 audit(1776.605:460347): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1233.841411][ T38] audit: type=1400 audit(1777.130:460348): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1234.342969][ T38] audit: type=1400 audit(1777.655:460349): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1234.842118][ T38] audit: type=1400 audit(1778.179:460350): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1235.342230][ T38] audit: type=1400 audit(1778.704:460351): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1235.842296][ T38] audit: type=1400 audit(1779.229:460352): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1236.233966][ C0] net_ratelimit: 12651 callbacks suppressed [ 1236.233989][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1236.234349][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1236.234701][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1236.235072][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1236.235424][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1236.235788][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1236.236146][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1236.236513][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1236.236898][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1236.237254][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1236.403925][ T38] audit: type=1400 audit(1779.754:460353): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1236.843313][ T38] audit: type=1400 audit(1780.279:460354): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1237.343426][ T38] audit: type=1400 audit(1780.804:460355): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1237.843715][ T38] audit: type=1400 audit(1781.329:460356): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1238.343694][ T38] audit: type=1400 audit(1781.854:460357): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1238.845054][ T38] audit: type=1400 audit(1782.389:460358): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1239.344479][ T38] audit: type=1400 audit(1782.904:460359): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1239.845237][ T38] audit: type=1400 audit(1783.439:460360): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1240.345459][ T38] audit: type=1400 audit(1783.953:460361): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1240.846225][ T38] audit: type=1400 audit(1784.489:460362): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1241.006539][ C0] net_ratelimit: 12303 callbacks suppressed [ 1241.006564][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1241.006952][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1241.007327][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1241.007688][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1241.008038][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1241.008393][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1241.008789][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1241.009510][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1241.009856][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1241.010273][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1241.346681][ T38] audit: type=1400 audit(1785.003:460363): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1241.846760][ T38] audit: type=1400 audit(1785.539:460364): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1242.349853][ T38] audit: type=1400 audit(1786.053:460365): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1242.848109][ T38] audit: type=1400 audit(1786.588:460366): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1243.348448][ T38] audit: type=1400 audit(1787.103:460367): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1243.849278][ T38] audit: type=1400 audit(1787.638:460368): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1244.349201][ T38] audit: type=1400 audit(1788.153:460369): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1244.849403][ T38] audit: type=1400 audit(1788.688:460370): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1245.349719][ T38] audit: type=1400 audit(1789.202:460371): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1245.778711][ C0] net_ratelimit: 12485 callbacks suppressed [ 1245.778735][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1245.779128][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1245.779493][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1245.779854][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1245.780241][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1245.780612][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1245.781014][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1245.781378][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1245.781740][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1245.782453][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1245.850390][ T38] audit: type=1400 audit(1789.738:460372): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1246.352781][ T38] audit: type=1400 audit(1790.263:460373): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1246.850952][ T38] audit: type=1400 audit(1790.788:460374): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1247.360014][ T38] audit: type=1400 audit(1791.312:460375): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1247.853454][ T38] audit: type=1400 audit(1791.837:460376): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1248.352045][ T38] audit: type=1400 audit(1792.362:460377): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1248.851995][ T38] audit: type=1400 audit(1792.887:460378): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1249.352107][ T38] audit: type=1400 audit(1793.412:460379): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1249.854771][ T38] audit: type=1400 audit(1793.937:460380): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1250.353468][ T38] audit: type=1400 audit(1794.462:460381): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1250.550998][ C0] net_ratelimit: 12553 callbacks suppressed [ 1250.551022][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1250.551388][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1250.551736][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1250.552092][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1250.552468][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1250.552929][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1250.553276][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1250.553718][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1250.554099][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1250.554459][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1250.853677][ T38] audit: type=1400 audit(1794.987:460382): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1251.355609][ T38] audit: type=1400 audit(1795.512:460383): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1251.854438][ T38] audit: type=1400 audit(1796.037:460384): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1252.357564][ T38] audit: type=1400 audit(1796.561:460385): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1252.854749][ T38] audit: type=1400 audit(1797.086:460386): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1253.355130][ T38] audit: type=1400 audit(1797.611:460387): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1253.856141][ T38] audit: type=1400 audit(1798.136:460388): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1254.356256][ T38] audit: type=1400 audit(1798.661:460389): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.1.175 dest=44834 netif=eth0 [ 1254.356940][ T38] audit: type=1400 audit(1798.661:460390): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5826 comm="syz-executor" opid=32657 ocomm="syz-executor" [ 1254.447380][ T38] audit: type=1400 audit(1798.745:460391): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=32657 comm="syz-executor" opid=32658 ocomm="syz-executor" [ 1254.456865][ T38] audit: type=1400 audit(1798.766:460392): lsm=SMACK fn=smack_task_setpgid action=granted subject="_" object="_" requested=w pid=32693 comm="syz-executor" opid=32693 ocomm="syz-executor" [ 1254.456928][ T38] audit: type=1400 audit(1798.766:460393): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32693 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 1254.456977][ T38] audit: type=1400 audit(1798.766:460394): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=32693 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 1255.238048][ T39] INFO: task syz.4.12668:32557 blocked for more than 143 seconds. [ 1255.238077][ T39] Not tainted syzkaller #0 [ 1255.238090][ T39] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1255.238102][ T39] task:syz.4.12668 state:D stack:21896 pid:32557 tgid:32555 ppid:5881 task_flags:0x400140 flags:0x00004006 [ 1255.238166][ T39] Call Trace: [ 1255.238175][ T39] SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 1255.238192][ T39] __schedule+0x16f3/0x4c20 [ 1255.238258][ T39] ? __lock_acquire+0xab9/0xd20 [ 1255.238292][ T39] ? __pfx___schedule+0x10/0x10 [ 1255.238345][ T39] ? schedule+0x91/0x360 [ 1255.238383][ T39] schedule+0x165/0x360 [ 1255.238419][ T39] schedule_timeout+0x9a/0x270 [ 1255.238452][ T39] ? __pfx_schedule_timeout+0x10/0x10 [ 1255.238500][ T39] ? _raw_spin_unlock_irq+0x23/0x50 [ 1255.238537][ T39] ? lockdep_hardirqs_on+0x9c/0x150 [ 1255.238569][ T39] ? wait_for_completion+0x267/0x5d0 [ 1255.238606][ T39] wait_for_completion+0x2bf/0x5d0 [ 1255.238656][ T39] ? __pfx_wait_for_completion+0x10/0x10 [ 1255.238699][ T39] ? __init_swait_queue_head+0xa9/0x150 [ 1255.238743][ T39] rcu_barrier+0x463/0x570 [ 1255.238780][ T39] netdev_run_todo+0x327/0xea0 [ 1255.238820][ T39] ? __pfx_netdev_run_todo+0x10/0x10 [ 1255.238866][ T39] rtnl_newlink+0x177b/0x1c70 [ 1255.238915][ T39] ? __pfx_rtnl_newlink+0x10/0x10 [ 1255.238946][ T39] ? migrate_enable+0x29c/0x3c0 [ 1255.238974][ T39] ? reacquire_held_locks+0x127/0x1d0 [ 1255.239009][ T39] ? __pfx_migrate_enable+0x10/0x10 [ 1255.239039][ T39] ? __pfx_migrate_enable+0x10/0x10 [ 1255.239084][ T39] ? __local_bh_enable+0x23f/0x3d0 [ 1255.239112][ T39] ? reacquire_held_locks+0x127/0x1d0 [ 1255.239149][ T39] ? __pfx___local_bh_enable+0x10/0x10 [ 1255.239188][ T39] ? __local_bh_enable_ip+0x1b2/0x270 [ 1255.239217][ T39] ? lockdep_hardirqs_on+0x9c/0x150 [ 1255.239256][ T39] ? __pfx___local_bh_enable_ip+0x10/0x10 [ 1255.239283][ T39] ? dev_hard_start_xmit+0x7f5/0x870 [ 1255.239308][ T39] ? __dev_queue_xmit+0x26f/0x3b70 [ 1255.239343][ T39] ? __dev_queue_xmit+0x26f/0x3b70 [ 1255.239368][ T39] ? __dev_queue_xmit+0x26f/0x3b70 [ 1255.239396][ T39] ? __dev_queue_xmit+0x1d3d/0x3b70 [ 1255.239429][ T39] ? __lock_acquire+0xab9/0xd20 [ 1255.239489][ T39] ? __pfx_rtnl_newlink+0x10/0x10 [ 1255.239521][ T39] rtnetlink_rcv_msg+0x7cf/0xb70 [ 1255.239558][ T39] ? rtnetlink_rcv_msg+0x1ab/0xb70 [ 1255.239589][ T39] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 1255.239619][ T39] ? ref_tracker_free+0x61e/0x7c0 [ 1255.239656][ T39] ? __asan_memcpy+0x40/0x70 [ 1255.239682][ T39] ? __pfx_ref_tracker_free+0x10/0x10 [ 1255.239739][ T39] netlink_rcv_skb+0x205/0x470 [ 1255.239775][ T39] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 1255.239808][ T39] ? __pfx_netlink_rcv_skb+0x10/0x10 [ 1255.239855][ T39] ? netlink_deliver_tap+0x2e/0x1b0 [ 1255.239897][ T39] netlink_unicast+0x843/0xa10 [ 1255.239937][ T39] ? __pfx_netlink_unicast+0x10/0x10 [ 1255.239971][ T39] ? netlink_sendmsg+0x642/0xb30 [ 1255.240002][ T39] ? skb_put+0x11b/0x210 [ 1255.240041][ T39] netlink_sendmsg+0x805/0xb30 [ 1255.240086][ T39] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1255.240129][ T39] ? bpf_lsm_socket_sendmsg+0x9/0x20 [ 1255.240152][ T39] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1255.240187][ T39] __sock_sendmsg+0x21c/0x270 [ 1255.240222][ T39] ____sys_[ 1255.240222][ T39] ____sys_sendmsg+0x508/0x820 [ 1255.240253][ T39] ? __pfx_____sys_sendmsg+0x10/0x10 [ 1255.240289][ T39] ? import_iovec+0x74/0xa0 [ 1255.240324][ T39] ___sys_sendmsg+0x21f/0x2a0 [ 1255.240351][ T39] ? __pfx____sys_sendmsg+0x10/0x10 [ 1255.240418][ T39] ? __fget_files+0x2a/0x420 [ 1255.240451][ T39] ? __fget_files+0x3a6/0x420 [ 1255.240496][ T39] __x64_sys_sendmsg+0x1a1/0x260 [ 1255.240524][ T39] ? __pfx___x64_sys_sendmsg+0x10/0x10 [ 1255.240561][ T39] ? rcu_is_watching+0x15/0xb0 [ 1255.240603][ T39] ? do_syscall_64+0xbe/0x3b0 [ 1255.240631][ T39] do_syscall_64+0xfa/0x3b0 [ 1255.240654][ T39] ? lockdep_hardirqs_on+0x9c/0x150 [ 1255.240690][ T39] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1255.240720][ T39] ? clear_bhb_loop+0x60/0xb0 [ 1255.240749][ T39] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1255.240773][ T39] RIP: 0033:0x7fa2f3e6eec9 [ 1255.240794][ T39] RSP: 002b:00007fa2f20d6038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1255.240818][ T39] RAX: ffffffffffffffda RBX: 00007fa2f40c5fa0 RCX: 00007fa2f3e6eec9 [ 1255.240836][ T39] RDX: 0000000000004000 RSI: 00002000000002c0 RDI: 0000000000000003 [ 1255.240852][ T39] RBP: 00007fa2f3ef1f91 R08: 0000000000000000 R09: 0000000000000000 [ 1255.240868][ T39] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1255.240882][ T39] R13: 00007fa2f40c6038 R14: 00007fa2f40c5fa0 R15: 00007fff1cf2db68 [ 1255.240921][ T39] [ 1255.240962][ T39] [ 1255.240962][ T39] Showing all locks held in the system: [ 1255.240974][ T39] 3 locks held by kworker/u8:0/12: [ 1255.240988][ T39] #0: ffff88814d034938 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 1255.241052][ T39] #1: ffffc90000117bc0 ((work_completion)(&(&net->ipv6.addr_chk_work)->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 1255.241112][ T39] #2: ffffffff8ecd38b8 (rtnl_mutex){+.+.}-{4:4}, at: addrconf_verify_work+0x19/0x30 [ 1255.241172][ T39] 7 locks held by rcuc/0/20: [ 1255.241187][ T39] 1 lock held by khungtaskd/39: [ 1255.241199][ T39] #0: ffffffff8d9a8dc0 (rcu_read_lock){....}-{1:3}, at: debug_show_all_locks+0x2e/0x180 [ 1255.241257][ T39] 3 locks held by kworker/u8:5/173: [ 1255.241270][ T39] #0: ffff888019881138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 1255.241328][ T39] #1: ffffc90003bd7bc0 ((linkwatch_work).work){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 1255.241386][ T39] #2: ffffffff8ecd38b8 (rtnl_mutex){+.+.}-{4:4}, at: linkwatch_event+0xe/0x60 [ 1255.241456][ T39] 3 locks held by kworker/u8:13/3612: [ 1255.241472][ T39] 2 locks held by getty/5595: [ 1255.241486][ T39] #0: ffff88823bf7c0a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x25/0x70 [ 1255.241536][ T39] #1: ffffc90003e8b2e0 (&ldata->atomic_read_lock){+.+.}-{4:4}, at: n_tty_read+0x444/0x1410 [ 1255.241605][ T39] 2 locks held by syz.4.12668/32557: [ 1255.241619][ T39] #0: ffffffff8f1d83f0 (&ops->srcu#2){.+.+}-{0:0}, at: rtnl_link_ops_get+0x23/0x250 [ 1255.241685][ T39] #1: ffffffff8d9ae770 (rcu_state.barrier_mutex){+.+.}-{4:4}, at: rcu_barrier+0x4c/0x570 [ 1255.241747][ T39] 1 lock held by syz.3.12673/32567: [ 1255.241760][ T39] #0: ffffffff8d9ae770 (rcu_state.barrier_mutex){+.+.}-{4:4}, at: rcu_barrier+0x4c/0x570 [ 1255.241813][ T39] 1 lock held by syz.2.12685/32591: [ 1255.241826][ T39] #0: ffffffff8d9ae770 (rcu_state.barrier_mutex){+.+.}-{4:4}, at: rcu_barrier+0x4c/0x570 [ 1255.241877][ T39] 1 lock held by syz.0.12687/32595: [ 1255.241891][ T39] #0: ffffffff8d9ae770 (rcu_state.barrier_mutex){+.+.}-{4:4}, at: rcu_barrier+0x4c/0x570 [ 1255.241943][ T39] 1 lock held by syz.1.12688/32597: [ 1255.241956][ T39] #0: ffffffff8ecd38b8 (rtnl_mutex){+.+.}-{4:4}, at: tun_chr_close+0x41/0x1c0 [ 1255.242019][ T39] 2 locks held by syz-executor/32602: [ 1255.242032][ T39] #0: ffffffff8f1d7be8 (&ops->srcu#2){.+.+}-{0:0}, at: rtnl_link_ops_get+0x23/0x250 [ 1255.242099][ T39] #1: ffffffff8ecd38b8 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_newlink+0x8db/0x1c70 [ 1255.242160][ T39] 6 locks held by syz-executor/32612: [ 1255.242173][ T39] #0: ffffffff8ecc69a0 (pernet_ops_rwsem){++++}-{4:4}, at: copy_net_ns+0x304/0x4d0 [ 1255.242233][ T39] #1: ffffffff8ea22de0 (devices_rwsem){++++}-{4:4}, at: rdma_dev_init_net+0x19a/0x270 [ 1255.242292][ T39] #2: ffffffff8ea23020 (rdma_nets_rwsem){++++}-{4:4}, at: rdma_dev_init_net+0x1d2/0x270 [ 1255.242350][ T39] #3: ffff88805b3bd118 (&device->compat_devs_mutex){+.+.}-{4:4}, at: add_one_compat_dev+0xee/0x5c0 [ 1255.242407][ T39] #4: ffff88805b3bd430 (&rxe->usdev_lock){+.+.}-{4:4}, at: rxe_query_port+0x7e/0x3b0 [ 1255.242471][ T39] #5: ffffffff8ecd38b8 (rtnl_mutex){+.+.}-{4:4}, at: ib_get_eth_speed+0x151/0x7b0 [ 1255.242525][ T39] 5 locks held by syz-executor/32615: [ 1255.242537][ T39] #0: ffffffff8ecc69a0 (pernet_ops_rwsem){++++}-{4:4}, at: copy_net_ns+0x304/0x4d0 [ 1255.242597][ T39] #1: ffffffff8ea22de0 (devices_rwsem){++++}-{4:4}, at: rdma_dev_init_net+0x19a/0x270 [ 1255.242655][ T39] #2: ffffffff8ea23020 (rdma_nets_rwsem){++++}-{4:4}, at: rdma_dev_init_net+0x1d2/0x270 [ 1255.242721][ T39] #3: ffff88805ec71118 (&device->compat_devs_mutex){+.+.}-{4:4}, at: add_one_compat_dev+0xee/0x5c0 [ 1255.242780][ T39] #4: ffffffff8ecd38b8 (rtnl_mutex){+.+.}-{4:4}, at: ib_get_eth_speed+0x151/0x7b0 [ 1255.242834][ T39] 2 locks held by syz-executor/32620: [ 1255.242848][ T39] #0: ffffffff8ecc69a0 (pernet_ops_rwsem){++++}-{4:4}, at: copy_net_ns+0x304/0x4d0 [ 1255.242908][ T39] #1: ffffffff8ecd38b8 (rtnl_mutex){+.+.}-{4:4}, at: ip_tunnel_init_net+0x2ab/0x800 [ 1255.242966][ T39] 1 lock held by syz-executor/32622: [ 1255.242979][ T39] #0: ffffffff8ecd38b8 (rtnl_mutex){+.+.}-{4:4}, at: __tun_chr_ioctl+0x37d/0x1df0 [ 1255.243033][ T39] 1 lock held by syz-executor/32633: [ 1255.243047][ T39] #0: ffffffff8ecd38b8 (rtnl_mutex){+.+.}-{4:4}, at: inet_rtm_newaddr+0x3b0/0x18b0 [ 1255.243102][ T39] 1 lock held by syz-executor/32644: [ 1255.243117][ T39] #0: ffffffff8ecd38b8 (rtnl_mutex){+.+.}-{4:4}, at: inet_rtm_newaddr+0x3b0/0x18b0 [ 1255.243171][ T39] 1 lock held by syz-executor/32649: [ 1255.243185][ T39] #0: ffffffff8ecd38b8 (rtnl_mutex){+.+.}-{4:4}, at: inet_rtm_newaddr+0x3b0/0x18b0 [ 1255.243239][ T39] 1 lock held by syz-executor/32651: [ 1255.243252][ T39] #0: ffffffff8ecd38b8 (rtnl_mutex){+.+.}-{4:4}, at: inet_rtm_newaddr+0x3b0/0x18b0 [ 1255.243306][ T39] 1 lock held by syz-executor/32655: [ 1255.243319][ T39] #0: ffffffff8ecd38b8 (rtnl_mutex){+.+.}-{4:4}, at: inet_rtm_newaddr+0x3b0/0x18b0 [ 1255.243373][ T39] 1 lock held by syz-executor/32658: [ 1255.243386][ T39] #0: ffffffff8ecd38b8 (rtnl_mutex){+.+.}-{4:4}, at: inet_rtm_newaddr+0x3b0/0x18b0 [ 1255.243441][ T39] 1 lock held by syz-executor/32664: [ 1255.243454][ T39] #0: ffffffff8ecd38b8 (rtnl_mutex){+.+.}-{4:4}, at: inet_rtm_newaddr+0x3b0/0x18b0 [ 1255.243509][ T39] 1 lock held by syz-executor/32672: [ 1255.243523][ T39] #0: ffffffff8ecd38b8 (rtnl_mutex){+.+.}-{4:4}, at: inet_rtm_newaddr+0x3b0/0x18b0 [ 1255.243576][ T39] 1 lock held by syz-executor/32673: [ 1255.243590][ T39] #0: ffffffff8ecd38b8 (rtnl_mutex){+.+.}-{4:4}, at: inet_rtm_newaddr+0x3b0/0x18b0 [ 1255.243645][ T39] 1 lock held by syz-executor/32680: [ 1255.243658][ T39] #0: ffffffff8ecd38b8 (rtnl_mutex){+.+.}-{4:4}, at: inet_rtm_newaddr+0x3b0/0x18b0 [ 1255.243719][ T39] [ 1255.243726][ T39] ============================================= [ 1255.243726][ T39] [ 1255.243746][ T39] NMI backtrace for cpu 1 [ 1255.243767][ T39] CPU: 1 UID: 0 PID: 39 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT_{RT,(full)} [ 1255.243801][ T39] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 1255.243814][ T39] Call Trace: [ 1255.243824][ T39] [ 1255.243835][ T39] dump_stack_lvl+0x189/0x250 [ 1255.243874][ T39] ? __pfx_dump_stack_lvl+0x10/0x10 [ 1255.243908][ T39] ? __pfx__printk+0x10/0x10 [ 1255.243946][ T39] nmi_cpu_backtrace+0x39e/0x3d0 [ 1255.243980][ T39] ? __pfx_nmi_cpu_backtrace+0x10/0x10 [ 1255.244014][ T39] ? __pfx__printk+0x10/0x10 [ 1255.244044][ T39] ? __pfx_nmi_raise_cpu_backtrace+0x10/0x10 [ 1255.244076][ T39] nmi_trigger_cpumask_backtrace+0x17a/0x300 [ 1255.244109][ T39] watchdog+0xf93/0xfe0 [ 1255.244145][ T39] ? watchdog+0x1de/0xfe0 [ 1255.244181][ T39] kthread+0x711/0x8a0 [ 1255.244219][ T39] ? __pfx_watchdog+0x10/0x10 [ 1255.244248][ T39] ? __pfx_kthread+0x10/0x10 [ 1255.244287][ T39] ? __pfx_kthread+0x10/0x10 [ 1255.244323][ T39] ret_from_fork+0x436/0x7d0 [ 1255.244355][ T39] ? __pfx_ret_from_fork+0x10/0x10 [ 1255.244392][ T39] ? __switch_to_asm+0x39/0x70 [ 1255.244412][ T39] ? __switch_to_asm+0x33/0x70 [ 1255.244432][ T39] ? __pfx_kthread+0x10/0x10 [ 1255.244468][ T39] ret_from_fork_asm+0x1a/0x30 [ 1255.244508][ T39] [ 1255.244517][ T39] Sending NMI from CPU 1 to CPUs 0: [ 1255.244547][ C0] NMI backtrace for cpu 0 [ 1255.244563][ C0] CPU: 0 UID: 0 PID: 20 Comm: rcuc/0 Not tainted syzkaller #0 PREEMPT_{RT,(full)} [ 1255.244585][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 1255.244598][ C0] RIP: 0010:lock_is_held_type+0x123/0x190 [ 1255.244630][ C0] Code: e8 92 16 00 00 b8 ff ff ff ff 65 0f c1 05 f5 4a ff 06 83 f8 01 75 44 48 c7 04 24 00 00 00 00 9c 8f 04 24 f7 04 24 00 02 00 00 <75> 4c 41 f7 c4 00 02 00 00 74 01 fb 65 48 8b 05 39 0a ff 06 48 3b [ 1255.244664][ C0] RSP: 0018:ffffc90000196058 EFLAGS: 00000046 [ 1255.244680][ C0] RAX: 0000000000000001 RBX: 0000000000000001 RCX: 5dcd69cf84106c00 [ 1255.244693][ C0] RDX: 0000000000000100 RSI: ffffffff8d21b1b6 RDI: ffffffff8b621680 [ 1255.244707][ C0] RBP: 00000000ffffffff R08: 0000000000000000 R09: 0000000000000100 [ 1255.244720][ C0] R10: ffffc90000196200 R11: fffff52000032c42 R12: 0000000000000246 [ 1255.244734][ C0] R13: ffff88801c685940 R14: ffffffff8d9a8dc0 R15: 0000000000000001 [ 1255.244749][ C0] FS: 0000000000000000(0000) GS:ffff8881268bc000(0000) knlGS:0000000000000000 [ 1255.244765][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1255.244778][ C0] CR2: 00007f9f6cf15c2d CR3: 0000000034ca4000 CR4: 00000000003526f0 [ 1255.244796][ C0] Call Trace: [ 1255.244803][ C0] [ 1255.244815][ C0] find_match+0xf1/0xcb0 [ 1255.244849][ C0] __find_rr_leaf+0x23a/0x6d0 [ 1255.244883][ C0] ? __pfx___find_rr_leaf+0x10/0x10 [ 1255.244911][ C0] ? __pfx_fib6_node_lookup+0x10/0x10 [ 1255.244942][ C0] fib6_table_lookup+0x3a2/0xa80 [ 1255.244982][ C0] ? __pfx_fib6_table_lookup+0x10/0x10 [ 1255.245007][ C0] ? ip6_pol_route+0x162/0x1180 [ 1255.245027][ C0] ip6_pol_route+0x222/0x1180 [ 1255.245051][ C0] ? __pfx_ip6_pol_route+0x10/0x10 [ 1255.245070][ C0] ? net_generic+0x1e/0x240 [ 1255.245108][ C0] fib6_rule_lookup+0x52f/0x6f0 [ 1255.245129][ C0] ? __pfx_ip6_pol_route_input+0x10/0x10 [ 1255.245151][ C0] ? __pfx_fib6_rule_lookup+0x10/0x10 [ 1255.245173][ C0] ? __pfx_br_dev_queue_push_xmit+0x10/0x10 [ 1255.245200][ C0] ? __pfx_br_dev_queue_push_xmit+0x10/0x10 [ 1255.245227][ C0] ? NF_HOOK+0x329/0x3c0 [ 1255.245255][ C0] ? NF_HOOK+0x9e/0x3c0 [ 1255.245281][ C0] ? __pfx_NF_HOOK+0x10/0x10 [ 1255.245311][ C0] ip6_route_input+0x6ce/0xa50 [ 1255.245336][ C0] ? __pfx_ip6_route_input+0x10/0x10 [ 1255.245355][ C0] ? br_forward_finish+0xd3/0x130 [ 1255.245397][ C0] ? ip6_rcv_finish_core+0x222/0x420 [ 1255.245425][ C0] ip6_rcv_finish+0x141/0x2e0 [ 1255.245452][ C0] ? __pfx_ip6_rcv_finish+0x10/0x10 [ 1255.245476][ C0] ip_sabotage_in+0x1e1/0x270 [ 1255.245493][ C0] ? __pfx_ip_sabotage_in+0x10/0x10 [ 1255.245513][ C0] nf_hook_slow+0xc2/0x220 [ 1255.245544][ C0] NF_HOOK+0x206/0x3a0 [ 1255.245567][ C0] ? skb_orphan+0xaf/0xd0 [ 1255.245592][ C0] ? __pfx_ip6_rcv_finish+0x10/0x10 [ 1255.245617][ C0] ? NF_HOOK+0x9a/0x3a0 [ 1255.245641][ C0] ? __pfx_NF_HOOK+0x10/0x10 [ 1255.245668][ C0] ? __pfx_ip6_rcv_finish+0x10/0x10 [ 1255.245699][ C0] __netif_receive_skb+0xd3/0x380 [ 1255.245727][ C0] ? netif_receive_skb+0x115/0x790 [ 1255.245750][ C0] netif_receive_skb+0x1cb/0x790 [ 1255.245774][ C0] ? __pfx_netif_receive_skb+0x10/0x10 [ 1255.245800][ C0] ? br_netif_receive_skb+0x126/0x190 [ 1255.245821][ C0] NF_HOOK+0x9d/0x390 [ 1255.245837][ C0] ? __pfx_br_netif_receive_skb+0x10/0x10 [ 1255.245856][ C0] ? NF_HOOK+0x102/0x390 [ 1255.245873][ C0] ? __pfx_NF_HOOK+0x10/0x10 [ 1255.245891][ C0] ? __pfx_br_netif_receive_skb+0x10/0x10 [ 1255.245913][ C0] ? br_pass_frame_up+0x275/0x420 [ 1255.245933][ C0] br_handle_frame_finish+0x14d1/0x19b0 [ 1255.245967][ C0] ? __pfx_br_handle_frame_finish+0x10/0x10 [ 1255.245985][ C0] ? ipv6_find_hdr+0xc78/0x1050 [ 1255.246016][ C0] ? ret_from_fork+0x436/0x7d0 [ 1255.246044][ C0] ? nf_hook_slow+0x176/0x220 [ 1255.246072][ C0] ? __pfx_br_handle_frame_finish+0x10/0x10 [ 1255.246090][ C0] br_nf_hook_thresh+0x3c6/0x4a0 [ 1255.246125][ C0] ? __pfx_br_nf_hook_thresh+0x10/0x10 [ 1255.246153][ C0] ? nft_do_chain_inet+0x25d/0x340 [ 1255.246174][ C0] ? __pfx_br_handle_frame_finish+0x10/0x10 [ 1255.246199][ C0] br_nf_pre_routing_finish_ipv6+0x948/0xd00 [ 1255.246219][ C0] ? __pfx_br_handle_frame_finish+0x10/0x10 [ 1255.246242][ C0] ? br_nf_pre_routing_ipv6+0x42f/0x6b0 [ 1255.246262][ C0] br_nf_pre_routing_ipv6+0x37e/0x6b0 [ 1255.246284][ C0] ? __pfx_br_nf_pre_routing_ipv6+0x10/0x10 [ 1255.246306][ C0] ? __pfx_br_nf_pre_routing_finish_ipv6+0x10/0x10 [ 1255.246325][ C0] ? br_nf_pre_routing+0x720/0x1470 [ 1255.246359][ C0] ? __pfx_br_nf_pre_routing+0x10/0x10 [ 1255.246388][ C0] br_handle_frame+0x985/0x14d0 [ 1255.246412][ C0] ? __pfx_br_handle_frame+0x10/0x10 [ 1255.246428][ C0] ? try_to_take_rt_mutex+0x840/0xb00 [ 1255.246455][ C0] ? __pfx_br_handle_frame_finish+0x10/0x10 [ 1255.246477][ C0] ? __pfx_br_handle_frame+0x10/0x10 [ 1255.246496][ C0] __netif_receive_skb_core+0x10b9/0x4020 [ 1255.246519][ C0] ? __lock_acquire+0xab9/0xd20 [ 1255.246549][ C0] ? do_raw_spin_lock+0x121/0x290 [ 1255.246575][ C0] ? _raw_spin_unlock_irqrestore+0x85/0x110 [ 1255.246605][ C0] ? __pfx___netif_receive_skb_core+0x10/0x10 [ 1255.246629][ C0] ? _raw_spin_unlock_irqrestore+0xad/0x110 [ 1255.246658][ C0] ? __pfx__raw_spin_unlock_irqrestore+0x10/0x10 [ 1255.246693][ C0] ? __lock_acquire+0xab9/0xd20 [ 1255.246724][ C0] ? process_backlog+0x27b/0x900 [ 1255.246750][ C0] ? process_backlog+0x27b/0x900 [ 1255.246774][ C0] __netif_receive_skb+0x72/0x380 [ 1255.246797][ C0] ? rt_spin_unlock+0x65/0x80 [ 1255.246823][ C0] ? process_backlog+0x27b/0x900 [ 1255.246847][ C0] process_backlog+0x31e/0x900 [ 1255.246879][ C0] __napi_poll+0xb3/0x540 [ 1255.246905][ C0] net_rx_action+0x707/0xe00 [ 1255.246929][ C0] ? arch_stack_walk+0x11c/0x150 [ 1255.246990][ C0] ? ret_from_fork_asm+0x1a/0x30 [ 1255.247015][ C0] ? __pfx_net_rx_action+0x10/0x10 [ 1255.247046][ C0] ? kvm_sched_clock_read+0x11/0x20 [ 1255.247080][ C0] ? __pfx_sched_clock_cpu+0x10/0x10 [ 1255.247109][ C0] handle_softirqs+0x22c/0x710 [ 1255.247139][ C0] ? __pfx_handle_softirqs+0x10/0x10 [ 1255.247170][ C0] __local_bh_enable_ip+0x179/0x270 [ 1255.247194][ C0] ? __pfx___local_bh_enable_ip+0x10/0x10 [ 1255.247224][ C0] ? rcu_cpu_kthread+0x23e/0x1b50 [ 1255.247251][ C0] ? rcu_cpu_kthread+0x23e/0x1b50 [ 1255.247278][ C0] rcu_cpu_kthread+0xc3d/0x1b50 [ 1255.247309][ C0] ? rcu_cpu_kthread+0x23e/0x1b50 [ 1255.247343][ C0] ? __pfx_rcu_cpu_kthread+0x10/0x10 [ 1255.247372][ C0] ? __lock_acquire+0xab9/0xd20 [ 1255.247396][ C0] ? __pfx___schedule+0x10/0x10 [ 1255.247433][ C0] ? schedule+0x91/0x360 [ 1255.247464][ C0] ? smpboot_thread_fn+0x4d/0xa60 [ 1255.247487][ C0] smpboot_thread_fn+0x542/0xa60 [ 1255.247511][ C0] ? smpboot_thread_fn+0x4d/0xa60 [ 1255.247540][ C0] kthread+0x711/0x8a0 [ 1255.247569][ C0] ? __pfx_smpboot_thread_fn+0x10/0x10 [ 1255.247593][ C0] ? __pfx_kthread+0x10/0x10 [ 1255.247624][ C0] ? __pfx_kthread+0x10/0x10 [ 1255.247652][ C0] ret_from_fork+0x436/0x7d0 [ 1255.247678][ C0] ? __pfx_ret_from_fork+0x10/0x10 [ 1255.247706][ C0] ? __switch_to_asm+0x39/0x70 [ 1255.247724][ C0] ? __switch_to_asm+0x33/0x70 [ 1255.247740][ C0] ? __pfx_kthread+0x10/0x10 [ 1255.247769][ C0] ret_from_fork_asm+0x1a/0x30 [ 1255.247796][ C0] [ 1255.323603][ C0] net_ratelimit: 12530 callbacks suppressed [ 1255.323622][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1255.324373][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1255.324744][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1255.325167][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1255.325540][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1255.325902][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1255.326265][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1255.326612][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1255.326982][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b0:2a:2a:d6:89, vlan:0) [ 1255.327371][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1255.609408][ T39] Kernel panic - not syncing: hung_task: blocked tasks [ 1255.609433][ T39] CPU: 1 UID: 0 PID: 39 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT_{RT,(full)} [ 1255.609460][ T39] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 1255.609474][ T39] Call Trace: [ 1255.609485][ T39] [ 1255.609496][ T39] dump_stack_lvl+0x99/0x250 [ 1255.609535][ T39] ? __asan_memcpy+0x40/0x70 [ 1255.609561][ T39] ? __pfx_dump_stack_lvl+0x10/0x10 [ 1255.609593][ T39] ? __pfx__printk+0x10/0x10 [ 1255.609633][ T39] vpanic+0x281/0x750 [ 1255.609683][ T39] ? __pfx_vpanic+0x10/0x10 [ 1255.609715][ T39] ? preempt_schedule+0xae/0xc0 [ 1255.609751][ T39] ? preempt_schedule_common+0x83/0xd0 [ 1255.609793][ T39] panic+0xb9/0xc0 [ 1255.609824][ T39] ? __pfx_panic+0x10/0x10 [ 1255.609858][ T39] ? preempt_schedule_thunk+0x16/0x30 [ 1255.609891][ T39] ? nmi_trigger_cpumask_backtrace+0x2bb/0x300 [ 1255.609924][ T39] watchdog+0xfd2/0xfe0 [ 1255.609959][ T39] ? watchdog+0x1de/0xfe0 [ 1255.609996][ T39] kthread+0x711/0x8a0 [ 1255.610034][ T39] ? __pfx_watchdog+0x10/0x10 [ 1255.610063][ T39] ? __pfx_kthread+0x10/0x10 [ 1255.610103][ T39] ? __pfx_kthread+0x10/0x10 [ 1255.610138][ T39] ret_from_fork+0x436/0x7d0 [ 1255.610172][ T39] ? __pfx_ret_from_fork+0x10/0x10 [ 1255.610209][ T39] ? __switch_to_asm+0x39/0x70 [ 1255.610230][ T39] ? __switch_to_asm+0x33/0x70 [ 1255.610250][ T39] ? __pfx_kthread+0x10/0x10 [ 1255.610286][ T39] ret_from_fork_asm+0x1a/0x30 [ 1255.610326][ T39] [ 1255.610686][ T39] Kernel Offset: disabled