last executing test programs: 12.019798848s ago: executing program 2 (id=1299): r0 = syz_open_procfs$userns(0x0, &(0x7f0000000080)) mount_setattr(0xffffffffffffff9c, 0x0, 0x100, &(0x7f0000000200)={0x100080, 0x0, 0x100000, {r0}}, 0x20) 11.922652274s ago: executing program 1 (id=1300): r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) getsockopt$rose(r0, 0x104, 0x1, 0x0, &(0x7f0000000080)) 11.786650761s ago: executing program 4 (id=1301): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="240000001a00010000000000000000001c0000000000000000000000080001000f0001"], 0x24}}, 0x0) 11.658458109s ago: executing program 3 (id=1302): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000080)={0x5c, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_BUCKETSIZE={0x5, 0x15, 0x4}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x5c}}, 0x0) 11.574303163s ago: executing program 0 (id=1303): r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='gid_map\x00') read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x79b40dbbed0e973) 11.571947346s ago: executing program 2 (id=1304): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x5, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}]}, @NFT_MSG_NEWRULE={0x58, 0x6, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_RULE_CHAIN_ID={0x8}, @NFTA_RULE_EXPRESSIONS={0x30, 0x4, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, @connlimit={{0xe}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_CONNLIMIT_COUNT={0x8}]}}}, {0xc, 0x1, 0x0, 0x1, @osf={{0x8}, @void}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0xcc}}, 0x0) 11.515093939s ago: executing program 1 (id=1305): r0 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x802) ioctl$F2FS_IOC_GARBAGE_COLLECT(r0, 0x80004509, 0x0) 11.322515813s ago: executing program 4 (id=1306): r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="1c0000005200010000000000fddbdf0002000000080001"], 0x1c}}, 0x4000000) 11.246762623s ago: executing program 3 (id=1307): r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$UI_BEGIN_FF_ERASE(r0, 0xc00c55ca, &(0x7f0000000080)={0x8, 0xf0, 0x3ff}) 11.192369256s ago: executing program 0 (id=1308): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@ipv4_newroute={0x24, 0x1a, 0x1, 0x0, 0x3, {0x2, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x1, 0x2100}, [@RTA_DST={0x8, 0x1, @multicast2}]}, 0x24}}, 0x0) 11.173665065s ago: executing program 2 (id=1309): r0 = syz_open_dev$radio(&(0x7f0000000000), 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYMENU(r0, 0xc02c5625, &(0x7f0000000040)={0x98f907, 0x2, @name="f4e06b0a1e730e142a5c1e8623218cb8167a99b19faf6797ae55586411baebc8"}) 11.074033836s ago: executing program 1 (id=1310): r0 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCGSW(r0, 0x80404531, 0x0) 10.906618222s ago: executing program 4 (id=1311): r0 = openat$sequencer2(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SNDCTL_FM_4OP_ENABLE(r0, 0x4004510f, &(0x7f0000000040)=0x3) 10.832343956s ago: executing program 3 (id=1312): r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@bridge_delneigh={0x15, 0x1d, 0xf07, 0x0, 0x0, {0x7}}, 0x1c}}, 0x0) 10.774786607s ago: executing program 2 (id=1313): r0 = syz_open_procfs$namespace(0x0, &(0x7f0000002d80)='ns/mnt\x00') ioctl$BTRFS_IOC_ADD_DEV(r0, 0x5000940a, 0x0) 10.769060239s ago: executing program 0 (id=1314): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)={0x14, 0x35, 0x107, 0x0, 0x0, {0xb, 0x7c}}, 0x14}}, 0x0) 10.643379634s ago: executing program 1 (id=1315): r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180), 0x109842, 0x0) ioctl$SNDCTL_DSP_SPEED(r0, 0x80044df9, 0x0) 10.466540043s ago: executing program 4 (id=1316): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f000000c280)={&(0x7f0000003a80)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01210000000000000000050000000900010073797a300000000054000000030a01030000000000000000050000000900010073797a30000000000900030073797a320000000028000480080002406b10a6210800014000000014"], 0xb0}, 0x1, 0x0, 0x0, 0x5d04b4753047a371}, 0x0) 10.413372945s ago: executing program 3 (id=1317): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000f40)=ANY=[@ANYBLOB="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", @ANYRES8], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x16, 0x0, 0xffffffffffffffff, 0xffffffffffffffc9, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xfe, 0x60000007, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000, 0x0, 0x5a0e}, 0x2c) 10.336777779s ago: executing program 0 (id=1318): r0 = openat$zero(0xffffff9c, &(0x7f0000004e00), 0x0, 0x0) read$alg(r0, 0x0, 0x0) 10.303393541s ago: executing program 2 (id=1319): futex_waitv(&(0x7f0000000180)=[{0x0, &(0x7f0000000000), 0x2}, {0x3, &(0x7f0000000040)=0x3, 0x2}], 0x2, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x5, 0x0, 0x0, &(0x7f0000000000), 0x0) 10.126401602s ago: executing program 1 (id=1320): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x80040, 0x0) ioctl$TIOCSIG(r0, 0x40045436, 0x2c) 10.026901233s ago: executing program 4 (id=1321): r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001680)={&(0x7f0000000080)=@newtaction={0x6c, 0x30, 0x53b, 0x0, 0x0, {}, [{0x58, 0x1, [@m_simple={0x54, 0x1, 0x0, 0x0, {{0xb}, {0x28, 0x2, 0x0, 0x1, [@TCA_DEF_DATA={0xb, 0x3, 'simple\x00'}, @TCA_DEF_PARMS={0x18}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x6c}}, 0x0) 9.982086318s ago: executing program 3 (id=1322): r0 = openat$dsp(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SOUND_MIXER_READ_DEVMASK(r0, 0x80044dfe, &(0x7f0000000100)) 9.918396511s ago: executing program 0 (id=1323): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffb}]}) mknod$loop(&(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x1) 9.862541701s ago: executing program 2 (id=1324): r0 = openat$selinux_avc_hash_stats(0xffffff9c, &(0x7f0000000e80), 0x0, 0x0) read$midi(r0, 0x0, 0x0) 9.722115605s ago: executing program 1 (id=1325): r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDMKTONE(r0, 0x4b30, 0x10000) 9.546399603s ago: executing program 4 (id=1326): r0 = syz_open_dev$evdev(&(0x7f0000000240), 0x0, 0x0) ioctl$EVIOCGLED(r0, 0x80284511, 0x0) 9.50196197s ago: executing program 3 (id=1327): r0 = fsopen(&(0x7f0000000280)='cifs\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000040)='source', &(0x7f0000000f80)='//\xf2b\x06\b\xba\xdfXo\xdc\xea\x95\x9a\x82\x10\x97W\x8f7\x98\x9bMQ9\xf9\rmD\x94)U\xdb\x15X.I\n}\xf3\x9d\xe4_\x05\x9cqf4I^#b?9\xde\xafu\'\x83L\xe0\x97\xe1n_\xa4%\xb1\x97\x93\xafv\xce/\\\xb4L\xf2_\xa7\xfb\xf4\x84\x1fA\xeas^\xef\xa2\x85\xa3!\xfb\x93\xd7R\xab2\x1eW\xe9h\x9b\xf7ul\xf9D\xd4\x82X5\x13\xaa\x87\xf9\xba\xa9m\x14\x14R_\x9a\\>4\xce\x8e_#\xf8D\xb1\xdep\x01\xcc:\xa6\xc5n\xeb\xab\xf70\x99\xef\x8b 1 Oct 8 19:40:36 syzkaller kern.warn kernel: [ 117.519764][ T5239] Bluetooth: hci4: unexpected cc 0x2027 length: 2 > 1 [ 118.136495][ T6633] xt_policy: neither incoming nor outgoing policy selected Oct 8 19:40:36 syzkaller kern.info kernel: [ 118.136495][ T6633] xt_policy: neither incoming nor outgoing policy selected [ 119.024863][ T6683] netlink: 52 bytes leftover after parsing attributes in process `syz.3.666'. Oct 8 19:40:37 syzkaller kern.warn kernel: [ 119.024863][ T6683] netlink: 52 bytes leftover after parsing attributes in process `syz.3.666'. [ 119.659719][ T29] kauditd_printk_skb: 196 callbacks suppressed [ 119.659741][ T29] audit: type=1400 audit(1728416438.177:1002): avc: denied { read write } for pid=5225 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Oct 8 19:40:38 syzkaller kern.warn kernel: [ 119.659719][ T29] kauditd_printk_skb: 196 callbacks suppressed Oct 8 19:40:38 syzkaller kern.notice kernel: [ 119.659741][ T29] audit: type=1400 audit(1728416438.177:1002): avc: denied { read write } for pid=5225 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=s[ 119.725224][ T29] audit: type=1400 audit(1728416438.187:1003): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ystem_u:object_r:fi Oct 8 19:40:38 syzkaller kern.notice kernel: [ 119.725224][ T29] audit: type=1400 audit(1728416438.187:1003): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 119.801480][ T29] audit: type=1400 audit(1728416438.187:1004): avc: denied { bpf } for pid=6719 comm="syz.4.684" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 Oct 8 19:40:38 syzkaller kern.notice kernel: [ 119.801480][ T29] audit: type=1400 audit(1728416438.187:1004): avc: denied { bpf } for pid=6719 comm="syz.4.684" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissiv [ 119.868363][ T29] audit: type=1400 audit(1728416438.207:1005): avc: denied { read } for pid=6720 comm="syz.3.685" name="v4l-subdev0" dev="devtmpfs" ino=857 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 Oct 8 19:40:38 syzkaller kern.notice kernel: [ 119.868363][ T29] audit: type=1400 audit(1728416438.207:1005): avc: denied { read } for pid=6720 comm="syz.3.685" name="v4l-subdev0" dev="devtmpfs" ino=857 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devic [ 119.964837][ T29] audit: type=1400 audit(1728416438.207:1006): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Oct 8 19:40:38 syzkaller kern.notice kernel: [ 119.964837][ T29] audit: type=1400 audit(1728416438.207:1006): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 120.036934][ T29] audit: type=1400 audit(1728416438.217:1007): avc: denied { read write } for pid=5233 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Oct 8 19:40:38 syzkaller kern.notice kernel: [ 120.036934][ T29] audit: type=1400 audit(1728416438.217:1007): avc: denied { read write } for pid=5233 comm="syz-executor"[ 120.078425][ T29] audit: type=1400 audit(1728416438.237:1008): avc: denied { create } for pid=6723 comm="syz.0.686" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=0 name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Oct 8 19:40[ 120.107158][ T6738] xt_connbytes: Forcing CT accounting to be enabled :38 syzkaller kern.notice kernel: [ 120.078425][ T29] audit: type=1400 audit(1728416438.237:1008): avc: denied { create } for pid=6723 com[ 120.125861][ T6738] xt_NFQUEUE: number of total queues is 0 m="syz.0.686" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=0 Oct 8 19:40:38 syzkaller kern.warn kernel: [ 120.107158][ T6738] xt_connbytes: Forcing CT accounting to be enabled Oct 8 19:40:38 syzkaller kern.info kernel: [ 120.125861][ T6738] xt_NFQUEUE: number of tot[ 120.160013][ T29] audit: type=1400 audit(1728416438.277:1009): avc: denied { read write } for pid=5229 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 al queues is 0 Oct 8 19:40:38 syzkaller kern.notice kernel: [ 120.160013][ T29] audit: type=1400 audit(1728416438.277:1009): avc: denied { read write } for pid=5229 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 120.231027][ T29] audit: type=1400 audit(1728416438.287:1010): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Oct 8 19:40:38 syzkaller kern.notice kernel: [ 120.231027][ T29] audit: type=1400 audit(1728416438.287:1010): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 120.332671][ T29] audit: type=1400 audit(1728416438.307:1011): avc: denied { read write } for pid=5224 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Oct 8 19:40:38 syzkaller kern.notice kernel: [ 120.332671][ T29] audit: type=1400 audit(1728416438.307:1011): avc: denied { read write } for pid=5224 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 121.236603][ T6798] No such timeout policy "syz0" Oct 8 19:40:39 syzkaller kern.info kernel: [ 121.236603][ T6798] No such timeout policy "syz0" [ 121.537397][ T5239] Bluetooth: hci4: Controller not accepting commands anymore: ncmd = 0 [ 121.546399][ T5239] Bluetooth: hci4: Injecting HCI hardware error event [ 121.554953][ T5239] Bluetooth: hci4: hardware error 0x00 Oct 8 19:40:40 syzkaller kern.err kernel: [ 121.537397][ T5239] Bluetooth: hci4: Controller not accepting commands anymore: ncmd = 0 Oct 8 19:40:40 syzkaller kern.err kernel: [ 121.546399][ T5239] Bluetooth: hci4: Injecting HCI hardware error event Oct 8 19:40:40 syzkaller kern.err kernel: [ 121.554953][ T5239] Bluetooth: hci4: hardware error 0x00 [ 123.696068][ T5239] Bluetooth: hci4: Opcode 0x0c03 failed: -110 Oct 8 19:40:42 syzkaller kern.err kernel: [ 123.696068][ T5239] Bluetooth: hci4: Opcode 0x0c03 failed: -110 [ 124.397909][ T6980] kAFS: unable to lookup cell 'mS²/Ë¡8' Oct 8 19:40:42 syzkaller kern.err kernel: [ 124.397909][ T6980] kAFS: unable to lookup cell 'mS²/Ë¡8' [ 124.494621][ T6983] netlink: 'syz.0.811': attribute type 9 has an invalid length. Oct 8 19:40:43 syzkaller kern.warn kernel: [ 124.494621][ T6983] netlink: 'syz.0.811': attribute type 9 has an invalid length. [ 124.671008][ T29] kauditd_printk_skb: 190 callbacks suppressed [ 124.671032][ T29] audit: type=1400 audit(1728416443.187:1202): avc: denied { create } for pid=6994 comm="syz.4.818" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 Oct 8 19:40:43 syzkaller kern.warn kernel: [ 124.671008][ T29] kauditd_printk_skb: 190 callbacks suppressed Oct 8 19:40:43 syzkaller kern.notice kernel: [ 124.671032][ T29] audit: type=1400 audit(1728416443.187:1202): avc: denied { create } for pid=6994 comm="syz.4.818" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 124.745888][ T29] audit: type=1400 audit(1728416443.217:1203): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Oct 8 19:40:43 syzkaller kern.notice kernel: [ 124.745888][ T29] audit: type=1400 audit(1728416443.217:1203): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 124.831128][ T29] audit: type=1400 audit(1728416443.217:1204): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Oct 8 19:40:43 syzkaller kern.notice kernel: [ 124.831128][ T29] audit: type=1400 audit(1728416443.217:1204): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 124.932478][ T29] audit: type=1400 audit(1728416443.237:1205): avc: denied { read write } for pid=5233 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Oct 8 19:40:43 syzkaller kern.notice kernel: [ 124.932478][ T29] audit: type=1400 audit(1728416443.237:1205): avc: denied { read write } for pid=5233 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 125.025652][ T29] audit: type=1400 audit(1728416443.247:1206): avc: denied { read } for pid=6996 comm="syz.3.819" dev="nsfs" ino=4026532863 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 Oct 8 19:40:43 syzkaller kern.notice kernel: [ 125.025652][ T29] audit: type=1400 audit(1728416443.247:1206): avc: denied { read } for pid=6996 comm="syz.3.819" dev="nsfs" ino=4026532863 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file pe [ 125.101125][ T29] audit: type=1400 audit(1728416443.247:1207): avc: denied { read write } for pid=5225 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Oct 8 19:40:43 syzkaller kern.notice kernel: [ 125.101125][ T29] audit: type=1400 audit(1728416443.247:1207): avc: denied { read write } for pid=5225 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 125.205674][ T29] audit: type=1400 audit(1728416443.287:1208): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Oct 8 19:40:43 syzkaller kern.notice kernel: [ 125.205674][ T29] audit: type=1400 audit(1728416443.287:1208): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 125.280561][ T29] audit: type=1400 audit(1728416443.287:1209): avc: denied { read write } for pid=5229 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Oct 8 19:40:43 syzkaller kern.notice kernel: [ 125.280561][ T29] audit: type=1400 audit(1728416443.287:1209): avc: denied { read write } for pid=5229 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 125.376877][ T29] audit: type=1400 audit(1728416443.347:1210): avc: denied { read write } for pid=5226 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Oct 8 19:40:43 syzkaller kern.notice kernel: [ 125.376877][ T29] audit: type=1400 audit(1728416443.347:1210): avc: denied { read write } for pid=5226 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 125.460904][ T29] audit: type=1400 audit(1728416443.367:1211): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Oct 8 19:40:43 syzkaller kern.notice kernel: [ 125.460904][ T29] audit: type=1400 audit(1728416443.367:1211): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 125.552740][ T7036] xt_cluster: node mask cannot exceed total number of nodes Oct 8 19:40:44 syzkaller kern.info kernel: [ 125.552740][ T7036] xt_cluster: node mask cannot exceed total number of nodes [ 125.755216][ T7048] netlink: 12 bytes leftover after parsing attributes in process `syz.2.844'. Oct 8 19:40:44 syzkaller kern.warn kernel: [ 125.755216][ T7048] netlink: 12 bytes leftover after parsing attributes in process `syz.2.844'. [ 126.379626][ T7080] xt_ipvs: protocol family 7 not supported Oct 8 19:40:44 syzkaller kern.info kernel: [ 126.379626][ T7080] xt_ipvs: protocol family 7 not supported [ 128.427079][ T7196] xt_CHECKSUM: CHECKSUM should be avoided. If really needed, restrict with "-p udp" and only use in OUTPUT [ 128.472831][ T7196] x_tables: ip6_tables: TCPMSS target: only valid for protocol 6 Oct 8 19:40:46 syzkaller kern.warn kernel: [ 128.427079][ T7196] xt_CHECKSUM: CHECKSUM should be avoided. If really needed, restrict with "-p udp" and only use in OUTPUT Oct 8 19:40:46 syzkaller kern.info kernel: [ 128.472831][ T7196] x_tables: ip6_tables: TCPMSS target: only valid for protocol 6 [ 129.678496][ T29] kauditd_printk_skb: 187 callbacks suppressed [ 129.678518][ T29] audit: type=1326 audit(1728416448.197:1399): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7265 comm="syz.1.952" exe="/root/syz-executor" sig=0 arch=c000003e syscall=437 compat=0 ip=0x7fc6cc57dff9 code=0x7ffc0000 Oct 8 19:40:48 [ 129.715895][ T29] audit: type=1400 audit(1728416448.197:1400): avc: denied { read write } for pid=5224 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 syzkaller kern.warn kernel: [ 129.678496][ T29] kauditd_printk_skb: 187 callbacks suppressed Oct 8 19:40:48 syzkaller kern.notice kernel: [ 129.678518][ T29] audit: type=1326 audit(1728416448.197:1399): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7265 comm="syz.1.952" exe="/root/syz-executor" sig=0 arch=c000003e syscall=437 compat Oct 8 19:40:48 syzkaller kern.notice kernel: [ 129.715895][ T29] audit: type=1400 audit(1728416448.197:1400): avc: denied { read writ[ 129.784469][ T29] audit: type=1400 audit(1728416448.197:1401): avc: denied { read write } for pid=5229 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 e } for pid=5224 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Oct 8 19:40:48 syzkaller kern.notice kernel: [ 129.784469][ T29] audit: type=1400 audit(1728416448.197:1401): avc: denied { read write } for pid=5229 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 129.860314][ T29] audit: type=1400 audit(1728416448.197:1402): avc: denied { read write } for pid=5233 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Oct 8 19:40:48 syzkaller kern.notice kernel: [ 129.860314][ T29] audit: type=1400 audit(1728416448.197:1402): avc: denied { read write } for pid=5233 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 129.935741][ T29] audit: type=1400 audit(1728416448.227:1403): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Oct 8 19:40:48 syzkaller kern.notice kernel: [ 129.935741][ T29] audit: type=1400 audit(1728416448.227:1403): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 130.022890][ T29] audit: type=1400 audit(1728416448.227:1404): avc: denied { read write } for pid=5226 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Oct 8 19:40:48 syzkaller kern.notice kernel: [ 130.022890][ T29] audit: type=1400 audit(1728416448.227:1404): avc: denied { read write } for pid=5226 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 130.096067][ T29] audit: type=1400 audit(1728416448.227:1405): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Oct 8 19:40:48 syzkaller kern.notice kernel: [ 130.096067][ T29] audit: type=1400 audit(1728416448.227:1405): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 130.178014][ T29] audit: type=1326 audit(1728416448.257:1406): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7265 comm="syz.1.952" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc6cc57dff9 code=0x7ffc0000 Oct 8 19:40:48 syzkaller kern.notice kernel: [ 130.178014][ T29] audit: type=1326 audit(1728416448.257:1406): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7265 comm="syz.1.952" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat [ 130.253842][ T29] audit: type=1326 audit(1728416448.257:1407): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7265 comm="syz.1.952" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc6cc57dff9 code=0x7ffc0000 Oct 8 19:40:48 syzkaller kern.notice kernel: [ 130.253842][ T29] audit: type=1326 audit(1728416448.257:1407): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7265 comm="syz.1.952" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 comp[ 130.324425][ T29] audit: type=1400 audit(1728416448.267:1408): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 at Oct 8 19:40:48 syzkaller kern.notice kernel: [ 130.324425][ T29] audit: type=1400 audit(1728416448.267:1408): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 130.381020][ T7296] xt_hashlimit: invalid rate Oct 8 19:40:48 syzkaller kern.info kernel: [ 130.381020][ T7296] xt_hashlimit: invalid rate [ 132.486071][ T7416] SET target dimension over the limit! Oct 8 19:40:51 syzkaller kern.info kernel: [ 132.486071][ T7416] SET target dimension over the limit! [ 132.982592][ T7444] mmap: syz.0.1041 (7444): VmData 37474304 exceed data ulimit 9. Update limits or use boot option ignore_rlimit_data. Oct 8 19:40:51 syzkaller kern.warn kernel: [ 132.982592][ T7444] mmap: syz.0.1041 (7444): VmData 37474304 exceed data ulimit 9. Update limits or use boot option ignore_rlimit_data. [ 133.411825][ T7470] trusted_key: encrypted key: instantiation of keys using provided decrypted data is disabled since CONFIG_USER_DECRYPTED_DATA is set to false Oct 8 19:40:51 syzkaller kern.err kernel: [ 133.411825][ T7470] trusted_key: encrypted key: instantiation of keys using provided decrypted data is disabled since CONFIG_USER_DECRYPTED_DATA is set to false [ 133.936095][ T7496] bridge0: port 3(veth0_to_bridge) entered blocking state [ 133.944128][ T7496] bridge0: port 3(veth0_to_bridge) entered disabled state Oct 8 19:40:52 syzkaller kern.info kernel: [ 133.936095][ T7496] bridge0: port 3(veth0_to_bridge) entered blocking state Oct 8 19:40:52 syzkaller kern.info kernel: [ 133.944128][ T7496] bridge0: port 3(veth0_to_bridge) entered disabled state [ 133.995868][ T7496] veth0_to_bridge: entered allmulticast mode [ 134.003225][ T7496] veth0_to_bridge: entered promiscuous mode Oct 8 19:40:52 syzkaller kern.info kernel: [ 133.995868][ T7496] veth0_to_bridge: entered allmulticast mode Oct 8 19:40:52 syzkaller kern.in[ 134.053502][ T7496] bridge0: adding interface veth0_to_bridge with same address as a received packet (addr:aa:aa:aa:aa:aa:1b, vlan:0) fo kernel: [ 134.003225][ T7496] veth0_to_bridge: entered promiscuous mode Oct 8 19:40:52 syzkaller kern.warn kernel: [ 134.053502][ T7496] bridge0: adding interface veth0_to_bridge with same address as a received packet (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 134.089914][ T7496] bridge0: port 3(veth0_to_bridge) entered blocking state [ 134.098436][ T7496] bridge0: port 3(veth0_to_bridge) entered forwarding state Oct 8 19:40:52 syzkaller kern.info kernel: [ 134.089914][ T7496] bridge0: port 3(veth0_to_bridge) entered blocking state Oct 8 19:40:52 syzkaller kern.info kernel: [ 134.098436][ T7496] bridge0: port 3(veth0_to_bridge) entered forwarding state [ 134.676686][ T7535] xt_CONNSECMARK: only valid in 'mangle' or 'security' table, not 'filter' Oct 8 19:40:53 [ 134.689635][ T29] kauditd_printk_skb: 193 callbacks suppressed syzkaller kern.i[ 134.689656][ T29] audit: type=1400 audit(1728416453.207:1602): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 nfo kernel: [ 134.676686][ T7535] xt_CONNSECMARK: only valid in 'mangle' or 'security' table, not 'filter' Oct 8 19:40:53 syzkaller kern.warn kernel: [ 134.689635][ T29] kauditd_printk_skb: 193 callbacks suppressed Oct 8 19:40:53 syzkaller kern.notice kernel: [ 134.689656][ T29] audit: type=1400 audit(1728416453.207:1602): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object[ 134.760402][ T29] audit: type=1400 audit(1728416453.207:1603): avc: denied { read write } for pid=5226 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 _r:var_t tclass= Oct 8 19:40:53 syzkaller kern.notice kernel: [ 134.760402][ T29] audit: type=1400 audit(1728416453.207:1603): avc: denied { read write } for pid=5226 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 134.864788][ T29] audit: type=1400 audit(1728416453.217:1604): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Oct 8 19:40:53 syzkaller kern.notice kernel: [ 134.864788][ T29] audit: type=1400 audit(1728416453.217:1604): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:obje[ 134.915462][ T29] audit: type=1400 audit(1728416453.237:1605): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ct_r:var_t tclass= Oct 8 19:40:53 syzkaller kern.notice kernel: [ 134.915462][ T29] audit: type=1400 audit(1728416453.237:1605): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 135.014771][ T29] audit: type=1400 audit(1728416453.307:1606): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Oct 8 19:40:53 syzkaller kern.notice kernel: [ 135.014771][ T29] audit: type=1400 audit(1728416453.307:1606): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 135.070396][ T29] audit: type=1400 audit(1728416453.327:1607): avc: denied { read write } for pid=5233 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Oct 8 19:40:53 syzkaller kern.notice kernel: [ 135.070396][ T29] audit: type=1400 audit(1728416453.327:1607): avc: denied { read write } for pid=5233 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:[ 135.126893][ T29] audit: type=1400 audit(1728416453.337:1608): avc: denied { read write } for pid=5229 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 fi Oct 8 19:40:53 syzkaller kern.notice kernel: [ 135.126893][ T29] audit: type=1400 audit(1728416453.337:1608): avc: denied { read write } for pid=5229 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 135.226313][ T29] audit: type=1400 audit(1728416453.357:1609): avc: denied { read write } for pid=5225 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Oct 8 19:40:53 syzkaller kern.notice kernel: [ 135.226313][ T29] audit: type=1400 audit(1728416453.357:1609): avc: denied { read write } for pid=5225 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 135.302448][ T29] audit: type=1400 audit(1728416453.367:1610): avc: denied { read write } for pid=5224 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Oct 8 19:40:53 syzkaller kern.notice kernel: [ 135.302448][ T29] audit: type=1400 audit(1728416453.367:1610): avc: denied { read write } for pid=5224 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 135.371714][ T29] audit: type=1400 audit(1728416453.407:1611): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Oct 8 19:40:53 syzkaller kern.notice kernel: [ 135.371714][ T29] audit: type=1400 audit(1728416453.407:1611): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 137.008561][ T5239] Bluetooth: hci2: Controller not accepting commands anymore: ncmd = 0 [ 137.018003][ T5239] Bluetooth: hci2: Injecting HCI hardware error event [ 137.026806][ T5239] Bluetooth: hci2: hardware error 0x00 Oct 8 19:40:55 syzkaller kern.err kernel: [ 137.008561][ T5239] Bluetooth: hci2: Controller not accepting commands anymore: ncmd = 0 Oct 8 19:40:55 syzkaller kern.err kernel: [ 137.018003][ T5239] Bluetooth: hci2: Injecting HCI hardware error event Oct 8 19:40:55 syzkaller kern.err kernel: [ 137.026806][ T5239] Bluetooth: hci2: hardware error 0x00 [ 138.178601][ T1268] ieee802154 phy0 wpan0: encryption failed: -22 [ 138.187122][ T1268] ieee802154 phy1 wpan1: encryption failed: -22 Oct 8 19:40:56 syzkaller kern.warn kernel: [ 138.178601][ T1268] ieee802154 phy0 wpan0: encryption failed: -22 Oct 8 19:40:56 syzkaller kern.warn kernel: [ 138.187122][ T1268] ieee802154 phy1 wpan1: encryption failed: -22 [ 138.383527][ T7699] ªªªªªª: renamed from vlan0 (while UP) Oct 8 19:40:56 syzkaller kern.info kernel: [ 138.383527][ T7699] ªªªªªª: renamed from vlan0 (while UP) [ 139.542415][ T5239] Bluetooth: hci2: Opcode 0x0c03 failed: -110 Oct 8 19:40:58 syzkaller kern.err kernel: [ 139.542415][ T5239] Bluetooth: hci2: Opcode 0x0c03 failed: -110 [ 139.729389][ T29] kauditd_printk_skb: 4973 callbacks suppressed [ 139.729415][ T29] audit: type=1400 audit(1728416458.207:6552): avc: denied { create } for pid=7750 comm="syz.4.1192" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 Oct 8 19:40:58 syzkaller kern.warn kernel: [ 139.729389][ T29] kauditd_printk_skb: 4973 callbacks suppressed Oct 8 19:40:58 syzkaller kern.notice kernel: [ 139.729415][ T29] audit: type=1400 audit(1728416458.207:6552): avc: denied { create } for pid=7750 comm="syz.4.1192" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissiv [ 139.805713][ T29] audit: type=1400 audit(1728416458.217:6553): avc: denied { map_create } for pid=7749 comm="syz.2.1190" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Oct 8 19:40:58 syzkaller kern.notice kernel: [ 139.805713][ T29] audit: type=1400 audit(1728416458.217:6553): avc: denied { map_create } for pid=7749 comm="syz.2.1190" scontext=root:sysadm_r:sysadm_t tcontext=root:sys[ 139.845887][ T29] audit: type=1400 audit(1728416458.217:6554): avc: denied { create } for pid=7753 comm="syz.1.1193" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 adm_r:sysadm_t tclass=bpf permissive=0 [ 139.892493][ T29] audit: type=1400 audit(1728416458.227:6555): avc: denied { prog_load } for pid=7749 comm="syz.2.1190" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Oct 8 19:40:58 [ 139.915122][ T29] audit: type=1400 audit(1728416458.277:6556): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.notice kernel: [ 139.845887][ T29] audit: type=1400 audit(1728416458.217:6554): avc: denied { create } for pid=7753 comm="syz.1.1193" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 Oct 8 19:40:58 syzkaller kern.notice kernel: [ 139.892493][ T29] audit: type=1400 audit(1728416458.227:6555): avc: denied { prog_load } for pid=7749 comm="syz.2.1190" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Oct 8 19:40:58 syzkaller kern.notice kernel: [ 139.915122][ T29] audit: type=1400 audit(1728416458.277:6556): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 140.013906][ T29] audit: type=1400 audit(1728416458.277:6557): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 140.068949][ T29] audit: type=1400 audit(1728416458.297:6558): avc: denied { read write } for pid=5229 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 140.109888][ T29] audit: type=1400 audit(1728416458.327:6559): avc: denied { read write } for pid=5226 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 140.134641][ T29] audit: type=1400 audit(1728416458.337:6560): avc: denied { read write } for pid=5225 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 140.159475][ T29] audit: type=1400 audit(1728416458.347:6561): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Oct 8 19:40:58 syzkaller kern.notice kernel: [ 140.013906][ T29] audit: type=1400 audit(1728416458.277:6557): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 8 19:40:58 syzkaller kern.notice kernel: [ 140.068949][ T29] audit: type=1400 audit(1728416458.297:6558): avc: denied { read write } for pid=5229 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Oct 8 19:40:58 syzkaller kern.notice kernel: [ 140.109888][ T29] audit: type=1400 audit(1728416458.327:6559): avc: denied { read write } for pid=5226 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Oct 8 19:40:58 syzkaller kern.notice kernel: [ 140.134641][ T29] audit: type=1400 audit(1728416458.337:6560): avc: denied { read write } for pid=5225 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Oct 8 19:40:58 syzkaller kern.notice kernel: [ 140.159475][ T29] audit: type=1400 audit(1728416458.347:6561): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 141.344668][ T7834] xt_TCPMSS: Only works on TCP SYN packets [ 141.382291][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 141.395084][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 141.407661][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 141.420167][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 141.432691][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 141.441964][ T7837] xt_CONNSECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 141.445211][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) Oct 8 19:40:59 [ 141.466807][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) syzkaller kern.info kernel: [ 141.344668][ T7834] xt_TCPMSS: Only works on TCP SYN packets [ 141.481154][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 141.481534][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 141.481926][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) Oct 8 19:40:59 syzkaller kern.warn kernel: [ 141.382291][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) Oct 8 19:40:59 syzkaller kern.warn kernel: [ 141.395084][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) Oct 8 19:40:59 syzkaller kern.warn kernel: [ 141.407661][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) Oct 8 19:40:59 syzkaller kern.warn kernel: [ 141.420167][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) Oct 8 19:40:59 syzkaller kern.warn kernel: [ 141.432691][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) Oct 8 19:40:59 syzkaller kern.info kernel: [ 141.441964][ T7837] xt_CONNSECMARK: only valid in 'mangle' or 'security' table, not 'raw' Oct 8 19:40:59 syzkaller kern.warn kernel: [ 141.445211][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) Oct 8 19:40:59 syzkaller kern.warn kernel: [ 141.466807][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) Oct 8 19:41:00 syzkaller kern.warn kernel: [ 141.481154][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) Oct 8 19:41:00 syzkaller kern.warn kernel: [ 141.481534][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) Oct 8 19:41:00 syzkaller kern.warn kernel: [ 141.481926][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 142.255775][ T5240] Bluetooth: hci3: command 0x0405 tx timeout Oct 8 19:41:00 syzkaller kern.err kernel: [ 142.255775][ T5240] Bluetooth: hci3: command 0x0405 tx timeout [ 143.198846][ T7874] sock: sock_timestamping_bind_phc: sock not bind to device Oct 8 19:41:01 syzkaller kern.err kernel: [ 143.198846][ T7874] sock: sock_timestamping_bind_phc: sock not bind to device [ 144.735667][ T29] kauditd_printk_skb: 133 callbacks suppressed [ 144.735691][ T29] audit: type=1400 audit(1728416463.247:6695): avc: denied { read write } for pid=5233 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Oct 8 19:41:03 syzkaller kern.warn kernel: [ 144.735667][ T29] kauditd_printk_skb: 133 callbacks suppressed Oct 8 19:41:03 syzkaller kern.notice kernel: [ 144.735691][ T29] audit: type=1400 audit(1728416463.247:6695): avc: denied { read write } for pid=5233 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 144.934453][ T29] audit: type=1400 audit(1728416463.317:6696): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Oct 8 19:41:03 syzkaller kern.notice kernel: [ 144.934453][ T29] audit: type=1400 audit(1728416463.317:6696): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 145.102524][ T29] audit: type=1400 audit(1728416463.317:6697): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Oct 8 19:41:03 syzkaller kern.notice kernel: [ 145.102524][ T29] audit: type=1400 audit(1728416463.317:6697): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 145.314906][ T29] audit: type=1400 audit(1728416463.367:6698): avc: denied { read write } for pid=5225 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Oct 8 19:41:03 syzkaller kern.notice kernel: [ 145.314906][ T29] audit: type=1400 audit(1728416463.367:6698): avc: denied { read write } for pid=5225 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 145.501947][ T29] audit: type=1400 audit(1728416463.487:6699): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Oct 8 19:41:04 syzkaller kern.notice kernel: [ 145.501947][ T29] audit: type=1400 audit(1728416463.487:6699): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 145.680907][ T29] audit: type=1400 audit(1728416463.597:6700): avc: denied { read write } for pid=5229 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Oct 8 19:41:04 syzkaller kern.notice kernel: [ 145.680907][ T29] audit: type=1400 audit(1728416463.597:6700): avc: denied { read write } for pid=5229 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 145.866160][ T29] audit: type=1400 audit(1728416463.647:6701): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Oct 8 19:41:04 syzkaller kern.notice kernel: [ 145.866160][ T29] audit: type=1400 audit(1728416463.647:6701): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 146.050575][ T29] audit: type=1400 audit(1728416463.717:6703): avc: denied { read write } for pid=5226 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Oct 8 19:41:04 syzkaller kern.notice kernel: [ 146.050575][ T29] audit: type=1400 audit(1728416463.717:6703): avc: denied { read write } for pid=5226 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 146.238651][ T29] audit: type=1400 audit(1728416463.707:6702): avc: denied { read write } for pid=5224 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Oct 8 19:41:04 syzkaller kern.notice kernel: [ 146.238651][ T29] audit: type=1400 audit(1728416463.707:6702): avc: denied { read write } for pid=5224 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 146.385841][ C1] net_ratelimit: 14300 callbacks suppressed [ 146.385868][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 146.404315][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 146.416839][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 146.417228][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 146.417584][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 146.417936][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 146.418297][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 146.418676][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 146.419074][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 146.419425][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 146.443546][ T29] audit: type=1400 audit(1728416463.767:6704): avc: denied { read write } for pid=5233 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Oct 8 19:41:04 syzkaller kern.warn kernel: [ 146.385841][ C1] net_ratelimit: 14300 callbacks suppressed Oct 8 19:41:04 syzkaller kern.warn kernel: [ 146.385868][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) Oct 8 19:41:04 syzkaller kern.warn kernel: [ 146.404315][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) Oct 8 19:41:04 syzkaller kern.warn kernel: [ 146.416839][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) Oct 8 19:41:04 syzkaller kern.warn kernel: [ 146.417228][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) Oct 8 19:41:04 syzkaller kern.warn kernel: [ 146.417584][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) Oct 8 19:41:04 syzkaller kern.warn kernel: [ 146.417936][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) Oct 8 19:41:04 syzkaller kern.warn kernel: [ 146.418297][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) Oct 8 19:41:04 syzkaller kern.warn kernel: [ 146.418676][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) Oct 8 19:41:04 syzkaller kern.warn kernel: [ 146.419074][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) Oct 8 19:41:04 syzkaller kern.warn kernel: [ 146.419425][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) Oct 8 19:41:04 syzkaller kern.notice kernel: [ 146.443546][ T29] audit: type=1400 audit(1728416463.767:6704): avc: denied { read write } for pid=5233 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 148.769967][ T25] sched: DL replenish lagged too much Oct 8 19:41:07 syzkaller kern.warn kernel: [ 148.769967][ T25] sched: DL replenish lagged too much [ 151.395764][ C1] net_ratelimit: 14820 callbacks suppressed [ 151.395793][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 151.414177][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 151.426583][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 151.438944][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 151.451303][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 151.463668][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 151.476117][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 151.488449][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 151.500893][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 151.513325][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 156.405674][ C1] net_ratelimit: 14751 callbacks suppressed [ 156.405701][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 156.424140][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 156.436495][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 156.448843][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 156.461285][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 156.473686][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 156.486070][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 156.498421][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 156.510936][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 156.523349][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 161.415746][ C1] net_ratelimit: 14360 callbacks suppressed [ 161.415773][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 161.434065][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 161.446458][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 161.458864][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 161.471579][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 161.483895][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 161.496255][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 161.508665][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 161.521021][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 161.533336][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 166.425717][ C1] net_ratelimit: 14552 callbacks suppressed [ 166.425743][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 166.444146][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 166.456544][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 166.468902][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 166.481344][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 166.493803][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 166.506122][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 166.518455][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 166.530972][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 166.543416][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 171.435572][ C1] net_ratelimit: 14348 callbacks suppressed [ 171.435599][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 171.453872][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 171.466273][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 171.478648][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 171.491028][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 171.503342][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 171.515754][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 171.528176][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 171.540483][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 171.552786][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 176.445707][ C1] net_ratelimit: 14581 callbacks suppressed [ 176.445736][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 176.464097][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 176.476359][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 176.488742][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 176.501205][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 176.513545][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 176.525909][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 176.538284][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 176.550814][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 176.563153][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 181.455560][ C1] net_ratelimit: 15016 callbacks suppressed [ 181.455588][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 181.473938][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 181.486350][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 181.498677][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 181.511012][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 181.523383][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 181.535816][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 181.548167][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 181.560476][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 181.572848][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 186.465643][ C1] net_ratelimit: 15025 callbacks suppressed [ 186.465668][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 186.483965][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 186.496361][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 186.508787][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 186.521145][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 186.533438][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 186.545907][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 186.558302][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 186.570623][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 186.582920][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 191.475838][ C1] net_ratelimit: 14903 callbacks suppressed [ 191.475864][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 191.494319][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 191.506734][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 191.519073][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 191.531417][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 191.543808][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 191.556189][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 191.568529][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 191.580880][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 191.593279][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 196.485764][ C1] net_ratelimit: 14698 callbacks suppressed [ 196.485791][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 196.504333][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 196.516698][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 196.529009][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 196.541346][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 196.553735][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 196.566151][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 196.578553][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 196.590904][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 196.603215][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 201.495672][ C1] net_ratelimit: 14626 callbacks suppressed [ 201.495705][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 201.514095][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 201.526436][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 201.538812][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 201.551261][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 201.563743][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 201.576198][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 201.588522][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 201.600969][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 201.613371][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 206.505782][ C1] net_ratelimit: 14836 callbacks suppressed [ 206.505810][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 206.524127][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 206.536466][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 206.548883][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 206.561297][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 206.573729][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 206.586057][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 206.598339][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 206.610701][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 206.623143][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 211.515558][ C1] net_ratelimit: 15247 callbacks suppressed [ 211.515585][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 211.534514][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 211.546969][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 211.559383][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 211.571770][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 211.584121][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 211.596606][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 211.609031][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 211.621481][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 211.633833][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 213.948843][ T29] kauditd_printk_skb: 90 callbacks suppressed [ 213.948868][ T29] audit: type=1400 audit(1728416515.397:6795): avc: denied { read write } for pid=5224 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 215.126157][ T1268] ieee802154 phy0 wpan0: encryption failed: -22 [ 215.239621][ T1268] ieee802154 phy1 wpan1: encryption failed: -22 [ 216.525634][ C1] net_ratelimit: 15200 callbacks suppressed [ 216.525659][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 216.543998][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 216.556373][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 216.568723][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 216.581109][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 216.594046][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 216.606419][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 216.618754][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 216.631080][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 216.643466][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 221.535769][ C1] net_ratelimit: 14692 callbacks suppressed [ 221.535795][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 221.554136][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 221.566475][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 221.578786][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 221.591327][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 221.603766][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 221.616168][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 221.628491][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 221.640808][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 221.653161][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 226.545849][ C1] net_ratelimit: 14767 callbacks suppressed [ 226.545876][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 226.564157][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 226.576496][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 226.588899][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 226.601311][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 226.613697][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 226.626030][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 226.638369][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 226.650817][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 226.663183][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 231.555546][ C1] net_ratelimit: 14743 callbacks suppressed [ 231.555573][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 231.573824][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 231.586188][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 231.598537][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 231.610949][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 231.623297][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 231.635606][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 231.648023][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 231.660339][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 231.672646][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 236.565624][ C1] net_ratelimit: 15317 callbacks suppressed [ 236.565651][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 236.583900][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 236.596188][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 236.608523][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 236.621113][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 236.633594][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 236.645911][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 236.658200][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 236.670540][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 236.682924][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 241.575665][ C1] net_ratelimit: 15172 callbacks suppressed [ 241.575690][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 241.593935][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 241.606305][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 241.618618][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 241.630993][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 241.643395][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 241.655815][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 241.668216][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 241.680561][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 241.692854][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 242.546049][ T54] Bluetooth: hci1: command 0x0406 tx timeout [ 242.552157][ T54] Bluetooth: hci0: command tx timeout [ 246.585764][ C1] net_ratelimit: 15037 callbacks suppressed [ 246.585790][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 246.604062][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 246.616346][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 246.628691][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 246.641060][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 246.653346][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 246.665780][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 246.678207][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 246.690588][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 246.702941][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 251.595663][ C1] net_ratelimit: 14963 callbacks suppressed [ 251.595689][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 251.614093][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 251.626496][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 251.638872][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 251.651235][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 251.663581][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 251.675996][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 251.688342][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 251.700708][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 251.713107][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 256.605607][ C1] net_ratelimit: 14377 callbacks suppressed [ 256.605636][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 256.624061][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 256.636391][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 256.648787][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 256.661177][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 256.673524][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 256.685908][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 256.698336][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 256.710757][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 256.723121][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 261.615664][ C1] net_ratelimit: 14705 callbacks suppressed [ 261.615692][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 261.634091][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 261.646437][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 261.658845][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 261.671283][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 261.683690][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 261.696049][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 261.708379][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 261.720835][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 261.733172][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 266.625687][ C1] net_ratelimit: 14848 callbacks suppressed [ 266.625712][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 266.644070][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 266.656496][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 266.668987][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 266.681375][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 266.693715][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 266.706115][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 266.718459][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 266.730784][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 266.743264][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 271.635774][ C1] net_ratelimit: 14546 callbacks suppressed [ 271.635802][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 271.654114][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 271.666544][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 271.678967][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 271.691408][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 271.703829][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 271.716268][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 271.728699][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 271.741091][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 271.753456][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 276.645742][ C1] net_ratelimit: 14166 callbacks suppressed [ 276.645770][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 276.664140][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 276.676597][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 276.688954][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 276.701292][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 276.713695][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 276.726099][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 276.738561][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 276.750973][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 276.763316][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 281.655782][ C1] net_ratelimit: 14154 callbacks suppressed [ 281.655810][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 281.674191][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 281.686631][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 281.699079][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 281.711457][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 281.723825][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 281.736236][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 281.748579][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 281.760946][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 281.773378][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 286.665820][ C1] net_ratelimit: 14519 callbacks suppressed [ 286.665846][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 286.684184][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 286.696681][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 286.709041][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 286.721391][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 286.733806][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 286.746142][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 286.758455][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 286.770876][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 286.783281][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 290.593371][ T1268] ieee802154 phy0 wpan0: encryption failed: -22 [ 290.611608][ T1268] ieee802154 phy1 wpan1: encryption failed: -22 [ 291.675781][ C1] net_ratelimit: 14787 callbacks suppressed [ 291.675809][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 291.694140][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 291.706489][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 291.718887][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 291.731314][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 291.743754][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 291.756339][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 291.768653][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 291.781055][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 291.793403][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 296.685622][ C1] net_ratelimit: 14630 callbacks suppressed [ 296.685650][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 296.704003][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 296.716387][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 296.728820][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 296.741283][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 296.753724][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 296.766079][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 296.778498][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 296.790947][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 296.803335][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 301.695536][ C1] net_ratelimit: 14168 callbacks suppressed [ 301.695564][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 301.713914][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 301.726326][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 301.738812][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 301.751263][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 301.763685][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 301.776155][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 301.788500][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 301.800872][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 301.813321][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 304.668846][ T29] audit: type=1400 audit(1728416554.247:6796): avc: denied { read } for pid=4656 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 306.705724][ C1] net_ratelimit: 14299 callbacks suppressed [ 306.705750][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 306.724054][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 306.736673][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 306.749031][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 306.761418][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 306.773824][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 306.786287][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 306.798717][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 306.811161][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 306.823530][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 311.715713][ C1] net_ratelimit: 14224 callbacks suppressed [ 311.715740][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 311.734123][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 311.746512][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 311.758942][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 311.771331][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 311.783684][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 311.796087][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 311.808470][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 311.820799][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 311.833253][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 316.725638][ C1] net_ratelimit: 14230 callbacks suppressed [ 316.725666][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 316.744042][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 316.756396][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 316.768720][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 316.781159][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 316.793524][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 316.805881][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 316.818279][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 316.830693][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 316.843167][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 321.735653][ C1] net_ratelimit: 14038 callbacks suppressed [ 321.735681][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 321.754132][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 321.766571][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 321.778937][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 321.791300][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 321.803710][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 321.816057][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 321.828351][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 321.840755][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 321.853227][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 326.745835][ C1] net_ratelimit: 14008 callbacks suppressed [ 326.745863][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 326.764538][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 326.776921][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 326.789351][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 326.801789][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 326.814263][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 326.826687][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 326.839080][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 326.851447][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 326.864055][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 331.755516][ C1] net_ratelimit: 13938 callbacks suppressed [ 331.755543][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 331.774009][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 331.786456][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 331.798839][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 331.811204][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 331.823604][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 331.836077][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 331.848507][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 331.861011][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 331.873378][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 336.765597][ C1] net_ratelimit: 14015 callbacks suppressed [ 336.765625][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 336.783925][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 336.796365][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 336.808776][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 336.821213][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 336.833659][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 336.846056][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 336.858443][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 336.870867][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 336.883222][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 340.785468][ C1] rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: [ 340.792513][ C1] rcu: Tasks blocked on level-0 rcu_node (CPUs 0-1): P5226/1:b..l P4887/1:b..l P4663/1:b..l [ 340.803251][ C1] rcu: (detected by 1, t=10503 jiffies, g=17153, q=478 ncpus=2) [ 340.811027][ C1] task:klogd state:R running task stack:24432 pid:4663 tgid:4663 ppid:1 flags:0x00004002 [ 340.823999][ C1] Call Trace: [ 340.827343][ C1] [ 340.830324][ C1] __schedule+0xef5/0x5750 [ 340.834828][ C1] ? __pfx_mark_lock+0x10/0x10 [ 340.839664][ C1] ? __pfx___schedule+0x10/0x10 [ 340.844588][ C1] ? irqentry_exit+0x3b/0x90 [ 340.849243][ C1] ? lockdep_hardirqs_on+0x7c/0x110 [ 340.854512][ C1] ? preempt_schedule_thunk+0x1a/0x30 [ 340.859951][ C1] preempt_schedule_common+0x44/0xc0 [ 340.865309][ C1] preempt_schedule_thunk+0x1a/0x30 [ 340.870582][ C1] unwind_next_frame+0x1776/0x20c0 [ 340.875752][ C1] ? stack_trace_save+0x95/0xd0 [ 340.880675][ C1] ? __pfx_stack_trace_consume_entry+0x10/0x10 [ 340.886901][ C1] arch_stack_walk+0x95/0x100 [ 340.891646][ C1] ? save_stack+0x162/0x1f0 [ 340.896206][ C1] stack_trace_save+0x95/0xd0 [ 340.900944][ C1] ? __pfx_stack_trace_save+0x10/0x10 [ 340.906397][ C1] save_stack+0x162/0x1f0 [ 340.910897][ C1] ? __pfx_save_stack+0x10/0x10 [ 340.915805][ C1] ? __pfx_lock_acquire.part.0+0x10/0x10 [ 340.921519][ C1] __reset_page_owner+0x8d/0x400 [ 340.926521][ C1] free_unref_page+0x5f4/0xdc0 [ 340.931352][ C1] __put_partials+0x14c/0x170 [ 340.936095][ C1] qlist_free_all+0x4e/0x120 [ 340.940744][ C1] kasan_quarantine_reduce+0x192/0x1e0 [ 340.946291][ C1] __kasan_kmalloc+0x8a/0xb0 [ 340.950938][ C1] __kmalloc_node_track_caller_noprof+0x20f/0x430 [ 340.957423][ C1] ? __alloc_skb+0x164/0x380 [ 340.962085][ C1] kmalloc_reserve+0xef/0x2c0 [ 340.966884][ C1] __alloc_skb+0x164/0x380 [ 340.971393][ C1] ? __pfx___alloc_skb+0x10/0x10 [ 340.976403][ C1] ? hlock_class+0x4e/0x130 [ 340.980986][ C1] ? __lock_acquire+0x1630/0x3ce0 [ 340.986090][ C1] alloc_skb_with_frags+0xe4/0x850 [ 340.991281][ C1] sock_alloc_send_pskb+0x7f1/0x980 [ 340.996587][ C1] ? __pfx_sock_alloc_send_pskb+0x10/0x10 [ 341.002382][ C1] ? __pfx_lock_release+0x10/0x10 [ 341.007458][ C1] ? do_raw_spin_lock+0x12d/0x2c0 [ 341.012543][ C1] ? __pfx_do_raw_spin_lock+0x10/0x10 [ 341.017976][ C1] ? lock_acquire+0x2f/0xb0 [ 341.022534][ C1] ? unix_dgram_sendmsg+0x928/0x19e0 [ 341.027899][ C1] unix_dgram_sendmsg+0x4b8/0x19e0 [ 341.033082][ C1] ? __pfx_tomoyo_socket_sendmsg_permission+0x10/0x10 [ 341.039909][ C1] ? __pfx_unix_dgram_sendmsg+0x10/0x10 [ 341.045538][ C1] __sys_sendto+0x479/0x4d0 [ 341.050111][ C1] ? __pfx___sys_sendto+0x10/0x10 [ 341.055199][ C1] ? __pfx_lock_release+0x10/0x10 [ 341.060274][ C1] ? trace_lock_acquire+0x14a/0x1d0 [ 341.065559][ C1] ? rcu_is_watching+0x12/0xc0 [ 341.070406][ C1] ? xfd_validate_state+0x5d/0x180 [ 341.075595][ C1] ? rcu_is_watching+0x12/0xc0 [ 341.080429][ C1] __x64_sys_sendto+0xe0/0x1c0 [ 341.085260][ C1] ? do_syscall_64+0x91/0x250 [ 341.090002][ C1] ? lockdep_hardirqs_on+0x7c/0x110 [ 341.095262][ C1] do_syscall_64+0xcd/0x250 [ 341.099838][ C1] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 341.105813][ C1] RIP: 0033:0x7fd726a639b5 [ 341.110283][ C1] RSP: 002b:00007ffe6b780088 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 341.118765][ C1] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fd726a639b5 [ 341.126873][ C1] RDX: 00000000000000a0 RSI: 000055f9d5853070 RDI: 0000000000000003 [ 341.134892][ C1] RBP: 000055f9d584b2c0 R08: 0000000000000000 R09: 0000000000000000 [ 341.142913][ C1] R10: 0000000000004000 R11: 0000000000000246 R12: 0000000000000013 [ 341.150942][ C1] R13: 00007fd726bf1212 R14: 00007ffe6b780188 R15: 0000000000000000 [ 341.158991][ C1] [ 341.162080][ C1] task:dhcpcd state:R running task stack:25840 pid:4887 tgid:4887 ppid:1 flags:0x00000002 [ 341.173934][ C1] Call Trace: [ 341.177251][ C1] [ 341.180220][ C1] __schedule+0xef5/0x5750 [ 341.184703][ C1] ? __pfx_mark_lock+0x10/0x10 [ 341.189543][ C1] ? __pfx_mark_lock+0x10/0x10 [ 341.194370][ C1] ? __pfx___schedule+0x10/0x10 [ 341.199288][ C1] ? mark_held_locks+0x9f/0xe0 [ 341.204111][ C1] preempt_schedule_irq+0x51/0x90 [ 341.209199][ C1] irqentry_exit+0x36/0x90 [ 341.213689][ C1] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 341.219732][ C1] RIP: 0010:stack_trace_consume_entry+0x10/0x170 [ 341.226128][ C1] Code: ff ff ff eb c7 e8 70 7e a8 09 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 48 b8 00 00 00 00 00 fc ff df 55 53 <48> 89 fb 48 83 c7 10 48 89 fa 48 83 ec 08 48 c1 ea 03 0f b6 04 02 [ 341.245797][ C1] RSP: 0018:ffffc90002f5f770 EFLAGS: 00000282 [ 341.251930][ C1] RAX: dffffc0000000000 RBX: ffffc90002f5f788 RCX: 0000000000000000 [ 341.259949][ C1] RDX: 1ffff920005ebefa RSI: ffffffff8450ac49 RDI: ffffc90002f5f848 [ 341.267965][ C1] RBP: ffffc90002f5f818 R08: ffffc90002f5f7bc R09: ffffffff90fdf8e2 [ 341.275984][ C1] R10: ffffc90002f5f788 R11: 000000000000e493 R12: ffffffff81794de0 [ 341.284000][ C1] R13: ffffc90002f5f848 R14: 0000000000000000 R15: ffff88802d208000 [ 341.292032][ C1] ? __pfx_stack_trace_consume_entry+0x10/0x10 [ 341.298267][ C1] ? tomoyo_realpath_from_path+0xb9/0x720 [ 341.304050][ C1] arch_stack_walk+0x86/0x100 [ 341.308801][ C1] ? tomoyo_realpath_from_path+0xb9/0x720 [ 341.314594][ C1] stack_trace_save+0x95/0xd0 [ 341.319332][ C1] ? __pfx_stack_trace_save+0x10/0x10 [ 341.324779][ C1] save_stack+0x162/0x1f0 [ 341.329259][ C1] ? __pfx_save_stack+0x10/0x10 [ 341.334163][ C1] ? __pfx_lock_acquire.part.0+0x10/0x10 [ 341.339854][ C1] ? free_unref_page+0x5f4/0xdc0 [ 341.344852][ C1] ? __put_partials+0x14c/0x170 [ 341.349757][ C1] ? qlist_free_all+0x4e/0x120 [ 341.354600][ C1] ? kasan_quarantine_reduce+0x192/0x1e0 [ 341.360287][ C1] ? __kasan_kmalloc+0x8a/0xb0 [ 341.365117][ C1] ? __kmalloc_noprof+0x1e8/0x400 [ 341.370225][ C1] __reset_page_owner+0x8d/0x400 [ 341.375224][ C1] free_unref_page+0x5f4/0xdc0 [ 341.380074][ C1] __put_partials+0x14c/0x170 [ 341.384828][ C1] qlist_free_all+0x4e/0x120 [ 341.389480][ C1] ? tomoyo_realpath_from_path+0xb9/0x720 [ 341.395251][ C1] kasan_quarantine_reduce+0x192/0x1e0 [ 341.400768][ C1] __kasan_kmalloc+0x8a/0xb0 [ 341.405437][ C1] __kmalloc_noprof+0x1e8/0x400 [ 341.410340][ C1] ? __pfx_lock_acquire.part.0+0x10/0x10 [ 341.416032][ C1] tomoyo_realpath_from_path+0xb9/0x720 [ 341.421641][ C1] ? tomoyo_path_number_perm+0x232/0x590 [ 341.427360][ C1] tomoyo_path_number_perm+0x245/0x590 [ 341.432899][ C1] ? tomoyo_path_number_perm+0x232/0x590 [ 341.438606][ C1] ? __pfx_tomoyo_path_number_perm+0x10/0x10 [ 341.444692][ C1] ? __seccomp_filter+0x6a2/0xf40 [ 341.449787][ C1] ? __rseq_handle_notify_resume+0x663/0x1090 [ 341.455926][ C1] ? __pfx___seccomp_filter+0x10/0x10 [ 341.461378][ C1] ? xfd_validate_state+0x5d/0x180 [ 341.466549][ C1] security_file_ioctl+0x9b/0x240 [ 341.471634][ C1] __x64_sys_ioctl+0xbb/0x220 [ 341.476386][ C1] do_syscall_64+0xcd/0x250 [ 341.480960][ C1] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 341.486922][ C1] RIP: 0033:0x7fce1e4f0d49 [ 341.491387][ C1] RSP: 002b:00007ffd22ba8818 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 341.499870][ C1] RAX: ffffffffffffffda RBX: 000055674bfe1350 RCX: 00007fce1e4f0d49 [ 341.507897][ C1] RDX: 00007ffd22ba8820 RSI: 0000000000008921 RDI: 0000000000000011 [ 341.515922][ C1] RBP: 0000000000000000 R08: 0000000000000008 R09: 0000000000000036 [ 341.523943][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffd22ba8820 [ 341.531965][ C1] R13: 0000556721102f88 R14: 000055674bfe1350 R15: 000055674bfe4950 [ 341.540013][ C1] [ 341.543070][ C1] task:syz-executor state:R running task stack:22816 pid:5226 tgid:5226 ppid:5222 flags:0x00004002 [ 341.555014][ C1] Call Trace: [ 341.558334][ C1] [ 341.561311][ C1] __schedule+0xef5/0x5750 [ 341.565799][ C1] ? mark_lock+0xb5/0xc60 [ 341.570184][ C1] ? __pfx_mark_lock+0x10/0x10 [ 341.575014][ C1] ? __pfx___schedule+0x10/0x10 [ 341.579944][ C1] ? hlock_class+0x4e/0x130 [ 341.584517][ C1] ? mark_held_locks+0x9f/0xe0 [ 341.589356][ C1] preempt_schedule_irq+0x51/0x90 [ 341.594442][ C1] irqentry_exit+0x36/0x90 [ 341.598921][ C1] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 341.604964][ C1] RIP: 0010:trace_lock_acquire+0x17/0x1d0 [ 341.610757][ C1] Code: 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 41 57 41 56 41 55 41 54 55 53 48 83 ec 10 66 90 48 c7 c3 cc db 03 00 <65> 8b 1b 83 fb 07 0f 87 5a 01 00 00 89 db be 08 00 00 00 48 89 d8 [ 341.630550][ C1] RSP: 0018:ffffc9000407f7b8 EFLAGS: 00000286 [ 341.636677][ C1] RAX: ffffffff81fae464 RBX: 000000000003dbcc RCX: 0000000000000002 [ 341.644711][ C1] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffffff8e1b8340 [ 341.652752][ C1] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 341.660786][ C1] R10: ffffea00014cafb7 R11: 0000000000000000 R12: 0000000000000000 [ 341.668806][ C1] R13: 0000000000000002 R14: 0000000000000000 R15: 0000000000000000 [ 341.676843][ C1] ? page_ext_get+0x34/0x310 [ 341.681504][ C1] ? lock_acquire.part.0+0x11b/0x380 [ 341.686922][ C1] ? page_ext_get+0x34/0x310 [ 341.691561][ C1] lock_acquire+0x2f/0xb0 [ 341.695971][ C1] ? page_ext_get+0x34/0x310 [ 341.700628][ C1] page_ext_get+0x3a/0x310 [ 341.705101][ C1] ? page_ext_get+0x34/0x310 [ 341.709748][ C1] __reset_page_owner+0x32/0x400 [ 341.714758][ C1] free_unref_page+0x5f4/0xdc0 [ 341.719596][ C1] __put_partials+0x14c/0x170 [ 341.724333][ C1] qlist_free_all+0x4e/0x120 [ 341.729025][ C1] kasan_quarantine_reduce+0x192/0x1e0 [ 341.734544][ C1] __kasan_slab_alloc+0x69/0x90 [ 341.739456][ C1] kmem_cache_alloc_noprof+0x121/0x2f0 [ 341.744986][ C1] ? vm_area_dup+0x53/0x2f0 [ 341.749557][ C1] vm_area_dup+0x53/0x2f0 [ 341.753948][ C1] copy_process+0x7891/0x8db0 [ 341.758685][ C1] ? hlock_class+0x4e/0x130 [ 341.763376][ C1] ? __pfx_copy_process+0x10/0x10 [ 341.768501][ C1] kernel_clone+0xfd/0x960 [ 341.773100][ C1] ? __pfx_kernel_clone+0x10/0x10 [ 341.778200][ C1] ? find_held_lock+0x59/0x110 [ 341.783024][ C1] ? find_held_lock+0x2d/0x110 [ 341.787860][ C1] __do_sys_clone+0xba/0x100 [ 341.792513][ C1] ? __pfx___do_sys_clone+0x10/0x10 [ 341.797779][ C1] ? trace_lock_acquire+0x14a/0x1d0 [ 341.803141][ C1] ? do_user_addr_fault+0x83d/0x13f0 [ 341.808486][ C1] do_syscall_64+0xcd/0x250 [ 341.813062][ C1] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 341.819019][ C1] RIP: 0033:0x7f1edff74853 [ 341.823479][ C1] RSP: 002b:00007ffdadd6bba8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 341.831956][ C1] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1edff74853 [ 341.839978][ C1] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 341.847997][ C1] RBP: 0000000000000001 R08: 0000000000000000 R09: 0000000000000000 [ 341.856017][ C1] R10: 0000555587d317d0 R11: 0000000000000246 R12: 0000000000000000 [ 341.864045][ C1] R13: 00000000000247fe R14: 000000000002478c R15: 00007ffdadd6bd30 [ 341.872137][ C1] [ 341.875195][ C1] rcu: rcu_preempt kthread starved for 3707 jiffies! g17153 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=1 [ 341.886357][ C1] rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. [ 341.896370][ C1] rcu: RCU grace-period kthread stack dump: [ 341.902302][ C1] task:rcu_preempt state:R running task stack:28400 pid:17 tgid:17 ppid:2 flags:0x00004000 [ 341.914164][ C1] Call Trace: [ 341.917479][ C1] [ 341.920456][ C1] __schedule+0xef5/0x5750 [ 341.924937][ C1] ? __pfx___lock_acquire+0x10/0x10 [ 341.930190][ C1] ? _raw_spin_lock_irqsave+0x42/0x60 [ 341.935648][ C1] ? __pfx___schedule+0x10/0x10 [ 341.940562][ C1] ? schedule+0x298/0x350 [ 341.944953][ C1] ? __pfx_lock_release+0x10/0x10 [ 341.950026][ C1] ? trace_lock_acquire+0x14a/0x1d0 [ 341.955290][ C1] ? lock_acquire+0x2f/0xb0 [ 341.959841][ C1] ? schedule+0x1fd/0x350 [ 341.964233][ C1] schedule+0xe7/0x350 [ 341.968361][ C1] schedule_timeout+0x136/0x2a0 [ 341.973262][ C1] ? __pfx_schedule_timeout+0x10/0x10 [ 341.978683][ C1] ? __pfx_process_timeout+0x10/0x10 [ 341.984046][ C1] ? _raw_spin_unlock_irqrestore+0x3b/0x80 [ 341.989924][ C1] ? prepare_to_swait_event+0xf3/0x470 [ 341.995456][ C1] rcu_gp_fqs_loop+0x1eb/0xb00 [ 342.000292][ C1] ? __pfx_rcu_gp_fqs_loop+0x10/0x10 [ 342.005645][ C1] ? rcu_gp_init+0xc82/0x1630 [ 342.010386][ C1] ? _raw_spin_unlock_irq+0x2e/0x50 [ 342.015670][ C1] ? _raw_spin_unlock_irqrestore+0x52/0x80 [ 342.021558][ C1] rcu_gp_kthread+0x271/0x380 [ 342.026305][ C1] ? __pfx_rcu_gp_kthread+0x10/0x10 [ 342.031561][ C1] ? lockdep_hardirqs_on+0x7c/0x110 [ 342.036832][ C1] ? __kthread_parkme+0x148/0x220 [ 342.041932][ C1] ? __pfx_rcu_gp_kthread+0x10/0x10 [ 342.047223][ C1] kthread+0x2c1/0x3a0 [ 342.051358][ C1] ? _raw_spin_unlock_irq+0x23/0x50 [ 342.056621][ C1] ? __pfx_kthread+0x10/0x10 [ 342.061278][ C1] ret_from_fork+0x45/0x80 [ 342.065748][ C1] ? __pfx_kthread+0x10/0x10 [ 342.070410][ C1] ret_from_fork_asm+0x1a/0x30 [ 342.075270][ C1] [ 342.078332][ C1] rcu: Stack dump where RCU GP kthread last ran: [ 342.084714][ C1] CPU: 1 UID: 0 PID: 24 Comm: ksoftirqd/1 Not tainted 6.12.0-rc2-syzkaller-00050-g5b7c893ed5ed #0 [ 342.095370][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 342.105483][ C1] RIP: 0010:kasan_check_range+0x4/0x1a0 [ 342.111105][ C1] Code: 89 43 08 5b 5d 41 5c c3 cc cc cc cc 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 66 0f 1f 00 <48> 85 f6 0f 84 50 01 00 00 48 89 f8 41 54 44 0f b6 c2 48 01 f0 55 [ 342.130782][ C1] RSP: 0018:ffffc900001e6a78 EFLAGS: 00000246 [ 342.136928][ C1] RAX: 0000000000000000 RBX: ffff88807ff57b70 RCX: ffffffff81f8bfc3 [ 342.144967][ C1] RDX: 0000000000000000 RSI: 0000000000000004 RDI: ffff88807ff57b8c [ 342.152992][ C1] RBP: ffff88814165dd70 R08: 0000000000000003 R09: 000000000000001f [ 342.161016][ C1] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000052820 [ 342.169036][ C1] R13: 1ffff9200003cd55 R14: ffff88807ff57b8c R15: 0000000000000000 [ 342.177057][ C1] FS: 0000000000000000(0000) GS:ffff8880b8700000(0000) knlGS:0000000000000000 [ 342.186043][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 342.192692][ C1] CR2: 00007ffd713b5f80 CR3: 000000002e684000 CR4: 00000000003526f0 [ 342.200743][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 342.208763][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 342.216783][ C1] Call Trace: [ 342.220100][ C1] [ 342.222987][ C1] ? rcu_check_gp_kthread_starvation+0x31b/0x450 [ 342.229386][ C1] ? do_raw_spin_unlock+0x172/0x230 [ 342.234656][ C1] ? rcu_sched_clock_irq+0x23d7/0x32a0 [ 342.240196][ C1] ? __pfx_rcu_sched_clock_irq+0x10/0x10 [ 342.245898][ C1] ? find_held_lock+0x2d/0x110 [ 342.250753][ C1] ? update_process_times+0x178/0x220 [ 342.256226][ C1] ? __pfx_update_process_times+0x10/0x10 [ 342.262028][ C1] ? tick_nohz_handler+0x376/0x530 [ 342.267223][ C1] ? __pfx_tick_nohz_handler+0x10/0x10 [ 342.272747][ C1] ? __hrtimer_run_queues+0x5fb/0xae0 [ 342.278191][ C1] ? __pfx___hrtimer_run_queues+0x10/0x10 [ 342.283979][ C1] ? ktime_get_update_offsets_now+0x201/0x310 [ 342.290130][ C1] ? hrtimer_interrupt+0x31b/0x800 [ 342.295320][ C1] ? __sysvec_apic_timer_interrupt+0x10f/0x450 [ 342.301540][ C1] ? sysvec_apic_timer_interrupt+0x9f/0xc0 [ 342.307411][ C1] [ 342.310383][ C1] [ 342.313353][ C1] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 342.319603][ C1] ? __set_page_owner+0x193/0x560 [ 342.324686][ C1] ? kasan_check_range+0x4/0x1a0 [ 342.329702][ C1] __set_page_owner+0x193/0x560 [ 342.334612][ C1] ? free_unref_folios+0xb30/0x1310 [ 342.339885][ C1] ? __pfx___set_page_owner+0x10/0x10 [ 342.345316][ C1] ? bad_range+0x264/0x440 [ 342.349787][ C1] ? lockdep_hardirqs_on+0x7c/0x110 [ 342.355092][ C1] post_alloc_hook+0x2d1/0x350 [ 342.359927][ C1] get_page_from_freelist+0x101e/0x3070 [ 342.365563][ C1] ? __napi_poll.constprop.0+0xb7/0x550 [ 342.371182][ C1] ? handle_softirqs+0x213/0x8f0 [ 342.376182][ C1] ? run_ksoftirqd+0x3a/0x60 [ 342.380827][ C1] ? smpboot_thread_fn+0x661/0xa30 [ 342.386011][ C1] ? __pfx_get_page_from_freelist+0x10/0x10 [ 342.391978][ C1] ? should_fail_alloc_page+0xee/0x130 [ 342.397518][ C1] ? prepare_alloc_pages.constprop.0+0x16f/0x560 [ 342.403910][ C1] __alloc_pages_noprof+0x223/0x25c0 [ 342.409291][ C1] ? kasan_quarantine_put+0x10a/0x240 [ 342.414719][ C1] ? lockdep_hardirqs_on+0x7c/0x110 [ 342.419990][ C1] ? __pfx___alloc_pages_noprof+0x10/0x10 [ 342.425776][ C1] ? hlock_class+0x4e/0x130 [ 342.430352][ C1] ? __lock_acquire+0x163e/0x3ce0 [ 342.435450][ C1] ? __pfx___lock_acquire+0x10/0x10 [ 342.440698][ C1] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 342.446674][ C1] ? policy_nodemask+0xea/0x4e0 [ 342.451605][ C1] alloc_pages_mpol_noprof+0x2c9/0x610 [ 342.457144][ C1] ? __pfx_alloc_pages_mpol_noprof+0x10/0x10 [ 342.463203][ C1] ? __pfx_lock_release+0x10/0x10 [ 342.468288][ C1] ? get_freelist+0x1b2/0x1e0 [ 342.473045][ C1] new_slab+0x2ba/0x3f0 [ 342.477262][ C1] ___slab_alloc+0xdac/0x1880 [ 342.482006][ C1] ? skb_clone+0x190/0x3f0 [ 342.486509][ C1] ? skb_clone+0x190/0x3f0 [ 342.490982][ C1] ? __slab_alloc.constprop.0+0x56/0xb0 [ 342.496588][ C1] __slab_alloc.constprop.0+0x56/0xb0 [ 342.502026][ C1] kmem_cache_alloc_noprof+0x2a7/0x2f0 [ 342.507550][ C1] ? br_multicast_count+0x8a/0xbd0 [ 342.512728][ C1] ? skb_clone+0x190/0x3f0 [ 342.517202][ C1] skb_clone+0x190/0x3f0 [ 342.521510][ C1] deliver_clone+0x3f/0xa0 [ 342.525997][ C1] maybe_deliver+0xa7/0x120 [ 342.530579][ C1] br_flood+0x17e/0x5c0 [ 342.534811][ C1] br_handle_frame_finish+0xda5/0x1c80 [ 342.540351][ C1] ? __pfx_br_handle_frame_finish+0x10/0x10 [ 342.546317][ C1] ? ip6t_do_table+0xd20/0x1d40 [ 342.551230][ C1] ? ip6t_do_table+0xd20/0x1d40 [ 342.556134][ C1] ? __local_bh_enable_ip+0xa4/0x120 [ 342.561490][ C1] ? ip6t_do_table+0xd50/0x1d40 [ 342.566413][ C1] ? __pfx_ip6t_do_table+0x10/0x10 [ 342.571585][ C1] ? nf_hook_slow+0x132/0x200 [ 342.576343][ C1] br_nf_hook_thresh+0x303/0x410 [ 342.581346][ C1] ? __pfx_br_handle_frame_finish+0x10/0x10 [ 342.587315][ C1] ? __pfx_br_nf_hook_thresh+0x10/0x10 [ 342.592846][ C1] ? __pfx_br_handle_frame_finish+0x10/0x10 [ 342.598812][ C1] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 342.604784][ C1] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 342.610771][ C1] br_nf_pre_routing_finish_ipv6+0x76a/0xfb0 [ 342.616843][ C1] ? __pfx_br_handle_frame_finish+0x10/0x10 [ 342.622817][ C1] br_nf_pre_routing_ipv6+0x3ce/0x8c0 [ 342.628262][ C1] ? __pfx_br_nf_pre_routing_ipv6+0x10/0x10 [ 342.634221][ C1] ? __pfx_lock_release+0x10/0x10 [ 342.639298][ C1] ? trace_lock_acquire+0x14a/0x1d0 [ 342.644565][ C1] ? __pfx_br_nf_pre_routing_finish_ipv6+0x10/0x10 [ 342.651162][ C1] br_nf_pre_routing+0x860/0x15b0 [ 342.656273][ C1] br_handle_frame+0x9eb/0x1490 [ 342.661199][ C1] ? __pfx_br_handle_frame+0x10/0x10 [ 342.666557][ C1] ? __pfx_br_handle_frame_finish+0x10/0x10 [ 342.672512][ C1] ? mark_lock+0xb5/0xc60 [ 342.676899][ C1] ? __pfx_br_handle_frame+0x10/0x10 [ 342.682245][ C1] __netif_receive_skb_core.constprop.0+0xa3d/0x4330 [ 342.688997][ C1] ? kasan_quarantine_put+0x10/0x240 [ 342.694350][ C1] ? kmem_cache_free+0x152/0x4b0 [ 342.699352][ C1] ? kfree_skbmem+0x1a4/0x1f0 [ 342.704103][ C1] ? __pfx___netif_receive_skb_core.constprop.0+0x10/0x10 [ 342.711291][ C1] ? hlock_class+0x4e/0x130 [ 342.715864][ C1] ? __lock_acquire+0xbdd/0x3ce0 [ 342.720891][ C1] ? __pfx_ip6_mc_input+0x10/0x10 [ 342.725980][ C1] ? __pfx___lock_acquire+0x10/0x10 [ 342.731236][ C1] ? __pfx_ip6_rcv_finish+0x10/0x10 [ 342.736514][ C1] ? process_backlog+0x3f1/0x15f0 [ 342.741606][ C1] __netif_receive_skb_one_core+0xb1/0x1e0 [ 342.747484][ C1] ? __pfx___netif_receive_skb_one_core+0x10/0x10 [ 342.753970][ C1] ? trace_lock_acquire+0x14a/0x1d0 [ 342.759243][ C1] ? process_backlog+0x3f1/0x15f0 [ 342.764345][ C1] ? process_backlog+0x3f1/0x15f0 [ 342.769436][ C1] __netif_receive_skb+0x1d/0x160 [ 342.774537][ C1] process_backlog+0x443/0x15f0 [ 342.779470][ C1] __napi_poll.constprop.0+0xb7/0x550 [ 342.784919][ C1] net_rx_action+0xa92/0x1010 [ 342.789667][ C1] ? finish_task_switch.isra.0+0x217/0xcc0 [ 342.795543][ C1] ? __pfx_net_rx_action+0x10/0x10 [ 342.800737][ C1] ? kvm_sched_clock_read+0x11/0x20 [ 342.805998][ C1] ? sched_clock+0x38/0x60 [ 342.810491][ C1] ? sched_clock_cpu+0x6d/0x4d0 [ 342.815422][ C1] handle_softirqs+0x213/0x8f0 [ 342.820257][ C1] ? __pfx_handle_softirqs+0x10/0x10 [ 342.825608][ C1] ? rcu_is_watching+0x12/0xc0 [ 342.830442][ C1] ? __pfx_run_ksoftirqd+0x10/0x10 [ 342.835614][ C1] ? smpboot_thread_fn+0x59d/0xa30 [ 342.840787][ C1] run_ksoftirqd+0x3a/0x60 [ 342.845261][ C1] smpboot_thread_fn+0x661/0xa30 [ 342.850261][ C1] ? __kthread_parkme+0x148/0x220 [ 342.855353][ C1] ? __pfx_smpboot_thread_fn+0x10/0x10 [ 342.860879][ C1] kthread+0x2c1/0x3a0 [ 342.865016][ C1] ? _raw_spin_unlock_irq+0x23/0x50 [ 342.870280][ C1] ? __pfx_kthread+0x10/0x10 [ 342.874942][ C1] ret_from_fork+0x45/0x80 [ 342.879430][ C1] ? __pfx_kthread+0x10/0x10 [ 342.884088][ C1] ret_from_fork_asm+0x1a/0x30 [ 342.888940][ C1] [ 342.892779][ C1] net_ratelimit: 11221 callbacks suppressed [ 342.892803][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 342.911107][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 342.923431][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 342.935885][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 342.948305][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 342.960706][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 342.973971][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 342.986371][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 342.998759][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 343.011228][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 347.895691][ C1] net_ratelimit: 14558 callbacks suppressed [ 347.895720][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 347.914012][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 347.926395][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 347.938816][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 347.951251][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 347.963699][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:da:65:fe:9a:08, vlan:0) [ 347.976043][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 347.988352][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 348.000668][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 348.013060][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)