last executing test programs: 1m56.679760552s ago: executing program 4 (id=6209): r0 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="180000001400b59500000000009b44082d"], 0x40}}, 0x0) 1m56.429357672s ago: executing program 4 (id=6212): r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000140)=@fd={0x0, 0x8, 0x4, 0x0, 0x600, {}, {0x4, 0xc, 0x2, 0x0, 0x80, 0x5, "acc5107d"}, 0x43bc, 0x4, {}, 0x13}) 1m56.222512725s ago: executing program 4 (id=6216): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)="d8000000180081054e81f783db4cb9040a1d080006007c09e8fc55a10a0015000600142603600e1208000f00fff00401a80008000800104004080000055c0461c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb71b14d6d930dfe144ecc447c65e206d25b4084121d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad9e3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd4e1ffffffffc1c9b6278754ca397c388b0dd6e4edef3d9300fc0d15", 0xd8}], 0x1}, 0x4000000) 1m55.841770712s ago: executing program 4 (id=6223): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2400000076000907010000000000000007020000", @ANYRES32=0x0, @ANYBLOB='\a\x00\r'], 0x24}, 0x1, 0x5502000000000000}, 0x4000) 1m55.644592252s ago: executing program 4 (id=6228): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xe0b, 0x0, 0x0, 0x0, 0x800000}, [@ringbuf_output={{0x18, 0x5, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x54}}]}, &(0x7f0000000080)='syzkaller\x00', 0x8, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @xdp=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x94) 1m55.408657642s ago: executing program 4 (id=6233): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x100, 0xfd, 0x9, 0x1, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000000), &(0x7f0000000000), 0xcff5, r0}, 0x38) 1m48.104595826s ago: executing program 0 (id=6301): r0 = socket$can_j1939(0x1d, 0x2, 0x7) recvfrom(r0, 0x0, 0x0, 0x2000, 0x0, 0x0) 1m47.734698766s ago: executing program 0 (id=6303): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000001c0)={0x28, 0x1, 0x7, 0x101, 0x0, 0x0, {}, [@NFACCT_FILTER={0x14, 0x7, 0x0, 0x1, [@NFACCT_FILTER_MASK={0x8}, @NFACCT_FILTER_VALUE={0x20}]}]}, 0x28}}, 0x0) 1m47.710154877s ago: executing program 1 (id=6304): r0 = syz_open_dev$usbfs(&(0x7f0000000100), 0x77, 0x101301) ioctl$USBDEVFS_CONTROL(r0, 0xc0105500, &(0x7f0000000040)={0x0, 0x3, 0x7de, 0x101, 0x0, 0x8, 0x0}) 1m47.691727801s ago: executing program 3 (id=6305): r0 = syz_open_dev$sndctrl(&(0x7f0000000100), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000340)={{0xfffffffe, 0x0, 0x0, 0x0, 'syz0\x00', 0xffffffff}, 0x6, 0x2, 0x4, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 1m47.263948216s ago: executing program 1 (id=6307): r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000002c0), 0x80042, 0x0) ioctl$PTP_PEROUT_REQUEST2(r0, 0x40383d0c, &(0x7f0000000100)={{0xff, 0xfffffffa}, {0x0, 0x8}, 0x5, 0x7}) 1m47.189914201s ago: executing program 3 (id=6308): r0 = socket(0xa, 0x3, 0xff) getsockopt$sock_buf(r0, 0x1, 0x19, 0x0, &(0x7f0000000180)) 1m47.180478991s ago: executing program 0 (id=6309): r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_RES_PD_GET(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x28, 0x140e, 0x1, 0x70bd28, 0x25dfdbff, "", [@RDMA_NLDEV_ATTR_RES_PDN={0x8, 0x3c, 0x3}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x20}, 0x10) 1m46.913913944s ago: executing program 2 (id=6310): r0 = socket(0x2, 0x80802, 0x0) getsockopt$inet_opts(r0, 0x0, 0xf, &(0x7f0000000000)=""/2, &(0x7f00000001c0)=0x2) 1m46.841544006s ago: executing program 1 (id=6311): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000070000000900010073797a300000000070000000090a010400000000000000000700000008000a40000000020900020073797a30000000000900010073797a3000000000080005400000000d34001180090001006d6574610000000024000280080002400000000608000340000000110800024000000019080001"], 0xb8}}, 0x20050800) 1m46.788929172s ago: executing program 3 (id=6312): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000004c0)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x137b}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_STATS_PER_PORT={0x5, 0x2d, 0x1}, @IFLA_BR_VLAN_STATS_ENABLED={0x5}]}}}]}, 0x44}}, 0x40080) 1m46.779625878s ago: executing program 0 (id=6313): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=@newlink={0x38, 0x10, 0x421, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x900, 0x100}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gtp={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GTP_PDP_HASHSIZE={0x8, 0x3, 0x200004}]}}}]}, 0x38}, 0x1, 0x0, 0x0, 0x80}, 0x8000) 1m46.45031537s ago: executing program 2 (id=6314): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000f0f000000000700000a20000000000a01030000000000000000010000000900010073797a310000000040000000030a01020000000000000000010000000900030073797a320000000014000480080002400000000008000140000000050900010073797a31000000003c000000050a01020000000000000000010000000c00024000000000000000010900010073797a3100000000040004800b00070066696c746572"], 0xc4}}, 0xc000) 1m46.399903269s ago: executing program 1 (id=6315): r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000), 0x22301, 0x0) ioctl$SNDCTL_DSP_GETCAPS(r0, 0x8004500f, &(0x7f00000001c0)) 1m46.225330038s ago: executing program 0 (id=6316): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) get_robust_list(0xffffffffffffffff, 0x0, 0x0) 1m46.18872508s ago: executing program 3 (id=6317): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000340)=@newlink={0x30, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x15a11}, [@IFLA_LINKINFO={0x10, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x4}}}]}, 0x30}}, 0x44) 1m45.947573557s ago: executing program 2 (id=6318): r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000d80)={&(0x7f0000001c40)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000060000000400000000000007000000000000000061"], 0x0, 0x2a}, 0x28) bpf$MAP_CREATE(0xe4ffffff00000000, &(0x7f0000001000)=@base={0x10, 0x4, 0x4, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r0, 0x0, 0x1}, 0x48) 1m45.941006785s ago: executing program 1 (id=6319): r0 = signalfd(0xffffffffffffffff, &(0x7f00000001c0), 0x8) inotify_add_watch(r0, 0x0, 0xa4000960) 1m45.790046754s ago: executing program 0 (id=6320): sendmsg$NFULNL_MSG_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c000000010405"], 0x7c}}, 0x0) syz_usb_connect$uac1(0x0, 0x94, &(0x7f0000000200)=ANY=[@ANYBLOB="12010000000000106b1d01014000010203010902820003010000000904000000010100000a24010000000201020c24020000000000000000000904010000010200000904010101010200000724010000000009050109000000000007250101000000090402000001020000090402010101ff0f00092402020000000000072401000001100905"], 0x0) 1m45.702218024s ago: executing program 3 (id=6321): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000010000000900010073797a30000000003c000000200af501000000000000000001000000040004800900018073797a3000000000100005"], 0x84}}, 0x0) 1m45.560474932s ago: executing program 2 (id=6322): r0 = io_uring_setup(0x71b9, &(0x7f00000000c0)={0x0, 0xc63b}) io_uring_enter(r0, 0x0, 0x2, 0xf, &(0x7f0000000000)={[0x700]}, 0x18) 1m45.428138822s ago: executing program 1 (id=6323): r0 = syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f0000000400)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) syz_usb_ep_write$ath9k_ep1(r0, 0x82, 0x18, &(0x7f0000001b40)=ANY=[]) 1m45.136050865s ago: executing program 3 (id=6324): r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r0, 0x4b72, &(0x7f0000000100)={0x0, 0x0, 0x3f, 0x1, 0x200, &(0x7f0000000880)="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"}) 1m45.005661757s ago: executing program 2 (id=6325): r0 = syz_open_dev$video4linux(&(0x7f0000000000), 0x6, 0x189d80) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, 0x0) 1m44.747019768s ago: executing program 2 (id=6326): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) getsockopt$sock_int(r0, 0x1, 0x12, 0x0, &(0x7f0000000200)=0xb) 1m33.055513354s ago: executing program 32 (id=6233): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x100, 0xfd, 0x9, 0x1, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000000), &(0x7f0000000000), 0xcff5, r0}, 0x38) 1m13.703879421s ago: executing program 33 (id=6320): sendmsg$NFULNL_MSG_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c000000010405"], 0x7c}}, 0x0) syz_usb_connect$uac1(0x0, 0x94, &(0x7f0000000200)=ANY=[@ANYBLOB="12010000000000106b1d01014000010203010902820003010000000904000000010100000a24010000000201020c24020000000000000000000904010000010200000904010101010200000724010000000009050109000000000007250101000000090402000001020000090402010101ff0f00092402020000000000072401000001100905"], 0x0) 0s ago: executing program 34 (id=6323): r0 = syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f0000000400)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) syz_usb_ep_write$ath9k_ep1(r0, 0x82, 0x18, &(0x7f0000001b40)=ANY=[]) kernel console output (not intermixed with test programs): 537][T17928] netlink: 248 bytes leftover after parsing attributes in process `syz.0.5707'. [ 473.927757][ T5998] usb 3-1: USB disconnect, device number 97 [ 474.063794][T17934] netlink: 28 bytes leftover after parsing attributes in process `syz.4.5710'. [ 474.421926][ T30] kauditd_printk_skb: 22872 callbacks suppressed [ 474.421945][ T30] audit: type=1400 audit(1753723561.912:437940): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="virtual" dev="sysfs" ino=1370 [ 474.448249][T17942] audit: audit_backlog=65 > audit_backlog_limit=64 [ 474.448375][ T5207] audit: audit_backlog=65 > audit_backlog_limit=64 [ 474.466440][ T5850] audit: audit_backlog=65 > audit_backlog_limit=64 [ 474.476916][T17942] audit: audit_lost=63897 audit_rate_limit=0 audit_backlog_limit=64 [ 474.478644][ T10] ath9k_htc 3-1:1.0: ath9k_htc: Target is unresponsive [ 474.487520][T17945] audit: audit_backlog=65 > audit_backlog_limit=64 [ 474.496456][T17946] audit: audit_backlog=65 > audit_backlog_limit=64 [ 474.505300][T17944] audit: audit_backlog=65 > audit_backlog_limit=64 [ 474.512421][ T5850] audit: audit_lost=63898 audit_rate_limit=0 audit_backlog_limit=64 [ 474.513145][T17946] audit: audit_lost=63899 audit_rate_limit=0 audit_backlog_limit=64 [ 474.532326][ T10] ath9k_htc: Failed to initialize the device [ 474.540918][ T5998] usb 3-1: ath9k_htc: USB layer deinitialized [ 474.829071][T17958] netlink: 96 bytes leftover after parsing attributes in process `syz.0.5721'. [ 475.441399][ T5998] usb 2-1: new high-speed USB device number 25 using dummy_hcd [ 475.483334][T17991] : renamed from bond_slave_0 [ 475.613556][ T5998] usb 2-1: Using ep0 maxpacket: 16 [ 475.663688][ T5998] usb 2-1: New USB device found, idVendor=17ef, idProduct=720c, bcdDevice=51.90 [ 475.686281][ T5998] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 475.718291][ T5998] usb 2-1: Product: syz [ 475.741351][ T5998] usb 2-1: Manufacturer: syz [ 475.756922][ T5998] usb 2-1: SerialNumber: syz [ 475.795590][ T5998] r8152-cfgselector 2-1: Unknown version 0x0000 [ 475.808660][ T5998] r8152-cfgselector 2-1: config 0 descriptor?? [ 476.000933][T18012] cgroup: none used incorrectly [ 476.076801][ T980] r8152-cfgselector 2-1: USB disconnect, device number 25 [ 476.753728][T18043] XFS (nbd3): no-recovery mounts must be read-only. [ 477.386425][T18072] tmpfs: Bad value for 'mpol' [ 477.909631][T18093] syz.1.5776 (18093): /proc/18092/oom_adj is deprecated, please use /proc/18092/oom_score_adj instead. [ 478.551525][T18106] netlink: 44 bytes leftover after parsing attributes in process `syz.1.5779'. [ 478.623211][T18106] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 479.194423][ T30] kauditd_printk_skb: 28047 callbacks suppressed [ 479.194440][ T30] audit: type=1400 audit(1753723566.930:453097): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=18139 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 479.203547][T18137] xt_TCPMSS: Only works on TCP SYN packets [ 479.234155][T18139] audit: audit_backlog=65 > audit_backlog_limit=64 [ 479.241566][T18141] audit: audit_backlog=65 > audit_backlog_limit=64 [ 479.254793][ T30] audit: type=1400 audit(1753723566.930:453098): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=18139 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 479.258835][ T5851] audit: audit_backlog=65 > audit_backlog_limit=64 [ 479.275104][ C0] audit: audit_backlog=65 > audit_backlog_limit=64 [ 479.281568][ T5207] audit: audit_backlog=65 > audit_backlog_limit=64 [ 479.287753][ C0] audit: audit_lost=68197 audit_rate_limit=0 audit_backlog_limit=64 [ 479.294479][T18141] audit: audit_lost=68198 audit_rate_limit=0 audit_backlog_limit=64 [ 479.302273][ C0] audit: backlog limit exceeded [ 479.329534][T18142] A link change request failed with some changes committed already. Interface netdevsim0 may have been left with an inconsistent configuration, please check. [ 479.408976][T18145] Smack: duplicate mount options [ 479.885861][T18163] netlink: 16 bytes leftover after parsing attributes in process `syz.2.5807'. [ 479.930635][T18163] netlink: 16 bytes leftover after parsing attributes in process `syz.2.5807'. [ 480.071268][T18171] openvswitch: netlink: IP tunnel dst address not specified [ 480.385486][ T5959] usb 2-1: new high-speed USB device number 26 using dummy_hcd [ 480.568830][ T5959] usb 2-1: Using ep0 maxpacket: 16 [ 480.605913][ T5959] usb 2-1: New USB device found, idVendor=06b9, idProduct=4061, bcdDevice= 1.88 [ 480.625609][ T5959] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 480.649602][ T5959] usb 2-1: Product: syz [ 480.665381][ T5959] usb 2-1: Manufacturer: syz [ 480.670139][ T5959] usb 2-1: SerialNumber: syz [ 480.705145][ T5959] usb 2-1: config 0 descriptor?? [ 480.809994][T18203] netlink: 3696 bytes leftover after parsing attributes in process `syz.4.5827'. [ 480.838410][T18203] netlink: 3696 bytes leftover after parsing attributes in process `syz.4.5827'. [ 480.957095][ T5959] speedtch 2-1:0.0: speedtch_bind: data interface not found! [ 480.964539][ T5959] speedtch 2-1:0.0: usbatm_usb_probe: bind failed: -19! [ 481.141145][ T980] usb 2-1: USB disconnect, device number 26 [ 481.259187][T18215] usb usb9: Requested nonsensical USBDEVFS_URB_SHORT_NOT_OK. [ 481.282622][T18215] usb usb9: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 482.333691][T18263] netlink: 4 bytes leftover after parsing attributes in process `syz.1.5855'. [ 482.709858][ T980] usb 4-1: new high-speed USB device number 3 using dummy_hcd [ 482.718348][T18279] comedi comedi0: comedi_test: 236 microvolt, 100000 microsecond waveform attached [ 482.892657][ T980] usb 4-1: Using ep0 maxpacket: 8 [ 482.921113][ T980] usb 4-1: New USB device found, idVendor=2770, idProduct=930c, bcdDevice=8d.6a [ 482.948113][ T980] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 482.978820][ T980] usb 4-1: Product: syz [ 482.983037][ T980] usb 4-1: Manufacturer: syz [ 483.004798][ T980] usb 4-1: SerialNumber: syz [ 483.027208][ T980] usb 4-1: config 0 descriptor?? [ 483.049927][T18291] overlay: Unknown parameter '\eiserfs' [ 483.061177][ T980] gspca_main: sq930x-2.14.0 probing 2770:930c [ 483.469777][ T980] gspca_sq930x: ucbus_write failed -71 [ 483.476033][ T980] sq930x 4-1:0.0: probe with driver sq930x failed with error -71 [ 483.492693][ T980] usb 4-1: USB disconnect, device number 3 [ 483.973398][ T5862] audit_log_start: 22347 callbacks suppressed [ 483.973415][ T5862] audit: audit_backlog=65 > audit_backlog_limit=64 [ 483.976593][ T30] audit: type=1400 audit(1753723571.927:468644): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="/" dev="sda1" ino=2 [ 484.005794][ T5856] audit: audit_backlog=65 > audit_backlog_limit=64 [ 484.005851][T18324] audit: audit_backlog=66 > audit_backlog_limit=64 [ 484.012399][ T5856] audit: audit_lost=70467 audit_rate_limit=0 audit_backlog_limit=64 [ 484.019106][ T5207] audit: audit_backlog=67 > audit_backlog_limit=64 [ 484.019122][ T5207] audit: audit_lost=70468 audit_rate_limit=0 audit_backlog_limit=64 [ 484.019136][ T5207] audit: backlog limit exceeded [ 484.019203][ T5207] audit: audit_backlog=67 > audit_backlog_limit=64 [ 484.019216][ T5207] audit: audit_lost=70469 audit_rate_limit=0 audit_backlog_limit=64 [ 484.085898][T18325] netlink: 4 bytes leftover after parsing attributes in process `syz.1.5885'. [ 484.115225][T18327] netlink: 8 bytes leftover after parsing attributes in process `syz.4.5888'. [ 484.160526][T18327] (unnamed net_device) (uninitialized): option resend_igmp: invalid value (511) [ 484.206701][T18327] (unnamed net_device) (uninitialized): option resend_igmp: allowed values 0 - 255 [ 484.434564][T18342] netlink: 'syz.2.5893': attribute type 10 has an invalid length. [ 484.504326][T18342] team0: Device ipvlan1 failed to register rx_handler [ 484.610015][T18342] syz.2.5893 (18342) used greatest stack depth: 19480 bytes left [ 485.311656][T18379] usb usb1: usbfs: process 18379 (syz.4.5912) did not claim interface 0 before use [ 485.529204][T18392] netlink: 'syz.1.5918': attribute type 1 has an invalid length. [ 485.547342][T18392] netlink: 224 bytes leftover after parsing attributes in process `syz.1.5918'. [ 486.175772][T18426] netlink: 16 bytes leftover after parsing attributes in process `syz.2.5933'. [ 486.262616][ T5998] usb 4-1: new full-speed USB device number 4 using dummy_hcd [ 486.440255][ T5998] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x83 has an invalid bInterval 52, changing to 4 [ 486.463729][ T5998] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x83 has invalid maxpacket 13368, setting to 1023 [ 486.505868][ T5998] usb 4-1: New USB device found, idVendor=134c, idProduct=0002, bcdDevice=ec.7e [ 486.531564][ T5998] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 486.557735][ T5998] usb 4-1: Product: syz [ 486.564926][ T5998] usb 4-1: Manufacturer: syz [ 486.579636][ T5998] usb 4-1: SerialNumber: syz [ 486.600489][ T5998] usb 4-1: config 0 descriptor?? [ 486.624710][T18438] netlink: 28 bytes leftover after parsing attributes in process `syz.1.5939'. [ 486.645546][ T5998] hub 4-1:0.0: bad descriptor, ignoring hub [ 486.667373][T18438] netlink: 28 bytes leftover after parsing attributes in process `syz.1.5939'. [ 486.676828][ T5998] hub 4-1:0.0: probe with driver hub failed with error -5 [ 486.705544][ T5998] input: syz syz as /devices/platform/dummy_hcd.3/usb4/4-1/4-1:0.0/input/input66 [ 486.721960][ T1302] ieee802154 phy1 wpan1: encryption failed: -22 [ 487.245284][T18458] netlink: 64 bytes leftover after parsing attributes in process `syz.1.5948'. [ 487.339296][ T5916] usb 4-1: USB disconnect, device number 4 [ 487.390310][T18464] netlink: 8 bytes leftover after parsing attributes in process `syz.1.5951'. [ 487.489957][T18460] bond3: entered promiscuous mode [ 487.547191][T18460] bond3: entered allmulticast mode [ 487.550996][T18470] netlink: 'syz.4.5952': attribute type 10 has an invalid length. [ 487.569713][T18460] 8021q: adding VLAN 0 to HW filter on device bond3 [ 487.582004][T18470] netlink: 40 bytes leftover after parsing attributes in process `syz.4.5952'. [ 487.630316][T18470] dummy0: entered promiscuous mode [ 487.648979][T18470] bridge0: port 3(dummy0) entered blocking state [ 487.658892][T18470] bridge0: port 3(dummy0) entered disabled state [ 487.668113][T18470] dummy0: entered allmulticast mode [ 487.944832][T18480] netlink: 64 bytes leftover after parsing attributes in process `syz.3.5956'. [ 488.567677][ T980] usb 2-1: new full-speed USB device number 27 using dummy_hcd [ 488.630471][T18517] netlink: 'syz.3.5975': attribute type 3 has an invalid length. [ 488.739669][ T30] kauditd_printk_skb: 28822 callbacks suppressed [ 488.739687][ T30] audit: type=1400 audit(1753723576.945:486127): lsm=SMACK fn=smack_file_ioctl action=granted subject="_" object="_" requested=w pid=18499 comm="syz.1.5966" path="/dev/raw-gadget" dev="devtmpfs" ino=820 [ 488.769104][ T980] usb 2-1: not running at top speed; connect to a high speed hub [ 488.804837][ T980] usb 2-1: config 95 has an invalid interface number: 1 but max is 0 [ 488.809412][T18524] audit: audit_backlog=65 > audit_backlog_limit=64 [ 488.813093][ T980] usb 2-1: config 95 has no interface number 0 [ 488.819888][T18524] audit: audit_lost=74250 audit_rate_limit=0 audit_backlog_limit=64 [ 488.819908][T18524] audit: backlog limit exceeded [ 488.820743][T18523] audit: audit_backlog=65 > audit_backlog_limit=64 [ 488.834591][ T30] audit: type=1400 audit(1753723576.945:486128): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=18521 comm="syz-executor" name="1198" dev="tmpfs" ino=6015 [ 488.844242][T18524] audit: audit_backlog=65 > audit_backlog_limit=64 [ 488.847537][ T980] usb 2-1: config 95 interface 1 has no altsetting 0 [ 488.867458][ T5862] audit: audit_backlog=65 > audit_backlog_limit=64 [ 488.880122][ C0] audit: audit_backlog=65 > audit_backlog_limit=64 [ 488.880146][ C0] audit: audit_lost=74251 audit_rate_limit=0 audit_backlog_limit=64 [ 488.903050][ T5916] usb 5-1: new high-speed USB device number 15 using dummy_hcd [ 488.917337][ T980] usb 2-1: string descriptor 0 read error: -22 [ 488.927809][ T980] usb 2-1: New USB device found, idVendor=0763, idProduct=2030, bcdDevice=79.79 [ 488.946477][ T980] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 489.080434][ T5916] usb 5-1: Using ep0 maxpacket: 16 [ 489.107005][ T5916] usb 5-1: config 254 has an invalid interface number: 235 but max is 0 [ 489.133517][ T5916] usb 5-1: config 254 has no interface number 0 [ 489.153966][ T5916] usb 5-1: config 254 interface 235 altsetting 2 bulk endpoint 0x6 has invalid maxpacket 32 [ 489.201635][ T5916] usb 5-1: config 254 interface 235 has no altsetting 0 [ 489.246982][ T5916] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a0, bcdDevice=2b.f1 [ 489.288077][ T5916] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 489.321715][ T5916] usb 5-1: Product: syz [ 489.325945][ T5916] usb 5-1: Manufacturer: syz [ 489.359184][ T5916] usb 5-1: SerialNumber: syz [ 489.367730][ T5959] usb 2-1: USB disconnect, device number 27 [ 489.421973][T18518] raw-gadget.1 gadget.4: fail, usb_ep_enable returned -22 [ 489.681272][T18518] raw-gadget.1 gadget.4: fail, usb_ep_enable returned -22 [ 489.717713][ T5916] usbtest 5-1:254.235: Linux gadget zero [ 489.744598][ T5916] usbtest 5-1:254.235: high-speed {control in/out bulk-in bulk-out} tests (+alt) [ 489.916083][T18550] __nla_validate_parse: 3 callbacks suppressed [ 489.916103][T18550] netlink: 6 bytes leftover after parsing attributes in process `syz.2.5987'. [ 489.987585][T18550] netlink: 6 bytes leftover after parsing attributes in process `syz.2.5987'. [ 489.998779][ T5916] usb 5-1: USB disconnect, device number 15 [ 490.114071][T18555] gtp0: entered promiscuous mode [ 490.130206][T18555] gtp0: entered allmulticast mode [ 490.597119][T18572] comedi comedi2: multiq3: I/O port conflict (0x40,16) [ 491.096656][T18597] Invalid source name [ 491.974837][T18636] random: crng reseeded on system resumption [ 492.049409][T18636] Restarting kernel threads ... [ 492.067955][T18636] Done restarting kernel threads. [ 492.324243][T18650] openvswitch: netlink: Flow actions may not be safe on all matching packets. [ 492.504483][T18656] netlink: 5404 bytes leftover after parsing attributes in process `syz.4.6036'. [ 492.529589][T18656] netlink: 5404 bytes leftover after parsing attributes in process `syz.4.6036'. [ 493.042176][T18684] overlayfs: conflicting options: nfs_export=on,index=off [ 493.183353][T18690] netlink: 36 bytes leftover after parsing attributes in process `syz.1.6053'. [ 493.210444][T18690] netlink: 16 bytes leftover after parsing attributes in process `syz.1.6053'. [ 493.269952][T18692] netlink: 8 bytes leftover after parsing attributes in process `syz.0.6054'. [ 493.525974][ T30] kauditd_printk_skb: 24867 callbacks suppressed [ 493.525992][ T30] audit: type=1400 audit(1753723581.963:505061): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5856 comm="syz-executor" name="1216" dev="tmpfs" ino=6111 [ 493.544569][ T5863] audit: audit_backlog=65 > audit_backlog_limit=64 [ 493.560990][ C0] audit: audit_backlog=65 > audit_backlog_limit=64 [ 493.561061][ T5851] audit: audit_backlog=65 > audit_backlog_limit=64 [ 493.567598][ C0] audit: audit_lost=76231 audit_rate_limit=0 audit_backlog_limit=64 [ 493.582230][ C0] audit: backlog limit exceeded [ 493.585932][ T5863] audit: audit_lost=76232 audit_rate_limit=0 audit_backlog_limit=64 [ 493.588763][ C0] audit: audit_backlog=65 > audit_backlog_limit=64 [ 493.597063][ T5851] audit: audit_lost=76233 audit_rate_limit=0 audit_backlog_limit=64 [ 493.601794][ C0] audit: audit_lost=76234 audit_rate_limit=0 audit_backlog_limit=64 [ 494.076249][T18728] netlink: 'syz.4.6072': attribute type 12 has an invalid length. [ 494.102458][T18728] netlink: 132 bytes leftover after parsing attributes in process `syz.4.6072'. [ 494.807056][ T980] usb 5-1: new high-speed USB device number 16 using dummy_hcd [ 494.988105][ T980] usb 5-1: Using ep0 maxpacket: 32 [ 495.002872][ T980] usb 5-1: config 1 interface 0 altsetting 6 bulk endpoint 0x82 has invalid maxpacket 1024 [ 495.026453][ T980] usb 5-1: config 1 interface 0 altsetting 6 endpoint 0x3 has invalid wMaxPacketSize 0 [ 495.064144][ T980] usb 5-1: config 1 interface 0 altsetting 6 bulk endpoint 0x3 has invalid maxpacket 0 [ 495.102873][ T980] usb 5-1: config 1 interface 0 altsetting 6 has 2 endpoint descriptors, different from the interface descriptor's value: 3 [ 495.165144][ T980] usb 5-1: config 1 interface 0 has no altsetting 0 [ 495.184382][ T980] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 495.214721][ T980] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 495.250757][ T980] usb 5-1: Product: syz [ 495.264188][ T980] usb 5-1: Manufacturer: syz [ 495.281903][ T980] usb 5-1: SerialNumber: syz [ 495.307276][T18750] raw-gadget.0 gadget.4: fail, usb_ep_enable returned -22 [ 495.561872][ T980] usb 5-1: bad CDC descriptors [ 495.623149][ T980] usb 5-1: USB disconnect, device number 16 [ 495.934969][T18802] xt_bpf: check failed: parse error [ 496.316419][T18821] vlan1: left promiscuous mode [ 497.093180][T18849] netlink: 'syz.1.6132': attribute type 2 has an invalid length. [ 497.709181][T18871] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 497.716901][T18871] IPv6: NLM_F_CREATE should be set when creating new route [ 497.724258][T18871] IPv6: NLM_F_CREATE should be set when creating new route [ 497.904887][ T5916] usb 2-1: new high-speed USB device number 28 using dummy_hcd [ 498.070849][ T5916] usb 2-1: New USB device found, idVendor=0af0, idProduct=7a05, bcdDevice= 0.00 [ 498.084219][ T5916] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 498.113790][ T5916] usb 2-1: Product: syz [ 498.118011][ T5916] usb 2-1: Manufacturer: syz [ 498.134974][ T5916] usb 2-1: SerialNumber: syz [ 498.160052][ T5916] usb 2-1: config 0 descriptor?? [ 498.301178][ T30] kauditd_printk_skb: 25876 callbacks suppressed [ 498.301197][ T30] audit: type=1400 audit(1753723586.971:522280): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=18893 comm="syz-executor" name="1230" dev="tmpfs" ino=6181 [ 498.334829][ T5863] audit: audit_backlog=65 > audit_backlog_limit=64 [ 498.342176][T18893] audit: audit_backlog=65 > audit_backlog_limit=64 [ 498.351651][T18892] audit: audit_backlog=66 > audit_backlog_limit=64 [ 498.351777][ T30] audit: type=1400 audit(1753723586.971:522281): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=18893 comm="syz-executor" name="1230" dev="tmpfs" ino=6181 [ 498.361501][T18893] audit: audit_lost=79120 audit_rate_limit=0 audit_backlog_limit=64 [ 498.377566][ C0] vkms_vblank_simulate: vblank timer overrun [ 498.382936][T18869] audit: audit_backlog=65 > audit_backlog_limit=64 [ 498.386301][ C0] audit: audit_backlog=65 > audit_backlog_limit=64 [ 498.386334][ C0] audit: audit_lost=79121 audit_rate_limit=0 audit_backlog_limit=64 [ 498.386351][ C0] audit: backlog limit exceeded [ 498.404304][T18895] netlink: 56 bytes leftover after parsing attributes in process `syz.2.6154'. [ 498.457423][ T5916] hso 2-1:0.0: Failed to find BULK IN ep [ 498.478287][ T5916] usb-storage 2-1:0.0: USB Mass Storage device detected [ 498.665368][ T980] usb 2-1: USB disconnect, device number 28 [ 499.186880][T18931] pci 0000:00:05.0: vgaarb: VGA decodes changed: olddecodes=io+mem,decodes=none:owns=io+mem [ 499.385164][T18938] overlayfs: option "uuid=on" requires an upper fs, falling back to uuid=null. [ 499.418017][ T5959] usb 1-1: new high-speed USB device number 13 using dummy_hcd [ 499.430451][T18938] overlayfs: missing 'lowerdir' [ 499.599891][ T5959] usb 1-1: Using ep0 maxpacket: 16 [ 499.609082][ T5959] usb 1-1: config 0 has an invalid interface number: 107 but max is 0 [ 499.611107][ T5998] usb 5-1: new high-speed USB device number 17 using dummy_hcd [ 499.617283][ T5959] usb 1-1: config 0 has no interface number 0 [ 499.617333][ T5959] usb 1-1: config 0 interface 107 altsetting 0 endpoint 0x88 has an invalid bInterval 41, changing to 9 [ 499.617359][ T5959] usb 1-1: config 0 interface 107 altsetting 0 endpoint 0x88 has invalid maxpacket 16848, setting to 1024 [ 499.630247][ T5959] usb 1-1: New USB device found, idVendor=06cd, idProduct=0131, bcdDevice=16.60 [ 499.681998][ T5959] usb 1-1: New USB device strings: Mfr=175, Product=2, SerialNumber=3 [ 499.693044][ T5959] usb 1-1: Product: syz [ 499.697977][ T5959] usb 1-1: Manufacturer: syz [ 499.703249][ T5959] usb 1-1: SerialNumber: syz [ 499.719049][ T5959] usb 1-1: config 0 descriptor?? [ 499.737335][ T5959] keyspan 1-1:0.107: Keyspan 4 port adapter converter detected [ 499.755303][ T5959] keyspan 1-1:0.107: found no endpoint descriptor for endpoint 81 [ 499.796613][ T5959] keyspan 1-1:0.107: found no endpoint descriptor for endpoint 1 [ 499.798611][ T5998] usb 5-1: Using ep0 maxpacket: 8 [ 499.836694][ T5959] usb 1-1: Keyspan 4 port adapter converter now attached to ttyUSB0 [ 499.848932][ T5998] usb 5-1: New USB device found, idVendor=047d, idProduct=5003, bcdDevice=2f.8c [ 499.868667][ T5959] keyspan 1-1:0.107: found no endpoint descriptor for endpoint 2 [ 499.875772][ T5998] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 499.917703][ T5998] usb 5-1: Product: syz [ 499.921922][ T5998] usb 5-1: Manufacturer: syz [ 499.923033][ T5959] usb 1-1: Keyspan 4 port adapter converter now attached to ttyUSB1 [ 499.976115][ T5959] keyspan 1-1:0.107: found no endpoint descriptor for endpoint 4 [ 499.981341][ T5998] usb 5-1: SerialNumber: syz [ 500.006010][ T5998] usb 5-1: config 0 descriptor?? [ 500.019371][ T5959] usb 1-1: Keyspan 4 port adapter converter now attached to ttyUSB2 [ 500.054333][ T5959] keyspan 1-1:0.107: found no endpoint descriptor for endpoint 6 [ 500.062118][ T5998] gspca_main: se401-2.14.0 probing 047d:5003 [ 500.145372][ T5959] usb 1-1: Keyspan 4 port adapter converter now attached to ttyUSB3 [ 500.214766][ T5959] usb 1-1: USB disconnect, device number 13 [ 500.275490][ T5959] keyspan_4 ttyUSB0: Keyspan 4 port adapter converter now disconnected from ttyUSB0 [ 500.341466][ T5959] keyspan_4 ttyUSB1: Keyspan 4 port adapter converter now disconnected from ttyUSB1 [ 500.409164][ T5959] keyspan_4 ttyUSB2: Keyspan 4 port adapter converter now disconnected from ttyUSB2 [ 500.465942][ T5998] gspca_se401: write req failed req 0x57 val 0x00 error -71 [ 500.478369][ T5959] keyspan_4 ttyUSB3: Keyspan 4 port adapter converter now disconnected from ttyUSB3 [ 500.486002][ T5998] se401 5-1:0.0: probe with driver se401 failed with error -71 [ 500.553003][ T5959] keyspan 1-1:0.107: device disconnected [ 500.566770][ T5998] usb 5-1: USB disconnect, device number 17 [ 501.286757][ T5959] usb 3-1: new high-speed USB device number 98 using dummy_hcd [ 501.430089][T19004] netlink: 'syz.1.6206': attribute type 2 has an invalid length. [ 501.454529][ T5959] usb 3-1: Using ep0 maxpacket: 8 [ 501.515667][ T5959] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x85 has invalid maxpacket 62432, setting to 1024 [ 501.539220][ T5959] usb 3-1: config 0 interface 0 altsetting 0 bulk endpoint 0x85 has invalid maxpacket 1024 [ 501.558354][ T5959] usb 3-1: New USB device found, idVendor=0af0, idProduct=6751, bcdDevice=75.8b [ 501.568464][ T5959] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 501.624906][ T5959] usb 3-1: config 0 descriptor?? [ 501.636164][T18987] raw-gadget.0 gadget.2: fail, usb_ep_enable returned -22 [ 501.667347][ T5959] hso 3-1:0.0: Can't find BULK OUT endpoint [ 501.953082][ T5959] usb 3-1: USB disconnect, device number 98 [ 502.077039][T19024] netlink: 'syz.4.6216': attribute type 21 has an invalid length. [ 502.238798][T19032] openvswitch: netlink: Flow actions may not be safe on all matching packets. [ 502.488706][T19041] bridge0: port 4(veth0_to_bridge) entered blocking state [ 502.532602][T19041] bridge0: port 4(veth0_to_bridge) entered disabled state [ 502.545123][T19041] veth0_to_bridge: entered allmulticast mode [ 502.584407][T19041] veth0_to_bridge: entered promiscuous mode [ 502.601460][T19041] bridge0: adding interface veth0_to_bridge with same address as a received packet (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 502.676636][T19041] bridge0: port 4(veth0_to_bridge) entered blocking state [ 502.683990][T19041] bridge0: port 4(veth0_to_bridge) entered forwarding state [ 502.899191][T19058] openvswitch: netlink: Missing key (keys=40, expected=100) [ 503.069028][ T30] kauditd_printk_skb: 28208 callbacks suppressed [ 503.069045][ T30] audit: type=1400 audit(1753723591.978:541603): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=19062 comm="syz-executor" path="/proc/2650/oom_score_adj" dev="proc" ino=47875 [ 503.073149][ T5207] audit: audit_backlog=65 > audit_backlog_limit=64 [ 503.080402][T19062] audit: audit_backlog=65 > audit_backlog_limit=64 [ 503.096269][ C0] vkms_vblank_simulate: vblank timer overrun [ 503.132669][ T30] audit: type=1400 audit(1753723591.989:541604): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=5207 comm="udevd" path="/sys/devices/virtual/block/loop1/integrity" dev="sysfs" ino=15041 [ 503.163163][ T5850] audit: audit_backlog=65 > audit_backlog_limit=64 [ 503.169812][ T5850] audit: audit_lost=82085 audit_rate_limit=0 audit_backlog_limit=64 [ 503.172171][ C0] audit: audit_backlog=65 > audit_backlog_limit=64 [ 503.184503][ C0] audit: audit_lost=82086 audit_rate_limit=0 audit_backlog_limit=64 [ 503.192620][ C0] audit: backlog limit exceeded [ 503.198319][ C0] audit: audit_backlog=65 > audit_backlog_limit=64 [ 503.709489][T19071] netlink: 'syz.1.6239': attribute type 39 has an invalid length. [ 504.155248][T19077] binder: 19076:19077 unknown command 0 [ 504.172209][T19077] binder: 19076:19077 ioctl c0306201 200000000480 returned -22 [ 504.187433][T19079] tmpfs: Bad value for 'mpol' [ 504.775746][T19088] netlink: 12 bytes leftover after parsing attributes in process `syz.0.6247'. [ 505.346279][T19101] netlink: 24 bytes leftover after parsing attributes in process `syz.3.6254'. [ 507.480949][T19145] openvswitch: netlink: nsh attribute has 2 unknown bytes. [ 507.505939][T19144] netlink: 16 bytes leftover after parsing attributes in process `syz.3.6274'. [ 507.843453][ T30] kauditd_printk_skb: 9454 callbacks suppressed [ 507.843470][ T30] audit: type=1400 audit(1753723596.954:548257): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="block" dev="sysfs" ino=13135 [ 507.918896][T19150] audit: audit_backlog=65 > audit_backlog_limit=64 [ 507.925908][ T5207] audit: audit_backlog=65 > audit_backlog_limit=64 [ 507.932641][ T5207] audit: audit_lost=83012 audit_rate_limit=0 audit_backlog_limit=64 [ 507.951578][T19151] audit: audit_backlog=65 > audit_backlog_limit=64 [ 507.968665][T19150] audit: audit_lost=83013 audit_rate_limit=0 audit_backlog_limit=64 [ 507.979157][ T5863] audit: audit_backlog=65 > audit_backlog_limit=64 [ 507.994749][T19151] audit: audit_lost=83014 audit_rate_limit=0 audit_backlog_limit=64 [ 508.006808][ T5851] audit: audit_backlog=65 > audit_backlog_limit=64 [ 508.016908][ T5207] audit: backlog limit exceeded [ 509.413257][T19177] netlink: 16 bytes leftover after parsing attributes in process `syz.3.6291'. [ 509.418457][ T23] sched: DL replenish lagged too much [ 510.611099][T19199] openvswitch: netlink: Flow actions may not be safe on all matching packets. [ 510.710548][T19203] netlink: 8 bytes leftover after parsing attributes in process `syz.0.6303'. [ 511.693157][T19219] bridge1: entered promiscuous mode [ 511.739591][T19219] bridge1: entered allmulticast mode [ 512.611364][ T30] kauditd_printk_skb: 12264 callbacks suppressed [ 512.611384][ T30] audit: type=1400 audit(1753723601.994:556714): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=19234 comm="syz.0.6320" name="newroot" dev="tmpfs" ino=2 [ 512.645934][ T5848] audit: audit_backlog=65 > audit_backlog_limit=64 [ 512.653037][ T5862] audit: audit_backlog=66 > audit_backlog_limit=64 [ 512.668528][T19235] audit: audit_backlog=66 > audit_backlog_limit=64 [ 512.675171][T19235] audit: audit_lost=84294 audit_rate_limit=0 audit_backlog_limit=64 [ 512.686890][ T5851] audit: audit_backlog=66 > audit_backlog_limit=64 [ 512.693462][ T5851] audit: audit_lost=84295 audit_rate_limit=0 audit_backlog_limit=64 [ 512.704839][ C0] audit: audit_backlog=66 > audit_backlog_limit=64 [ 512.711499][ C0] audit: audit_lost=84296 audit_rate_limit=0 audit_backlog_limit=64 [ 512.719887][ C0] audit: backlog limit exceeded [ 512.785066][T19237] netlink: 'syz.3.6321': attribute type 5 has an invalid length. [ 512.823772][T19237] netlink: 8 bytes leftover after parsing attributes in process `syz.3.6321'. [ 512.876993][ T5998] usb 1-1: new high-speed USB device number 14 using dummy_hcd [ 513.048585][ T5998] usb 1-1: Using ep0 maxpacket: 16 [ 513.087527][ T5998] usb 1-1: config 1 contains an unexpected descriptor of type 0x2, skipping [ 513.129127][ T5998] usb 1-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 513.180472][ T5998] usb 1-1: config 1 has 2 interfaces, different from the descriptor's value: 3 [ 513.215336][ T5998] usb 1-1: config 1 has no interface number 1 [ 513.237581][ T5998] usb 1-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 513.261141][ T5916] usb 2-1: new high-speed USB device number 29 using dummy_hcd [ 513.301197][ T5998] usb 1-1: config 1 interface 2 altsetting 1 endpoint 0x5 has invalid wMaxPacketSize 0 [ 513.318621][ T5998] usb 1-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 513.318653][ T5998] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 513.318673][ T5998] usb 1-1: Product: syz [ 513.318689][ T5998] usb 1-1: Manufacturer: syz [ 513.318704][ T5998] usb 1-1: SerialNumber: syz [ 513.425286][ T5916] usb 2-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 513.425340][ T5916] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 513.425362][ T5916] usb 2-1: Product: syz [ 513.425377][ T5916] usb 2-1: Manufacturer: syz [ 513.425392][ T5916] usb 2-1: SerialNumber: syz [ 513.469264][ T5916] usb 2-1: ath9k_htc: Firmware ath9k_htc/htc_9271-1.4.0.fw requested [ 513.572403][ T10] usb 2-1: ath9k_htc: Transferred FW: ath9k_htc/htc_9271-1.4.0.fw, size: 51008 [ 514.589354][ T5998] usb 1-1: USB disconnect, device number 14 [ 514.646438][ T10] ath9k_htc 2-1:1.0: ath9k_htc: Target is unresponsive [ 514.646633][ T10] ath9k_htc: Failed to initialize the device [ 517.666327][ T30] kauditd_printk_skb: 3618 callbacks suppressed [ 517.666347][ T30] audit: type=1400 audit(1753723607.295:558381): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=19247 comm="syz-executor" name="1273" dev="tmpfs" ino=6394 [ 517.786898][ T30] audit: type=1400 audit(1753723607.421:558382): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=5863 comm="syz-executor" saddr=10.128.0.169 src=30008 daddr=10.128.10.27 dest=44238 netif=eth0 [ 518.299933][ T30] audit: type=1400 audit(1753723607.935:558383): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=6858 comm="udevd" name="data" dev="tmpfs" ino=14 [ 518.886628][ T30] audit: type=1400 audit(1753723608.555:558384): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=5824 comm="syz-executor" saddr=10.128.0.169 src=30008 daddr=10.128.10.27 dest=44238 netif=eth0 [ 518.886684][ T30] audit: type=1400 audit(1753723608.555:558385): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=5824 comm="syz-executor" saddr=10.128.0.169 src=30008 daddr=10.128.10.27 dest=44238 netif=eth0 [ 518.886748][ T30] audit: type=1400 audit(1753723608.555:558386): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=5824 comm="syz-executor" saddr=10.128.0.169 src=30008 daddr=10.128.10.27 dest=44238 netif=eth0 [ 518.886797][ T30] audit: type=1400 audit(1753723608.555:558387): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=5824 comm="syz-executor" saddr=10.128.0.169 src=30008 daddr=10.128.10.27 dest=44238 netif=eth0 [ 518.920059][ T30] audit: type=1400 audit(1753723608.607:558388): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5848 comm="udevd" name="/" dev="sda1" ino=2 [ 518.920115][ T30] audit: type=1400 audit(1753723608.607:558389): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5848 comm="udevd" name="/" dev="sysfs" ino=1 [ 518.920157][ T30] audit: type=1400 audit(1753723608.607:558390): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5848 comm="udevd" name="devices" dev="sysfs" ino=7 [ 519.666559][ T10] usb 2-1: ath9k_htc: USB layer deinitialized [ 522.821480][ T30] kauditd_printk_skb: 70 callbacks suppressed [ 522.821501][ T30] audit: type=1400 audit(1753723612.712:558460): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1338 comm="kworker/u8:7" saddr=10.128.0.169 src=30008 daddr=10.128.10.27 dest=44238 netif=eth0 [ 523.001773][ T30] audit: type=1400 audit(1753723612.911:558461): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5207 comm="udevd" path="/etc/udev/hwdb.bin" dev="sda1" ino=260 [ 523.001826][ T30] audit: type=1400 audit(1753723612.911:558462): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="/" dev="sda1" ino=2 [ 523.001866][ T30] audit: type=1400 audit(1753723612.911:558463): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="/" dev="tmpfs" ino=1 [ 523.001906][ T30] audit: type=1400 audit(1753723612.911:558464): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="udev" dev="tmpfs" ino=9 [ 523.001945][ T30] audit: type=1400 audit(1753723612.911:558465): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=w pid=5207 comm="udevd" name="queue" dev="tmpfs" ino=13088 [ 523.001984][ T30] audit: type=1400 audit(1753723612.911:558466): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=5207 comm="udevd" path="/run/udev/queue" dev="tmpfs" ino=13088 [ 523.002024][ T30] audit: type=1400 audit(1753723612.911:558467): lsm=SMACK fn=smack_inode_setattr action=granted subject="_" object="_" requested=w pid=5207 comm="udevd" name="queue" dev="tmpfs" ino=13088 [ 523.113247][ T30] audit: type=1400 audit(1753723613.027:558468): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6858 comm="udevd" name="/" dev="sda1" ino=2 [ 523.113295][ T30] audit: type=1400 audit(1753723613.027:558469): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6858 comm="udevd" name="/" dev="tmpfs" ino=1 [ 527.811467][ C0] audit_log_start: 752 callbacks suppressed [ 527.811489][ C0] audit: audit_backlog=65 > audit_backlog_limit=64 [ 527.811506][ C0] audit: audit_lost=85097 audit_rate_limit=0 audit_backlog_limit=64 [ 527.811522][ C0] audit: backlog limit exceeded [ 528.149550][ T30] audit: type=1400 audit(1753723617.363:558775): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=5848 comm="udevd" name="data" dev="tmpfs" ino=14 [ 528.149604][ T30] audit: type=1400 audit(1753723617.363:558776): lsm=SMACK fn=smack_inode_rename action=granted subject="_" object="_" requested=rw pid=5848 comm="udevd" name="+usb:1-1:1.0.tmp" dev="tmpfs" ino=13094 [ 528.149645][ T30] audit: type=1400 audit(1753723617.415:558777): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5851 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 528.149687][ T30] audit: type=1400 audit(1753723617.415:558778): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5851 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 528.149727][ T30] audit: type=1400 audit(1753723617.415:558779): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5851 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 528.149766][ T30] audit: type=1400 audit(1753723617.415:558780): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5851 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 528.149806][ T30] audit: type=1400 audit(1753723617.415:558781): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=5851 comm="syz-executor" name="1153" dev="tmpfs" ino=5793 [ 532.771730][ T30] kauditd_printk_skb: 68 callbacks suppressed [ 532.771753][ T30] audit: type=1400 audit(1753723623.126:558850): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5848 comm="udevd" name="/" dev="sda1" ino=2 [ 532.771806][ T30] audit: type=1400 audit(1753723623.126:558851): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5848 comm="udevd" name="lib" dev="sda1" ino=264 [ 532.771846][ T30] audit: type=1400 audit(1753723623.126:558852): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5848 comm="udevd" name="modules" dev="sda1" ino=1135 [ 532.771886][ T30] audit: type=1400 audit(1753723623.147:558853): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5848 comm="udevd" name="/" dev="sda1" ino=2 [ 532.771932][ T30] audit: type=1400 audit(1753723623.147:558854): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5848 comm="udevd" name="lib" dev="sda1" ino=264 [ 532.771970][ T30] audit: type=1400 audit(1753723623.147:558855): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5848 comm="udevd" name="modules" dev="sda1" ino=1135 [ 532.895958][ T30] audit: type=1400 audit(1753723623.221:558856): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=36 comm="kworker/u8:2" saddr=10.128.0.169 src=30008 daddr=10.128.10.27 dest=44238 netif=eth0 [ 532.932582][ T30] audit: type=1400 audit(1753723623.336:558857): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5580 comm="crond" name="/" dev="sda1" ino=2 [ 532.952196][ T30] audit: type=1400 audit(1753723623.336:558858): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="/" dev="sda1" ino=2 [ 532.952250][ T30] audit: type=1400 audit(1753723623.336:558859): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="/" dev="tmpfs" ino=1 [ 537.665944][ T30] kauditd_printk_skb: 48 callbacks suppressed [ 537.665966][ T30] audit: type=1400 audit(1753723627.955:558908): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=19249 comm="kworker/u8:1" saddr=10.128.0.169 src=30008 daddr=10.128.10.27 dest=44238 netif=eth0 [ 537.861406][ T30] audit: type=1400 audit(1753723628.480:558909): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=36 comm="kworker/u8:2" saddr=10.128.0.169 src=30008 daddr=10.128.10.27 dest=44238 netif=eth0 [ 537.955186][ T30] audit: type=1400 audit(1753723628.606:558910): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=12334 comm="udevd" path="/run/udev/data/+usb:1-1:1.2" dev="tmpfs" ino=13093 [ 538.343664][ T30] audit: type=1400 audit(1753723629.005:558911): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=5848 comm="udevd" saddr=10.128.0.169 src=30008 daddr=10.128.10.27 dest=44238 netif=eth0 [ 538.891066][ T30] audit: type=1400 audit(1753723629.530:558912): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=19248 comm="kworker/u8:0" saddr=10.128.0.169 src=30008 daddr=10.128.10.27 dest=44238 netif=eth0 [ 539.268080][ T30] audit: type=1400 audit(1753723629.960:558913): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=19250 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 539.268135][ T30] audit: type=1400 audit(1753723629.960:558914): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=19250 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 539.268176][ T30] audit: type=1400 audit(1753723629.960:558915): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=19250 comm="syz-executor" name="syz-executor" dev="sda1" ino=2020 [ 539.338073][ T30] audit: type=1400 audit(1753723630.044:558916): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3464 comm="kworker/u8:8" saddr=10.128.0.169 src=30008 daddr=10.128.10.27 dest=44238 netif=eth0 [ 539.386116][ T30] audit: type=1400 audit(1753723630.107:558917): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5824 comm="syz-executor" opid=5849 ocomm="syz-executor" [ 540.361473][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 540.363327][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 540.365100][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 540.366936][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 540.368765][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 540.370726][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 540.377985][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 540.380558][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 540.383006][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 540.385394][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 542.701751][ T30] kauditd_printk_skb: 106 callbacks suppressed [ 542.701772][ T30] audit: type=1400 audit(1753723633.341:559024): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3464 comm="kworker/u8:8" saddr=10.128.0.169 src=30008 daddr=10.128.10.27 dest=44238 netif=eth0 [ 542.770481][ T30] audit: type=1400 audit(1753723633.635:559025): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3464 comm="kworker/u8:8" saddr=10.128.0.169 src=30008 daddr=10.128.10.27 dest=44238 netif=eth0 [ 542.811104][ T30] audit: type=1400 audit(1753723633.666:559026): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="devices" dev="sysfs" ino=7 [ 542.811159][ T30] audit: type=1400 audit(1753723633.666:559027): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="virtual" dev="sysfs" ino=1370 [ 542.811199][ T30] audit: type=1400 audit(1753723633.666:559028): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="block" dev="sysfs" ino=13135 [ 542.811240][ T30] audit: type=1400 audit(1753723633.666:559029): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="loop1" dev="sysfs" ino=15013 [ 542.985687][ T30] audit: type=1400 audit(1753723633.740:559030): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=5909 comm="kworker/0:4" saddr=10.128.0.169 src=30008 daddr=10.128.10.27 dest=44238 netif=eth0 [ 542.998111][ T24] usb 2-1: USB disconnect, device number 29 [ 543.000830][ T30] audit: type=1400 audit(1753723633.908:559031): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=26 comm="kdevtmpfs" name="/" dev="devtmpfs" ino=1 [ 543.000880][ T30] audit: type=1400 audit(1753723633.908:559032): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=26 comm="kdevtmpfs" name="bus" dev="devtmpfs" ino=718 [ 543.000919][ T30] audit: type=1400 audit(1753723633.908:559033): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=26 comm="kdevtmpfs" name="usb" dev="devtmpfs" ino=719 [ 545.132866][ C1] net_ratelimit: 2426 callbacks suppressed [ 545.132894][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 545.134672][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 545.136561][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 545.138474][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 545.140442][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 545.142338][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 545.144138][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 545.146021][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 545.148027][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 545.149818][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 545.406309][ T1302] ieee802154 phy1 wpan1: encryption failed: -22 [ 547.905998][ T30] kauditd_printk_skb: 141 callbacks suppressed [ 547.906021][ T30] audit: type=1400 audit(1753723638.464:559160): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=60 comm="kworker/u8:4" saddr=10.128.0.169 src=30008 daddr=10.128.10.27 dest=44238 netif=eth0 [ 547.906069][ T30] audit: type=1400 audit(1753723638.978:559161): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=60 comm="kworker/u8:4" saddr=10.128.0.169 src=30008 daddr=10.128.10.27 dest=44238 netif=eth0 [ 548.355281][ T30] audit: type=1400 audit(1753723639.503:559162): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=5998 comm="kworker/0:8" saddr=10.128.0.169 src=30008 daddr=10.128.10.27 dest=44238 netif=eth0 [ 549.310539][ T30] audit: type=1400 audit(1753723640.038:559163): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=5998 comm="kworker/0:8" saddr=10.128.0.169 src=30008 daddr=10.128.10.27 dest=44238 netif=eth0 [ 549.478803][ T30] audit: type=1400 audit(1753723640.563:559164): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=19248 comm="kworker/u8:0" saddr=10.128.0.169 src=30008 daddr=10.128.10.27 dest=44238 netif=eth0 [ 549.903984][ C1] net_ratelimit: 2461 callbacks suppressed [ 549.904005][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 549.905957][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 549.907972][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 549.909947][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 549.911927][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 549.913973][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 549.915949][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 549.917866][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 549.919689][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 549.921350][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 549.999481][ T30] audit: type=1400 audit(1753723641.088:559165): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=10 comm="kworker/0:1" saddr=10.128.0.169 src=30008 daddr=10.128.10.27 dest=44238 netif=eth0 [ 550.447885][ T30] audit: type=1400 audit(1753723641.613:559166): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=10 comm="kworker/0:1" saddr=10.128.0.169 src=30008 daddr=10.128.10.27 dest=44238 netif=eth0 [ 551.048360][ T30] audit: type=1400 audit(1753723642.138:559167): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=19248 comm="kworker/u8:0" saddr=10.128.0.169 src=30008 daddr=10.128.10.27 dest=44238 netif=eth0 [ 551.306101][ T30] audit: type=1400 audit(1753723642.568:559168): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=19255 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 551.306155][ T30] audit: type=1400 audit(1753723642.568:559169): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=19255 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 553.291259][ T30] kauditd_printk_skb: 20 callbacks suppressed [ 553.291279][ T30] audit: type=1400 audit(1753723644.248:559190): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=5916 comm="kworker/0:5" saddr=10.128.0.169 src=30008 daddr=10.128.10.27 dest=44238 netif=eth0 [ 553.532072][ T30] audit: type=1400 audit(1753723644.762:559191): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=19249 comm="kworker/u8:1" saddr=10.128.0.169 src=30008 daddr=10.128.10.27 dest=44238 netif=eth0 [ 554.661077][ T30] audit: type=1400 audit(1753723645.287:559192): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=60 comm="kworker/u8:4" saddr=10.128.0.169 src=30008 daddr=10.128.10.27 dest=44238 netif=eth0 [ 554.661135][ T30] audit: type=1400 audit(1753723645.823:559193): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=19253 comm="kworker/u8:10" saddr=10.128.0.169 src=30008 daddr=10.128.10.27 dest=44238 netif=eth0 [ 554.676022][ C1] net_ratelimit: 2416 callbacks suppressed [ 554.676042][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 554.677880][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 554.679577][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 554.681388][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 554.683309][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 554.685087][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 554.686897][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 554.688463][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 554.690044][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 554.691666][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 554.745272][ T30] audit: type=1400 audit(1753723646.232:559194): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="/" dev="sda1" ino=2 [ 554.745334][ T30] audit: type=1400 audit(1753723646.232:559195): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="/" dev="sysfs" ino=1 [ 554.745375][ T30] audit: type=1400 audit(1753723646.232:559196): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="devices" dev="sysfs" ino=7 [ 554.745415][ T30] audit: type=1400 audit(1753723646.232:559197): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="virtual" dev="sysfs" ino=1370 [ 554.745460][ T30] audit: type=1400 audit(1753723646.232:559198): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="block" dev="sysfs" ino=13135 [ 554.745500][ T30] audit: type=1400 audit(1753723646.232:559199): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="loop1" dev="sysfs" ino=15013 [ 558.523672][ T30] kauditd_printk_skb: 14 callbacks suppressed [ 558.523693][ T30] audit: type=1400 audit(1753723650.022:559214): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=19249 comm="kworker/u8:1" saddr=10.128.0.169 src=30008 daddr=10.128.10.27 dest=44238 netif=eth0 [ 558.962956][ T30] audit: type=1400 audit(1753723650.547:559215): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=19253 comm="kworker/u8:10" saddr=10.128.0.169 src=30008 daddr=10.128.10.27 dest=44238 netif=eth0 [ 559.449383][ C1] net_ratelimit: 2390 callbacks suppressed [ 559.449403][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 559.451319][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 559.453241][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 559.455155][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 559.457058][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 559.459146][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 559.460966][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 559.462999][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 559.464983][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 559.467050][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 559.651439][ T30] audit: type=1400 audit(1753723651.072:559216): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=19253 comm="kworker/u8:10" saddr=10.128.0.169 src=30008 daddr=10.128.10.27 dest=44238 netif=eth0 [ 559.670596][ T30] audit: type=1400 audit(1753723651.387:559217): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="/" dev="sysfs" ino=1 [ 559.670649][ T30] audit: type=1400 audit(1753723651.387:559218): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="devices" dev="sysfs" ino=7 [ 559.670690][ T30] audit: type=1400 audit(1753723651.387:559219): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="virtual" dev="sysfs" ino=1370 [ 559.670731][ T30] audit: type=1400 audit(1753723651.387:559220): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="block" dev="sysfs" ino=13135 [ 559.670770][ T30] audit: type=1400 audit(1753723651.387:559221): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="loop1" dev="sysfs" ino=15013 [ 559.670810][ T30] audit: type=1400 audit(1753723651.387:559222): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="/" dev="sda1" ino=2 [ 559.670849][ T30] audit: type=1400 audit(1753723651.387:559223): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="/" dev="sysfs" ino=1 [ 563.434764][ T30] kauditd_printk_skb: 12 callbacks suppressed [ 563.434786][ T30] audit: type=1400 audit(1753723655.281:559236): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=19253 comm="kworker/u8:10" saddr=10.128.0.169 src=30008 daddr=10.128.10.27 dest=44238 netif=eth0 [ 563.866878][ T30] audit: type=1400 audit(1753723655.806:559237): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=19253 comm="kworker/u8:10" saddr=10.128.0.169 src=30008 daddr=10.128.10.27 dest=44238 netif=eth0 [ 564.221526][ C1] net_ratelimit: 2452 callbacks suppressed [ 564.221547][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 564.223576][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 564.225335][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 564.227207][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 564.228994][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 564.230868][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 564.232712][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 564.234730][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 564.236548][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 564.238457][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 564.391099][ T30] audit: type=1400 audit(1753723656.331:559238): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=19253 comm="kworker/u8:10" saddr=10.128.0.169 src=30008 daddr=10.128.10.27 dest=44238 netif=eth0 [ 564.952979][ T30] audit: type=1400 audit(1753723656.856:559239): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=19253 comm="kworker/u8:10" saddr=10.128.0.169 src=30008 daddr=10.128.10.27 dest=44238 netif=eth0 [ 565.362074][ T30] audit: type=1400 audit(1753723657.381:559240): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=19253 comm="kworker/u8:10" saddr=10.128.0.169 src=30008 daddr=10.128.10.27 dest=44238 netif=eth0 [ 565.901674][ T30] audit: type=1400 audit(1753723657.906:559241): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=19253 comm="kworker/u8:10" saddr=10.128.0.169 src=30008 daddr=10.128.10.27 dest=44238 netif=eth0 [ 566.244245][ T30] audit: type=1400 audit(1753723658.263:559242): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=19250 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 566.244306][ T30] audit: type=1400 audit(1753723658.263:559243): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=19250 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 566.244347][ T30] audit: type=1400 audit(1753723658.263:559244): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=19250 comm="syz-executor" name="syzkaller.Vlq7CT" dev="sda1" ino=2048 [ 566.366133][ T30] audit: type=1400 audit(1753723658.431:559245): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=19253 comm="kworker/u8:10" saddr=10.128.0.169 src=30008 daddr=10.128.10.27 dest=44238 netif=eth0 [ 568.992999][ C1] net_ratelimit: 2486 callbacks suppressed [ 568.993020][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 568.994944][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 568.996802][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 568.998718][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 569.000631][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 569.002574][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 569.004523][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 569.006490][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 569.008328][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 569.010262][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 569.145678][ T30] kauditd_printk_skb: 4 callbacks suppressed [ 569.145700][ T30] audit: type=1400 audit(1753723660.541:559250): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=19253 comm="kworker/u8:10" saddr=10.128.0.169 src=30008 daddr=10.128.10.27 dest=44238 netif=eth0 [ 569.145749][ T30] audit: type=1400 audit(1753723661.066:559251): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=19253 comm="kworker/u8:10" saddr=10.128.0.169 src=30008 daddr=10.128.10.27 dest=44238 netif=eth0 [ 569.468688][ T30] audit: type=1400 audit(1753723661.591:559252): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=19253 comm="kworker/u8:10" saddr=10.128.0.169 src=30008 daddr=10.128.10.27 dest=44238 netif=eth0 [ 569.972907][ T30] audit: type=1400 audit(1753723662.116:559253): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=19253 comm="kworker/u8:10" saddr=10.128.0.169 src=30008 daddr=10.128.10.27 dest=44238 netif=eth0 [ 570.373755][ T30] audit: type=1400 audit(1753723662.630:559254): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=19253 comm="kworker/u8:10" saddr=10.128.0.169 src=30008 daddr=10.128.10.27 dest=44238 netif=eth0 [ 571.424698][ T30] audit: type=1400 audit(1753723663.155:559255): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=19251 comm="kworker/u8:9" saddr=10.128.0.169 src=30008 daddr=10.128.10.27 dest=44238 netif=eth0 [ 571.424756][ T30] audit: type=1400 audit(1753723663.690:559256): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=19251 comm="kworker/u8:9" saddr=10.128.0.169 src=30008 daddr=10.128.10.27 dest=44238 netif=eth0 [ 571.520790][ T30] audit: type=1400 audit(1753723663.806:559257): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="/" dev="sysfs" ino=1 [ 571.520844][ T30] audit: type=1400 audit(1753723663.806:559258): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="devices" dev="sysfs" ino=7 [ 571.520887][ T30] audit: type=1400 audit(1753723663.806:559259): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="virtual" dev="sysfs" ino=1370 [ 573.765432][ C1] net_ratelimit: 2673 callbacks suppressed [ 573.765452][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 573.767213][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 573.768832][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 573.770601][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 573.772220][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 573.773694][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 573.775376][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 573.777141][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 573.778712][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 573.780386][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 574.002182][ T30] kauditd_printk_skb: 8 callbacks suppressed [ 574.002204][ T30] audit: type=1400 audit(1753723666.315:559268): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=6006 comm="kworker/0:9" saddr=10.128.0.169 src=30008 daddr=10.128.10.27 dest=44238 netif=eth0 [ 574.555858][ T30] audit: type=1400 audit(1753723666.850:559269): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1029 comm="kworker/u8:5" saddr=10.128.0.169 src=30008 daddr=10.128.10.27 dest=44238 netif=eth0 [ 574.965105][ T30] audit: type=1400 audit(1753723667.365:559270): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=36 comm="kworker/u8:2" saddr=10.128.0.169 src=30008 daddr=10.128.10.27 dest=44238 netif=eth0 [ 575.416171][ T30] audit: type=1400 audit(1753723667.900:559271): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=5207 comm="udevd" path="/sys/devices/virtual/block/loop1/mq" dev="sysfs" ino=15106 [ 575.416229][ T30] audit: type=1400 audit(1753723667.900:559272): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=5207 comm="udevd" saddr=10.128.0.169 src=30008 daddr=10.128.10.27 dest=44238 netif=eth0 [ 575.454976][ T30] audit: type=1400 audit(1753723667.963:559273): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=19255 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 575.455030][ T30] audit: type=1400 audit(1753723667.963:559274): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=19255 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 575.883846][ T30] audit: type=1400 audit(1753723668.414:559275): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=5916 comm="kworker/0:5" saddr=10.128.0.169 src=30008 daddr=10.128.10.27 dest=44238 netif=eth0 [ 576.398518][ T30] audit: type=1400 audit(1753723668.950:559276): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=36 comm="kworker/u8:2" saddr=10.128.0.169 src=30008 daddr=10.128.10.27 dest=44238 netif=eth0 [ 576.934080][ T30] audit: type=1400 audit(1753723669.475:559277): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=6006 comm="kworker/0:9" saddr=10.128.0.169 src=30008 daddr=10.128.10.27 dest=44238 netif=eth0 [ 578.537417][ C1] net_ratelimit: 2584 callbacks suppressed [ 578.537438][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 578.539405][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 578.541355][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 578.543135][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 578.545057][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 578.546963][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 578.548858][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 578.550742][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 578.552623][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 578.554536][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 578.905837][ T30] kauditd_printk_skb: 3 callbacks suppressed [ 578.905857][ T30] audit: type=1400 audit(1753723671.564:559281): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=36 comm="kworker/u8:2" saddr=10.128.0.169 src=30008 daddr=10.128.10.27 dest=44238 netif=eth0 [ 579.429307][ T30] audit: type=1400 audit(1753723672.099:559282): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=19249 comm="kworker/u8:1" saddr=10.128.0.169 src=30008 daddr=10.128.10.27 dest=44238 netif=eth0 [ 579.921331][ T30] audit: type=1400 audit(1753723672.614:559283): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=6006 comm="kworker/0:9" saddr=10.128.0.169 src=30008 daddr=10.128.10.27 dest=44238 netif=eth0 [ 580.149317][ T30] audit: type=1400 audit(1753723672.887:559284): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5207 comm="udevd" path="/sys/devices/virtual/block/loop1/mq" dev="sysfs" ino=15106 [ 580.149377][ T30] audit: type=1400 audit(1753723672.887:559285): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="/" dev="sda1" ino=2 [ 580.149417][ T30] audit: type=1400 audit(1753723672.887:559286): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="/" dev="sysfs" ino=1 [ 580.149456][ T30] audit: type=1400 audit(1753723672.887:559287): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="devices" dev="sysfs" ino=7 [ 580.149496][ T30] audit: type=1400 audit(1753723672.887:559288): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="virtual" dev="sysfs" ino=1370 [ 580.149545][ T30] audit: type=1400 audit(1753723672.887:559289): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="block" dev="sysfs" ino=13135 [ 580.149584][ T30] audit: type=1400 audit(1753723672.887:559290): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="loop1" dev="sysfs" ino=15013 [ 583.309518][ C1] net_ratelimit: 2455 callbacks suppressed [ 583.309537][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 583.311892][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 583.313855][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 583.315626][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 583.317508][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 583.319398][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 583.321339][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 583.323778][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 583.325773][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 583.327678][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 585.700016][ T30] kauditd_printk_skb: 3 callbacks suppressed [ 585.700037][ T30] audit: type=1400 audit(1753723674.199:559294): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=19253 comm="kworker/u8:10" saddr=10.128.0.169 src=30008 daddr=10.128.10.27 dest=44238 netif=eth0 [ 585.700086][ T30] audit: type=1400 audit(1753723674.713:559295): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=19253 comm="kworker/u8:10" saddr=10.128.0.169 src=30008 daddr=10.128.10.27 dest=44238 netif=eth0 [ 585.700131][ T30] audit: type=1400 audit(1753723675.249:559296): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=19253 comm="kworker/u8:10" saddr=10.128.0.169 src=30008 daddr=10.128.10.27 dest=44238 netif=eth0 [ 585.700173][ T30] audit: type=1400 audit(1753723675.774:559297): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=19253 comm="kworker/u8:10" saddr=10.128.0.169 src=30008 daddr=10.128.10.27 dest=44238 netif=eth0 [ 585.700213][ T30] audit: type=1400 audit(1753723676.299:559298): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=19253 comm="kworker/u8:10" saddr=10.128.0.169 src=30008 daddr=10.128.10.27 dest=44238 netif=eth0 [ 585.700252][ T30] audit: type=1400 audit(1753723676.823:559299): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=19253 comm="kworker/u8:10" saddr=10.128.0.169 src=30008 daddr=10.128.10.27 dest=44238 netif=eth0 [ 585.700309][ T30] audit: type=1400 audit(1753723677.348:559300): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=19253 comm="kworker/u8:10" saddr=10.128.0.169 src=30008 daddr=10.128.10.27 dest=44238 netif=eth0 [ 585.700351][ T30] audit: type=1400 audit(1753723677.863:559301): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1029 comm="kworker/u8:5" saddr=10.128.0.169 src=30008 daddr=10.128.10.27 dest=44238 netif=eth0 [ 585.713163][ T30] audit: type=1400 audit(1753723678.398:559302): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=5916 comm="kworker/0:5" saddr=10.128.0.169 src=30008 daddr=10.128.10.27 dest=44238 netif=eth0 [ 586.171552][ T30] audit: type=1400 audit(1753723678.923:559303): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=10 comm="kworker/0:1" saddr=10.128.0.169 src=30008 daddr=10.128.10.27 dest=44238 netif=eth0 [ 588.083430][ C1] net_ratelimit: 2496 callbacks suppressed [ 588.083452][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 588.085111][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 588.086945][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 588.088664][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 588.090455][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 588.092314][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 588.094013][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 588.095802][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 588.097645][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 588.099430][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 590.645390][ T30] kauditd_printk_skb: 17 callbacks suppressed [ 590.645411][ T30] audit: type=1400 audit(1753723682.597:559321): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=19253 comm="kworker/u8:10" saddr=10.128.0.169 src=30008 daddr=10.128.10.27 dest=44238 netif=eth0 [ 590.645459][ T30] audit: type=1400 audit(1753723683.133:559322): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=19253 comm="kworker/u8:10" saddr=10.128.0.169 src=30008 daddr=10.128.10.27 dest=44238 netif=eth0 [ 590.645503][ T30] audit: type=1400 audit(1753723683.658:559323): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=19256 comm="kworker/u8:11" saddr=10.128.0.169 src=30008 daddr=10.128.10.27 dest=44238 netif=eth0 [ 591.009368][ T30] audit: type=1400 audit(1753723684.183:559324): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=19256 comm="kworker/u8:11" saddr=10.128.0.169 src=30008 daddr=10.128.10.27 dest=44238 netif=eth0 [ 591.338710][ T30] audit: type=1400 audit(1753723684.644:559325): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5580 comm="crond" path="/etc/cron/crontabs" dev="sda1" ino=121 [ 592.855262][ C1] net_ratelimit: 2483 callbacks suppressed [ 592.855285][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 592.856994][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 592.858815][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 592.860671][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 592.862496][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 592.864289][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 592.866006][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 592.867739][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 592.869507][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 592.871264][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 594.511903][ T30] audit: type=1400 audit(1753723684.707:559326): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=19256 comm="kworker/u8:11" saddr=10.128.0.169 src=30008 daddr=10.128.10.27 dest=44238 netif=eth0 [ 594.511960][ T30] audit: type=1400 audit(1753723685.243:559327): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=19256 comm="kworker/u8:11" saddr=10.128.0.169 src=30008 daddr=10.128.10.27 dest=44238 netif=eth0 [ 594.512003][ T30] audit: type=1400 audit(1753723685.768:559328): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=19256 comm="kworker/u8:11" saddr=10.128.0.169 src=30008 daddr=10.128.10.27 dest=44238 netif=eth0 [ 594.512046][ T30] audit: type=1400 audit(1753723686.293:559329): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=19256 comm="kworker/u8:11" saddr=10.128.0.169 src=30008 daddr=10.128.10.27 dest=44238 netif=eth0 [ 594.512086][ T30] audit: type=1400 audit(1753723686.293:559330): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=19256 comm="kworker/u8:11" saddr=10.128.0.169 src=30008 daddr=10.128.10.27 dest=44238 netif=eth0 [ 596.114002][ T30] kauditd_printk_skb: 15 callbacks suppressed [ 596.114023][ T30] audit: type=1400 audit(1753723689.610:559346): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1029 comm="kworker/u8:5" saddr=10.128.0.169 src=30008 daddr=10.128.10.27 dest=44238 netif=eth0 [ 597.290904][ T30] audit: type=1400 audit(1753723690.901:559347): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5580 comm="crond" name="/" dev="sda1" ino=2 [ 597.626640][ C1] net_ratelimit: 2463 callbacks suppressed [ 597.626661][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 597.628416][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 597.630325][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 597.632084][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 597.633810][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 597.635491][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 597.637236][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 597.639004][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 597.641072][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 597.643033][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 597.664166][ T30] audit: type=1400 audit(1753723691.216:559348): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=10 comm="kworker/0:1" saddr=10.128.0.169 src=30008 daddr=10.128.10.27 dest=44238 netif=eth0 [ 598.523238][ T30] audit: type=1400 audit(1753723692.203:559349): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5580 comm="crond" name="etc" dev="sda1" ino=116 [ 600.164630][ T30] audit: type=1400 audit(1753723693.862:559350): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=5207 comm="udevd" path="/sys/devices/virtual/block/loop1/mq/0" dev="sysfs" ino=15107 [ 600.213807][ T30] audit: type=1400 audit(1753723693.967:559351): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5830 comm="syz-executor" opid=5851 ocomm="syz-executor" [ 600.696971][ T30] audit: type=1400 audit(1753723694.481:559352): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=5998 comm="kworker/0:8" saddr=10.128.0.169 src=30008 daddr=10.128.10.27 dest=44238 netif=eth0 [ 602.400461][ C1] net_ratelimit: 3500 callbacks suppressed [ 602.400482][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 602.401081][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:b0:34:62:d7:29, vlan:0) [ 602.403014][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 602.403627][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:b0:34:62:d7:29, vlan:0) [ 602.405346][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 602.405989][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:b0:34:62:d7:29, vlan:0) [ 602.407948][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 602.408569][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:b0:34:62:d7:29, vlan:0) [ 602.410304][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 602.410894][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:b0:34:62:d7:29, vlan:0) [ 602.788284][ T30] audit: type=1400 audit(1753723696.549:559353): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=19250 comm="syz-executor" name="/" dev="sda1" ino=2 [ 602.788347][ T30] audit: type=1400 audit(1753723696.549:559354): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=19250 comm="syz-executor" name="/" dev="sysfs" ino=1 [ 602.788393][ T30] audit: type=1400 audit(1753723696.549:559355): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=19250 comm="syz-executor" name="kernel" dev="sysfs" ino=1388 [ 602.788434][ T30] audit: type=1400 audit(1753723696.549:559356): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=19250 comm="syz-executor" name="/" dev="debugfs" ino=1 [ 602.788473][ T30] audit: type=1400 audit(1753723696.549:559357): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=rw pid=19250 comm="syz-executor" name="kcov" dev="debugfs" ino=1177 [ 604.480077][ T30] audit: type=1400 audit(1753723698.397:559358): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5207 comm="udevd" path="/sys/devices/virtual/block/loop1/mq/0" dev="sysfs" ino=15107 [ 604.480133][ T30] audit: type=1400 audit(1753723698.397:559359): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="/" dev="sda1" ino=2 [ 604.480172][ T30] audit: type=1400 audit(1753723698.397:559360): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="/" dev="sysfs" ino=1 [ 604.480222][ T30] audit: type=1400 audit(1753723698.397:559361): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="devices" dev="sysfs" ino=7 [ 604.480262][ T30] audit: type=1400 audit(1753723698.397:559362): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="virtual" dev="sysfs" ino=1370 [ 604.939533][ T1302] ieee802154 phy1 wpan1: encryption failed: -22 [ 607.172131][ C1] net_ratelimit: 4022 callbacks suppressed [ 607.172153][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 607.172713][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:b0:34:62:d7:29, vlan:0) [ 607.174461][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 607.175042][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:b0:34:62:d7:29, vlan:0) [ 607.177024][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 607.177621][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:b0:34:62:d7:29, vlan:0) [ 607.179457][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 607.180078][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:b0:34:62:d7:29, vlan:0) [ 607.181952][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 607.182557][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:b0:34:62:d7:29, vlan:0) [ 608.950267][ T30] kauditd_printk_skb: 9 callbacks suppressed [ 608.950286][ T30] audit: type=1400 audit(1753723700.958:559372): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="block" dev="sysfs" ino=13135 [ 608.950333][ T30] audit: type=1400 audit(1753723703.131:559373): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="loop1" dev="sysfs" ino=15013 [ 608.950373][ T30] audit: type=1400 audit(1753723703.131:559374): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="mq" dev="sysfs" ino=15106 [ 608.950413][ T30] audit: type=1400 audit(1753723703.131:559375): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="0" dev="sysfs" ino=15107 [ 608.950453][ T30] audit: type=1400 audit(1753723703.131:559376): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="cpu1" dev="sysfs" ino=15112 [ 611.943584][ C1] net_ratelimit: 5380 callbacks suppressed [ 611.943605][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 611.944146][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 611.944579][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 611.945113][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:b0:34:62:d7:29, vlan:0) [ 611.946808][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 611.947379][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 611.947800][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 611.948324][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:b0:34:62:d7:29, vlan:0) [ 611.949956][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 611.950489][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 613.097921][ T30] audit: type=1400 audit(1753723707.478:559377): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=5824 comm="syz-executor" saddr=10.128.0.169 src=30008 daddr=10.128.10.27 dest=44238 netif=eth0 [ 613.248918][ T30] audit: type=1400 audit(1753723707.499:559378): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=60 comm="kworker/u8:4" saddr=10.128.0.169 src=30008 daddr=10.128.10.27 dest=44238 netif=eth0 [ 614.728761][ T30] audit: type=1400 audit(1753723709.189:559379): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=19250 comm="syz-executor" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1177 [ 616.715794][ C1] net_ratelimit: 5686 callbacks suppressed [ 616.715814][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 616.716406][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 616.716873][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 616.717481][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:b0:34:62:d7:29, vlan:0) [ 616.719428][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 616.720026][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 616.720493][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 616.721118][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:b0:34:62:d7:29, vlan:0) [ 616.722833][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 616.723418][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 618.246910][ T30] audit: type=1400 audit(1753723712.737:559380): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=19256 comm="kworker/u8:11" saddr=10.128.0.169 src=30008 daddr=10.128.10.27 dest=44238 netif=eth0 [ 618.246968][ T30] audit: type=1400 audit(1753723712.748:559381): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=19256 comm="kworker/u8:11" saddr=10.128.0.169 src=30008 daddr=10.128.10.27 dest=44238 netif=eth0 [ 618.247013][ T30] audit: type=1400 audit(1753723712.769:559382): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=19256 comm="kworker/u8:11" saddr=10.128.0.169 src=30008 daddr=10.128.10.27 dest=44238 netif=eth0 [ 618.247057][ T30] audit: type=1400 audit(1753723712.811:559383): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=19256 comm="kworker/u8:11" saddr=10.128.0.169 src=30008 daddr=10.128.10.27 dest=44238 netif=eth0 [ 621.489644][ C1] net_ratelimit: 5618 callbacks suppressed [ 621.489665][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 621.490223][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 621.490638][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 621.491170][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:b0:34:62:d7:29, vlan:0) [ 621.492895][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 621.493429][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 621.493863][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 621.494449][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:b0:34:62:d7:29, vlan:0) [ 621.495992][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 621.496525][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 626.262080][ C1] net_ratelimit: 6158 callbacks suppressed [ 626.262102][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 626.262637][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 626.263058][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 626.263606][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:b0:34:62:d7:29, vlan:0) [ 626.265223][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 626.265750][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 626.266191][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 626.266713][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:b0:34:62:d7:29, vlan:0) [ 626.268351][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 626.268904][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 630.349778][ T30] audit: type=1400 audit(1753723725.545:559384): lsm=SMACK fn=smack_file_ioctl action=granted subject="_" object="_" requested=r pid=19250 comm="syz-executor" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1177 [ 630.410244][ T30] audit: type=1400 audit(1753723725.650:559385): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=5861 comm="kworker/u9:6" saddr=10.128.0.169 src=30008 daddr=10.128.10.27 dest=44238 netif=eth0 [ 631.032962][ C1] net_ratelimit: 4881 callbacks suppressed [ 631.032981][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:b0:34:62:d7:29, vlan:0) [ 631.034661][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 631.035188][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 631.036693][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 631.037214][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:b0:34:62:d7:29, vlan:0) [ 631.038897][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 631.039446][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 631.040866][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 631.041401][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:b0:34:62:d7:29, vlan:0) [ 631.043187][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 631.276779][ T30] audit: type=1400 audit(1753723726.542:559386): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="/" dev="sda1" ino=2 [ 631.276832][ T30] audit: type=1400 audit(1753723726.542:559387): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="/" dev="sysfs" ino=1 [ 631.276873][ T30] audit: type=1400 audit(1753723726.542:559388): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="devices" dev="sysfs" ino=7 [ 631.276914][ T30] audit: type=1400 audit(1753723726.542:559389): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="virtual" dev="sysfs" ino=1370 [ 631.276952][ T30] audit: type=1400 audit(1753723726.542:559390): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="block" dev="sysfs" ino=13135 [ 631.276992][ T30] audit: type=1400 audit(1753723726.542:559391): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="loop1" dev="sysfs" ino=15013 [ 631.277032][ T30] audit: type=1400 audit(1753723726.542:559392): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="mq" dev="sysfs" ino=15106 [ 631.277073][ T30] audit: type=1400 audit(1753723726.542:559393): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="0" dev="sysfs" ino=15107 [ 635.805416][ C1] net_ratelimit: 4330 callbacks suppressed [ 635.805436][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:b0:34:62:d7:29, vlan:0) [ 635.807131][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 635.807739][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 635.809437][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 635.810069][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:b0:34:62:d7:29, vlan:0) [ 635.811763][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 635.812370][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 635.814019][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 635.814579][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:b0:34:62:d7:29, vlan:0) [ 635.816342][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 640.578151][ C1] net_ratelimit: 4071 callbacks suppressed [ 640.578171][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 640.578771][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 640.580474][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 640.581064][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:b0:34:62:d7:29, vlan:0) [ 640.582970][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 640.583576][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 640.585267][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 640.585882][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:b0:34:62:d7:29, vlan:0) [ 640.587720][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 640.588300][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 644.830693][ T30] kauditd_printk_skb: 2 callbacks suppressed [ 644.830712][ T30] audit: type=1400 audit(1753723740.725:559396): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5207 comm="udevd" path="/sys/devices/virtual/block/loop1/mq/0/cpu1" dev="sysfs" ino=15112 [ 644.830762][ T30] audit: type=1400 audit(1753723740.725:559397): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="/" dev="sda1" ino=2 [ 644.830801][ T30] audit: type=1400 audit(1753723740.725:559398): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="/" dev="sysfs" ino=1 [ 644.830840][ T30] audit: type=1400 audit(1753723740.725:559399): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="devices" dev="sysfs" ino=7 [ 644.830880][ T30] audit: type=1400 audit(1753723740.725:559400): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="virtual" dev="sysfs" ino=1370 [ 644.830918][ T30] audit: type=1400 audit(1753723740.725:559401): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="block" dev="sysfs" ino=13135 [ 644.830958][ T30] audit: type=1400 audit(1753723740.725:559402): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="loop1" dev="sysfs" ino=15013 [ 644.830998][ T30] audit: type=1400 audit(1753723740.725:559403): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="mq" dev="sysfs" ino=15106 [ 644.831036][ T30] audit: type=1400 audit(1753723740.725:559404): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="0" dev="sysfs" ino=15107 [ 645.052548][ T30] audit: type=1400 audit(1753723740.998:559405): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="/" dev="sda1" ino=2 [ 645.350364][ C1] net_ratelimit: 4092 callbacks suppressed [ 645.350385][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 645.351022][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:b0:34:62:d7:29, vlan:0) [ 645.352953][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 645.353563][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 645.355282][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 645.355894][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:b0:34:62:d7:29, vlan:0) [ 645.357711][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 645.358302][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 645.360092][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 645.360688][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:b0:34:62:d7:29, vlan:0) [ 650.122363][ C1] net_ratelimit: 4017 callbacks suppressed [ 650.122385][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 650.123948][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 650.124495][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:b0:34:62:d7:29, vlan:0) [ 650.126119][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 650.126671][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 650.128448][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 650.128978][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:b0:34:62:d7:29, vlan:0) [ 650.130626][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 650.131156][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 650.132748][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 652.145334][ T30] kauditd_printk_skb: 14 callbacks suppressed [ 652.145356][ T30] audit: type=1400 audit(1753723748.472:559421): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5580 comm="crond" path="/etc/cron/crontabs" dev="sda1" ino=121 [ 654.895511][ C1] net_ratelimit: 4055 callbacks suppressed [ 654.895533][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 654.896059][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:b0:34:62:d7:29, vlan:0) [ 654.897655][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 654.898179][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 654.899663][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 654.900185][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:b0:34:62:d7:29, vlan:0) [ 654.901848][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 654.902376][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 654.903852][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 654.904580][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:b0:34:62:d7:29, vlan:0) [ 655.196334][ T30] audit: type=1400 audit(1753723751.443:559422): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3464 comm="kworker/u8:8" saddr=10.128.0.169 src=30008 daddr=10.128.10.27 dest=44238 netif=eth0 [ 657.147516][ T30] audit: type=1400 audit(1753723744.840:559420): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="virtual" dev="sysfs" ino=1370 [ 657.147572][ T30] audit: type=1400 audit(1753723753.679:559423): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="block" dev="sysfs" ino=13135 [ 657.147612][ T30] audit: type=1400 audit(1753723753.679:559424): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="loop1" dev="sysfs" ino=15013 [ 657.147653][ T30] audit: type=1400 audit(1753723753.679:559425): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="mq" dev="sysfs" ino=15106 [ 657.147692][ T30] audit: type=1400 audit(1753723753.679:559426): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="0" dev="sysfs" ino=15107 [ 657.147731][ T30] audit: type=1400 audit(1753723753.679:559427): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=5207 comm="udevd" name="cpu0" dev="sysfs" ino=15111 [ 659.668188][ C1] net_ratelimit: 4134 callbacks suppressed [ 659.668208][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 659.668810][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:b0:34:62:d7:29, vlan:0) [ 659.670531][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 659.671163][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 659.672918][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 659.673531][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:b0:34:62:d7:29, vlan:0) [ 659.675347][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 659.675951][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 659.677731][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 659.678339][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:b0:34:62:d7:29, vlan:0) [ 662.461663][ T30] audit: type=1400 audit(1753723759.275:559428): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5580 comm="crond" name="crontabs" dev="sda1" ino=121 [ 662.719900][ T1302] ieee802154 phy1 wpan1: encryption failed: -22 [ 664.439912][ C1] net_ratelimit: 4254 callbacks suppressed [ 664.439933][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 664.440468][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:b0:34:62:d7:29, vlan:0) [ 664.442019][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 664.442618][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 664.444126][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 664.444712][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:b0:34:62:d7:29, vlan:0) [ 664.446342][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 664.446869][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 664.448527][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 664.449136][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:b0:34:62:d7:29, vlan:0) [ 668.522594][ T30] audit: type=1400 audit(1753723765.637:559429): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=5207 comm="udevd" path="/sys/devices/virtual/block/loop1/mq/0/cpu0" dev="sysfs" ino=15111 [ 668.524062][ T30] audit: type=1400 audit(1753723765.679:559430): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5580 comm="crond" name="/" dev="sda1" ino=2 [ 668.524109][ T30] audit: type=1400 audit(1753723765.679:559431): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5580 comm="crond" name="etc" dev="sda1" ino=116 [ 669.212414][ C1] net_ratelimit: 4308 callbacks suppressed [ 669.212435][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 669.213046][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 669.214767][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 669.215363][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:b0:34:62:d7:29, vlan:0) [ 669.217318][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 669.217940][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 669.219633][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 669.220261][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:b0:34:62:d7:29, vlan:0) [ 669.222199][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 669.222805][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 673.713554][ T30] audit: type=1400 audit(1753723771.022:559432): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=19252 comm="kworker/1:5" saddr=10.128.0.169 src=46760 daddr=10.128.10.27 dest=22 netif=eth0 [ 673.820885][ T30] audit: type=1400 audit(1753723771.243:559433): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5207 comm="udevd" path="/sys/devices/virtual/block/loop1/mq/0/cpu0" dev="sysfs" ino=15111 [ 673.983770][ C1] net_ratelimit: 4026 callbacks suppressed [ 673.983791][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 673.984324][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 673.985842][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 673.986365][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:b0:34:62:d7:29, vlan:0) [ 673.988086][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 673.988623][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 673.990137][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 673.990681][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:b0:34:62:d7:29, vlan:0) [ 673.992193][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 673.992745][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 676.122161][ T30] audit: type=1400 audit(1753723773.615:559434): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="/" dev="sda1" ino=2 [ 676.122214][ T30] audit: type=1400 audit(1753723773.615:559435): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="/" dev="sysfs" ino=1 [ 676.122253][ T30] audit: type=1400 audit(1753723773.615:559436): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="devices" dev="sysfs" ino=7 [ 676.122293][ T30] audit: type=1400 audit(1753723773.615:559437): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="virtual" dev="sysfs" ino=1370 [ 676.122333][ T30] audit: type=1400 audit(1753723773.615:559438): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="block" dev="sysfs" ino=13135 [ 676.122384][ T30] audit: type=1400 audit(1753723773.615:559439): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="loop1" dev="sysfs" ino=15013 [ 676.122421][ T30] audit: type=1400 audit(1753723773.636:559440): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="/" dev="sda1" ino=2 [ 676.122459][ T30] audit: type=1400 audit(1753723773.636:559441): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="/" dev="sysfs" ino=1 [ 678.756086][ C1] net_ratelimit: 4351 callbacks suppressed [ 678.756106][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 678.757853][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 678.758439][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:b0:34:62:d7:29, vlan:0) [ 678.760369][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 678.761060][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 678.762772][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 678.763355][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:b0:34:62:d7:29, vlan:0) [ 678.765319][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 678.765965][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 678.767669][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 681.022955][ T30] kauditd_printk_skb: 6 callbacks suppressed [ 681.022975][ T30] audit: type=1400 audit(1753723778.707:559448): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=19255 comm="syz-executor" name="/" dev="sda1" ino=2 [ 681.023023][ T30] audit: type=1400 audit(1753723778.707:559449): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=19255 comm="syz-executor" name="/" dev="proc" ino=1 [ 681.023072][ T30] audit: type=1400 audit(1753723778.780:559450): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=19255 comm="syz-executor" name="/" dev="proc" ino=1 [ 683.356550][ T30] audit: type=1400 audit(1753723781.205:559451): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="/" dev="sda1" ino=2 [ 683.356605][ T30] audit: type=1400 audit(1753723781.205:559452): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="/" dev="sysfs" ino=1 [ 683.356645][ T30] audit: type=1400 audit(1753723781.205:559453): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="devices" dev="sysfs" ino=7 [ 683.356685][ T30] audit: type=1400 audit(1753723781.205:559454): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="virtual" dev="sysfs" ino=1370 [ 683.356725][ T30] audit: type=1400 audit(1753723781.205:559455): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="block" dev="sysfs" ino=13135 [ 683.356764][ T30] audit: type=1400 audit(1753723781.205:559456): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5207 comm="udevd" name="loop1" dev="sysfs" ino=15013 [ 683.356804][ T30] audit: type=1400 audit(1753723781.205:559457): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=5207 comm="udevd" name="queue" dev="sysfs" ino=15059 [ 683.529180][ C1] net_ratelimit: 4141 callbacks suppressed [ 683.529201][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 683.529907][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 683.531769][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 683.532414][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:b0:34:62:d7:29, vlan:0) [ 683.534420][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 683.535066][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 683.536911][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 683.537544][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:b0:34:62:d7:29, vlan:0) [ 683.539689][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 683.540350][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 688.300885][ C1] net_ratelimit: 4020 callbacks suppressed [ 688.300905][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 688.301514][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:b0:34:62:d7:29, vlan:0) [ 688.303375][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 688.304009][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 688.305823][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 688.306385][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:b0:34:62:d7:29, vlan:0) [ 688.308146][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 688.308732][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 688.310381][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 688.311103][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:b0:34:62:d7:29, vlan:0) [ 689.433698][ T31] INFO: task kworker/1:3:980 blocked for more than 148 seconds. [ 689.433739][ T31] Not tainted 6.16.0-syzkaller #0 [ 689.433752][ T31] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 689.433764][ T31] task:kworker/1:3 state:D stack:21032 pid:980 tgid:980 ppid:2 task_flags:0x4208160 flags:0x00004000 [ 689.433822][ T31] Workqueue: events_power_efficient reg_check_chans_work [ 689.433864][ T31] Call Trace: [ 689.433876][ T31] [ 689.433893][ T31] __schedule+0x16aa/0x4c90 [ 689.433923][ T31] ? do_raw_spin_unlock+0x122/0x240 [ 689.433956][ T31] ? __pfx__raw_spin_unlock_irqrestore+0x10/0x10 [ 689.433990][ T31] ? schedule+0x165/0x360 [ 689.434015][ T31] ? __pfx___schedule+0x10/0x10 [ 689.434052][ T31] ? schedule+0x91/0x360 [ 689.434075][ T31] schedule+0x165/0x360 [ 689.434098][ T31] schedule_preempt_disabled+0x13/0x30 [ 689.434118][ T31] __mutex_lock+0x724/0xe80 [ 689.434143][ T31] ? __mutex_lock+0x51b/0xe80 [ 689.434171][ T31] ? reg_check_chans_work+0x164/0xf00 [ 689.434208][ T31] ? __pfx___mutex_lock+0x10/0x10 [ 689.448651][ T31] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 689.448708][ T31] reg_check_chans_work+0x164/0xf00 [ 689.448754][ T31] ? __pfx_reg_check_chans_work+0x10/0x10 [ 689.448783][ T31] ? process_scheduled_works+0x9ef/0x17b0 [ 689.448812][ T31] ? _raw_spin_unlock_irq+0x23/0x50 [ 689.448839][ T31] ? process_scheduled_works+0x9ef/0x17b0 [ 689.448864][ T31] ? process_scheduled_works+0x9ef/0x17b0 [ 689.448888][ T31] process_scheduled_works+0xade/0x17b0 [ 689.448941][ T31] ? __pfx_process_scheduled_works+0x10/0x10 [ 689.448982][ T31] worker_thread+0x8a0/0xda0 [ 689.449008][ T31] ? __pfx__raw_spin_unlock_irqrestore+0x10/0x10 [ 689.449048][ T31] ? __kthread_parkme+0x7b/0x200 [ 689.449081][ T31] kthread+0x70e/0x8a0 [ 689.449111][ T31] ? __pfx_worker_thread+0x10/0x10 [ 689.449133][ T31] ? __pfx_kthread+0x10/0x10 [ 689.449162][ T31] ? _raw_spin_unlock_irq+0x23/0x50 [ 689.449181][ T31] ? lockdep_hardirqs_on+0x9c/0x150 [ 689.449200][ T31] ? __pfx_kthread+0x10/0x10 [ 689.449228][ T31] ret_from_fork+0x3fc/0x770 [ 689.449252][ T31] ? __pfx_ret_from_fork+0x10/0x10 [ 689.449279][ T31] ? __switch_to_asm+0x39/0x70 [ 689.449326][ T31] ? __switch_to_asm+0x33/0x70 [ 689.449350][ T31] ? __pfx_kthread+0x10/0x10 [ 689.449377][ T31] ret_from_fork_asm+0x1a/0x30 [ 689.449419][ T31] [ 689.449545][ T31] [ 689.449545][ T31] Showing all locks held in the system: [ 689.449558][ T31] 4 locks held by kworker/0:0/9: [ 689.449574][ T31] 1 lock held by khungtaskd/31: [ 689.449586][ T31] #0: ffffffff8e13f0e0 (rcu_read_lock){....}-{1:3}, at: debug_show_all_locks+0x2e/0x180 [ 689.449648][ T31] 3 locks held by kworker/u8:2/36: [ 689.449663][ T31] 3 locks held by kworker/1:2/55: [ 689.449675][ T31] #0: ffff888032224548 ((wq_completion)wg-kex-wg1#6){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 689.449735][ T31] #1: ffffc9000130fbc0 ((work_completion)(&({ do { const void *__vpp_verify = (typeof((worker) + 0))((void *)0); (void)__vpp_verify; } while (0); ({ unsigned long __ptr; __ptr = (unsigned long) ((__typeof_unqual__(*((worker))) *)(( unsigned long)((worker)))); (typeof((__typeof_unqual__(*((worker))) *)(( unsigned long)((worker))))) (__ptr + (((__per_cpu_offset[(cpu)])))); }); })->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 689.449806][ T31] #2: ffff88807d2c7030 (&handshake->lock){++++}-{4:4}, at: wg_noise_handshake_begin_session+0x36/0xbd0 [ 689.449863][ T31] 4 locks held by kworker/u8:4/60: [ 689.449881][ T31] 4 locks held by kworker/1:3/980: [ 689.449894][ T31] #0: ffff88801a481d48 ((wq_completion)events_power_efficient){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 689.449949][ T31] #1: ffffc90003aefbc0 ((reg_check_chans).work){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 689.450003][ T31] #2: ffffffff8f509f08 (rtnl_mutex){+.+.}-{4:4}, at: reg_check_chans_work+0x95/0xf00 [ 689.450061][ T31] #3: ffff88807f018768 (&rdev->wiphy.mtx){+.+.}-{4:4}, at: reg_check_chans_work+0x164/0xf00 [ 689.450122][ T31] 3 locks held by kworker/u8:6/1332: [ 689.450135][ T31] 3 locks held by kworker/u8:7/1338: [ 689.450155][ T31] 4 locks held by kworker/u8:8/3464: [ 689.450169][ T31] 1 lock held by klogd/5196: [ 689.450182][ T31] 3 locks held by udevd/5207: [ 689.450194][ T31] 2 locks held by dhcpcd/5501: [ 689.450207][ T31] 5 locks held by dhcpcd/5502: [ 689.450220][ T31] 2 locks held by getty/5603: [ 689.450232][ T31] #0: ffff88814c6c40a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x25/0x70 [ 689.450291][ T31] #1: ffffc9000333b2f0 (&ldata->atomic_read_lock){+.+.}-{4:4}, at: n_tty_read+0x43e/0x1400 [ 689.450345][ T31] 2 locks held by syz-executor/5824: [ 689.450357][ T31] 3 locks held by kworker/0:3/5835: [ 689.450370][ T31] #0: ffff88801a480d48 ((wq_completion)events){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 689.450424][ T31] #1: ffffc9000405fbc0 (deferred_process_work){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 689.450488][ T31] #2: ffffffff8f509f08 (rtnl_mutex){+.+.}-{4:4}, at: switchdev_deferred_process_work+0xe/0x20 [ 689.450546][ T31] 2 locks held by syz-executor/5862: [ 689.450563][ T31] 5 locks held by kworker/0:5/5916: [ 689.450577][ T31] 3 locks held by kworker/1:4/5930: [ 689.450589][ T31] #0: ffff888061772148 ((wq_completion)wg-kex-wg0#4){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 689.450649][ T31] #1: ffffc9000461fbc0 ((work_completion)(&({ do { const void *__vpp_verify = (typeof((worker) + 0))((void *)0); (void)__vpp_verify; } while (0); ({ unsigned long __ptr; __ptr = (unsigned long) ((__typeof_unqual__(*((worker))) *)(( unsigned long)((worker)))); (typeof((__typeof_unqual__(*((worker))) *)(( unsigned long)((worker))))) (__ptr + (((__per_cpu_offset[(cpu)])))); }); })->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 689.450718][ T31] #2: ffff88807f69a0f0 (&handshake->lock){++++}-{4:4}, at: wg_noise_handshake_begin_session+0x36/0xbd0 [ 689.450771][ T31] 3 locks held by kworker/1:6/5959: [ 689.450784][ T31] 3 locks held by kworker/0:8/5998: [ 689.450797][ T31] 3 locks held by kworker/0:9/6006: [ 689.450811][ T31] 1 lock held by syz.4.6233/19057: [ 689.450825][ T31] 2 locks held by syz.3.6324/19244: [ 689.450837][ T31] 3 locks held by kworker/u8:1/19249: [ 689.450850][ T31] 1 lock held by syz-executor/19250: [ 689.450863][ T31] 3 locks held by kworker/u8:9/19251: [ 689.450876][ T31] #0: ffff888030a7a948 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 689.450930][ T31] #1: ffffc9001cd07bc0 ((work_completion)(&(&net->ipv6.addr_chk_work)->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 689.450985][ T31] #2: ffffffff8f509f08 (rtnl_mutex){+.+.}-{4:4}, at: addrconf_verify_work+0x19/0x30 [ 689.451044][ T31] 4 locks held by kworker/1:5/19252: [ 689.451058][ T31] 3 locks held by syz-executor/19255: [ 689.451071][ T31] [ 689.451078][ T31] ============================================= [ 689.451078][ T31] [ 689.451099][ T31] NMI backtrace for cpu 1 [ 689.451119][ T31] CPU: 1 UID: 0 PID: 31 Comm: khungtaskd Not tainted 6.16.0-syzkaller #0 PREEMPT(full) [ 689.451148][ T31] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 689.451160][ T31] Call Trace: [ 689.451168][ T31] [ 689.451176][ T31] dump_stack_lvl+0x189/0x250 [ 689.451197][ T31] ? __wake_up_klogd+0xd9/0x110 [ 689.451223][ T31] ? __pfx_dump_stack_lvl+0x10/0x10 [ 689.451245][ T31] ? __pfx__printk+0x10/0x10 [ 689.451281][ T31] nmi_cpu_backtrace+0x39e/0x3d0 [ 689.451312][ T31] ? __pfx_nmi_cpu_backtrace+0x10/0x10 [ 689.451337][ T31] ? _printk+0xcf/0x120 [ 689.451363][ T31] ? __pfx__printk+0x10/0x10 [ 689.451388][ T31] ? debug_show_all_locks+0x2e/0x180 [ 689.451408][ T31] ? __pfx_nmi_raise_cpu_backtrace+0x10/0x10 [ 689.451438][ T31] nmi_trigger_cpumask_backtrace+0x17a/0x300 [ 689.451469][ T31] watchdog+0xfee/0x1030 [ 689.451507][ T31] ? watchdog+0x1de/0x1030 [ 689.451541][ T31] kthread+0x70e/0x8a0 [ 689.451569][ T31] ? __pfx_watchdog+0x10/0x10 [ 689.451594][ T31] ? __pfx_kthread+0x10/0x10 [ 689.451620][ T31] ? _raw_spin_unlock_irq+0x23/0x50 [ 689.451638][ T31] ? lockdep_hardirqs_on+0x9c/0x150 [ 689.451655][ T31] ? __pfx_kthread+0x10/0x10 [ 689.451680][ T31] ret_from_fork+0x3fc/0x770 [ 689.451702][ T31] ? __pfx_ret_from_fork+0x10/0x10 [ 689.451726][ T31] ? __switch_to_asm+0x39/0x70 [ 689.451747][ T31] ? __switch_to_asm+0x33/0x70 [ 689.451768][ T31] ? __pfx_kthread+0x10/0x10 [ 689.451793][ T31] ret_from_fork_asm+0x1a/0x30 [ 689.451831][ T31] [ 689.451839][ T31] Sending NMI from CPU 1 to CPUs 0: [ 689.451868][ C0] NMI backtrace for cpu 0 [ 689.451881][ C0] CPU: 0 UID: 0 PID: 3464 Comm: kworker/u8:8 Not tainted 6.16.0-syzkaller #0 PREEMPT(full) [ 689.451900][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 689.451912][ C0] Workqueue: bat_events batadv_tt_purge [ 689.451930][ C0] RIP: 0010:its_return_thunk+0x0/0x10 [ 689.451958][ C0] Code: cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc 90 90 90 90 90 90 90 90 90 90 90 90 90 90 e9 4b eb c9 f5 cc [ 689.451973][ C0] RSP: 0018:ffffc90000007318 EFLAGS: 00000246 [ 689.451992][ C0] RAX: ffffffff8a3ea1d2 RBX: 0000000000000001 RCX: 0000000000000100 [ 689.452004][ C0] RDX: ffff888031528000 RSI: 0000000000000001 RDI: 0000000000000000 [ 689.452016][ C0] RBP: ffffc90000007428 R08: 0000000000000000 R09: ffffffff8a3ea0de [ 689.452028][ C0] R10: dffffc0000000000 R11: ffffed100637309d R12: 1ffff92000000e6c [ 689.452041][ C0] R13: ffff88803597d408 R14: ffff88807b928000 R15: 0000000000000002 [ 689.452053][ C0] FS: 0000000000000000(0000) GS:ffff888125c57000(0000) knlGS:0000000000000000 [ 689.452067][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 689.452078][ C0] CR2: 0000200000c7e000 CR3: 000000007b6d2000 CR4: 00000000003526f0 [ 689.452093][ C0] Call Trace: [ 689.452100][ C0] [ 689.452106][ C0] NF_HOOK+0x192/0x3c0 [ 689.452126][ C0] ? NF_HOOK+0x9e/0x3c0 [ 689.452142][ C0] ? __pfx_NF_HOOK+0x10/0x10 [ 689.452157][ C0] ? __asan_memcpy+0x40/0x70 [ 689.452179][ C0] ? __skb_clone+0x63/0x7a0 [ 689.452200][ C0] __br_forward+0x41e/0x600 [ 689.452221][ C0] ? __pfx_br_forward_finish+0x10/0x10 [ 689.452238][ C0] ? skb_clone+0x246/0x3a0 [ 689.452255][ C0] ? __pfx___br_forward+0x10/0x10 [ 689.452277][ C0] br_handle_frame_finish+0x14b4/0x19b0 [ 689.452300][ C0] ? net_generic+0x1e/0x240 [ 689.452321][ C0] ? __pfx_br_handle_frame_finish+0x10/0x10 [ 689.452341][ C0] ? net_generic+0x1e/0x240 [ 689.452359][ C0] ? net_generic+0x1e/0x240 [ 689.452375][ C0] ? net_generic+0x1e/0x240 [ 689.452394][ C0] ? br_mrp_alloc_in_test_skb+0x510/0xad0 [ 689.452412][ C0] ? br_nf_pre_routing+0xc30/0x1470 [ 689.452436][ C0] br_handle_frame+0xb89/0x14c0 [ 689.452460][ C0] ? __pfx_br_handle_frame+0x10/0x10 [ 689.452479][ C0] ? rcu_lockdep_current_cpu_online+0x37/0x120 [ 689.452501][ C0] ? __pfx_br_handle_frame_finish+0x10/0x10 [ 689.452521][ C0] ? __pfx_rcu_read_lock_bh_held+0x10/0x10 [ 689.452543][ C0] ? __pfx_br_handle_frame+0x10/0x10 [ 689.452563][ C0] __netif_receive_skb_core+0x10e1/0x4180 [ 689.452582][ C0] ? arp_process+0xee8/0x17a0 [ 689.452599][ C0] ? kmem_cache_free+0x18f/0x400 [ 689.452627][ C0] ? __pfx___netif_receive_skb_core+0x10/0x10 [ 689.452661][ C0] ? process_backlog+0x2d5/0x14f0 [ 689.452682][ C0] ? process_backlog+0x2d5/0x14f0 [ 689.452703][ C0] __netif_receive_skb+0x72/0x380 [ 689.452729][ C0] ? process_backlog+0x2d5/0x14f0 [ 689.452750][ C0] process_backlog+0x60e/0x14f0 [ 689.452769][ C0] ? __lock_acquire+0xab9/0xd20 [ 689.452791][ C0] ? __pfx_process_backlog+0x10/0x10 [ 689.452816][ C0] __napi_poll+0xc4/0x480 [ 689.452833][ C0] ? net_rx_action+0x46d/0xe30 [ 689.452855][ C0] net_rx_action+0x707/0xe30 [ 689.452874][ C0] ? _raw_spin_unlock_irq+0x23/0x50 [ 689.452897][ C0] ? __pfx_net_rx_action+0x10/0x10 [ 689.452935][ C0] handle_softirqs+0x283/0x870 [ 689.452953][ C0] ? do_softirq+0xec/0x180 [ 689.452972][ C0] ? __pfx_handle_softirqs+0x10/0x10 [ 689.452991][ C0] ? batadv_tt_purge+0x4d1/0x9e0 [ 689.453007][ C0] do_softirq+0xec/0x180 [ 689.453022][ C0] [ 689.453028][ C0] [ 689.453035][ C0] ? __pfx_do_softirq+0x10/0x10 [ 689.453055][ C0] ? lockdep_softirqs_on+0x13b/0x1c0 [ 689.453080][ C0] __local_bh_enable_ip+0x17d/0x1c0 [ 689.453096][ C0] ? __pfx___local_bh_enable_ip+0x10/0x10 [ 689.453114][ C0] ? do_raw_spin_unlock+0x122/0x240 [ 689.453135][ C0] ? batadv_tt_purge+0x4d1/0x9e0 [ 689.453152][ C0] batadv_tt_purge+0x4d1/0x9e0 [ 689.453170][ C0] ? process_scheduled_works+0x9ef/0x17b0 [ 689.453189][ C0] process_scheduled_works+0xade/0x17b0 [ 689.453219][ C0] ? __pfx_process_scheduled_works+0x10/0x10 [ 689.453245][ C0] worker_thread+0x8a0/0xda0 [ 689.453269][ C0] ? __kthread_parkme+0x7b/0x200 [ 689.453293][ C0] kthread+0x70e/0x8a0 [ 689.453311][ C0] ? __pfx_worker_thread+0x10/0x10 [ 689.453327][ C0] ? __pfx_kthread+0x10/0x10 [ 689.453345][ C0] ? _raw_spin_unlock_irq+0x23/0x50 [ 689.453360][ C0] ? lockdep_hardirqs_on+0x9c/0x150 [ 689.453376][ C0] ? __pfx_kthread+0x10/0x10 [ 689.453396][ C0] ret_from_fork+0x3fc/0x770 [ 689.453415][ C0] ? __pfx_ret_from_fork+0x10/0x10 [ 689.453432][ C0] ? __switch_to_asm+0x39/0x70 [ 689.453452][ C0] ? __switch_to_asm+0x33/0x70 [ 689.453470][ C0] ? __pfx_kthread+0x10/0x10 [ 689.453493][ C0] ret_from_fork_asm+0x1a/0x30 [ 689.453521][ C0] [ 689.466951][ T31] Kernel panic - not syncing: hung_task: blocked tasks [ 689.466977][ T31] CPU: 1 UID: 0 PID: 31 Comm: khungtaskd Not tainted 6.16.0-syzkaller #0 PREEMPT(full) [ 689.467000][ T31] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 689.467013][ T31] Call Trace: [ 689.467022][ T31] [ 689.467032][ T31] dump_stack_lvl+0x99/0x250 [ 689.467059][ T31] ? __asan_memcpy+0x40/0x70 [ 689.467088][ T31] ? __pfx_dump_stack_lvl+0x10/0x10 [ 689.467109][ T31] ? __pfx__printk+0x10/0x10 [ 689.467147][ T31] panic+0x2db/0x790 [ 689.467165][ T31] ? lockdep_hardirqs_on+0x9c/0x150 [ 689.467192][ T31] ? __pfx_panic+0x10/0x10 [ 689.467211][ T31] ? __pfx_delay_tsc+0x10/0x10 [ 689.467236][ T31] ? nmi_backtrace_stall_check+0x433/0x440 [ 689.467264][ T31] ? irq_work_queue+0xbc/0x140 [ 689.467301][ T31] watchdog+0x102d/0x1030 [ 689.467332][ T31] ? watchdog+0x1de/0x1030 [ 689.467366][ T31] kthread+0x70e/0x8a0 [ 689.467394][ T31] ? __pfx_watchdog+0x10/0x10 [ 689.467421][ T31] ? __pfx_kthread+0x10/0x10 [ 689.467447][ T31] ? _raw_spin_unlock_irq+0x23/0x50 [ 689.467467][ T31] ? lockdep_hardirqs_on+0x9c/0x150 [ 689.467626][ T31] ? __pfx_kthread+0x10/0x10 [ 689.467653][ T31] ret_from_fork+0x3fc/0x770 [ 689.467675][ T31] ? __pfx_ret_from_fork+0x10/0x10 [ 689.467700][ T31] ? __switch_to_asm+0x39/0x70 [ 689.467722][ T31] ? __switch_to_asm+0x33/0x70 [ 689.467802][ T31] ? __pfx_kthread+0x10/0x10 [ 689.467831][ T31] ret_from_fork_asm+0x1a/0x30 [ 689.467868][ T31] [ 689.468150][ T31] Kernel Offset: disabled