last executing test programs: 2m18.17042642s ago: executing program 4 (id=6867): mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x4c831, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x2064, &(0x7f0000000040)=[&(0x7f0000ff9000/0x2000)=nil], &(0x7f0000001180), &(0x7f0000000000), 0x0) 2m14.396040143s ago: executing program 0 (id=6879): r0 = socket$nl_generic(0x10, 0x3, 0x10) connect$netlink(r0, &(0x7f0000000000), 0xc) 2m13.924564852s ago: executing program 0 (id=6884): r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x2c, &(0x7f00000003c0)=[@in={0x2, 0x4e20, @rand_addr=0x64010102}, @in6={0xa, 0x4e20, 0x200, @mcast2, 0x20000}]}, &(0x7f00000001c0)=0x10) 2m13.524216063s ago: executing program 1 (id=6885): r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000240)={0x400, 0x30, 0xf0, 0x0, 0x0, 0x1f, 0x0, 0x0, {}, {}, {}, {}, 0x0, 0x40, 0x0, 0x7, 0x0, 0x5, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x16, 0x0, 0x0, 0x5}) 2m13.391571144s ago: executing program 0 (id=6886): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x3, 0xc, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000610000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000110b0008850000006d00000095"], &(0x7f0000000500)='GPL\x00', 0x7, 0x0, 0x0, 0x0, 0xd, '\x00', 0x0, @sched_cls=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r0, 0x0, 0xe, 0x0, &(0x7f00000007c0)="c1188e99b95d02ff4284860188a8", 0x0, 0xc00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x50) 2m13.109566733s ago: executing program 1 (id=6888): r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) write$nbd(r0, 0x0, 0x40) 2m13.002881416s ago: executing program 0 (id=6890): r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000001c0)={0x8}, 0x10) 2m12.82172328s ago: executing program 1 (id=6891): r0 = openat$mixer(0xffffffffffffff9c, &(0x7f00000016c0), 0x121040, 0x0) ioctl$SOUND_MIXER_READ_VOLUME(r0, 0x40086603, &(0x7f0000000040)) 2m12.712338708s ago: executing program 0 (id=6893): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000300)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x7, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x30, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_USERDATA={0xe, 0x3, "91abc12404cf378042f2"}]}, @NFT_MSG_DELTABLE={0x14, 0x2, 0xa, 0x9}], {0x14}}, 0x8c}}, 0x0) 2m12.455183159s ago: executing program 1 (id=6894): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000070000020900010073797a30000000004c000000090a010400000000000000000700000008000a40000000000900020073797a31000000000900010073797a3000000000080005400000000d08000640ffffff00080003400000000c2c0000000b0a01070000001800000000070000000900020073797a3100000000090001"], 0xc0}}, 0x0) 2m10.676457718s ago: executing program 4 (id=6897): r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_ADD_MFC(r0, 0x0, 0xcc, 0x0, 0x0) 2m9.985054316s ago: executing program 4 (id=6899): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x5b8, 0x0, &(0x7f0000000000)="b9ff030711a5268c019e14f088a847e0ffff00124000632177fbac141416e000030a94029f030301800000ca6aab840000008100", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 2m9.739939278s ago: executing program 2 (id=6900): r0 = syz_open_dev$video(&(0x7f0000000040), 0xa7, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000000)={0xc, {0xffff0001, 0xdf8, 0x9, 0x7ff}, {0x2, 0xb, 0xfffffff7, 0x1ff}, {0xd42, 0x200}}) 2m9.732422995s ago: executing program 4 (id=6901): r0 = syz_open_dev$vim2m(&(0x7f0000000000), 0xffffffff, 0x2) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f00000001c0)={0x1, @pix_mp={0x4, 0x0, 0x38415262, 0x3, 0x9, [{0x9, 0x4}, {0x0, 0x5724}, {0x2, 0x7f}, {0x5, 0x8}, {0x69b42e76, 0x3}, {0x101, 0x2}, {0x0, 0xfffffffd}, {0x150c, 0xffff1900}], 0x4, 0x8, 0x0, 0x1, 0x5}}) 2m9.521641552s ago: executing program 4 (id=6902): r0 = openat$binfmt_register(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$binfmt_register(r0, &(0x7f0000000140)={0x3a, 'syz3', 0x3a, 'M', 0x3a, 0x3, 0x3a, '\x00\x00\x00', 0x3a, '!/', 0x3a, './file0'}, 0x2c) 2m9.45612042s ago: executing program 2 (id=6903): r0 = socket$packet(0x11, 0x2, 0x300) sendmmsg$sock(r0, &(0x7f0000000840)=[{{&(0x7f0000000000)=@tipc=@name={0x1e, 0x2, 0x2, {{0x42}}}, 0x80, 0x0, 0x0, &(0x7f0000000a80)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}}], 0x1, 0x4) 2m9.214391551s ago: executing program 4 (id=6904): r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000500)="2400000011005f0414f9f40700090400810000000d0000000000000008000f0001000000", 0x24) 2m4.998189553s ago: executing program 0 (id=6905): r0 = socket(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000000)="7800000018002507b9409b14ffff00000202be04020506056403040c5c0009003f0020010a0000000d0085a168216b46d32345653600648d27000b000a00080049935ade4a460c89b6ec0cff3959547f509058ba86c902007a00004a32000402160020200800000000000000e218d1ddf66ed538f2523250", 0x78, 0x0, 0x0, 0x0) 2m4.9946195s ago: executing program 1 (id=6906): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000003580)={&(0x7f00000001c0)=ANY=[@ANYBLOB="cc010000110001002abd7000fffffffffe80000000000000000000000000003e000004d50200ff0008001e000002000028001a00ff020000000000000000000000000001e00000020000000000000000000000000a002b06e4000600000000000000000000000000000000017f0000010000000000000000000000004e2300004e240009000000a05c000000", @ANYRES32, @ANYRES32, @ANYBLOB="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"], 0x1cc}, 0x1, 0x0, 0x0, 0x844}, 0x4810) 2m4.728527623s ago: executing program 2 (id=6908): r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)=ANY=[@ANYBLOB="1400000013000104000000000000000003"], 0x14}], 0x1}, 0x0) 2m4.537627989s ago: executing program 1 (id=6909): r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000300)=ANY=[@ANYBLOB="2400000076001f03000000000000000008000000ffffffff0c000d80080003"], 0x24}], 0x1}, 0x0) 2m4.530078885s ago: executing program 3 (id=6910): capset(&(0x7f0000000080)={0x20080522}, &(0x7f0000000040)={0x1000, 0x10ffff, 0xfffffffd}) socket(0x25, 0x1, 0xffffffff) 2m4.329087264s ago: executing program 2 (id=6911): r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='uid_map\x00') pread64(r0, &(0x7f000001a240)=""/102400, 0x19000, 0x21) 2m4.176796303s ago: executing program 3 (id=6912): r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x8916, 0x0) 2m4.034345649s ago: executing program 2 (id=6913): mmap$xdp(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x0, 0x42031, 0xffffffffffffffff, 0x0) mmap$xdp(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x2, 0x7e832, 0xffffffffffffffff, 0x0) 2m3.957133428s ago: executing program 3 (id=6914): r0 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f00000003c0)='ceph\x00', 0x0, &(0x7f0000000400)="010000000037a788a11d1f000000000000006923c63a4541062101a59ea9cba39a989ca8c70b3692930208", 0x2b, r0) 2m3.747666311s ago: executing program 2 (id=6915): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000000200)="1700000072006bcd9e3fe3dc6e08000007230000040200", 0x17}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) 2m3.717328998s ago: executing program 3 (id=6916): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) quotactl$Q_SYNC(0xffffffff80000102, 0x0, 0x0, 0x0) 2m3.553145115s ago: executing program 3 (id=6917): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0xbe) 2m2.099189017s ago: executing program 3 (id=6918): r0 = syz_open_dev$dri(&(0x7f0000000000), 0x1ff, 0x0) ioctl$DRM_IOCTL_MODE_PAGE_FLIP(r0, 0xc01864b0, &(0x7f0000000340)={0x0, 0x0, 0xa, 0x0, 0x6}) 39.025508279s ago: executing program 32 (id=6904): r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000500)="2400000011005f0414f9f40700090400810000000d0000000000000008000f0001000000", 0x24) 0s ago: executing program 33 (id=6905): r0 = socket(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000000)="7800000018002507b9409b14ffff00000202be04020506056403040c5c0009003f0020010a0000000d0085a168216b46d32345653600648d27000b000a00080049935ade4a460c89b6ec0cff3959547f509058ba86c902007a00004a32000402160020200800000000000000e218d1ddf66ed538f2523250", 0x78, 0x0, 0x0, 0x0) kernel console output (not intermixed with test programs): with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 644.082724][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 644.084090][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 644.085385][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 644.086715][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 644.088424][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 644.089799][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 644.091113][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 644.092482][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 644.093842][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 645.492352][ T6195] usb 4-1: new full-speed USB device number 15 using dummy_hcd [ 645.671741][ T6195] usb 4-1: New USB device found, idVendor=05d1, idProduct=2001, bcdDevice= 2.00 [ 645.671769][ T6195] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 645.710163][ T6195] usb 4-1: config 0 descriptor?? [ 645.757942][ T6195] ftdi_sio 4-1:0.0: FTDI USB Serial Device converter detected [ 646.087731][ T6195] usb 4-1: Detected FT232B [ 646.308034][ T6195] ftdi_sio ttyUSB0: Unable to read latency timer: -71 [ 646.309636][ T6195] ftdi_sio ttyUSB0: Unable to write latency timer: -71 [ 646.426503][ T6195] usb 4-1: FTDI USB Serial Device converter now attached to ttyUSB0 [ 646.505249][ T6195] usb 4-1: USB disconnect, device number 15 [ 646.629387][ T6195] ftdi_sio ttyUSB0: FTDI USB Serial Device converter now disconnected from ttyUSB0 [ 646.634596][ T6195] ftdi_sio 4-1:0.0: device disconnected [ 647.856853][ T37] kauditd_printk_skb: 4574 callbacks suppressed [ 647.856872][ T37] audit: type=1400 audit(1756568903.584:337451): lsm=SMACK fn=smack_inode_rmdir action=granted subject="_" object="_" requested=w pid=6124 comm="syz-executor" name="1314" dev="tmpfs" ino=6602 [ 647.856914][ T37] audit: type=1400 audit(1756568903.584:337452): lsm=SMACK fn=smack_inode_rmdir action=granted subject="_" object="_" requested=w pid=6124 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 647.856952][ T37] audit: type=1400 audit(1756568903.584:337453): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6124 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 647.856991][ T37] audit: type=1400 audit(1756568903.584:337454): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6124 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 647.858484][ T37] audit: type=1400 audit(1756568903.593:337455): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=6124 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 647.859156][ T37] audit: type=1400 audit(1756568903.593:337456): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6124 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 647.859938][ T37] audit: type=1400 audit(1756568903.593:337457): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6124 comm="syz-executor" name="/" dev="devtmpfs" ino=1 [ 647.860394][ T37] audit: type=1400 audit(1756568903.593:337458): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=rw pid=6124 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 [ 647.861187][ T37] audit: type=1400 audit(1756568903.593:337459): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=6124 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=648 [ 648.055788][ T37] audit: type=1400 audit(1756568903.724:337460): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=6118 comm="syz-executor" opid=19920 ocomm="syz.0.6732" [ 649.437686][ C0] net_ratelimit: 4015 callbacks suppressed [ 649.437709][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 649.439485][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 649.440833][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 649.442183][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 649.443503][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 649.444862][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 649.446195][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 649.447552][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 649.448892][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 649.450304][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 650.038429][ T1324] ieee802154 phy0 wpan0: encryption failed: -22 [ 650.038505][ T1324] ieee802154 phy1 wpan1: encryption failed: -22 [ 653.265074][ T37] kauditd_printk_skb: 1061 callbacks suppressed [ 653.265096][ T37] audit: type=1400 audit(1756568908.645:338522): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=53448 netif=eth0 [ 653.760406][ T37] audit: type=1400 audit(1756568909.113:338523): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=53448 netif=eth0 [ 654.275224][ T37] audit: type=1400 audit(1756568909.580:338524): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=53448 netif=eth0 [ 654.769193][ T37] audit: type=1400 audit(1756568910.048:338525): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=53448 netif=eth0 [ 654.792208][ C0] net_ratelimit: 4357 callbacks suppressed [ 654.792231][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 654.793497][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 654.794747][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 654.796367][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 654.797666][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 654.798936][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 654.800222][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 654.801559][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 654.802926][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 654.804198][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 655.263389][ T37] audit: type=1400 audit(1756568910.525:338526): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=53448 netif=eth0 [ 655.764007][ T37] audit: type=1400 audit(1756568910.984:338527): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=53448 netif=eth0 [ 655.914561][ T37] audit: type=1400 audit(1756568911.124:338528): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6129 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 655.914612][ T37] audit: type=1400 audit(1756568911.124:338529): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6129 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 655.914652][ T37] audit: type=1400 audit(1756568911.124:338530): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6129 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 655.914690][ T37] audit: type=1400 audit(1756568911.124:338531): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6129 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 656.032013][T19956] netlink: 132 bytes leftover after parsing attributes in process `syz.0.6748'. [ 656.898795][T19978] netlink: 'syz.2.6754': attribute type 10 has an invalid length. [ 657.432378][ T31] usb 5-1: new high-speed USB device number 16 using dummy_hcd [ 657.614026][ T31] usb 5-1: Using ep0 maxpacket: 16 [ 657.660493][ T31] usb 5-1: New USB device found, idVendor=05ac, idProduct=0263, bcdDevice=6f.9e [ 657.660522][ T31] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 657.660541][ T31] usb 5-1: Product: syz [ 657.660554][ T31] usb 5-1: Manufacturer: syz [ 657.660567][ T31] usb 5-1: SerialNumber: syz [ 657.724532][ T31] usb 5-1: config 0 descriptor?? [ 657.780722][ T31] input: bcm5974 as /devices/platform/dummy_hcd.4/usb5/5-1/5-1:0.0/input/input66 [ 658.069957][ T5198] bcm5974 5-1:0.0: could not read from device [ 658.301914][T19978] macvlan0: entered promiscuous mode [ 658.430136][T19978] bond0: (slave macvlan0): Enslaving as an active interface with an up link [ 658.515016][ T31] usb 5-1: USB disconnect, device number 16 [ 658.643392][ T37] kauditd_printk_skb: 1682 callbacks suppressed [ 658.643410][ T37] audit: type=1400 audit(1756568913.659:340214): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6124 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 658.643455][ T37] audit: type=1400 audit(1756568913.659:340215): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6124 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 658.643496][ T37] audit: type=1400 audit(1756568913.659:340216): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6124 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 658.643536][ T37] audit: type=1400 audit(1756568913.659:340217): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6124 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 658.643575][ T37] audit: type=1400 audit(1756568913.659:340218): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=6124 comm="syz-executor" name="1319" dev="tmpfs" ino=6627 [ 658.643614][ T37] audit: type=1400 audit(1756568913.659:340219): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=6124 comm="syz-executor" path="/1319" dev="tmpfs" ino=6627 [ 658.643653][ T37] audit: type=1400 audit(1756568913.659:340220): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=6124 comm="syz-executor" path="/1319" dev="tmpfs" ino=6627 [ 658.643692][ T37] audit: type=1400 audit(1756568913.659:340221): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6124 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 658.643732][ T37] audit: type=1400 audit(1756568913.659:340222): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6124 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 658.643772][ T37] audit: type=1400 audit(1756568913.659:340223): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6124 comm="syz-executor" name="1319" dev="tmpfs" ino=6627 [ 659.215821][T19991] netlink: 'syz.2.6763': attribute type 2 has an invalid length. [ 659.215844][T19991] netlink: 199836 bytes leftover after parsing attributes in process `syz.2.6763'. [ 659.215873][T19991] nbd: must specify at least one socket [ 659.330323][T19992] vti0: entered promiscuous mode [ 659.400329][T19984] udevd[19984]: setting mode of /dev/bus/usb/005/016 to 020664 failed: No such file or directory [ 659.401021][T19984] udevd[19984]: setting owner of /dev/bus/usb/005/016 to uid=0, gid=0 failed: No such file or directory [ 660.147873][ C0] net_ratelimit: 4035 callbacks suppressed [ 660.147916][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 660.149287][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 660.150824][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 660.152113][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 660.153466][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 660.154773][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 660.156132][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 660.157461][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 660.158850][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 660.160139][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 664.220223][ T37] kauditd_printk_skb: 3605 callbacks suppressed [ 664.220239][ T37] audit: type=1400 audit(1756568918.898:343829): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5213 comm="udevd" opid=19984 ocomm="udevd" [ 664.220599][ T37] audit: type=1400 audit(1756568918.898:343830): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5213 comm="udevd" opid=19983 ocomm="udevd" [ 664.220872][ T37] audit: type=1400 audit(1756568918.898:343831): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5213 comm="udevd" opid=19985 ocomm="udevd" [ 664.294002][ T37] audit: type=1400 audit(1756568918.898:343832): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5213 comm="udevd" name="/" dev="sda1" ino=2 [ 664.294052][ T37] audit: type=1400 audit(1756568918.964:343833): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=53448 netif=eth0 [ 664.348270][ T37] audit: type=1400 audit(1756568919.010:343834): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5213 comm="udevd" name="etc" dev="sda1" ino=116 [ 664.348322][ T37] audit: type=1400 audit(1756568919.010:343835): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5213 comm="udevd" name="udev" dev="sda1" ino=259 [ 664.487184][ T37] audit: type=1400 audit(1756568919.132:343836): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5213 comm="udevd" path="/etc/udev/rules.d" dev="sda1" ino=261 [ 664.534451][ T37] audit: type=1400 audit(1756568919.179:343837): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6125 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 664.534498][ T37] audit: type=1400 audit(1756568919.188:343838): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6125 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 665.351020][T20042] IPv6: Can't replace route, no match found [ 665.503497][ C0] net_ratelimit: 4033 callbacks suppressed [ 665.503517][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 665.504998][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 665.506423][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 665.507859][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 665.509250][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 665.510689][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 665.512113][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 665.513606][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 665.515043][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 665.516448][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 665.973179][ T31] usb 5-1: new high-speed USB device number 17 using dummy_hcd [ 666.272282][ T31] usb 5-1: Using ep0 maxpacket: 8 [ 666.296061][ T31] usb 5-1: config index 0 descriptor too short (expected 1821, got 853) [ 666.296088][ T31] usb 5-1: config 0 has an invalid interface number: 103 but max is 2 [ 666.296108][ T31] usb 5-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 666.296125][ T31] usb 5-1: config 0 has 2 interfaces, different from the descriptor's value: 3 [ 666.296143][ T31] usb 5-1: config 0 has no interface number 1 [ 666.296205][ T31] usb 5-1: config 0 interface 103 altsetting 9 endpoint 0x7 has an invalid bInterval 0, changing to 7 [ 666.296229][ T31] usb 5-1: config 0 interface 103 altsetting 9 endpoint 0xE has invalid maxpacket 1024, setting to 64 [ 666.296258][ T31] usb 5-1: config 0 interface 103 altsetting 9 has a duplicate endpoint with address 0x8, skipping [ 666.296279][ T31] usb 5-1: config 0 interface 103 altsetting 9 has a duplicate endpoint with address 0x4, skipping [ 666.296301][ T31] usb 5-1: config 0 interface 103 has no altsetting 0 [ 666.560131][ T31] usb 5-1: New USB device found, idVendor=04b4, idProduct=1002, bcdDevice=cd.b4 [ 666.560162][ T31] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 666.560180][ T31] usb 5-1: Product: syz [ 666.560193][ T31] usb 5-1: Manufacturer: syz [ 666.560206][ T31] usb 5-1: SerialNumber: syz [ 666.653187][ T31] usb 5-1: config 0 descriptor?? [ 667.095622][ T6080] usb 1-1: new high-speed USB device number 20 using dummy_hcd [ 667.317447][ T6080] usb 1-1: Using ep0 maxpacket: 32 [ 667.446546][ T6080] usb 1-1: config 0 has an invalid interface number: 85 but max is 0 [ 667.446572][ T6080] usb 1-1: config 0 has no interface number 0 [ 667.446619][ T6080] usb 1-1: config 0 interface 85 altsetting 7 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 667.446644][ T6080] usb 1-1: config 0 interface 85 has no altsetting 0 [ 667.540186][ T6080] usb 1-1: New USB device found, idVendor=05ac, idProduct=0219, bcdDevice=f0.72 [ 667.540223][ T6080] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 667.540241][ T6080] usb 1-1: Product: syz [ 667.540255][ T6080] usb 1-1: Manufacturer: syz [ 667.540267][ T6080] usb 1-1: SerialNumber: syz [ 667.688666][ T6080] usb 1-1: config 0 descriptor?? [ 667.715780][T20062] C: renamed from lo (while UP) [ 667.871755][ T31] videodev: could not get a free minor [ 667.871771][ T31] dsbr100 5-1:0.0: couldn't register video device [ 667.893385][ T31] dsbr100 5-1:0.0: probe with driver dsbr100 failed with error -23 [ 668.077849][ T31] usb 5-1: USB disconnect, device number 17 [ 668.133238][ T6080] appletouch 1-1:0.85: Failed to read mode from device. [ 668.133563][ T6080] appletouch 1-1:0.85: probe with driver appletouch failed with error -5 [ 668.344015][ T6080] usb 1-1: USB disconnect, device number 20 [ 669.170552][T20075] netlink: 'syz.2.6799': attribute type 41 has an invalid length. [ 669.586084][ T37] kauditd_printk_skb: 6369 callbacks suppressed [ 669.586102][ T37] audit: type=1400 audit(1756568923.912:347274): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20082 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 669.586146][ T37] audit: type=1400 audit(1756568923.912:347275): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20082 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 669.586184][ T37] audit: type=1400 audit(1756568923.912:347276): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20082 comm="syz-executor" name="1255" dev="tmpfs" ino=6305 [ 669.586223][ T37] audit: type=1400 audit(1756568923.912:347277): lsm=SMACK fn=smack_task_setpgid action=granted subject="_" object="_" requested=w pid=20082 comm="syz-executor" opid=20082 ocomm="syz-executor" [ 669.595192][ T37] audit: type=1400 audit(1756568923.922:347278): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20082 comm="syz-executor" name="1255" dev="tmpfs" ino=6305 [ 669.595242][ T37] audit: type=1400 audit(1756568923.922:347279): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20082 comm="syz-executor" name="1255" dev="tmpfs" ino=6305 [ 669.731943][ T37] audit: type=1400 audit(1756568924.053:347280): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=20082 comm="syz-executor" name="1255" dev="tmpfs" ino=6305 [ 669.756941][ T37] audit: type=1400 audit(1756568924.071:347281): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20082 comm="syz-executor" name="1255" dev="tmpfs" ino=6305 [ 669.756984][ T37] audit: type=1400 audit(1756568924.071:347282): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20082 comm="syz-executor" name="1255" dev="tmpfs" ino=6305 [ 669.757014][ T37] audit: type=1400 audit(1756568924.071:347283): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=20082 comm="syz-executor" name="1255" dev="tmpfs" ino=6305 [ 670.139406][T20079] Bluetooth: hci0: Opcode 0x0c20 failed: -4 [ 670.858119][ C0] net_ratelimit: 3939 callbacks suppressed [ 670.858144][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 670.859676][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 670.861126][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 670.862487][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 670.863823][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 670.865395][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 670.866939][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 670.868377][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 670.869827][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 670.871138][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 671.488747][ T6128] Bluetooth: hci0: command 0x0406 tx timeout [ 672.289235][T20095] batman_adv: Cannot find parent device. Skipping batadv-on-batadv check for ip6gretap1 [ 674.364167][ T5846] usb 4-1: new high-speed USB device number 16 using dummy_hcd [ 674.530637][ T5846] usb 4-1: New USB device found, idVendor=0bed, idProduct=1100, bcdDevice=ec.c3 [ 674.530666][ T5846] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 674.572083][ T5846] usb 4-1: config 0 descriptor?? [ 674.639429][ T5846] cp210x 4-1:0.0: cp210x converter detected [ 674.947686][ T37] kauditd_printk_skb: 4036 callbacks suppressed [ 674.947705][ T37] audit: type=1400 audit(1756568928.917:351209): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=20141 comm="udevd" path="/sys/devices/platform/dummy_hcd.3/usb4/4-1/idVendor" dev="sysfs" ino=247165 [ 674.947750][ T37] audit: type=1400 audit(1756568928.927:351210): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20150 comm="syz-executor" name="1312" dev="tmpfs" ino=6586 [ 674.947789][ T37] audit: type=1400 audit(1756568928.927:351211): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6118 comm="syz-executor" name="1352" dev="tmpfs" ino=6793 [ 674.947828][ T37] audit: type=1400 audit(1756568928.927:351212): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20141 comm="udevd" name="/" dev="sda1" ino=2 [ 674.947866][ T37] audit: type=1400 audit(1756568928.927:351213): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20141 comm="udevd" name="/" dev="sysfs" ino=1 [ 674.947906][ T37] audit: type=1400 audit(1756568928.927:351214): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20141 comm="udevd" name="devices" dev="sysfs" ino=7 [ 674.947944][ T37] audit: type=1400 audit(1756568928.927:351215): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20141 comm="udevd" name="platform" dev="sysfs" ino=36 [ 674.947982][ T37] audit: type=1400 audit(1756568928.927:351216): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20141 comm="udevd" name="dummy_hcd.3" dev="sysfs" ino=26170 [ 674.948022][ T37] audit: type=1400 audit(1756568928.927:351217): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20141 comm="udevd" name="usb4" dev="sysfs" ino=26199 [ 674.948060][ T37] audit: type=1400 audit(1756568928.927:351218): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20141 comm="udevd" name="4-1" dev="sysfs" ino=247157 [ 675.192852][ T5846] usb 4-1: cp210x converter now attached to ttyUSB0 [ 675.260803][ T5846] usb 4-1: USB disconnect, device number 16 [ 675.325349][ T5846] cp210x ttyUSB0: cp210x converter now disconnected from ttyUSB0 [ 675.350578][ T5846] cp210x 4-1:0.0: device disconnected [ 676.213612][ C0] net_ratelimit: 3895 callbacks suppressed [ 676.213632][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 676.214922][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 676.216252][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 676.217520][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 676.218984][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 676.220558][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 676.221830][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 676.223167][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 676.224511][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 676.225843][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 676.891515][T20168] delete_channel: no stack [ 677.016942][T20172] netlink: 12 bytes leftover after parsing attributes in process `syz.4.6844'. [ 677.182301][T20172] bridge1: trying to set multicast query interval below minimum, setting to 100 (1000ms) [ 677.853131][T20189] netlink: 800 bytes leftover after parsing attributes in process `syz.2.6853'. [ 677.853168][T20189] netlink: 1301 bytes leftover after parsing attributes in process `syz.2.6853'. [ 678.282067][T20196] netlink: 8 bytes leftover after parsing attributes in process `syz.4.6855'. [ 678.806873][T20201] netlink: 'syz.3.6862': attribute type 3 has an invalid length. [ 680.136853][ T31] usb 1-1: new high-speed USB device number 21 using dummy_hcd [ 680.325673][ T37] kauditd_printk_skb: 4871 callbacks suppressed [ 680.325691][ T37] audit: type=1400 audit(1756568933.960:355730): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6129 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 680.325735][ T37] audit: type=1400 audit(1756568933.960:355731): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6129 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 680.325843][ T37] audit: type=1400 audit(1756568933.960:355732): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6129 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 680.325896][ T37] audit: type=1400 audit(1756568933.960:355733): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6129 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 680.325933][ T37] audit: type=1400 audit(1756568933.960:355734): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=6129 comm="syz-executor" name="1272" dev="tmpfs" ino=6390 [ 680.325970][ T37] audit: type=1400 audit(1756568933.960:355735): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=6129 comm="syz-executor" path="/1272" dev="tmpfs" ino=6390 [ 680.327186][ T37] audit: type=1400 audit(1756568933.960:355736): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=6129 comm="syz-executor" path="/1272" dev="tmpfs" ino=6390 [ 680.327465][ T37] audit: type=1400 audit(1756568933.960:355737): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6129 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 680.423446][T20223] audit: audit_backlog=65 > audit_backlog_limit=64 [ 680.423466][T20223] audit: audit_lost=21691 audit_rate_limit=0 audit_backlog_limit=64 [ 680.602921][ T31] usb 1-1: unable to get BOS descriptor or descriptor too short [ 680.617567][ T31] usb 1-1: config 14 has an invalid interface number: 21 but max is 0 [ 680.617595][ T31] usb 1-1: config 14 has no interface number 0 [ 680.617642][ T31] usb 1-1: config 14 interface 21 altsetting 251 bulk endpoint 0xA has invalid maxpacket 32 [ 680.617666][ T31] usb 1-1: config 14 interface 21 has no altsetting 0 [ 680.699617][ T31] usb 1-1: New USB device found, idVendor=c880, idProduct=760e, bcdDevice=35.fc [ 680.699646][ T31] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 680.699670][ T31] usb 1-1: Product: syz [ 680.699683][ T31] usb 1-1: Manufacturer: syz [ 680.699696][ T31] usb 1-1: SerialNumber: syz [ 680.752289][T20222] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 681.193489][ T31] usb 1-1: Quirk or no altset; falling back to MIDI 1.0 [ 681.193547][ T31] usb 1-1: MIDIStreaming interface descriptor not found [ 681.464067][ T31] usb 1-1: USB disconnect, device number 21 [ 681.569341][ C0] net_ratelimit: 3979 callbacks suppressed [ 681.569358][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 681.570352][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 681.571517][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 681.572919][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 681.574362][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 681.575771][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 681.577143][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 681.578276][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 681.580403][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 681.581796][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 681.899859][T20141] udevd[20141]: setting owner of /dev/bus/usb/001/021 to uid=0, gid=0 failed: No such file or directory [ 682.092041][T20231] : entered promiscuous mode [ 682.907652][T20240] udevd[20240]: error opening ATTR{/sys/devices/platform/dummy_hcd.0/usb1/1-1/1-1:14.21/sound/card3/controlC3/../uevent} for writing: No such file or directory [ 683.464384][T20251] gtp0: entered promiscuous mode [ 685.837798][ T37] kauditd_printk_skb: 5903 callbacks suppressed [ 685.837817][ T37] audit: type=1400 audit(1756568939.124:360236): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=53448 netif=eth0 [ 686.185447][ T37] audit: type=1400 audit(1756568939.442:360237): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6129 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 686.185498][ T37] audit: type=1400 audit(1756568939.442:360238): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6129 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 686.185539][ T37] audit: type=1400 audit(1756568939.442:360239): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6129 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 686.185586][ T37] audit: type=1400 audit(1756568939.442:360240): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6129 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 686.185624][ T37] audit: type=1400 audit(1756568939.442:360241): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=6129 comm="syz-executor" name="1281" dev="tmpfs" ino=6435 [ 686.185662][ T37] audit: type=1400 audit(1756568939.442:360242): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=6129 comm="syz-executor" path="/1281" dev="tmpfs" ino=6435 [ 686.185701][ T37] audit: type=1400 audit(1756568939.442:360243): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=6129 comm="syz-executor" path="/1281" dev="tmpfs" ino=6435 [ 686.185742][ T37] audit: type=1400 audit(1756568939.442:360244): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6129 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 686.185781][ T37] audit: type=1400 audit(1756568939.442:360245): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6129 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 686.925136][ C0] net_ratelimit: 3949 callbacks suppressed [ 686.925162][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 686.926758][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 686.928108][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 686.929804][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 686.931253][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 686.932643][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 686.934110][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 686.935766][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 686.937301][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 686.938679][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 688.181510][T20296] netlink: 4 bytes leftover after parsing attributes in process `syz.4.6904'. [ 688.182002][T20296] bridge0: port 3(batadv0) entered disabled state [ 691.285480][ T37] kauditd_printk_skb: 979 callbacks suppressed [ 691.285500][ T37] audit: type=1400 audit(1756568944.204:361225): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6129 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 691.285544][ T37] audit: type=1400 audit(1756568944.213:361226): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6129 comm="syz-executor" name="/" dev="sysfs" ino=1 [ 691.285585][ T37] audit: type=1400 audit(1756568944.213:361227): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6129 comm="syz-executor" name="fs" dev="sysfs" ino=2 [ 691.285623][ T37] audit: type=1400 audit(1756568944.213:361228): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6129 comm="syz-executor" name="fuse" dev="sysfs" ino=5240 [ 691.285662][ T37] audit: type=1400 audit(1756568944.213:361229): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=6129 comm="syz-executor" name="/" dev="fusectl" ino=1 [ 691.345752][ T37] audit: type=1400 audit(1756568944.269:361230): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=53448 netif=eth0 [ 691.358944][ T37] audit: type=1400 audit(1756568944.279:361231): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=6122 comm="syz-executor" opid=20295 ocomm="syz.4.6904" [ 691.358994][ T37] audit: type=1400 audit(1756568944.279:361232): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=6122 comm="syz-executor" opid=20295 ocomm="syz.4.6904" [ 691.488614][ T37] audit: type=1400 audit(1756568944.400:361233): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=6129 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 [ 691.545088][ T37] audit: type=1400 audit(1756568944.456:361234): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=6129 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 [ 692.279687][ C0] net_ratelimit: 4067 callbacks suppressed [ 692.279707][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 692.281081][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 692.282431][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 692.283844][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 692.285593][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 692.286992][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 692.288414][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 692.289851][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 692.291650][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 692.293110][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 696.662226][ T37] kauditd_printk_skb: 1370 callbacks suppressed [ 696.662243][ T37] audit: type=1400 audit(1756568948.311:362596): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=53448 netif=eth0 [ 696.662290][ T37] audit: type=1400 audit(1756568948.507:362597): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=53448 netif=eth0 [ 696.662330][ T37] audit: type=1400 audit(1756568948.591:362598): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=53448 netif=eth0 [ 696.662459][ T37] audit: type=1400 audit(1756568949.125:362599): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=53448 netif=eth0 [ 696.662509][ T37] audit: type=1400 audit(1756568949.246:362600): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=6118 comm="syz-executor" opid=20297 ocomm="syz.0.6905" [ 696.662627][ T37] audit: type=1400 audit(1756568949.246:362601): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=6118 comm="syz-executor" opid=20297 ocomm="syz.0.6905" [ 697.140492][ T37] audit: type=1400 audit(1756568949.611:362602): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=6124 comm="syz-executor" opid=20305 ocomm="syz.1.6909" [ 697.140545][ T37] audit: type=1400 audit(1756568949.611:362603): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=6124 comm="syz-executor" opid=20305 ocomm="syz.1.6909" [ 697.199127][ T37] audit: type=1400 audit(1756568949.733:362604): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=6129 comm="syz-executor" opid=20317 ocomm="syz.2.6915" [ 697.199178][ T37] audit: type=1400 audit(1756568949.751:362605): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=6129 comm="syz-executor" opid=20317 ocomm="syz.2.6915" [ 697.634825][ C1] net_ratelimit: 12633 callbacks suppressed [ 697.634848][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 697.635107][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 697.635326][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 697.635666][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 697.636110][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 697.636470][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 697.636908][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 697.637023][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 697.637253][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 697.637761][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 702.989949][ C1] net_ratelimit: 16082 callbacks suppressed [ 702.989972][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 702.990451][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 702.990813][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 702.991136][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 702.991340][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 702.991704][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 702.992191][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 702.992578][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 702.992590][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 702.993055][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 705.608881][ T37] kauditd_printk_skb: 1 callbacks suppressed [ 705.608896][ T37] audit: type=1400 audit(1756568957.610:362607): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20329 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 705.608940][ T37] audit: type=1400 audit(1756568957.610:362608): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20329 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 705.608977][ T37] audit: type=1400 audit(1756568957.610:362609): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20329 comm="syz-executor" name="1364" dev="tmpfs" ino=6847 [ 705.609013][ T37] audit: type=1400 audit(1756568957.610:362610): lsm=SMACK fn=smack_task_setpgid action=granted subject="_" object="_" requested=w pid=20329 comm="syz-executor" opid=20329 ocomm="syz-executor" [ 705.609051][ T37] audit: type=1400 audit(1756568957.610:362611): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20329 comm="syz-executor" name="1364" dev="tmpfs" ino=6847 [ 705.609088][ T37] audit: type=1400 audit(1756568957.610:362612): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20329 comm="syz-executor" name="1364" dev="tmpfs" ino=6847 [ 705.609124][ T37] audit: type=1400 audit(1756568957.610:362613): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=20329 comm="syz-executor" name="1364" dev="tmpfs" ino=6847 [ 705.609430][ T37] audit: type=1400 audit(1756568957.619:362614): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20329 comm="syz-executor" name="1364" dev="tmpfs" ino=6847 [ 705.609650][ T37] audit: type=1400 audit(1756568957.619:362615): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20329 comm="syz-executor" name="1364" dev="tmpfs" ino=6847 [ 705.610005][ T37] audit: type=1400 audit(1756568957.619:362616): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=20329 comm="syz-executor" name="1364" dev="tmpfs" ino=6847 [ 708.345407][ C1] net_ratelimit: 15869 callbacks suppressed [ 708.345429][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 708.345879][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 708.346259][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 708.346330][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 708.346708][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 708.347075][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 708.347529][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 708.347696][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 708.347870][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 708.348322][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 712.169649][ T37] kauditd_printk_skb: 29 callbacks suppressed [ 712.169669][ T37] audit: type=1400 audit(1756568963.719:362646): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=6125 comm="syz-executor" opid=20329 ocomm="syz.3.6918" [ 712.169712][ T37] audit: type=1400 audit(1756568963.728:362647): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=6125 comm="syz-executor" opid=20329 ocomm="syz.3.6918" [ 713.700679][ C1] net_ratelimit: 16194 callbacks suppressed [ 713.700700][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 713.701056][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 713.701069][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 713.701533][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 713.701895][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 713.702391][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 713.702514][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 713.702797][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 713.703294][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 713.703653][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 714.319759][ T37] audit: type=1400 audit(1756568965.758:362648): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6125 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 714.319822][ T37] audit: type=1400 audit(1756568965.758:362649): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6125 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 715.378956][ T37] audit: type=1400 audit(1756568965.786:362650): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=53448 netif=eth0 [ 715.379010][ T37] audit: type=1400 audit(1756568965.786:362651): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=53448 netif=eth0 [ 715.379050][ T37] audit: type=1400 audit(1756568965.786:362652): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=53448 netif=eth0 [ 715.379091][ T37] audit: type=1400 audit(1756568965.786:362653): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=53448 netif=eth0 [ 715.379128][ T37] audit: type=1400 audit(1756568965.786:362654): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=53448 netif=eth0 [ 715.379167][ T37] audit: type=1400 audit(1756568965.786:362655): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=53448 netif=eth0 [ 717.553604][ T37] kauditd_printk_skb: 49 callbacks suppressed [ 717.553624][ T37] audit: type=1400 audit(1756568966.796:362705): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6125 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 717.553669][ T37] audit: type=1400 audit(1756568966.927:362706): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=53448 netif=eth0 [ 717.553712][ T37] audit: type=1400 audit(1756568968.228:362707): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=53448 netif=eth0 [ 717.553753][ T37] audit: type=1400 audit(1756568968.658:362708): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=53448 netif=eth0 [ 717.965129][ T37] audit: type=1400 audit(1756568969.135:362709): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=53448 netif=eth0 [ 718.980434][ T37] audit: type=1400 audit(1756568969.603:362710): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=53448 netif=eth0 [ 718.980508][ T37] audit: type=1400 audit(1756568970.052:362711): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=53448 netif=eth0 [ 719.056154][ C1] net_ratelimit: 16168 callbacks suppressed [ 719.056176][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 719.056518][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 719.056978][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 719.056991][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 719.057345][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 719.057829][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 719.058174][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 719.058375][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 719.058626][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 719.058994][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 719.643986][ T37] audit: type=1400 audit(1756568970.529:362712): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=53448 netif=eth0 [ 719.665322][ T37] audit: type=1400 audit(1756568970.754:362713): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6125 comm="syz-executor" name="1364" dev="tmpfs" ino=6847 [ 719.665378][ T37] audit: type=1400 audit(1756568970.763:362714): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6125 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 721.629195][ T1324] ieee802154 phy0 wpan0: encryption failed: -22 [ 721.701285][ T1324] ieee802154 phy1 wpan1: encryption failed: -22 [ 722.936927][ T37] kauditd_printk_skb: 17 callbacks suppressed [ 722.936942][ T37] audit: type=1400 audit(1756568973.831:362732): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=6125 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 722.937174][ T37] audit: type=1400 audit(1756568973.831:362733): lsm=SMACK fn=smack_inode_rmdir action=granted subject="_" object="_" requested=w pid=6125 comm="syz-executor" name="1364" dev="tmpfs" ino=6847 [ 722.937386][ T37] audit: type=1400 audit(1756568973.831:362734): lsm=SMACK fn=smack_inode_rmdir action=granted subject="_" object="_" requested=w pid=6125 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 722.944697][ T37] audit: type=1400 audit(1756568973.831:362735): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6125 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 722.944910][ T37] audit: type=1400 audit(1756568973.831:362736): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6125 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 723.060923][ T37] audit: type=1400 audit(1756568973.869:362737): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=53448 netif=eth0 [ 724.411404][ C0] net_ratelimit: 16902 callbacks suppressed [ 724.411425][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 724.411619][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 724.412097][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 724.412404][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 724.412461][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 724.412914][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 724.413241][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 724.413256][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 724.413698][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 724.414070][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 725.691538][ T37] audit: type=1400 audit(1756568974.271:362738): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=53448 netif=eth0 [ 725.691593][ T37] audit: type=1400 audit(1756568974.748:362739): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=53448 netif=eth0 [ 725.691636][ T37] audit: type=1400 audit(1756568975.207:362740): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=53448 netif=eth0 [ 725.691686][ T37] audit: type=1400 audit(1756568975.684:362741): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=53448 netif=eth0 [ 729.670845][ T37] kauditd_printk_skb: 3 callbacks suppressed [ 729.670866][ T37] audit: type=1400 audit(1756568977.499:362745): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=6125 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 729.670911][ T37] audit: type=1400 audit(1756568977.564:362746): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=53448 netif=eth0 [ 729.670953][ T37] audit: type=1400 audit(1756568978.032:362747): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=53448 netif=eth0 [ 729.671003][ T37] audit: type=1400 audit(1756568978.537:362748): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=53448 netif=eth0 [ 729.671044][ T37] audit: type=1400 audit(1756568978.967:362749): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=53448 netif=eth0 [ 729.671084][ T37] audit: type=1400 audit(1756568979.435:362750): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=53448 netif=eth0 [ 729.671125][ T37] audit: type=1400 audit(1756568979.912:362751): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=53448 netif=eth0 [ 729.766700][ C1] net_ratelimit: 17662 callbacks suppressed [ 729.766723][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 729.766829][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 729.767201][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 729.767549][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 729.767778][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 729.767994][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 729.768340][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 729.768576][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 729.768810][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 729.769304][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 732.124190][ C1] ip6_tunnel: ip6gre1 xmit: Local address not yet configured! [ 732.492535][ T37] audit: type=1400 audit(1756568980.371:362752): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=53448 netif=eth0 [ 732.492591][ T37] audit: type=1400 audit(1756568980.838:362753): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=53448 netif=eth0 [ 732.492633][ T37] audit: type=1400 audit(1756568981.297:362754): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=53448 netif=eth0 [ 735.122359][ C1] net_ratelimit: 18286 callbacks suppressed [ 735.122380][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 735.122763][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 735.123212][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 735.123586][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 735.124042][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 735.124384][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 735.124837][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 735.125206][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 735.125626][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 735.125977][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 735.644754][ T37] kauditd_printk_skb: 9 callbacks suppressed [ 735.644773][ T37] audit: type=1400 audit(1756568985.507:362764): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=53448 netif=eth0 [ 737.005856][ T37] audit: type=1400 audit(1756568985.993:362765): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=53448 netif=eth0 [ 737.005912][ T37] audit: type=1400 audit(1756568986.059:362766): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6125 comm="syz-executor" name="/" dev="devtmpfs" ino=1 [ 737.005953][ T37] audit: type=1400 audit(1756568986.059:362767): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=rw pid=6125 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 [ 737.005993][ T37] audit: type=1400 audit(1756568986.077:362768): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=6125 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=650 [ 737.006032][ T37] audit: type=1400 audit(1756568986.461:362769): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=53448 netif=eth0 [ 737.006072][ T37] audit: type=1400 audit(1756568986.929:362770): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=53448 netif=eth0 [ 738.315601][ T37] audit: type=1400 audit(1756568987.396:362771): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=53448 netif=eth0 [ 738.315656][ T37] audit: type=1400 audit(1756568987.873:362772): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=53448 netif=eth0 [ 738.767298][ T37] audit: type=1400 audit(1756568988.341:362773): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=53448 netif=eth0 [ 740.477594][ C1] net_ratelimit: 18075 callbacks suppressed [ 740.477615][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 740.477958][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 740.478067][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 740.478414][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 740.478754][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 740.479012][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 740.479258][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 740.479651][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 740.479823][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 740.480114][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 741.036549][ T37] kauditd_printk_skb: 3 callbacks suppressed [ 741.036569][ T37] audit: type=1400 audit(1756568989.651:362777): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5830 comm="syz-executor" opid=6117 ocomm="syz-executor" [ 742.397616][ T37] audit: type=1400 audit(1756568991.999:362778): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=6117 comm="syz-executor" opid=6122 ocomm="syz-executor" [ 745.832875][ C1] net_ratelimit: 17889 callbacks suppressed [ 745.832897][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 745.833271][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 745.833501][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 745.833726][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 745.834067][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 745.834429][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 745.834546][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 745.834888][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 745.835340][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 745.835463][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 748.842055][ T37] audit: type=1400 audit(1756568998.033:362779): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6124 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 749.576523][ T37] audit: type=1400 audit(1756568998.735:362780): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6124 comm="syz-executor" name="/" dev="sysfs" ino=1 [ 749.576577][ T37] audit: type=1400 audit(1756568998.735:362781): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6124 comm="syz-executor" name="fs" dev="sysfs" ino=2 [ 749.576617][ T37] audit: type=1400 audit(1756568998.735:362782): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6124 comm="syz-executor" name="fuse" dev="sysfs" ino=5240 [ 749.576657][ T37] audit: type=1400 audit(1756568998.735:362783): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=6124 comm="syz-executor" name="/" dev="fusectl" ino=1 [ 751.188215][ C1] net_ratelimit: 17989 callbacks suppressed [ 751.188237][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 751.188621][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 751.188826][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 751.189157][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 751.189568][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 751.189753][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 751.190068][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 751.190448][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 751.190570][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 751.191054][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 753.382765][ T37] audit: type=1400 audit(1756569001.008:362784): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6118 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 753.382820][ T37] audit: type=1400 audit(1756569001.017:362785): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=6124 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 [ 753.390154][ T37] audit: type=1400 audit(1756569002.308:362786): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6118 comm="syz-executor" name="/" dev="sysfs" ino=1 [ 753.390206][ T37] audit: type=1400 audit(1756569002.308:362787): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6118 comm="syz-executor" name="fs" dev="sysfs" ino=2 [ 753.390245][ T37] audit: type=1400 audit(1756569002.308:362788): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6118 comm="syz-executor" name="fuse" dev="sysfs" ino=5240 [ 754.258981][ T37] kauditd_printk_skb: 1 callbacks suppressed [ 754.259002][ T37] audit: type=1400 audit(1756569003.038:362790): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=53448 netif=eth0 [ 755.454698][ T37] audit: type=1400 audit(1756569003.309:362791): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5586 comm="crond" name="/" dev="sda1" ino=2 [ 755.454753][ T37] audit: type=1400 audit(1756569004.245:362792): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5586 comm="crond" name="etc" dev="sda1" ino=116 [ 755.454793][ T37] audit: type=1400 audit(1756569004.245:362793): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5586 comm="crond" name="cron" dev="sda1" ino=120 [ 755.496638][ T37] audit: type=1400 audit(1756569004.264:362794): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=6118 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 [ 755.496689][ T37] audit: type=1400 audit(1756569004.292:362795): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=6118 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 [ 755.801955][ T37] audit: type=1400 audit(1756569004.572:362796): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=6124 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 [ 756.543505][ C0] net_ratelimit: 17840 callbacks suppressed [ 756.543528][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 756.543696][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 756.544065][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 756.544455][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 756.544517][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 756.544882][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 756.545323][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 756.545330][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 756.545669][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 756.546111][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 758.973778][ T37] audit: type=1400 audit(1756569006.584:362797): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5586 comm="crond" path="/etc/cron/crontabs" dev="sda1" ino=121 [ 758.994494][ T37] audit: type=1400 audit(1756569007.557:362798): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5586 comm="crond" name="crontabs" dev="sda1" ino=121 [ 761.899104][ C1] net_ratelimit: 18207 callbacks suppressed [ 761.899126][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 761.899479][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 761.899883][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 761.899972][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 761.900318][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 761.900707][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 761.900820][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 761.901163][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 761.901620][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 761.901761][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 763.977089][ T37] audit: type=1400 audit(1756569012.225:362799): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6129 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 763.977143][ T37] audit: type=1400 audit(1756569012.225:362800): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6129 comm="syz-executor" name="/" dev="sysfs" ino=1 [ 763.977183][ T37] audit: type=1400 audit(1756569012.225:362801): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6129 comm="syz-executor" name="fs" dev="sysfs" ino=2 [ 763.977223][ T37] audit: type=1400 audit(1756569012.225:362802): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=6129 comm="syz-executor" name="fuse" dev="sysfs" ino=5240 [ 763.977262][ T37] audit: type=1400 audit(1756569012.225:362803): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=6129 comm="syz-executor" name="/" dev="fusectl" ino=1 [ 766.307363][ T37] audit: type=1400 audit(1756569014.405:362804): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5586 comm="crond" name="/" dev="sda1" ino=2 [ 766.307414][ T37] audit: type=1400 audit(1756569014.405:362805): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5586 comm="crond" name="etc" dev="sda1" ino=116 [ 767.254203][ C0] net_ratelimit: 18279 callbacks suppressed [ 767.254225][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 767.254255][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 767.254717][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 767.255083][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 767.255087][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 767.255560][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 767.255900][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 767.256031][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 767.256350][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 767.256720][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 769.640016][ T37] audit: type=1400 audit(1756569015.967:362806): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=6129 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 [ 772.048259][ T37] audit: type=1400 audit(1756569019.166:362807): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1032 comm="irq/29-virtio0-" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=53448 netif=eth0 [ 772.609617][ C1] net_ratelimit: 17771 callbacks suppressed [ 772.609639][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 772.609760][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 772.610127][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 772.610495][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 772.610707][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 772.610950][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 772.611292][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 772.611528][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 772.611738][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 772.612085][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 773.943728][ T37] audit: type=1400 audit(1756569021.281:362808): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=53448 netif=eth0 [ 774.538145][ T37] audit: type=1400 audit(1756569021.851:362809): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=53448 netif=eth0 [ 776.599389][T20296] bridge_slave_1: left allmulticast mode [ 777.964919][ C1] net_ratelimit: 18033 callbacks suppressed [ 777.964940][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 777.965035][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 777.965424][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 777.965765][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 777.965835][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 777.966217][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 777.966566][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 777.966806][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 777.967010][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 777.967420][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 778.287811][ T37] audit: type=1400 audit(1756569025.509:362810): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=53448 netif=eth0 [ 778.287866][ T37] audit: type=1400 audit(1756569025.575:362811): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=53448 netif=eth0 [ 779.814305][ T37] audit: type=1400 audit(1756569025.808:362812): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=6129 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 [ 783.320364][ C0] net_ratelimit: 18067 callbacks suppressed [ 783.320393][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 783.320558][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 783.321007][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 783.321347][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 783.321350][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 783.321825][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 783.322165][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 783.322173][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 783.322642][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 783.322981][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 786.095339][T20296] bridge_slave_1: left promiscuous mode [ 787.847090][ T37] audit: type=1400 audit(1756569034.509:362813): lsm=SMACK fn=smack_task_setpgid action=granted subject="_" object="_" requested=w pid=20340 comm="syz-executor" opid=20340 ocomm="syz-executor" [ 787.847144][ T37] audit: type=1400 audit(1756569034.509:362814): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20340 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 787.847184][ T37] audit: type=1400 audit(1756569034.509:362815): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20340 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 787.847228][ T37] audit: type=1400 audit(1756569034.509:362816): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20340 comm="syz-executor" name="syz-executor" dev="sda1" ino=2020 [ 787.847268][ T37] audit: type=1400 audit(1756569034.509:362817): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=20340 comm="syz-executor" path="/root/syz-executor" dev="sda1" ino=2020 [ 787.847310][ T37] audit: type=1400 audit(1756569034.509:362818): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20340 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 787.847349][ T37] audit: type=1400 audit(1756569034.509:362819): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20340 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 787.847390][ T37] audit: type=1400 audit(1756569034.509:362820): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=20340 comm="syz-executor" name="syz-executor" dev="sda1" ino=2020 [ 787.847440][ T37] audit: type=1400 audit(1756569034.527:362821): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20340 comm="syz-executor" name="/" dev="sda1" ino=2 [ 787.847479][ T37] audit: type=1400 audit(1756569034.527:362822): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20340 comm="syz-executor" name="/" dev="proc" ino=1 [ 788.675808][ C1] net_ratelimit: 17999 callbacks suppressed [ 788.675831][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 788.676180][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 788.676309][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 788.676656][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 788.677283][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 788.677561][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 788.678009][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 788.678079][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 788.678361][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 788.678805][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 793.398659][ T37] kauditd_printk_skb: 25 callbacks suppressed [ 793.398680][ T37] audit: type=1400 audit(1756569039.673:362848): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=29 comm="ktimers/1" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=53448 netif=eth0 [ 794.031312][ C1] net_ratelimit: 17860 callbacks suppressed [ 794.031335][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 794.031489][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 794.031677][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 794.032126][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 794.032438][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 794.032493][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 794.032944][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 794.033260][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 794.033311][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 794.033753][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 794.818768][ T37] audit: type=1400 audit(1756569041.067:362849): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20340 comm="syz-executor" name="/" dev="sda1" ino=2 [ 794.819012][ T37] audit: type=1400 audit(1756569041.067:362850): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20340 comm="syz-executor" name="/" dev="sysfs" ino=1 [ 794.819229][ T37] audit: type=1400 audit(1756569041.067:362851): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20340 comm="syz-executor" name="kernel" dev="sysfs" ino=1392 [ 794.819453][ T37] audit: type=1400 audit(1756569041.067:362852): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20340 comm="syz-executor" name="/" dev="debugfs" ino=1 [ 794.819678][ T37] audit: type=1400 audit(1756569041.067:362853): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=rw pid=20340 comm="syz-executor" name="kcov" dev="debugfs" ino=96 [ 794.846635][ T37] audit: type=1400 audit(1756569041.104:362854): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=20340 comm="syz-executor" path="/sys/kernel/debug/kcov" dev="debugfs" ino=96 [ 794.847063][ T37] audit: type=1400 audit(1756569041.104:362855): lsm=SMACK fn=smack_file_ioctl action=granted subject="_" object="_" requested=r pid=20340 comm="syz-executor" path="/sys/kernel/debug/kcov" dev="debugfs" ino=96 [ 796.917275][ T37] audit: type=1400 audit(1756569043.022:362856): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5830 comm="syz-executor" opid=6113 ocomm="syz-executor" [ 798.257975][T20296] bridge0: port 2(bridge_slave_1) entered disabled state [ 799.014726][ T37] audit: type=1400 audit(1756569045.005:362857): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=6113 comm="syz-executor" opid=6118 ocomm="syz-executor" [ 799.386596][ C0] net_ratelimit: 18091 callbacks suppressed [ 799.386615][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 799.387139][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 799.387435][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 799.387487][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 799.387960][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 799.388335][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 799.388470][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 799.388782][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 799.389130][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 799.389315][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 799.910491][ T37] audit: type=1400 audit(1756569045.838:362858): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20340 comm="syz-executor" name="/" dev="sda1" ino=2 [ 799.910730][ T37] audit: type=1400 audit(1756569045.838:362859): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20340 comm="syz-executor" name="/" dev="sysfs" ino=1 [ 799.910954][ T37] audit: type=1400 audit(1756569045.838:362860): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20340 comm="syz-executor" name="kernel" dev="sysfs" ino=1392 [ 799.911190][ T37] audit: type=1400 audit(1756569045.838:362861): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20340 comm="syz-executor" name="/" dev="debugfs" ino=1 [ 799.911401][ T37] audit: type=1400 audit(1756569045.838:362862): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=rw pid=20340 comm="syz-executor" name="kcov" dev="debugfs" ino=96 [ 800.952136][ T37] audit: type=1400 audit(1756569046.811:362863): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=20340 comm="syz-executor" path="/sys/kernel/debug/kcov" dev="debugfs" ino=96 [ 800.991053][ T37] audit: type=1400 audit(1756569046.848:362864): lsm=SMACK fn=smack_file_ioctl action=granted subject="_" object="_" requested=r pid=20340 comm="syz-executor" path="/sys/kernel/debug/kcov" dev="debugfs" ino=96 [ 803.022549][ T37] audit: type=1400 audit(1756569048.747:362865): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20340 comm="syz-executor" name="/" dev="sda1" ino=2 [ 803.022810][ T37] audit: type=1400 audit(1756569048.747:362866): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20340 comm="syz-executor" name="/" dev="sysfs" ino=1 [ 804.741777][ C0] net_ratelimit: 17953 callbacks suppressed [ 804.741799][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 804.741956][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 804.742401][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 804.742646][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 804.742749][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 804.743190][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 804.743565][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 804.743568][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 804.744012][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 804.744377][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 804.981229][ T37] kauditd_printk_skb: 4 callbacks suppressed [ 804.981247][ T37] audit: type=1400 audit(1756569050.581:362871): lsm=SMACK fn=smack_file_ioctl action=granted subject="_" object="_" requested=r pid=20340 comm="syz-executor" path="/sys/kernel/debug/kcov" dev="debugfs" ino=96 [ 805.004097][ T37] audit: type=1400 audit(1756569050.600:362872): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20340 comm="syz-executor" name="/" dev="sda1" ino=2 [ 805.004341][ T37] audit: type=1400 audit(1756569050.600:362873): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20340 comm="syz-executor" name="/" dev="sysfs" ino=1 [ 805.004557][ T37] audit: type=1400 audit(1756569050.600:362874): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20340 comm="syz-executor" name="kernel" dev="sysfs" ino=1392 [ 805.004772][ T37] audit: type=1400 audit(1756569050.600:362875): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20340 comm="syz-executor" name="/" dev="debugfs" ino=1 [ 805.004980][ T37] audit: type=1400 audit(1756569050.600:362876): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=rw pid=20340 comm="syz-executor" name="kcov" dev="debugfs" ino=96 [ 805.005319][ T37] audit: type=1400 audit(1756569050.600:362877): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=20340 comm="syz-executor" path="/sys/kernel/debug/kcov" dev="debugfs" ino=96 [ 805.005693][ T37] audit: type=1400 audit(1756569050.600:362878): lsm=SMACK fn=smack_file_ioctl action=granted subject="_" object="_" requested=r pid=20340 comm="syz-executor" path="/sys/kernel/debug/kcov" dev="debugfs" ino=96 [ 808.461662][ T37] audit: type=1400 audit(1756569053.818:362879): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20340 comm="syz-executor" name="/" dev="sda1" ino=2 [ 808.461716][ T37] audit: type=1400 audit(1756569053.827:362880): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20340 comm="syz-executor" name="/" dev="sysfs" ino=1 [ 810.097199][ C1] net_ratelimit: 18303 callbacks suppressed [ 810.097221][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 810.097595][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 810.097670][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 810.098045][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 810.098490][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 810.098637][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 810.098832][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 810.099312][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 810.099481][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 810.099654][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 811.332065][ T1324] ieee802154 phy0 wpan0: encryption failed: -22 [ 811.346501][ T1324] ieee802154 phy1 wpan1: encryption failed: -22 [ 811.458487][ T37] kauditd_printk_skb: 6 callbacks suppressed [ 811.458507][ T37] audit: type=1400 audit(1756569056.577:362887): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=53448 netif=eth0 [ 813.239810][ T37] audit: type=1400 audit(1756569058.280:362888): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20340 comm="syz-executor" name="/" dev="sda1" ino=2 [ 813.240082][ T37] audit: type=1400 audit(1756569058.308:362889): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20340 comm="syz-executor" name="/" dev="sysfs" ino=1 [ 813.240306][ T37] audit: type=1400 audit(1756569058.308:362890): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20340 comm="syz-executor" name="kernel" dev="sysfs" ino=1392 [ 813.240534][ T37] audit: type=1400 audit(1756569058.308:362891): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20340 comm="syz-executor" name="/" dev="debugfs" ino=1 [ 813.240756][ T37] audit: type=1400 audit(1756569058.308:362892): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=rw pid=20340 comm="syz-executor" name="kcov" dev="debugfs" ino=96 [ 813.511682][ T37] audit: type=1400 audit(1756569058.561:362893): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=20340 comm="syz-executor" path="/sys/kernel/debug/kcov" dev="debugfs" ino=96 [ 815.452505][ C0] net_ratelimit: 18223 callbacks suppressed [ 815.452526][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 815.452566][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 815.452918][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 815.453362][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 815.453481][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 815.453737][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 815.454180][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 815.454299][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 815.454519][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 815.454993][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 815.712942][ T37] audit: type=1400 audit(1756569060.619:362894): lsm=SMACK fn=smack_file_ioctl action=granted subject="_" object="_" requested=r pid=20340 comm="syz-executor" path="/sys/kernel/debug/kcov" dev="debugfs" ino=96 [ 817.488188][ T37] audit: type=1400 audit(1756569062.209:362895): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=53448 netif=eth0 [ 818.250875][ T37] audit: type=1400 audit(1756569062.995:362896): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5586 comm="crond" name="/" dev="sda1" ino=2 [ 818.250928][ T37] audit: type=1400 audit(1756569062.995:362897): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5586 comm="crond" name="etc" dev="sda1" ino=116 [ 818.250967][ T37] audit: type=1400 audit(1756569062.995:362898): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5586 comm="crond" name="cron" dev="sda1" ino=120 [ 818.353727][ T37] audit: type=1400 audit(1756569063.089:362899): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20340 comm="syz-executor" name="/" dev="sda1" ino=2 [ 818.353969][ T37] audit: type=1400 audit(1756569063.089:362900): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20340 comm="syz-executor" name="/" dev="sysfs" ino=1 [ 818.354207][ T37] audit: type=1400 audit(1756569063.089:362901): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20340 comm="syz-executor" name="kernel" dev="sysfs" ino=1392 [ 818.354432][ T37] audit: type=1400 audit(1756569063.089:362902): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20340 comm="syz-executor" name="/" dev="debugfs" ino=1 [ 818.354645][ T37] audit: type=1400 audit(1756569063.089:362903): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=rw pid=20340 comm="syz-executor" name="kcov" dev="debugfs" ino=96 [ 818.355003][ T37] audit: type=1400 audit(1756569063.089:362904): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=20340 comm="syz-executor" path="/sys/kernel/debug/kcov" dev="debugfs" ino=96 [ 820.807911][ C1] net_ratelimit: 18018 callbacks suppressed [ 820.807932][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 820.808218][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 820.808301][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 820.808771][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 820.809118][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 820.809190][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 820.809563][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 820.809908][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 820.809982][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 820.810379][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 822.851908][ T37] kauditd_printk_skb: 6 callbacks suppressed [ 822.851928][ T37] audit: type=1400 audit(1756569067.224:362911): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20349 comm="syz-executor" name="/" dev="sda1" ino=2 [ 822.851972][ T37] audit: type=1400 audit(1756569067.224:362912): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20349 comm="syz-executor" name="/" dev="devtmpfs" ino=1 [ 822.852013][ T37] audit: type=1400 audit(1756569067.224:362913): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=rw pid=20349 comm="syz-executor" name="vhci" dev="devtmpfs" ino=1268 [ 822.852052][ T37] audit: type=1400 audit(1756569067.224:362914): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=20349 comm="syz-executor" path="/dev/vhci" dev="devtmpfs" ino=1268 [ 823.007209][ T37] audit: type=1400 audit(1756569067.383:362915): lsm=SMACK fn=smack_file_ioctl action=granted subject="_" object="*" requested=w pid=20349 comm="syz-executor" path="socket:[55129]" dev="sockfs" ino=55129 [ 824.004055][ T37] audit: type=1400 audit(1756569068.374:362916): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5213 comm="udevd" name="/" dev="sda1" ino=2 [ 824.004284][ T37] audit: type=1400 audit(1756569068.384:362917): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5213 comm="udevd" name="etc" dev="sda1" ino=116 [ 824.004510][ T37] audit: type=1400 audit(1756569068.384:362918): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5213 comm="udevd" name="udev" dev="sda1" ino=259 [ 824.013644][ T37] audit: type=1400 audit(1756569068.384:362919): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=5213 comm="udevd" path="/etc/udev/rules.d" dev="sda1" ino=261 [ 824.020438][ T37] audit: type=1400 audit(1756569068.393:362920): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=5213 comm="udevd" name="/" dev="sda1" ino=2 [ 824.364636][T20350] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 826.163487][ C0] net_ratelimit: 18092 callbacks suppressed [ 826.163506][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 826.164326][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 826.165080][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 826.165946][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 826.168372][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 826.168564][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 826.168727][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 826.169168][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 826.169518][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 826.169636][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 827.003802][T20350] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 829.129744][ T37] kauditd_printk_skb: 24 callbacks suppressed [ 829.129764][ T37] audit: type=1400 audit(1756569073.173:362945): lsm=SMACK fn=smack_task_setpgid action=granted subject="_" object="_" requested=w pid=20354 comm="syz-executor" opid=20354 ocomm="syz-executor" [ 829.131336][ T37] audit: type=1400 audit(1756569073.173:362946): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20354 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 829.131549][ T37] audit: type=1400 audit(1756569073.173:362947): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20354 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 829.131771][ T37] audit: type=1400 audit(1756569073.173:362948): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20354 comm="syz-executor" name="syz-executor" dev="sda1" ino=2020 [ 829.132043][ T37] audit: type=1400 audit(1756569073.173:362949): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=20354 comm="syz-executor" path="/root/syz-executor" dev="sda1" ino=2020 [ 829.258838][ T6120] Bluetooth: hci5: Opcode 0x1001 failed: -110 [ 831.518605][ C1] net_ratelimit: 18396 callbacks suppressed [ 831.518626][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 831.519043][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 831.519102][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 831.519562][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 831.520005][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 831.520137][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 831.520562][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 831.520936][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 831.520968][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 831.521500][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 836.841451][ T6128] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 836.874110][ C1] net_ratelimit: 17797 callbacks suppressed [ 836.874132][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 836.874438][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 836.874488][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 836.874952][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 836.875251][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 836.875303][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 836.875765][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 836.876106][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 836.876167][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 836.876561][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 838.887964][T20349] Bluetooth: hci5: Opcode 0x0c03 failed: -110 [ 839.889185][ T37] audit: type=1400 audit(1756569079.385:362950): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20354 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 839.889452][ T37] audit: type=1400 audit(1756569083.230:362951): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20354 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 842.089517][ T37] audit: type=1400 audit(1756569085.288:362952): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=20354 comm="syz-executor" name="syz-executor" dev="sda1" ino=2020 [ 842.090809][ T37] audit: type=1400 audit(1756569085.298:362953): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=5830 comm="syz-executor" opid=6114 ocomm="syz-executor" [ 842.229338][ C0] net_ratelimit: 17962 callbacks suppressed [ 842.229360][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 842.229546][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 842.229906][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 842.230195][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 842.230361][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 842.230703][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 842.231122][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 842.231187][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 842.231532][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 842.231978][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 843.841987][ T37] audit: type=1400 audit(1756569086.364:362954): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=1186 comm="irq/33-virtio1-" saddr=10.128.0.169 src=30008 daddr=10.128.10.2 dest=53448 netif=eth0 [ 844.257805][ T37] audit: type=1400 audit(1756569087.075:362955): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=6114 comm="syz-executor" opid=6124 ocomm="syz-executor" [ 844.257859][ T37] audit: type=1400 audit(1756569087.281:362956): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20354 comm="syz-executor" name="/" dev="sda1" ino=2 [ 844.257899][ T37] audit: type=1400 audit(1756569087.281:362957): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20354 comm="syz-executor" name="/" dev="proc" ino=1 [ 844.257938][ T37] audit: type=1400 audit(1756569087.281:362958): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20354 comm="syz-executor" name="/" dev="proc" ino=1 [ 844.257977][ T37] audit: type=1400 audit(1756569087.281:362959): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20354 comm="syz-executor" name="20354" dev="proc" ino=55139 [ 845.305114][ T37] audit: type=1400 audit(1756569088.282:362960): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20354 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 845.305170][ T37] audit: type=1400 audit(1756569088.282:362961): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20354 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 845.305211][ T37] audit: type=1400 audit(1756569088.282:362962): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=20354 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 845.305250][ T37] audit: type=1400 audit(1756569088.282:362963): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20354 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 845.305289][ T37] audit: type=1400 audit(1756569088.282:362964): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20354 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 845.305329][ T37] audit: type=1400 audit(1756569088.282:362965): lsm=SMACK fn=smack_inode_setattr action=granted subject="_" object="_" requested=w pid=20354 comm="syz-executor" name="syzkaller.70AzoL" dev="sda1" ino=2068 [ 845.305369][ T37] audit: type=1400 audit(1756569088.282:362966): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20354 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 845.305416][ T37] audit: type=1400 audit(1756569088.282:362967): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20354 comm="syz-executor" name="root" dev="sda1" ino=1265 [ 845.305456][ T37] audit: type=1400 audit(1756569088.282:362968): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20354 comm="syz-executor" name="syzkaller.70AzoL" dev="sda1" ino=2068 [ 845.305495][ T37] audit: type=1400 audit(1756569088.282:362969): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20354 comm="syz-executor" name="/" dev="sda1" ino=2 [ 847.584747][ C1] net_ratelimit: 17856 callbacks suppressed [ 847.584768][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 847.585115][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 847.585221][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 847.585710][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 847.586123][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:56:77:30:6c:c9:61, vlan:0) [ 847.586156][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 847.586509][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 847.586933][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 847.586956][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 847.587305][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 847.909347][ T1324] ieee80215[ 847.909347][ T1324] ieee802154 phy0 wpan0: encryption failed: -22 [ 847.972068][ T1324] ieee802154 phy1 wpan1: encryption failed: -22 [ 850.490503][ T38] INFO: task kworker/1:0:31 blocked for more than 143 seconds. [ 850.490527][ T38] Not tainted syzkaller #0 [ 850.490538][ T38] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 850.490550][ T38] task:kworker/1:0 state:D stack:17368 pid:31 tgid:31 ppid:2 task_flags:0x4208060 flags:0x00004000 [ 850.490597][ T38] Workqueue: events switchdev_deferred_process_work [ 850.490641][ T38] Call Trace: [ 850.490648][ T38] [ 850.490663][ T38] __schedule+0x16f3/0x4c20 [ 850.490695][ T38] ? sched_clock+0x3f/0x60 [ 850.490718][ T38] ? __pfx_do_raw_spin_lock+0x10/0x10 [ 850.490749][ T38] ? __pfx___schedule+0x10/0x10 [ 850.490797][ T38] rt_mutex_schedule+0x77/0xf0 [ 850.490815][ T38] rt_mutex_slowlock_block+0x5ba/0x6d0 [ 850.490849][ T38] ? rt_mutex_slowlock_block+0x351/0x6d0 [ 850.490871][ T38] rt_mutex_slowlock+0x2b1/0x6e0 [ 850.490893][ T38] ? rt_mutex_slowlock+0x1c9/0x6e0 [ 850.490913][ T38] ? __pfx_rt_mutex_slowlock+0x10/0x10 [ 850.490944][ T38] ? switchdev_deferred_process_work+0xe/0x20 [ 850.490976][ T38] ? process_scheduled_works+0x9ef/0x17b0 [ 850.491002][ T38] ? switchdev_deferred_process_work+0xe/0x20 [ 850.491024][ T38] mutex_lock_nested+0x16a/0x1d0 [ 850.491041][ T38] ? _raw_spin_unlock_irq+0x23/0x50 [ 850.491063][ T38] ? process_scheduled_works+0x9ef/0x17b0 [ 850.491086][ T38] switchdev_deferred_process_work+0xe/0x20 [ 850.491109][ T38] process_scheduled_works+0xade/0x17b0 [ 850.491169][ T38] ? __pfx_process_scheduled_works+0x10/0x10 [ 850.491209][ T38] worker_thread+0x8a0/0xda0 [ 850.491256][ T38] kthread+0x711/0x8a0 [ 850.491283][ T38] ? __pfx_worker_thread+0x10/0x10 [ 850.491304][ T38] ? __pfx_kthread+0x10/0x10 [ 850.491334][ T38] ? __pfx_kthread+0x10/0x10 [ 850.491358][ T38] ret_from_fork+0x3f9/0x770 [ 850.491384][ T38] ? __pfx_ret_from_fork+0x10/0x10 [ 850.491415][ T38] ? __switch_to_asm+0x39/0x70 [ 850.491442][ T38] ? __switch_to_asm+0x33/0x70 [ 850.491457][ T38] ? __pfx_kthread+0x10/0x10 [ 850.491482][ T38] ret_from_fork_asm+0x1a/0x30 [ 850.491517][ T38] [ 850.491567][ T38] INFO: task kworker/u8:9:1317 blocked for more than 143 seconds. [ 850.491581][ T38] Not tainted syzkaller #0 [ 850.491590][ T38] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 850.491599][ T38] task:kworker/u8:9 state:D stack:20488 pid:1317 tgid:1317 ppid:2 task_flags:0x4208160 flags:0x00004000 [ 850.491645][ T38] Workqueue: ipv6_addrconf addrconf_verify_work [ 850.491664][ T38] Call Trace: [ 850.491671][ T38] [ 850.491683][ T38] __schedule+0x16f3/0x4c20 [ 850.491715][ T38] ? ktime_get+0x3e/0x1f0 [ 850.491734][ T38] ? ktime_get+0x3e/0x1f0 [ 850.491756][ T38] ? __pfx_seqcount_lockdep_reader_access+0x10/0x10 [ 850.491780][ T38] ? __pfx___schedule+0x10/0x10 [ 850.491820][ T38] ? _raw_spin_unlock_irq+0x23/0x50 [ 850.491846][ T38] rt_mutex_schedule+0x77/0xf0 [ 850.491863][ T38] rt_mutex_slowlock_block+0x5ba/0x6d0 [ 850.491882][ T38] ? task_blocks_on_rt_mutex+0xf12/0x1380 [ 850.491919][ T38] rt_mutex_slowlock+0x2b1/0x6e0 [ 850.491941][ T38] ? rt_mutex_slowlock+0x1c9/0x6e0 [ 850.491961][ T38] ? __pfx_rt_mutex_slowlock+0x10/0x10 [ 850.491991][ T38] ? addrconf_verify_work+0x19/0x30 [ 850.492018][ T38] ? process_scheduled_works+0x9ef/0x17b0 [ 850.492043][ T38] ? addrconf_verify_work+0x19/0x30 [ 850.492072][ T38] mutex_lock_nested+0x16a/0x1d0 [ 850.492091][ T38] ? _raw_spin_unlock_irq+0x23/0x50 [ 850.530545][ T38] addrconf_verify_work+0x19/0x30 [ 850.530576][ T38] ? process_scheduled_works+0x9ef/0x17b0 [ 850.530598][ T38] process_scheduled_works+0xade/0x17b0 [ 850.530653][ T38] ? __pfx_process_scheduled_works+0x10/0x10 [ 850.530694][ T38] worker_thread+0x8a0/0xda0 [ 850.530719][ T38] ? __pfx__raw_spin_unlock_irqrestore+0x10/0x10 [ 850.530752][ T38] ? __kthread_parkme+0x7b/0x200 [ 850.530785][ T38] kthread+0x711/0x8a0 [ 850.530813][ T38] ? __pfx_worker_thread+0x10/0x10 [ 850.530834][ T38] ? __pfx_kthread+0x10/0x10 [ 850.530862][ T38] ? __pfx_kthread+0x10/0x10 [ 850.530887][ T38] ret_from_fork+0x3f9/0x770 [ 850.530912][ T38] ? __pfx_ret_from_fork+0x10/0x10 [ 850.530941][ T38] ? __switch_to_asm+0x39/0x70 [ 850.530957][ T38] ? __switch_to_asm+0x33/0x70 [ 850.530972][ T38] ? __pfx_kthread+0x10/0x10 [ 850.530997][ T38] ret_from_fork_asm+0x1a/0x30 [ 850.531032][ T38] [ 850.531133][ T38] INFO: task syz.0.6905:20300 blocked for more than 144 seconds. [ 850.531148][ T38] Not tainted syzkaller #0 [ 850.531158][ T38] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 850.531168][ T38] task:syz.0.6905 state:D stack:27512 pid:20300 tgid:20297 ppid:6118 task_flags:0x400140 flags:0x00004004 [ 850.531221][ T38] Call Trace: [ 850.531228][ T38] [ 850.531241][ T38] __schedule+0x16f3/0x4c20 [ 850.531278][ T38] ? do_raw_spin_lock+0x121/0x290 [ 850.531309][ T38] ? __pfx___schedule+0x10/0x10 [ 850.531350][ T38] ? _raw_spin_unlock_irq+0x23/0x50 [ 850.531375][ T38] rt_mutex_schedule+0x77/0xf0 [ 850.531393][ T38] rt_mutex_slowlock_block+0x5ba/0x6d0 [ 850.531413][ T38] ? task_blocks_on_rt_mutex+0xf12/0x1380 [ 850.531451][ T38] rt_mutex_slowlock+0x2b1/0x6e0 [ 850.531473][ T38] ? rt_mutex_slowlock+0x1c9/0x6e0 [ 850.531494][ T38] ? __pfx_rt_mutex_slowlock+0x10/0x10 [ 850.531511][ T38] ? __lock_acquire+0xab9/0xd20 [ 850.531544][ T38] ? inet_rtm_newroute+0x109/0x210 [ 850.531577][ T38] ? inet_rtm_newroute+0x109/0x210 [ 850.531594][ T38] mutex_lock_nested+0x16a/0x1d0 [ 850.531619][ T38] inet_rtm_newroute+0x109/0x210 [ 850.531638][ T38] ? __lock_acquire+0xab9/0xd20 [ 850.531660][ T38] ? __pfx_inet_rtm_newroute+0x10/0x10 [ 850.531702][ T38] ? __pfx_inet_rtm_newroute+0x10/0x10 [ 850.531721][ T38] rtnetlink_rcv_msg+0x7cc/0xb70 [ 850.531747][ T38] ? rtnetlink_rcv_msg+0x1ab/0xb70 [ 850.531768][ T38] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 850.531787][ T38] ? ref_tracker_free+0x61e/0x7c0 [ 850.531811][ T38] ? __asan_memcpy+0x40/0x70 [ 850.531829][ T38] ? __pfx_ref_tracker_free+0x10/0x10 [ 850.531849][ T38] ? __skb_clone+0x63/0x7a0 [ 850.531883][ T38] netlink_rcv_skb+0x205/0x470 [ 850.531907][ T38] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 850.531930][ T38] ? __pfx_netlink_rcv_skb+0x10/0x10 [ 850.531964][ T38] ? netlink_deliver_tap+0x2e/0x1b0 [ 850.531994][ T38] netlink_unicast+0x843/0xa10 [ 850.532024][ T38] ? __pfx_netlink_unicast+0x10/0x10 [ 850.532047][ T38] ? netlink_sendmsg+0x642/0xb30 [ 850.532066][ T38] ? skb_put+0x11b/0x210 [ 850.532093][ T38] netlink_sendmsg+0x805/0xb30 [ 850.532130][ T38] ? __pfx_netlink_sendmsg+0x10/0x10 [ 850.532161][ T38] ? bpf_lsm_socket_sendmsg+0x9/0x20 [ 850.532179][ T38] ? __pfx_netlink_sendmsg+0x10/0x10 [ 850.532202][ T38] __sock_sendmsg+0x219/0x270 [ 850.532225][ T38] __sys_sendto+0x3c7/0x520 [ 850.532251][ T38] ? __pfx___sys_sendto+0x10/0x10 [ 850.532270][ T38] ? do_futex+0x333/0x420 [ 850.532325][ T38] ? rcu_is_watching+0x15/0xb0 [ 850.532356][ T38] __x64_sys_sendto+0xde/0x100 [ 850.532383][ T38] do_syscall_64+0xfa/0x3b0 [ 850.532405][ T38] ? lockdep_hardirqs_on+0x9c/0x150 [ 850.532426][ T38] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 850.532445][ T38] ? clear_bhb_loop+0x60/0xb0 [ 850.532467][ T38] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 850.532497][ T38] RIP: 0033:0x7f744cb6ebe9 [ 850.532517][ T38] RSP: 002b:00007f744add6038 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 850.532536][ T38] RAX: ffffffffffffffda RBX: 00007f744cda5fa0 RCX: 00007f744cb6ebe9 [ 850.532550][ T38] RDX: 0000000000000078 RSI: 0000200000000000 RDI: 0000000000000003 [ 850.532562][ T38] RBP: 00007f744cbf1e19 R08: 0000000000000000 R09: 0000000000000000 [ 850.532574][ T38] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 850.532585][ T38] R13: 00007f744cda6038 R14: 00007f744cda5fa0 R15: 00007fff69b6d198 [ 850.532616][ T38] [ 850.532626][ T38] INFO: task syz.1.6909:20308 blocked for more than 144 seconds. [ 850.532638][ T38] Not tainted syzkaller #0 [ 850.532648][ T38] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 850.532656][ T38] task:syz.1.6909 state:D stack:26520 pid:20308 tgid:20305 ppid:6124 task_flags:0x400040 flags:0x00004004 [ 850.532706][ T38] Call Trace: [ 850.532712][ T38] [ 850.532724][ T38] __schedule+0x16f3/0x4c20 [ 850.532753][ T38] ? kernel_text_address+0xa5/0xe0 [ 850.532773][ T38] ? __kernel_text_address+0xd/0x40 [ 850.532790][ T38] ? unwind_get_return_address+0x4d/0x90 [ 850.532813][ T38] ? __pfx_stack_trace_consume_entry+0x10/0x10 [ 850.532833][ T38] ? arch_stack_walk+0xfc/0x150 [ 850.532865][ T38] ? __pfx___schedule+0x10/0x10 [ 850.532907][ T38] ? _raw_spin_unlock_irq+0x23/0x50 [ 850.532933][ T38] rt_mutex_schedule+0x77/0xf0 [ 850.532951][ T38] rt_mutex_slowlock_block+0x5ba/0x6d0 [ 850.532970][ T38] ? task_blocks_on_rt_mutex+0xf12/0x1380 [ 850.533008][ T38] rt_mutex_slowlock+0x2b1/0x6e0 [ 850.533030][ T38] ? rt_mutex_slowlock+0x1c9/0x6e0 [ 850.533050][ T38] ? __pfx_rt_mutex_slowlock+0x10/0x10 [ 850.533081][ T38] ? rtnl_dumpit+0x92/0x200 [ 850.533103][ T38] ? rcu_is_watching+0x15/0xb0 [ 850.533134][ T38] ? trace_kmalloc+0x1f/0xd0 [ 850.533153][ T38] ? __kmalloc_node_track_caller_noprof+0x213/0x450 [ 850.533182][ T38] ? rtnl_dumpit+0x92/0x200 [ 850.533200][ T38] mutex_lock_nested+0x16a/0x1d0 [ 850.533217][ T38] ? __build_skb_around+0x257/0x3e0 [ 850.533240][ T38] ? __pfx_rtm_dump_nexthop_bucket+0x10/0x10 [ 850.533266][ T38] rtnl_dumpit+0x92/0x200 [ 850.533292][ T38] netlink_dump+0x6e4/0xe90 [ 850.533327][ T38] ? __pfx_netlink_dump+0x10/0x10 [ 850.533345][ T38] ? _raw_spin_unlock_irqrestore+0x85/0x110 [ 850.533367][ T38] ? lockdep_hardirqs_on+0x9c/0x150 [ 850.533417][ T38] __netlink_dump_start+0x5cb/0x7e0 [ 850.533447][ T38] rtnetlink_rcv_msg+0x9eb/0xb70 [ 850.533470][ T38] ? __pfx_rtm_dump_nexthop_bucket+0x10/0x10 [ 850.533494][ T38] ? rtnetlink_rcv_msg+0x1ab/0xb70 [ 850.533514][ T38] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 850.533533][ T38] ? ref_tracker_free+0x61e/0x7c0 [ 850.533554][ T38] ? __pfx_rtnl_dumpit+0x10/0x10 [ 850.533574][ T38] ? __pfx_rtm_dump_nexthop_bucket+0x10/0x10 [ 850.533598][ T38] ? __skb_clone+0x63/0x7a0 [ 850.533632][ T38] netlink_rcv_skb+0x205/0x470 [ 850.533654][ T38] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 850.533678][ T38] ? __pfx_netlink_rcv_skb+0x10/0x10 [ 850.533712][ T38] ? netlink_deliver_tap+0x2e/0x1b0 [ 850.533743][ T38] netlink_unicast+0x843/0xa10 [ 850.533773][ T38] ? __pfx_netlink_unicast+0x10/0x10 [ 850.533795][ T38] ? netlink_sendmsg+0x642/0xb30 [ 850.533814][ T38] ? skb_put+0x11b/0x210 [ 850.533840][ T38] netlink_sendmsg+0x805/0xb30 [ 850.533872][ T38] ? __pfx_netlink_sendmsg+0x10/0x10 [ 850.533904][ T38] ? bpf_lsm_socket_sendmsg+0x9/0x20 [ 850.533921][ T38] ? __pfx_netlink_sendmsg+0x10/0x10 [ 850.533942][ T38] __sock_sendmsg+0x219/0x270 [ 850.533963][ T38] ____sys_sendmsg+0x508/0x820 [ 850.533992][ T38] ? __pfx_____sys_sendmsg+0x10/0x10 [ 850.534025][ T38] ? import_iovec+0x74/0xa0 [ 850.534048][ T38] ___sys_sendmsg+0x21f/0x2a0 [ 850.534073][ T38] ? __pfx____sys_sendmsg+0x10/0x10 [ 850.534134][ T38] ? __fget_files+0x2a/0x420 [ 850.534154][ T38] ? __fget_files+0x3a6/0x420 [ 850.534203][ T38] __x64_sys_sendmsg+0x1a1/0x260 [ 850.534231][ T38] ? __pfx___x64_sys_sendmsg+0x10/0x10 [ 850.534265][ T38] ? rcu_is_watching+0x15/0xb0 [ 850.534295][ T38] ? do_syscall_64+0xbe/0x3b0 [ 850.534322][ T38] do_syscall_64+0xfa/0x3b0 [ 850.534343][ T38] ? lockdep_hardirqs_on+0x9c/0x150 [ 850.534364][ T38] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 850.534382][ T38] ? clear_bhb_loop+0x60/0xb0 [ 850.534404][ T38] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 850.534421][ T38] RIP: 0033:0x7fbb9079ebe9 [ 850.534437][ T38] RSP: 002b:00007fbb8ea06038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 850.534457][ T38] RAX: ffffffffffffffda RBX: 00007fbb909d5fa0 RCX: 00007fbb9079ebe9 [ 850.534471][ T38] RDX: 0000000000000000 RSI: 00002000000007c0 RDI: 0000000000000003 [ 850.534483][ T38] RBP: 00007fbb90821e19 R08: 0000000000000000 R09: 0000000000000000 [ 850.534495][ T38] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 850.534506][ T38] R13: 00007fbb909d6038 R14: 00007fbb909d5fa0 R15: 00007ffdb1cbbf18 [ 850.534537][ T38] [ 850.534546][ T38] INFO: task syz.2.6915:20319 blocked for more than 144 seconds. [ 850.534559][ T38] Not tainted syzkaller #0 [ 850.534568][ T38] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 850.534577][ T38] task:syz.2.6915 state:D stack:26520 pid:20319 tgid:20317 ppid:6129 task_flags:0x400040 flags:0x00004004 [ 850.534626][ T38] Call Trace: [ 850.534633][ T38] [ 850.534646][ T38] __schedule+0x16f3/0x4c20 [ 850.534675][ T38] ? kernel_text_address+0xa5/0xe0 [ 850.534694][ T38] ? __kernel_text_address+0xd/0x40 [ 850.534711][ T38] ? unwind_get_return_address+0x4d/0x90 [ 850.534734][ T38] ? __pfx_stack_trace_consume_entry+0x10/0x10 [ 850.534754][ T38] ? arch_stack_walk+0xfc/0x150 [ 850.534786][ T38] ? __pfx___schedule+0x10/0x10 [ 850.534839][ T38] ? _raw_spin_unlock_irq+0x23/0x50 [ 850.572426][ T38] rt_mutex_schedule+0x77/0xf0 [ 850.572457][ T38] rt_mutex_slowlock_block+0x5ba/0x6d0 [ 850.572478][ T38] ? task_blocks_on_rt_mutex+0xf12/0x1380 [ 850.572516][ T38] rt_mutex_slowlock+0x2b1/0x6e0 [ 850.572538][ T38] ? rt_mutex_slowlock+0x1c9/0x6e0 [ 850.572558][ T38] ? __pfx_rt_mutex_slowlock+0x10/0x10 [ 850.572589][ T38] ? rtnl_dumpit+0x92/0x200 [ 850.572611][ T38] ? rcu_is_watching+0x15/0xb0 [ 850.572637][ T38] ? trace_kmalloc+0x1f/0xd0 [ 850.572656][ T38] ? __kmalloc_node_track_caller_noprof+0x213/0x450 [ 850.572686][ T38] ? rtnl_dumpit+0x92/0x200 [ 850.572703][ T38] mutex_lock_nested+0x16a/0x1d0 [ 850.572720][ T38] ? __build_skb_around+0x257/0x3e0 [ 850.572743][ T38] ? __pfx_br_vlan_rtm_dump+0x10/0x10 [ 850.572768][ T38] rtnl_dumpit+0x92/0x200 [ 850.572794][ T38] netlink_dump+0x6e4/0xe90 [ 850.572829][ T38] ? __pfx_netlink_dump+0x10/0x10 [ 850.572847][ T38] ? _raw_spin_unlock_irqrestore+0x85/0x110 [ 850.572869][ T38] ? lockdep_hardirqs_on+0x9c/0x150 [ 850.572919][ T38] __netlink_dump_start+0x5cb/0x7e0 [ 850.572949][ T38] rtnetlink_rcv_msg+0x9eb/0xb70 [ 850.572973][ T38] ? __pfx_br_vlan_rtm_dump+0x10/0x10 [ 850.572994][ T38] ? rtnetlink_rcv_msg+0x1ab/0xb70 [ 850.573015][ T38] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 850.573032][ T38] ? ref_tracker_free+0x61e/0x7c0 [ 850.573055][ T38] ? __pfx_rtnl_dumpit+0x10/0x10 [ 850.573075][ T38] ? __pfx_br_vlan_rtm_dump+0x10/0x10 [ 850.573097][ T38] ? __skb_clone+0x63/0x7a0 [ 850.573137][ T38] netlink_rcv_skb+0x205/0x470 [ 850.573160][ T38] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 850.573183][ T38] ? __pfx_netlink_rcv_skb+0x10/0x10 [ 850.573217][ T38] ? netlink_deliver_tap+0x2e/0x1b0 [ 850.573248][ T38] netlink_unicast+0x843/0xa10 [ 850.573277][ T38] ? __pfx_netlink_unicast+0x10/0x10 [ 850.573300][ T38] ? netlink_sendmsg+0x642/0xb30 [ 850.573319][ T38] ? skb_put+0x11b/0x210 [ 850.573345][ T38] netlink_sendmsg+0x805/0xb30 [ 850.573378][ T38] ? __pfx_netlink_sendmsg+0x10/0x10 [ 850.573409][ T38] ? bpf_lsm_socket_sendmsg+0x9/0x20 [ 850.573428][ T38] ? __pfx_netlink_sendmsg+0x10/0x10 [ 850.573450][ T38] __sock_sendmsg+0x219/0x270 [ 850.573475][ T38] ____sys_sendmsg+0x508/0x820 [ 850.573506][ T38] ? __pfx_____sys_sendmsg+0x10/0x10 [ 850.573540][ T38] ? import_iovec+0x74/0xa0 [ 850.573564][ T38] ___sys_sendmsg+0x21f/0x2a0 [ 850.573592][ T38] ? __pfx____sys_sendmsg+0x10/0x10 [ 850.573656][ T38] ? __fget_files+0x2a/0x420 [ 850.573679][ T38] ? __fget_files+0x3a6/0x420 [ 850.573713][ T38] __x64_sys_sendmsg+0x1a1/0x260 [ 850.573740][ T38] ? __pfx___x64_sys_sendmsg+0x10/0x10 [ 850.573777][ T38] ? rcu_is_watching+0x15/0xb0 [ 850.573806][ T38] ? do_syscall_64+0xbe/0x3b0 [ 850.573834][ T38] do_syscall_64+0xfa/0x3b0 [ 850.573855][ T38] ? lockdep_hardirqs_on+0x9c/0x150 [ 850.573877][ T38] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 850.573895][ T38] ? clear_bhb_loop+0x60/0xb0 [ 850.573918][ T38] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 850.573936][ T38] RIP: 0033:0x7f506906ebe9 [ 850.573952][ T38] RSP: 002b:00007f50672d6038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 850.573973][ T38] RAX: ffffffffffffffda RBX: 00007f50692a5fa0 RCX: 00007f506906ebe9 [ 850.573987][ T38] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000003 [ 850.573999][ T38] RBP: 00007f50690f1e19 R08: 0000000000000000 R09: 0000000000000000 [ 850.574011][ T38] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 850.574022][ T38] R13: 00007f50692a6038 R14: 00007f50692a5fa0 R15: 00007ffce532aee8 [ 850.574054][ T38] [ 850.574087][ T38] [ 850.574087][ T38] Showing all locks held in the system: [ 850.574096][ T38] 4 locks held by kworker/0:0/9: [ 850.574111][ T38] #0: ffff88805c140138 ((wq_completion)wg-kex-wg2#4){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 850.574163][ T38] #1: ffffc900000e7bc0 ((work_completion)(&({ do { const void *__vpp_verify = (typeof((worker) + 0))((void *)0); (void)__vpp_verify; } while (0); ({ unsigned long __ptr; __ptr = (unsigned long) ((__typeof_unqual__(*((worker))) *)(( unsigned long)((worker)))); (typeof((__typeof_unqual__(*((worker))) *)(( unsigned long)((worker))))) (__ptr + (((__per_cpu_offset[(cpu)])))); }); })->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 850.574219][ T38] #2: ffffffff8d84a760 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 850.574262][ T38] #3: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 850.574306][ T38] 3 locks held by kworker/u8:1/13: [ 850.574317][ T38] 2 locks held by ksoftirqd/0/15: [ 850.574328][ T38] #0: ffffffff8d84a760 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 850.574370][ T38] #1: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 850.574414][ T38] 11 locks held by ktimers/0/16: [ 850.574424][ T38] 4 locks held by pr/legacy/17: [ 850.574436][ T38] 2 locks held by rcuc/1/28: [ 850.574446][ T38] #0: ffffffff8d84a760 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 850.574489][ T38] #1: ffff8880b8923d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 850.574532][ T38] 2 locks held by ksoftirqd/1/30: [ 850.574542][ T38] #0: ffffffff8d84a760 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 850.574586][ T38] #1: ffff8880b8923d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 850.574629][ T38] 3 locks held by kworker/1:0/31: [ 850.574639][ T38] #0: ffff888019898538 ((wq_completion)events){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 850.574684][ T38] #1: ffffc90000a5fbc0 (deferred_process_work){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 850.574727][ T38] #2: ffffffff8ecd22b8 (rtnl_mutex){+.+.}-{4:4}, at: switchdev_deferred_process_work+0xe/0x20 [ 850.574777][ T38] 1 lock held by khungtaskd/38: [ 850.574787][ T38] #0: ffffffff8d9a8b80 (rcu_read_lock){....}-{1:3}, at: debug_show_all_locks+0x2e/0x180 [ 850.574829][ T38] 6 locks held by kworker/u8:2/43: [ 850.574839][ T38] #0: ffff88803d038938 ((wq_completion)wg-kex-wg2#7){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 850.574892][ T38] #1: ffffc90000b47bc0 ((work_completion)(&peer->transmit_handshake_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 850.574937][ T38] #2: ffff8880357395f8 (&wg->static_identity.lock){++++}-{4:4}, at: wg_noise_handshake_create_initiation+0x10a/0x7e0 [ 850.574980][ T38] #3: ffff8880336f4e20 (&handshake->lock){++++}-{4:4}, at: wg_noise_handshake_create_initiation+0x11b/0x7e0 [ 850.575022][ T38] #4: ffffffff8d84a760 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 850.575065][ T38] #5: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 850.575115][ T38] 4 locks held by kworker/1:1/44: [ 850.575126][ T38] #0: ffff88805c2d7538 ((wq_completion)wg-crypt-wg1#4){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 850.575175][ T38] #1: ffffc90000b57bc0 ((work_completion)(&({ do { const void *__vpp_verify = (typeof((worker) + 0))((void *)0); (void)__vpp_verify; } while (0); ({ unsigned long __ptr; __ptr = (unsigned long) ((__typeof_unqual__(*((worker))) *)(( unsigned long)((worker)))); (typeof((__typeof_unqual__(*((worker))) *)(( unsigned long)((worker))))) (__ptr + (((__per_cpu_offset[(cpu)])))); }); })->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 850.575232][ T38] #2: ffffffff8d84a760 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 850.575275][ T38] #3: ffff8880b8923d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 850.575321][ T38] 5 locks held by kworker/u8:3/57: [ 850.575331][ T38] #0: ffff888019881138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 850.575375][ T38] #1: ffffc9000123fbc0 ((work_completion)(&rdev->wiphy_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 850.575418][ T38] #2: ffff88805b6a0898 (&rdev->wiphy.mtx){+.+.}-{4:4}, at: cfg80211_wiphy_work+0xc4/0x470 [ 850.575463][ T38] #3: ffffffff8d84a760 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 850.575506][ T38] #4: ffff8880b8923d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 850.575558][ T38] 5 locks held by kworker/u8:5/991: [ 850.575569][ T38] #0: ffff888019881138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 850.575612][ T38] #1: ffffc90004817bc0 ((work_completion)(&rdev->wiphy_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 850.575656][ T38] #2: ffff88805e410898 (&rdev->wiphy.mtx){+.+.}-{4:4}, at: cfg80211_wiphy_work+0xc4/0x470 [ 850.575698][ T38] #3: ffffffff8d84a760 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 850.575741][ T38] #4: ffff8880b8923d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 850.575787][ T38] 5 locks held by kworker/u8:7/1166: [ 850.575797][ T38] #0: ffff888019881138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 850.575840][ T38] #1: ffffc90004d3fbc0 ((work_completion)(&rdev->wiphy_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 850.575883][ T38] #2: ffff88805b640898 (&rdev->wiphy.mtx){+.+.}-{4:4}, at: cfg80211_wiphy_work+0xc4/0x470 [ 850.575926][ T38] #3: ffffffff8d84a760 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 850.575969][ T38] #4: ffff8880b8923d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 850.576013][ T38] 3 locks held by kworker/u8:9/1317: [ 850.576024][ T38] #0: ffff88814d508138 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 850.576067][ T38] #1: ffffc900051dfbc0 ((work_completion)(&(&net->ipv6.addr_chk_work)->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 850.576117][ T38] #2: ffffffff8ecd22b8 (rtnl_mutex){+.+.}-{4:4}, at: addrconf_verify_work+0x19/0x30 [ 850.576160][ T38] 6 locks held by kworker/u8:10/1434: [ 850.576170][ T38] #0: ffff888028c7c138 ((wq_completion)wg-kex-wg2#3){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 850.576218][ T38] #1: ffffc900056efbc0 ((work_completion)(&peer->transmit_handshake_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 850.576262][ T38] #2: ffff888039c695f8 (&wg->static_identity.lock){++++}-{4:4}, at: wg_noise_handshake_create_initiation+0x10a/0x7e0 [ 850.576304][ T38] #3: ffff888041e8d8b8 (&handshake->lock){++++}-{4:4}, at: wg_noise_handshake_create_initiation+0x11b/0x7e0 [ 850.576346][ T38] #4: ffffffff8d84a760 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 850.576388][ T38] #5: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 850.576432][ T38] 4 locks held by kworker/0:2/1619: [ 850.576442][ T38] #0: ffff88805bd49138 ((wq_completion)wg-kex-wg0#2){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 850.576490][ T38] #1: ffffc90005bffbc0 ((work_completion)(&({ do { const void *__vpp_verify = (typeof((worker) + 0))((void *)0); (void)__vpp_verify; } while (0); ({ unsigned long __ptr; __ptr = (unsigned long) ((__typeof_unqual__(*((worker))) *)(( unsigned long)((worker)))); (typeof((__typeof_unqual__(*((worker))) *)(( unsigned long)((worker))))) (__ptr + (((__per_cpu_offset[(cpu)])))); }); })->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 850.576547][ T38] #2: ffffffff8d84a760 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 850.576590][ T38] #3: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 850.576647][ T38] 4 locks held by kworker/u8:14/3693: [ 850.576658][ T38] #0: ffff88801999b938 ((wq_completion)wg-kex-wg1#7){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 850.576707][ T38] #1: ffffc9000df87bc0 ((work_completion)(&peer->transmit_handshake_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 850.576751][ T38] #2: ffffffff8d84a760 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 850.576795][ T38] #3: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 850.576839][ T38] 5 locks held by kworker/u8:16/3842: [ 850.576850][ T38] #0: ffff888019881138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 850.576894][ T38] #1: ffffc9000eab7bc0 ((work_completion)(&rdev->wiphy_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 850.576946][ T38] #2: ffff88805f1a0898 (&rdev->wiphy.mtx){+.+.}-{4:4}, at: cfg80211_wiphy_work+0xc4/0x470 [ 850.576987][ T38] #3: ffffffff8d84a760 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 850.577029][ T38] #4: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 850.577073][ T38] 7 locks held by kworker/u8:18/3870: [ 850.577083][ T38] #0: ffff888019881138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 850.577135][ T38] #1: ffffc9000ec77bc0 ((work_completion)(&(&nsim_dev->trap_data->trap_report_dw)->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 850.577180][ T38] #2: ffff88802368b300 (&devlink->lock_key#5){+.+.}-{4:4}, at: nsim_dev_trap_report_work+0x57/0xbc0 [ 850.577231][ T38] #3: ffff888032f61920 (&nsim_trap_data->trap_lock){+.+.}-{3:3}, at: nsim_dev_trap_report_work+0x1ad/0xbc0 [ 850.577276][ T38] #4: ffffffff8d9a8b80 (rcu_read_lock){....}-{1:3}, at: rt_spin_lock+0x1bb/0x2c0 [ 850.577318][ T38] #5: ffffffff8d84a760 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 850.577360][ T38] #6: ffff8880b8923d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 850.577404][ T38] 6 locks held by kworker/u8:19/3919: [ 850.577415][ T38] #0: ffff88805c26b138 ((wq_completion)wg-kex-wg1#5){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 850.577462][ T38] #1: ffffc9000ed87bc0 ((work_completion)(&peer->transmit_handshake_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 850.577506][ T38] #2: ffff888039db95f8 (&wg->static_identity.lock){++++}-{4:4}, at: wg_noise_handshake_create_initiation+0x10a/0x7e0 [ 850.577548][ T38] #3: ffff8880336f38f0 (&handshake->lock){++++}-{4:4}, at: wg_noise_handshake_create_initiation+0x11b/0x7e0 [ 850.577601][ T38] #4: ffffffff8d84a760 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 850.601923][ T38] #5: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 850.601971][ T38] 2 locks held by klogd/5202: [ 850.601983][ T38] 3 locks held by udevd/5213: [ 850.601993][ T38] #0: ffff888051360350 (sk_lock-AF_NETLINK){+.+.}-{0:0}, at: sk_setsockopt+0xc2f/0x2a70 [ 850.602038][ T38] #1: ffffffff8d84a760 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 850.602081][ T38] #2: ffff8880b8923d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 850.602131][ T38] 3 locks held by dhcpcd/5508: [ 850.602141][ T38] #0: ffff8880513eaf50 (sk_lock-AF_UNIX){+.+.}-{0:0}, at: sk_setsockopt+0xc2f/0x2a70 [ 850.602183][ T38] #1: ffffffff8d84a760 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 850.602224][ T38] #2: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 850.602269][ T38] 2 locks held by getty/5603: [ 850.602279][ T38] #0: ffff88823bf1e8a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x25/0x70 [ 850.602325][ T38] #1: ffffc90003e8b2e0 (&ldata->atomic_read_lock){+.+.}-{4:4}, at: n_tty_read+0x444/0x1410 [ 850.602366][ T38] 3 locks held by syz-executor/5830: [ 850.602376][ T38] #0: ffff8880286da1d0 (sk_lock-AF_INET){+.+.}-{0:0}, at: tcp_sendmsg+0x21/0x50 [ 850.602416][ T38] #1: ffffffff8d84a760 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 850.602458][ T38] #2: ffff8880b8923d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 850.602501][ T38] 4 locks held by kworker/1:4/6080: [ 850.602512][ T38] #0: ffff888019899938 ((wq_completion)events_power_efficient){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 850.602555][ T38] #1: ffffc90004effbc0 ((work_completion)(&(&tbl->gc_work)->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 850.602598][ T38] #2: ffffffff8d84a760 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 850.602638][ T38] #3: ffff8880b8923d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 850.602688][ T38] 2 locks held by napi/wg1-0/6191: [ 850.602699][ T38] #0: ffffffff8d84a760 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 850.602741][ T38] #1: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 850.602784][ T38] 6 locks held by kworker/1:5/6195: [ 850.602795][ T38] #0: ffff88805c2eb938 ((wq_completion)wg-kex-wg2#8){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 850.602843][ T38] #1: ffffc9000497fbc0 ((work_completion)(&({ do { const void *__vpp_verify = (typeof((worker) + 0))((void *)0); (void)__vpp_verify; } while (0); ({ unsigned long __ptr; __ptr = (unsigned long) ((__typeof_unqual__(*((worker))) *)(( unsigned long)((worker)))); (typeof((__typeof_unqual__(*((worker))) *)(( unsigned long)((worker))))) (__ptr + (((__per_cpu_offset[(cpu)])))); }); })->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 850.602899][ T38] #2: ffff8880357395f8 (&wg->static_identity.lock){++++}-{4:4}, at: wg_noise_handshake_create_response+0x115/0x970 [ 850.602943][ T38] #3: ffff8880374ae350 (&handshake->lock){++++}-{4:4}, at: wg_noise_handshake_create_response+0x126/0x970 [ 850.602985][ T38] #4: ffffffff8d84a760 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 850.603026][ T38] #5: ffff8880b8923d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 850.603068][ T38] 4 locks held by kworker/0:5/6196: [ 850.603078][ T38] #0: ffff888032f65538 ((wq_completion)wg-kex-wg2#6){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 850.603130][ T38] #1: ffffc9000492fbc0 ((work_completion)(&({ do { const void *__vpp_verify = (typeof((worker) + 0))((void *)0); (void)__vpp_verify; } while (0); ({ unsigned long __ptr; __ptr = (unsigned long) ((__typeof_unqual__(*((worker))) *)(( unsigned long)((worker)))); (typeof((__typeof_unqual__(*((worker))) *)(( unsigned long)((worker))))) (__ptr + (((__per_cpu_offset[(cpu)])))); }); })->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 850.603185][ T38] #2: ffffffff8d84a760 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 850.603228][ T38] #3: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 850.603271][ T38] 4 locks held by kworker/1:8/7442: [ 850.603281][ T38] 6 locks held by kworker/u8:0/12662: [ 850.603292][ T38] #0: ffff88805c097138 ((wq_completion)wg-kex-wg0#5){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 850.603339][ T38] #1: ffffc90004f2fbc0 ((work_completion)(&peer->transmit_handshake_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 850.603383][ T38] #2: ffff88805c1a95f8 (&wg->static_identity.lock){++++}-{4:4}, at: wg_noise_handshake_create_initiation+0x10a/0x7e0 [ 850.603425][ T38] #3: ffff8880336f1928 (&handshake->lock){++++}-{4:4}, at: wg_noise_handshake_create_initiation+0x11b/0x7e0 [ 850.603465][ T38] #4: ffffffff8d84a760 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 850.603507][ T38] #5: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 850.603550][ T38] 5 locks held by kworker/0:6/19499: [ 850.603560][ T38] #0: ffff8880108a8538 ((wq_completion)wg-kex-wg1#2){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 850.603605][ T38] #1: ffffc90010f0fbc0 ((work_completion)(&({ do { const void *__vpp_verify = (typeof((worker) + 0))((void *)0); (void)__vpp_verify; } while (0); ({ unsigned long __ptr; __ptr = (unsigned long) ((__typeof_unqual__(*((worker))) *)(( unsigned long)((worker)))); (typeof((__typeof_unqual__(*((worker))) *)(( unsigned long)((worker))))) (__ptr + (((__per_cpu_offset[(cpu)])))); }); })->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 850.603661][ T38] #2: ffff888041e89928 (&handshake->lock){++++}-{4:4}, at: wg_noise_handshake_begin_session+0x38/0xbe0 [ 850.603707][ T38] #3: ffffffff8d84a760 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 850.603749][ T38] #4: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 850.603792][ T38] 4 locks held by kworker/0:8/19562: [ 850.603803][ T38] #0: ffff88801089c138 ((wq_completion)wg-kex-wg2#2){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 850.603850][ T38] #1: ffffc90012e8fbc0 ((work_completion)(&({ do { const void *__vpp_verify = (typeof((worker) + 0))((void *)0); (void)__vpp_verify; } while (0); ({ unsigned long __ptr; __ptr = (unsigned long) ((__typeof_unqual__(*((worker))) *)(( unsigned long)((worker)))); (typeof((__typeof_unqual__(*((worker))) *)(( unsigned long)((worker))))) (__ptr + (((__per_cpu_offset[(cpu)])))); }); })->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 850.603906][ T38] #2: ffffffff8d84a760 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 850.603948][ T38] #3: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 850.603991][ T38] 1 lock held by syz.4.6904/20296: [ 850.604001][ T38] #0: ffffffff8ecd22b8 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_dellink+0x331/0x710 [ 850.604042][ T38] 1 lock held by syz.0.6905/20300: [ 850.604053][ T38] #0: ffffffff8ecd22b8 (rtnl_mutex){+.+.}-{4:4}, at: inet_rtm_newroute+0x109/0x210 [ 850.604095][ T38] 2 locks held by syz.1.6909/20308: [ 850.604110][ T38] #0: ffff8880384d2908 (nlk_cb_mutex-ROUTE){+.+.}-{4:4}, at: __netlink_dump_start+0xfe/0x7e0 [ 850.604153][ T38] #1: ffffffff8ecd22b8 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_dumpit+0x92/0x200 [ 850.604195][ T38] 2 locks held by syz.2.6915/20319: [ 850.604205][ T38] #0: ffff88807f7a4908 (nlk_cb_mutex-ROUTE){+.+.}-{4:4}, at: __netlink_dump_start+0xfe/0x7e0 [ 850.604246][ T38] #1: ffffffff8ecd22b8 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_dumpit+0x92/0x200 [ 850.604288][ T38] 4 locks held by kworker/0:9/20323: [ 850.604299][ T38] #0: ffff888032f65938 ((wq_completion)wg-crypt-wg0#4){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 850.604346][ T38] #1: ffffc9001fbcfbc0 ((work_completion)(&({ do { const void *__vpp_verify = (typeof((worker) + 0))((void *)0); (void)__vpp_verify; } while (0); ({ unsigned long __ptr; __ptr = (unsigned long) ((__typeof_unqual__(*((worker))) *)(( unsigned long)((worker)))); (typeof((__typeof_unqual__(*((worker))) *)(( unsigned long)((worker))))) (__ptr + (((__per_cpu_offset[(cpu)])))); }); })->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 850.604399][ T38] #2: ffffffff8d84a760 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 850.604440][ T38] #3: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 850.604484][ T38] 6 locks held by kworker/u8:6/20324: [ 850.604494][ T38] #0: ffff888028c7b938 ((wq_completion)wg-kex-wg2#9){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 850.604542][ T38] #1: ffffc9001fbdfbc0 ((work_completion)(&peer->transmit_handshake_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 850.604587][ T38] #2: ffff8880380f55f8 (&wg->static_identity.lock){++++}-{4:4}, at: wg_noise_handshake_create_initiation+0x10a/0x7e0 [ 850.604627][ T38] #3: ffff8880336f03f8 (&handshake->lock){++++}-{4:4}, at: wg_noise_handshake_create_initiation+0x11b/0x7e0 [ 850.604667][ T38] #4: ffffffff8d84a760 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 850.604709][ T38] #5: ffff8880b8923d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 850.604753][ T38] 4 locks held by kworker/u8:8/20325: [ 850.604763][ T38] #0: ffff88805c095938 ((wq_completion)wg-kex-wg0#9){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 850.604809][ T38] #1: ffffc9001fbefbc0 ((work_completion)(&peer->transmit_handshake_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 850.604852][ T38] #2: ffffffff8d84a760 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 850.604899][ T38] #3: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 850.604941][ T38] 7 locks held by kworker/u8:11/20326: [ 850.604952][ T38] #0: ffff888019881138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 850.604996][ T38] #1: ffffc9001f9ffbc0 ((work_completion)(&(&nsim_dev->trap_data->trap_report_dw)->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 850.605040][ T38] #2: ffff88802409b300 (&devlink->lock_key#4){+.+.}-{4:4}, at: nsim_dev_trap_report_work+0x57/0xbc0 [ 850.605089][ T38] #3: ffff88805d3f4520 (&nsim_trap_data->trap_lock){+.+.}-{3:3}, at: nsim_dev_trap_report_work+0x1ad/0xbc0 [ 850.605137][ T38] #4: ffffffff8d9a8b80 (rcu_read_lock){....}-{1:3}, at: rt_spin_lock+0x1bb/0x2c0 [ 850.605177][ T38] #5: ffffffff8d84a760 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 850.605220][ T38] #6: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 850.605263][ T38] 7 locks held by kworker/u8:12/20327: [ 850.605273][ T38] #0: ffff888019881138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 850.605316][ T38] #1: ffffc9001fb8fbc0 ((work_completion)(&(&nsim_dev->trap_data->trap_report_dw)->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 850.605378][ T38] #2: ffff88805cefc300 (&devlink->lock_key){+.+.}-{4:4}, at: nsim_dev_trap_report_work+0x57/0xbc0 [ 850.605423][ T38] #3: ffff88805ce0f120 (&nsim_trap_data->trap_lock){+.+.}-{3:3}, at: nsim_dev_trap_report_work+0x1ad/0xbc0 [ 850.605468][ T38] #4: ffffffff8d9a8b80 (rcu_read_lock){....}-{1:3}, at: rt_spin_lock+0x1bb/0x2c0 [ 850.605509][ T38] #5: ffffffff8d84a760 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 850.605549][ T38] #6: ffff8880b8923d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 850.605591][ T38] 4 locks held by kworker/u8:13/20328: [ 850.605601][ T38] #0: ffff88814da22138 ((wq_completion)bat_events){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 850.605645][ T38] #1: ffffc9001fbafbc0 ((work_completion)(&(&bat_priv->nc.work)->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 850.605689][ T38] #2: ffffffff8d84a760 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 850.605731][ T38] #3: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 850.605774][ T38] 3 locks held by kworker/1:2/20330: [ 850.605785][ T38] #0: ffff888019899938 ((wq_completion)events_power_efficient){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 850.605828][ T38] #1: ffffc9000487fbc0 ((reg_check_chans).work){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 850.605870][ T38] #2: ffffffff8ecd22b8 (rtnl_mutex){+.+.}-{4:4}, at: reg_check_chans_work+0x95/0xf30 [ 850.605917][ T38] 6 locks held by kworker/u8:15/20332: [ 850.605927][ T38] #0: ffff88805c095938 ((wq_completion)wg-kex-wg0#9){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 850.605975][ T38] #1: ffffc9001fc1fbc0 ((work_completion)(&peer->transmit_handshake_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 850.606017][ T38] #2: ffff88803531d5f8 (&wg->static_identity.lock){++++}-{4:4}, at: wg_noise_handshake_create_initiation+0x10a/0x7e0 [ 850.606057][ T38] #3: ffff888041e8ede8 (&handshake->lock){++++}-{4:4}, at: wg_noise_handshake_create_initiation+0x11b/0x7e0 [ 850.606097][ T38] #4: ffffffff8d84a760 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 850.606144][ T38] #5: ffff8880b8923d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 850.606188][ T38] 4 locks held by kworker/1:7/20333: [ 850.606198][ T38] #0: ffff8880108a8538 ((wq_completion)wg-kex-wg1#2){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 850.606247][ T38] #1: ffffc9001fc2fbc0 ((work_completion)(&({ do { const void *__vpp_verify = (typeof((worker) + 0))((void *)0); (void)__vpp_verify; } while (0); ({ unsigned long __ptr; __ptr = (unsigned long) ((__typeof_unqual__(*((worker))) *)(( unsigned long)((worker)))); (typeof((__typeof_unqual__(*((worker))) *)(( unsigned long)((worker))))) (__ptr + (((__per_cpu_offset[(cpu)])))); }); })->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 850.606303][ T38] #2: ffffffff8d84a760 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 850.606345][ T38] #3: ffff8880b8923d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 850.606389][ T38] 4 locks held by kworker/1:9/20334: [ 850.606400][ T38] #0: ffff88805c140138 ((wq_completion)wg-kex-wg2#4){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 850.606448][ T38] #1: ffffc9001fc0fbc0 ((work_completion)(&({ do { const void *__vpp_verify = (typeof((worker) + 0))((void *)0); (void)__vpp_verify; } while (0); ({ unsigned long __ptr; __ptr = (unsigned long) ((__typeof_unqual__(*((worker))) *)(( unsigned long)((worker)))); (typeof((__typeof_unqual__(*((worker))) *)(( unsigned long)((worker))))) (__ptr + (((__per_cpu_offset[(cpu)])))); }); })->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 850.606503][ T38] #2: ffffffff8d84a760 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 850.606542][ T38] #3: ffff8880b8923d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 850.606585][ T38] 1 lock held by kworker/u8:17/20335: [ 850.606596][ T38] 4 locks held by kworker/1:10/20336: [ 850.606606][ T38] #0: ffff888032f65938 ((wq_completion)wg-crypt-wg0#4){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 850.606652][ T38] #1: ffffc9001fa9fbc0 ((work_completion)(&({ do { const void *__vpp_verify = (typeof((worker) + 0))((void *)0); (void)__vpp_verify; } while (0); ({ unsigned long __ptr; __ptr = (unsigned long) ((__typeof_unqual__(*((worker))) *)(( unsigned long)((worker)))); (typeof((__typeof_unqual__(*((worker))) *)(( unsigned long)((worker))))) (__ptr + (((__per_cpu_offset[(cpu)])))); }); })->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 850.606707][ T38] #2: ffffffff8d84a760 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 850.606748][ T38] #3: ffff8880b8923d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 850.606789][ T38] 7 locks held by kworker/u8:20/20337: [ 850.606799][ T38] #0: ffff888019881138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 850.606841][ T38] #1: ffffc9001fc3fbc0 ((work_completion)(&(&nsim_dev->trap_data->trap_report_dw)->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 850.606884][ T38] #2: ffff888041ea3300 (&devlink->lock_key#3){+.+.}-{4:4}, at: nsim_dev_trap_report_work+0x57/0xbc0 [ 850.606938][ T38] #3: ffff88805d26c120 (&nsim_trap_data->trap_lock){+.+.}-{3:3}, at: nsim_dev_trap_report_work+0x1ad/0xbc0 [ 850.606982][ T38] #4: ffffffff8d9a8b80 (rcu_read_lock){....}-{1:3}, at: rt_spin_lock+0x1bb/0x2c0 [ 850.607022][ T38] #5: ffffffff8d84a760 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 850.607063][ T38] #6: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 850.607115][ T38] 4 locks held by kworker/0:10/20338: [ 850.607125][ T38] #0: ffff888019899138 ((wq_completion)events_long){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 850.607169][ T38] #1: ffffc9001faffbc0 ((work_completion)(&(&ipvs->defense_work)->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 850.607212][ T38] #2: ffffffff8d84a760 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 850.607254][ T38] #3: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 850.607297][ T38] 6 locks held by kworker/u8:21/20339: [ 850.607307][ T38] #0: ffff8880308ed938 ((wq_completion)wg-kex-wg0#3){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 850.607354][ T38] #1: ffffc9001fc4fbc0 ((work_completion)(&peer->transmit_handshake_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 850.607398][ T38] #2: ffff88802fb6d5f8 (&wg->static_identity.lock){++++}-{4:4}, at: wg_noise_handshake_create_initiation+0x10a/0x7e0 [ 850.607441][ T38] #3: ffff8880374a8e90 (&handshake->lock){++++}-{4:4}, at: wg_noise_handshake_create_initiation+0x11b/0x7e0 [ 850.607481][ T38] #4: ffffffff8d84a760 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 850.607523][ T38] #5: ffff8880b8923d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 850.607567][ T38] 4 locks held by kworker/u8:22/20342: [ 850.607578][ T38] #0: ffff88803626e938 ((wq_completion)wg-kex-wg1){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 850.607622][ T38] #1: ffffc9002007fbc0 ((work_completion)(&peer->transmit_handshake_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 850.607664][ T38] #2: ffff888035ecd5f8 (&wg->static_identity.lock){++++}-{4:4}, at: wg_noise_handshake_create_initiation+0x10a/0x7e0 [ 850.607705][ T38] #3: ffff888041e89928 (&handshake->lock){++++}-{4:4}, at: wg_noise_handshake_create_initiation+0x11b/0x7e0 [ 850.607746][ T38] 1 lock held by dhcpcd/20343: [ 850.607757][ T38] #0: ffff888032d98350 (sk_lock-AF_PACKET){+.+.}-{0:0}, at: packet_do_bind+0x32/0xcd0 [ 850.607798][ T38] 4 locks held by kworker/u8:23/20344: [ 850.607809][ T38] #0: ffff88805c26c938 ((wq_completion)wg-kex-wg0#7){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 850.607856][ T38] #1: ffffc9002048fbc0 ((work_completion)(&peer->transmit_handshake_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 850.607897][ T38] #2: ffffffff8d84a760 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 850.607938][ T38] #3: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 850.607982][ T38] 4 locks held by kworker/u8:24/20345: [ 850.607993][ T38] #0: ffff888028c7b938 ((wq_completion)wg-kex-wg2#9){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 850.608040][ T38] #1: ffffc900057ffbc0 ((work_completion)(&peer->transmit_handshake_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 850.608084][ T38] #2: ffffffff8d84a760 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 850.608131][ T38] #3: ffff8880b8923d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 850.608174][ T38] 6 locks held by kworker/u8:25/20346: [ 850.608184][ T38] #0: ffff888028c78938 ((wq_completion)wg-kex-wg1#9){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 850.608233][ T38] #1: ffffc9002149fbc0 ((work_completion)(&peer->transmit_handshake_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 850.608277][ T38] #2: ffff8880380f15f8 (&wg->static_identity.lock){++++}-{4:4}, at: wg_noise_handshake_create_initiation+0x10a/0x7e0 [ 850.608318][ T38] #3: ffff888041e8f880 (&handshake->lock){++++}-{4:4}, at: wg_noise_handshake_create_initiation+0x11b/0x7e0 [ 850.608358][ T38] #4: ffffffff8d84a760 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 850.608399][ T38] #5: ffff8880b8923d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 850.608443][ T38] 6 locks held by kworker/u8:26/20347: [ 850.608454][ T38] #0: ffff88805c26b138 ((wq_completion)wg-kex-wg1#5){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 850.608501][ T38] #1: ffffc900214afbc0 ((work_completion)(&peer->transmit_handshake_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 850.608564][ T38] #2: ffff888039db95f8 (&wg->static_identity.lock){++++}-{4:4}, at: wg_noise_handshake_create_initiation+0x10a/0x7e0 [ 850.608605][ T38] #3: ffff8880336f2e58 (&handshake->lock){++++}-{4:4}, at: wg_noise_handshake_create_initiation+0x11b/0x7e0 [ 850.608647][ T38] #4: ffffffff8d84a760 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 850.608690][ T38] #5: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 850.608734][ T38] 1 lock held by dhcpcd/20348: [ 850.608745][ T38] #0: ffff8880509c6350 (sk_lock-AF_PACKET){+.+.}-{0:0}, at: packet_do_bind+0x32/0xcd0 [ 850.608787][ T38] 6 locks held by kworker/u8:27/20353: [ 850.608797][ T38] #0: ffff88803626e938 ((wq_completion)wg-kex-wg1){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 850.608856][ T38] #1: ffffc9002250fbc0 ((work_completion)(&peer->transmit_handshake_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 850.608900][ T38] #2: ffff888035ecd5f8 (&wg->static_identity.lock){++++}-{4:4}, at: wg_noise_handshake_create_initiation+0x10a/0x7e0 [ 850.608942][ T38] #3: ffff8880374a83f8 (&handshake->lock){++++}-{4:4}, at: wg_noise_handshake_create_initiation+0x11b/0x7e0 [ 850.608982][ T38] #4: ffffffff8d84a760 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 850.609025][ T38] #5: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 850.609066][ T38] 4 locks held by syz-executor/20354: [ 850.609076][ T38] 7 locks held by kworker/u8:28/20355: [ 850.609086][ T38] #0: ffff888019881138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 850.609134][ T38] #1: ffffc9002252fbc0 ((work_completion)(&(&nsim_dev->trap_data->trap_report_dw)->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 851.593910][ T37] kauditd_printk_skb: 13 callbacks suppressed [ 851.593930][ T37] audit: type=1400 audit(1756569092.351:362983): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20354 comm="syz-executor" name="/" dev="sda1" ino=2 [ 851.593975][ T37] audit: type=1400 audit(1756569093.259:362984): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20354 comm="syz-executor" name="/" dev="sysfs" ino=1 [ 851.594012][ T37] audit: type=1400 audit(1756569093.259:362985): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20354 comm="syz-executor" name="kernel" dev="sysfs" ino=1392 [ 851.594051][ T37] audit: type=1400 audit(1756569093.259:362986): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=20354 comm="syz-executor" name="/" dev="debugfs" ino=1 [ 851.594089][ T37] audit: type=1400 audit(1756569093.259:362987): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=rw pid=20354 comm="syz-executor" name="kcov" dev="debugfs" ino=96 [ 851.594128][ T37] audit: type=1400 audit(1756569093.278:362988): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=20354 comm="syz-executor" path="/sys/kernel/debug/kcov" dev="debugfs" ino=96 [ 851.594167][ T37] audit: type=1400 audit(1756569093.278:362989): lsm=SMACK fn=smack_file_ioctl action=granted subject="_" object="_" requested=r pid=20354 comm="syz-executor" path="/sys/kernel/debug/kcov" dev="debugfs" ino=96 [ 852.597984][ T38] #2: ffff88805d19b300 (&devlink->lock_key#2){+.+.}-{4:4}, at: nsim_dev_trap_report_work+0x57/0xbc0 [ 852.598052][ T38] #3: ffff88805d083120 (&nsim_trap_data->trap_lock){+.+.}-{3:3}, at: nsim_dev_trap_report_work+0x1ad/0xbc0 [ 852.598097][ T38] #4: ffffffff8d9a8b80 (rcu_read_lock){....}-{1:3}, at: rt_spin_lock+0x1bb/0x2c0 [ 852.598139][ T38] #5: ffffffff8d84a760 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 852.598183][ T38] #6: ffff8880b8923d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 852.598229][ T38] 3 locks held by dhcpcd/20356: [ 852.598240][ T38] #0: ffff8880108c4350 (sk_lock-AF_PACKET){+.+.}-{0:0}, at: packet_do_bind+0x32/0xcd0 [ 852.598283][ T38] #1: ffffffff8d84a760 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 852.598326][ T38] #2: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 852.598370][ T38] 6 locks held by kworker/u8:29/20357: [ 852.598381][ T38] #0: ffff88805c097138 ((wq_completion)wg-kex-wg0#5){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 [ 852.598430][ T38] #1: ffffc900057efbc0 ((work_completion)(&peer->transmit_handshake_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 [ 852.598475][ T38] #2: ffff88805c1a95f8 (&wg->static_identity.lock){++++}-{4:4}, at: wg_noise_handshake_create_initiation+0x10a/0x7e0 [ 852.598518][ T38] #3: ffff8880336f23c0 (&handshake->lock){++++}-{4:4}, at: wg_noise_handshake_create_initiation+0x11b/0x7e0 [ 852.598560][ T38] #4: ffffffff8d84a760 (local_bh){.+.+}-{1:3}, at: __local_bh_disable_ip+0xa1/0x400 [ 852.598602][ T38] #5: ffff8880b8823d90 ((softirq_ctrl.lock)){+.+.}-{3:3}, at: __local_bh_disable_ip+0x264/0x400 [ 852.598654][ T38] [ 852.598660][ T38] ============================================= [ 852.598660][ T38] [ 852.598679][ T38] NMI backtrace for cpu 0 [ 852.598701][ T38] CPU: 0 UID: 0 PID: 38 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT_{RT,(full)} [ 852.598722][ T38] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 852.598733][ T38] Call Trace: [ 852.598741][ T38] [ 852.598748][ T38] dump_stack_lvl+0x189/0x250 [ 852.598777][ T38] ? __pfx_dump_stack_lvl+0x10/0x10 [ 852.598800][ T38] ? __pfx__printk+0x10/0x10 [ 852.598832][ T38] nmi_cpu_backtrace+0x39e/0x3d0 [ 852.598854][ T38] ? __pfx_nmi_cpu_backtrace+0x10/0x10 [ 852.598876][ T38] ? __pfx__printk+0x10/0x10 [ 852.598899][ T38] ? __pfx_nmi_raise_cpu_backtrace+0x10/0x10 [ 852.598922][ T38] nmi_trigger_cpumask_backtrace+0x17a/0x300 [ 852.598944][ T38] watchdog+0xf93/0xfe0 [ 852.598971][ T38] ? watchdog+0x1de/0xfe0 [ 852.598997][ T38] kthread+0x711/0x8a0 [ 852.599024][ T38] ? __pfx_watchdog+0x10/0x10 [ 852.599043][ T38] ? __pfx_kthread+0x10/0x10 [ 852.599072][ T38] ? __pfx_kthread+0x10/0x10 [ 852.599095][ T38] ret_from_fork+0x3f9/0x770 [ 852.599120][ T38] ? __pfx_ret_from_fork+0x10/0x10 [ 852.599148][ T38] ? __switch_to_asm+0x39/0x70 [ 852.599163][ T38] ? __switch_to_asm+0x33/0x70 [ 852.599178][ T38] ? __pfx_kthread+0x10/0x10 [ 852.599202][ T38] ret_from_fork_asm+0x1a/0x30 [ 852.599235][ T38] [ 852.599242][ T38] Sending NMI from CPU 0 to CPUs 1: [ 852.599267][ C1] NMI backtrace for cpu 1 [ 852.599281][ C1] CPU: 1 UID: 0 PID: 29 Comm: ktimers/1 Not tainted syzkaller #0 PREEMPT_{RT,(full)} [ 852.599300][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 852.599310][ C1] RIP: 0010:__sanitizer_cov_trace_pc+0x0/0x80 [ 852.599331][ C1] Code: 89 fb e8 23 00 00 00 48 8b 3d a4 a8 66 0b 48 89 de 5b e9 13 a0 54 00 cc cc cc 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1e fa 48 8b 04 24 65 48 8b 0c 25 08 e0 f5 91 65 8b 35 c8 83 [ 852.599345][ C1] RSP: 0018:ffffc90000a3ee88 EFLAGS: 00000202 [ 852.599360][ C1] RAX: ffffffff89ae3556 RBX: ffff888035332000 RCX: ffff88801ca89dc0 [ 852.599373][ C1] RDX: 0000000000000100 RSI: 0000000000000001 RDI: 0000000000000000 [ 852.599384][ C1] RBP: 1ffff1100bbd6699 R08: 0000000000000000 R09: 0000000000000100 [ 852.599395][ C1] R10: ffffc90000a3f000 R11: fffff52000147e02 R12: 0000000000000001 [ 852.599407][ C1] R13: 0000000000000003 R14: 1ffff1100bbd669b R15: ffff88805deb34df [ 852.599419][ C1] FS: 0000000000000000(0000) GS:ffff8881269c2000(0000) knlGS:0000000000000000 [ 852.599433][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 852.599444][ C1] CR2: 00007f48fec36038 CR3: 00000000352a6000 CR4: 00000000003526f0 [ 852.599459][ C1] Call Trace: [ 852.599465][ C1] [ 852.599471][ C1] lockdep_rtnl_is_held+0xa/0x40 [ 852.599496][ C1] find_match+0xd0/0xcb0 [ 852.599521][ C1] __find_rr_leaf+0x23a/0x6d0 [ 852.599547][ C1] ? __pfx___find_rr_leaf+0x10/0x10 [ 852.599566][ C1] ? __pfx_fib6_node_lookup+0x10/0x10 [ 852.599590][ C1] fib6_table_lookup+0x3a2/0xa80 [ 852.599626][ C1] ? __pfx_fib6_table_lookup+0x10/0x10 [ 852.599653][ C1] ? ip6_pol_route+0x162/0x1180 [ 852.599674][ C1] ip6_pol_route+0x222/0x1180 [ 852.599700][ C1] ? __pfx_ip6_pol_route+0x10/0x10 [ 852.599721][ C1] ? stack_depot_save_flags+0x40/0x860 [ 852.599750][ C1] fib6_rule_lookup+0x52f/0x6f0 [ 852.599766][ C1] ? __pfx_ip6_pol_route_input+0x10/0x10 [ 852.599789][ C1] ? __pfx_fib6_rule_lookup+0x10/0x10 [ 852.599817][ C1] ip6_route_input+0x6ce/0xa50 [ 852.599843][ C1] ? __pfx_ip6_route_input+0x10/0x10 [ 852.599871][ C1] ? __lock_acquire+0xab9/0xd20 [ 852.599906][ C1] ? ip6_rcv_finish_core+0x222/0x420 [ 852.599926][ C1] ip6_rcv_finish+0x141/0x2e0 [ 852.599946][ C1] NF_HOOK+0x30c/0x3a0 [ 852.599963][ C1] ? skb_orphan+0xaf/0xd0 [ 852.599981][ C1] ? __pfx_ip6_rcv_finish+0x10/0x10 [ 852.599999][ C1] ? NF_HOOK+0x9a/0x3a0 [ 852.600016][ C1] ? __pfx_NF_HOOK+0x10/0x10 [ 852.600035][ C1] ? __pfx_ip6_rcv_finish+0x10/0x10 [ 852.600059][ C1] __netif_receive_skb+0xd3/0x380 [ 852.600076][ C1] ? rt_spin_unlock+0x65/0x80 [ 852.600095][ C1] ? process_backlog+0x27b/0x900 [ 852.600112][ C1] process_backlog+0x31e/0x900 [ 852.600137][ C1] __napi_poll+0xb6/0x540 [ 852.600157][ C1] net_rx_action+0x707/0xe00 [ 852.600185][ C1] ? __pfx_net_rx_action+0x10/0x10 [ 852.600222][ C1] handle_softirqs+0x22c/0x710 [ 852.600246][ C1] ? __pfx_handle_softirqs+0x10/0x10 [ 852.600272][ C1] run_ktimerd+0xcf/0x190 [ 852.600292][ C1] ? __pfx_run_ktimerd+0x10/0x10 [ 852.600312][ C1] ? schedule+0x91/0x360 [ 852.600334][ C1] ? smpboot_thread_fn+0x4d/0xa60 [ 852.600353][ C1] smpboot_thread_fn+0x542/0xa60 [ 852.600373][ C1] ? smpboot_thread_fn+0x4d/0xa60 [ 852.600397][ C1] kthread+0x711/0x8a0 [ 852.600420][ C1] ? __pfx_smpboot_thread_fn+0x10/0x10 [ 852.600439][ C1] ? __pfx_kthread+0x10/0x10 [ 852.600463][ C1] ? __pfx_kthread+0x10/0x10 [ 852.600486][ C1] ret_from_fork+0x3f9/0x770 [ 852.600507][ C1] ? __pfx_ret_from_fork+0x10/0x10 [ 852.600529][ C1] ? __switch_to_asm+0x39/0x70 [ 852.600544][ C1] ? __switch_to_asm+0x33/0x70 [ 852.600558][ C1] ? __pfx_kthread+0x10/0x10 [ 852.600581][ C1] ret_from_fork_asm+0x1a/0x30 [ 852.600605][ C1] [ 852.601271][ T38] Kernel panic - not syncing: hung_task: blocked tasks [ 852.601286][ T38] CPU: 0 UID: 0 PID: 38 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT_{RT,(full)} [ 852.601306][ T38] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 852.601316][ T38] Call Trace: [ 852.601324][ T38] [ 852.601332][ T38] dump_stack_lvl+0x99/0x250 [ 852.601357][ T38] ? __asan_memcpy+0x40/0x70 [ 852.601376][ T38] ? __pfx_dump_stack_lvl+0x10/0x10 [ 852.601400][ T38] ? __pfx__printk+0x10/0x10 [ 852.601431][ T38] vpanic+0x281/0x750 [ 852.601457][ T38] ? __pfx_vpanic+0x10/0x10 [ 852.601477][ T38] ? __x2apic_send_IPI_mask+0x1e4/0x260 [ 852.601496][ T38] ? lockdep_hardirqs_on+0x9c/0x150 [ 852.601529][ T38] panic+0xb9/0xc0 [ 852.601551][ T38] ? __pfx_panic+0x10/0x10 [ 852.601576][ T38] ? irq_work_queue+0xc3/0x140 [ 852.601602][ T38] ? nmi_trigger_cpumask_backtrace+0x234/0x300 [ 852.601625][ T38] watchdog+0xfd2/0xfe0 [ 852.601660][ T38] ? watchdog+0x1de/0xfe0 [ 852.601687][ T38] kthread+0x711/0x8a0 [ 852.601714][ T38] ? __pfx_watchdog+0x10/0x10 [ 852.601734][ T38] ? __pfx_kthread+0x10/0x10 [ 852.601762][ T38] ? __pfx_kthread+0x10/0x10 [ 852.601786][ T38] ret_from_fork+0x3f9/0x770 [ 852.601811][ T38] ? __pfx_ret_from_fork+0x10/0x10 [ 852.601837][ T38] ? __switch_to_asm+0x39/0x70 [ 852.601853][ T38] ? __switch_to_asm+0x33/0x70 [ 852.601868][ T38] ? __pfx_kthread+0x10/0x10 [ 852.601892][ T38] ret_from_fork_asm+0x1a/0x30 [ 852.601925][ T38] [ 852.602211][ T38] Kernel Offset: disabled