last executing test programs: 13.183977292s ago: executing program 1 (id=3035): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x2, 0x4, 0x3fd, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000006e7a00000000000000000018200000", @ANYRES32=r0, @ANYBLOB="0000000000000000c3000c004000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) 13.104513094s ago: executing program 2 (id=3037): r0 = syz_open_dev$dmmidi(&(0x7f0000000200), 0x2, 0x8901) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS32(r0, 0xc0245720, &(0x7f00000001c0)) 13.055702867s ago: executing program 4 (id=3038): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x2, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000840)={r0, 0xffffffffffffffff, 0x2a, 0x0, @void}, 0x10) 13.047368491s ago: executing program 3 (id=3039): r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000), 0x202, 0x0) ioctl$SNDCTL_DSP_SETDUPLEX(r0, 0x5016, 0x0) 12.842084502s ago: executing program 1 (id=3040): add_key$keyring(&(0x7f0000000180), 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) 12.820839548s ago: executing program 0 (id=3041): r0 = epoll_create1(0x0) epoll_pwait2(r0, 0x0, 0x4f, &(0x7f00000000c0), 0x0, 0x0) 12.68341038s ago: executing program 2 (id=3042): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB="60000000200001002cbd7000000000000a2000000000000000000000140003006c6f000000000000000000000000000014000100"], 0x60}}, 0x0) 12.650609005s ago: executing program 4 (id=3043): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1, 0x112, r0, 0x1031a000) 12.649785643s ago: executing program 3 (id=3044): r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0xc0105303, &(0x7f0000000180)) 12.494344887s ago: executing program 1 (id=3045): r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'netdevsim0\x00', &(0x7f0000000080)=@ethtool_test={0xf, 0x0, 0x0, 0x2, [0x0, 0xfffffffffffff001]}}) 12.433868996s ago: executing program 0 (id=3046): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000010000000900010073797a300000000044000000090a010400000000000000000100000008000a40000000000900020073797a32000000000900010073797a3000000000080005400000001f0800034000000004640000000e0a01020000000000000000010000000900020073797a32000000000900010073797a300000000038000380340000802800018023000100118c7457ff8f99b8233ba7d81496e1da69279e989c73000065399ef6cd8d8000080003"], 0xf0}}, 0x0) 12.376751582s ago: executing program 2 (id=3047): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x5, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}]}, @NFT_MSG_NEWRULE={0x54, 0x6, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_RULE_CHAIN_ID={0x8}, @NFTA_RULE_EXPRESSIONS={0x2c, 0x4, 0x0, 0x1, [{0x28, 0x1, 0x0, 0x1, @cmp={{0x8}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_CMP_DATA={0x8, 0x3, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x4}]}, @NFTA_CMP_SREG={0x8}, @NFTA_CMP_OP={0x8}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0xc8}}, 0x0) 12.325007095s ago: executing program 4 (id=3048): r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x16, &(0x7f00000000c0)=0x40001, 0x4) 12.266931486s ago: executing program 3 (id=3049): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000001c0)={&(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ff5000/0xb000)=nil, &(0x7f0000ff5000/0x4000)=nil, &(0x7f0000ff8000/0x2000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f00000000c0)="97fab112052b", 0x6, r0}, 0x68) 12.124331006s ago: executing program 1 (id=3050): r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)={0x114, 0x2b, 0x1, 0x0, 0x0, "", [@nested={0x101, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@local}, @generic="50bb2d6f67d29d6fabadb107d0def49c88ea04abde1d5e8d3fb22a1b5046778bdafefc46b0449ade68bf84b36ec72dd71265fc2e882348c26c2126237dd5b37f5ae655b1086cda40e00aec58754734be31d750351dc076eb43d9621dc08c029d1608a487f26fbe816b89f7cb81bff81a8b9482565856555ee923c65973deb0a99b962bc0fe94a3fcae3697bd7b85b3a682167c43dbf137115a40ebddcad74875ec58e9a3ddb9ad02a078cf0d972df9e99f079767734f69ce475f55ac64337803f5eb4e5843f4d98fe3fa370d47eb640dc5061dc35817c8a66c29be82fd"]}]}, 0x114}], 0x1}, 0x0) 12.056315251s ago: executing program 0 (id=3051): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000f40)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0ff0100000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005ecefab8f2e85c6c1ca711fcd0cdfa146ec561750379585e5a076d839240d29c03406910927c6b0b55b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b3185fec0e07004e60c08dc8b8dbf11e6e94d75938321a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946ef3bb622003b538dfe79578e51bc53099e90f4580d760551b5b342f7cbdb9cd38bdb2209c676b2ac2deca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e860e3670ef0e789f65f132020000002cbe7bc04b82d2789cb1b2b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c581e7be6ba0dc001c41146dfebd38608b3280080005d9a9500000000000000334d83239dd27080851dcac3c12233f9a1fb9c2aec61ce63a38d2fd50117b89a42b359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697aeea0182babd18cac1bd4f4390af9a9ceafd0002cab154ad029a1090000002780c70014f51c3c975d5aec84222fff0d7216fdb0d3a0ec4be3e506d1387b63112f0b39501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a6a71bc85018e5ff2c91018afc9ffc2cc788bee1b47683db01a469398685211dfbbae3e2ed0a50e7313bff5d4c391ddece08ac772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcd36e7487afa447e2ef0ae4f390a8337841cef386e22cc22ee17476d738952229682e24b92533ac2a9f5a699593f084419cae0b4532bcc97d3ae486aca54183fb01c73f979ca9857399537f5dc2a3f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a088a22e8b15c3e233db7ab22e30d46a9d24d37cef099bdae7ed04935c2c90d3add8eebc8619d73415cda2130f5011e48455b5a8b90dfae158b94f50adeb988dd8e12baf5cc9398fff00404d5d99f82e20ee6a8c88e18c2977aab37d9ac4cfc1c7b400000000000007ffa3c39495c826b956ba859ac8e3c177b91bd7d5e41ff868f7ca1664fe4a3ced846891180604b6dd2499d16d7d9158ffffff069dc42749a89f854797f29d0000002d8c38a967c1bbe09315c29877a331bcc87dc3addb0814040000007874b2f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a90800c66ee2b1ad76dff9f9000071414c99d4894ee7f8249dbae3428d2129ecfce1b85af6eb2eea0d0df414b315f651c8412392191fa83ee830548f11e1036a8debd64cbe359454a3f2239cfe35f81b7a490f167e6d5c1109000000000000000042b8ff8c21ad702ccacad5b39eef213d1ca296c6a298c8ce2a305c0c7d35cf4b22549a4bd92052188bd1f285f653b621491dc6aaee0200e2ff08644fb94c06006eff1be2f633c1d987591ec3db58a7bb3042ec3f771f050000000000000026049fe86e09623524f390bf79b441b75fc790c58e273cd905deb28c13c1ed1c0d9cae846b03008cce7b893e578af7dc7d5e87d44ff828de453f34c2b18660b080efc707e676e1fb4d5825c0ca177a4c7fbb4e62b445c00f576b2b5cc7f819abd0f885cc48f97496079654f5a2d38708194cd6f496e5dee734fe7da3770845cf442d488afdc0e17000000000000000000000000000000000000000000000000000005205000000dc1c56d59f35d367632952a93466ae595c6a8cda690d192a070886df42b27098773b45198b4a34ac977ebd4450e121d01342703f5bf030e935878a6d169c80aa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9953c3093c3690d10ecb65dc5b4749c28eb5167e9936ed327fb237a56224e49d9ea956d1798571b3ccd35364600000000000000000000000000000000000000000000000000000000000026ded4dd6fe1518cc7802043ecf743f1213bf8179ecd9e5a225d67521dc728eac7d80a5656ac2cbde21d3ebfbf69ff861f4394836ddf128d6d19079e64336e7c676505c78ad67548f4b192be182724d95cf107753cb0a6a979d3db0c407081c6281e2d8429a863903ca75f4c7df3ea8fc2018d07af1491ef060cd0403a099f32468f1561f058960d12969bc982ff5d8e9b986c0c6c747d9a1cc500bb892c3a16ff10feea20bdac0000000000000000ca06f256c8028e0f9b656dc0e32384f037b21f3289f86a6826c69fa35ba5cbc3f2db1516ffc5c6e3fa618b24a6ce16d6c7010bbe3e8ef76f57a2d0e69115d33394e86e4b83c0f3c2a34635f3eee4746e92dea6c5d1d33d84d96b50fb000000ae07c65b71088dd7d5d1e1bab9000000000000000000000000b5ace293bec833c13e3229432ad71d646218b5229dd88137fc7c59aa242af3bb4efb82055a3b61227ad40f52c9f2500579aca11033ec14bb9cc16bd83a00840e31d828ec78e116ae46c4897e2795b6ff92e9a1e24b0b855c02f2b7add58ffb25f339297729a7a51810134d3dfbf71f6516737be55c06d9cd082027c641ec4355eb4acff90756d1a1ecf9f58afd3c19b5c4558ba9af6b7333c894a1fb29ade9ad75c9c022e8cc3fe28bc3586844f5fecb92aa771dbfe80745fe89ad349ffaad76ff9dd643796caffdf67af5dd476c37e7e9a84e2e5da2696e285a5906002fb0e16d8262c080c159ce40c14089c82759106f422582b42e3e8484ea5a6ad9aa52106eafe0e0caea1ad4cb23f3c2b8a0f455ba69ea284c268d54b43158a8b1d128ab794c9ac57a2a7332f4d8764c302ccd5aac114482b619fc575aa0dd2777e881e29a854380e2f1e49db5a1517ec40bb3fa44f9959bad67ccaba76408da35c9f1534c8bd48bbd61627a2e0afd9ae134400f70b5e6aefb7eee403502732df858a2ea033b6c91c673b6079e65d7295eed164ca63e4ea26dce0fb3ce0f6591d80ffb8f386bb79f5589829b6b0679b5d65a00000000000000e6ff00000000000000000000faff0000bab50bc8508a9644d3e7c328b0ff22035c8073f8c1f0e3da7339fc81d4ab3ef2857ef70a81d8a1628da28c942571880e22df7cabae56d5ff5e483c9c1f5a258b8f1f34cc300312f76a374a6e9b3f9dbd7f538a80b00f97e47895b3201c5126feca0888956a7d768198d9c2109ac508a47ebb99c539ef45af7d87b308117a9e321a3861bc42cf41942c31268a4020221d7b1622585094eddd83c7f4acdd7f5c23d8b730bf03118261edada8b8487a3b1b7548a4687a91f12bf70bb1df3bfe7d4b92ad6fcbf401efd6eb004cf20016ad8d1dad136dd856ffca238b39482811f9c8524bf182f1956a3d044423927df28880bbd11c06407220df8e1d1d483d947d990dc175803d765ca14a915a0040b641959ad3e776b4bb4852fea12983dc18b7404914a6137dc4a78f1e0d331c60a9019c21698cd18753491df962f496f2395563e9c3d7b1228d0e488cf7e50a29541aa757f2e2ee9ff4433d65db0de5a123d569e39dce481156cbec584c9a32a8e3b032fa003192c891d83119bc950abac9147b9fcb0acd9a207b5ceb7e8ed1d91c000000000000000000000000000000141258373281153fa27e586ea82650f070d8851ac9e7ac07b37a6479d4017b5b5af3ff4c91235df4f657d77e386a329aec4d766369c86b62b01ceb028c6fcf206883633cb143016b9f5351a45a8cb4ea110ba700000000000000883416b6eff6a793c71deb7d780c4f51d86ece127c0714144916f397d398ad2fe72b710b932c15c2369cb5d2d2f6ae420672c4a626195a891ac51825077fbc286aa3866bbf18a4a8b836ea8c90af0d5f0aff55b50bc18c27875ed2628b91224b7fa9fd10ccd7c1b1a92bac529df981a6d30100e68555553625c0e91a51000000000000000000fe030f85b294f3ea1fce314a9dcefbe3b64e83c35c5e95734786ca78315793cc0e6e776d2ec07c55cd89541ec25e074e840287011cab538d79e1569df321282071d49a4dc5fb2d7da1d05249d0e153fd04aca2", @ANYRES8], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x16, 0x0, 0xffffffffffffffff, 0xffffffffffffffc9}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe, 0x60000007, &(0x7f0000000100)="feff03076844ba8cb89e14f04305fee0ffff00febabec44277fb86dd1402e000030c62079f4b4d2f87e5feca6aab055013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0xfe, 0x60000000, 0x0, 0x5a0e}, 0x2c) 11.990178682s ago: executing program 2 (id=3052): r0 = socket(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000080)="7800000018002507b9409b14ffff00000202be04020506056403040c5c000900080020010a0000000d0085a168216b46d32345653600648d270015000a00000049935ade4a460c89b6ec0cff3959547f509058ba86c902007a00004a32000402160008000a0024a40423e000e218d1ddf66ed538f2523250", 0x78, 0x0, 0x0, 0x0) 11.922231097s ago: executing program 4 (id=3053): r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@gettaction={0x14, 0x5a, 0xc6b747b6bf1c6f95}, 0x14}}, 0x0) 11.832578676s ago: executing program 3 (id=3054): r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000002c0)={'bond_slave_0\x00', &(0x7f0000000280)=@ethtool_channels={0x3d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2}}) 11.675292846s ago: executing program 1 (id=3055): r0 = syz_open_dev$I2C(&(0x7f0000001940), 0x0, 0x0) ioctl$I2C_PEC(r0, 0x703, 0x60) 11.621811171s ago: executing program 0 (id=3056): prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x0, &(0x7f0000006680)) getpriority(0x1, 0x0) 11.573560157s ago: executing program 2 (id=3057): r0 = syz_open_dev$I2C(&(0x7f0000000000), 0x0, 0x0) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000900)={&(0x7f0000000480)=[{0x0, 0x0, 0x1, &(0x7f00000007c0)='\v'}, {0x0, 0x400, 0x0, 0x0}], 0x2}) 11.473737374s ago: executing program 4 (id=3058): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000d40)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01030000000000000000010000000900010073797a300000000054000000030a01020000000000000000010000000900030073797a32000000002800048008000240000000000800014000000005140003006261746164765f736c6176ffffffff000900010073797a30000000002c000000050a01020000000000000000010000000900010073797a30000000000c0002"], 0xc8}}, 0x0) 11.398387166s ago: executing program 3 (id=3059): r0 = socket(0xa, 0x3, 0x9) getsockopt$nfc_llcp(r0, 0x29, 0x7, 0x0, 0x20000011) 11.224054609s ago: executing program 0 (id=3060): keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default user:syz '], 0x2a, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180), &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 11.223167457s ago: executing program 1 (id=3061): r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000240)={0x2, @pix={0x0, 0x0, 0x47425247}}) 11.114877743s ago: executing program 2 (id=3062): r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_FLUSH(r0, 0x0, 0xd0, &(0x7f0000000000)=0x9, 0x4) 11.085477307s ago: executing program 4 (id=3063): r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f00000001c0)={{0x2, 0x0, @multicast2}, {0x0, @dev}, 0x28, {0x2, 0x0, @empty}, 'bridge_slave_1\x00'}) 7.138971771s ago: executing program 0 (id=3064): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000070000000900010073797a30000000004c000000090a010400000000000000000700000008000a40000000000900020025797a31000000000900010073797a3000000000080005400000001c"], 0xe8}}, 0x0) 0s ago: executing program 3 (id=3065): keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'trusted:', 0x20, 0x40}, 0x32, 0xfffffffffffffffc) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180), &(0x7f0000000100), 0xca, 0xfffffffffffffffe) kernel console output (not intermixed with test programs): ode 0x0c1a failed: -4 [ 310.515133][T10057] Bluetooth: hci4: Error when powering off device on rfkill (-4) [ 310.556984][ T5275] usb 5-1: new high-speed USB device number 47 using dummy_hcd [ 310.632982][ T5314] gspca_sq905c: sq905c_read: usb_control_msg failed (-71) [ 310.648446][ T5314] sq905c 3-1:0.0: Reading version command failed [ 310.658354][ T5314] sq905c 3-1:0.0: probe with driver sq905c failed with error -71 [ 310.677028][ T5314] usb 3-1: USB disconnect, device number 80 [ 310.765727][ T5275] usb 5-1: config 0 has an invalid interface number: 117 but max is 0 [ 310.805171][ T5275] usb 5-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 310.840699][ T5275] usb 5-1: config 0 has no interface number 0 [ 310.853196][ T5275] usb 5-1: config 0 interface 117 altsetting 0 endpoint 0x88 has invalid wMaxPacketSize 0 [ 310.891878][ T5275] usb 5-1: config 0 interface 117 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 3 [ 310.916774][ T5275] usb 5-1: New USB device found, idVendor=0afa, idProduct=03e8, bcdDevice=99.d0 [ 310.952514][ T5275] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 310.974815][ T5275] usb 5-1: Product: syz [ 310.979036][ T5275] usb 5-1: Manufacturer: syz [ 311.034610][ T5275] usb 5-1: SerialNumber: syz [ 311.055433][ T5275] usb 5-1: config 0 descriptor?? [ 311.758342][T10128] ceph: Path missing in source [ 311.776017][ T934] usb 5-1: USB disconnect, device number 47 [ 312.072298][ T29] kauditd_printk_skb: 34 callbacks suppressed [ 312.072317][ T29] audit: type=1400 audit(2000000008.299:531): avc: denied { read } for pid=10143 comm="syz.3.2233" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 312.094449][T10144] binder: 10143:10144 ioctl c0306201 20000480 returned -14 [ 312.180056][ T29] audit: type=1400 audit(2000000008.299:532): avc: denied { open } for pid=10143 comm="syz.3.2233" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 312.247429][ T29] audit: type=1400 audit(2000000008.309:533): avc: denied { ioctl } for pid=10143 comm="syz.3.2233" path="/dev/binderfs/binder0" dev="binder" ino=4 ioctlcmd=0x6201 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 312.645009][ T29] audit: type=1400 audit(2000000008.869:534): avc: denied { mount } for pid=10163 comm="syz.4.2242" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 312.783556][ T29] audit: type=1400 audit(2000000009.009:535): avc: denied { unmount } for pid=5221 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 312.883413][ T29] audit: type=1400 audit(2000000009.069:536): avc: denied { create } for pid=10172 comm="syz.2.2246" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 312.934737][T10176] xt_connbytes: Forcing CT accounting to be enabled [ 312.983293][ T29] audit: type=1400 audit(2000000009.089:537): avc: denied { write } for pid=10172 comm="syz.2.2246" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 313.009504][T10180] netlink: 108 bytes leftover after parsing attributes in process `syz.1.2249'. [ 313.064649][ T29] audit: type=1400 audit(2000000009.089:538): avc: denied { nlmsg_read } for pid=10172 comm="syz.2.2246" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 313.143633][T10186] openvswitch: netlink: Missing key (keys=8040, expected=200000) [ 313.183253][ T29] audit: type=1400 audit(2000000009.239:539): avc: denied { nlmsg_read } for pid=10177 comm="syz.1.2249" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 313.266053][ T29] audit: type=1400 audit(2000000009.349:540): avc: denied { setopt } for pid=10182 comm="syz.0.2250" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 313.300711][T10191] netlink: 8 bytes leftover after parsing attributes in process `syz.3.2252'. [ 313.339880][T10193] netlink: 'syz.4.2253': attribute type 3 has an invalid length. [ 313.367826][T10193] netlink: 196520 bytes leftover after parsing attributes in process `syz.4.2253'. May 18 03:33:30 syzkaller daemon.info dhcpcd[4885]: lapb5: carrier lost May 18 03:33:31 syzkaller daemon.info dhcpcd[4885]: lapb5: deleting route to 169.254.0.0/16 [ 316.983733][ T29] kauditd_printk_skb: 244 callbacks suppressed [ 316.983751][ T29] audit: type=1400 audit(2000000013.304:785): avc: denied { read write } for pid=5220 comm="syz-executor" name="loop3" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 18 03:33:33 syzkaller kern.warn kernel: [ 316.983733][ T29] kauditd_printk_skb: 244 callbacks suppressed May 18 03:33:33 syzkaller kern.notice kernel: [ 316.983751][ T29] audit: type=1400 audit(2000000013.304:785): avc: denied { read write } for pid=5220 comm="syz-executor" name="loop3" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fix [ 317.095252][ T29] audit: type=1400 audit(2000000013.335:786): avc: denied { read } for pid=4653 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 317.095319][ T29] audit: type=1400 audit(2000000013.335:787): avc: denied { read } for pid=4653 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 317.095382][ T29] audit: type=1400 audit(2000000013.355:788): avc: denied { read write } for pid=5222 comm="syz-executor" name="loop0" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 317.095443][ T29] audit: type=1400 audit(2000000013.386:789): avc: denied { read write } for pid=5232 comm="syz-executor" name="loop2" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 317.120144][ T29] audit: type=1400 audit(2000000013.448:790): avc: denied { read } for pid=4653 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 317.138944][ T29] audit: type=1400 audit(2000000013.468:791): avc: denied { read write } for pid=5221 comm="syz-executor" name="loop4" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 317.158894][ T29] audit: type=1400 audit(2000000013.478:792): avc: denied { create } for pid=10383 comm="syz.0.2335" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 May 18 03:33:33 syzkaller kern.notice kernel: [ 317.095252][ T29] audit: type=1400 audit(2000000013.335:786): avc: denied { read } for pid=4653 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l May 18 03:33:33 syzkaller kern.notice kernel: [ 317.095319][ T29] audit: type=1400 audit(2000000013.335:787): avc: denied { read } for pid=4653 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l May 18 03:33:33 syzkaller kern.notice kernel: [ 317.095382][ T29] audit: type=1400 audit(2000000013.355:788): avc: denied { read write } for pid=5222 comm="syz-executor" name="loop0" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fix May 18 03:33:33 syzkaller kern.notice kernel: [ 317.095443][ T29] audit: type=1400 audit(2000000013.386:789): avc: denied { read write } for pid=5232 comm="syz-executor" name="loop2" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fix May 18 03:33:33 syzkaller kern.notice kernel: [ 317.120144][ T29] audit: type=1400 audit(2000000013.448:790): avc: denied { read } for pid=4653 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l May 18 03:33:33 syzkaller kern.notice kernel: [ 317.138944][ T29] audit: type=1400 audit(2000000013.468:791): avc: denied { read write } for pid=5221 comm="syz-executor" name="loop4" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fix [ 317.477547][ T1266] ieee802154 phy0 wpan0: encryption failed: -22 [ 317.484017][ T1266] ieee802154 phy1 wpan1: encryption failed: -22 May 18 03:33:33 syzkaller kern.n[ 317.493151][ T29] audit: type=1400 audit(2000000013.602:793): avc: denied { create } for pid=10382 comm="syz.3.2334" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 otice kernel: [ 317.158894][ T29] audit: type=1400 audit(2000000013.478:792): avc: denied { create } for pid=10383 comm="syz.0.2335" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permiss May 18 03:33[ 317.536012][ T29] audit: type=1400 audit(2000000013.622:794): avc: denied { read } for pid=4653 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 :33 syzkaller kern.warn kernel: [ 317.477547][ T1266] ieee802154 phy0 wpan0: encryption failed: -22 May 18 03:33:33 syzkaller kern.warn kernel: [ 317.484017][ T1266] ieee802154 phy1 wpan1: encryption failed: -22 May 18 03:33:33 syzkaller kern.notice kernel: [ 317.493151][ T29] audit: type=1400 audit(2000000013.602:793): avc: denied { create } for pid=10382 comm="syz.3.2334" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 May 18 03:33:33 syzkaller kern.notice kernel: [ 317.536012][ T29] audit: type=1400 audit(2000000013.622:794): avc: denied { read } for pid=4653 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l [ 318.024521][T10426] xt_policy: neither incoming nor outgoing policy selected May 18 03:33:34 syzkaller kern.info kernel: [ 318.024521][T10426] xt_policy: neither incoming nor outgoing policy selected [ 318.575673][T10456] xt_CT: You must specify a L4 protocol and not use inversions on it May 18 03:33:34 syzkaller kern.info kernel: [ 318.575673][T10456] xt_CT: You must specify a L4 protocol and not use inversions on it [ 319.004747][T10479] netlink: 20 bytes leftover after parsing attributes in process `syz.1.2381'. May 18 03:33:35 syzkaller kern.warn kernel: [ 319.004747][T10479] netlink: 20 bytes leftover after parsing attributes in process `syz.1.2381'. [ 319.499298][T10507] netlink: 180 bytes leftover after parsing attributes in process `syz.3.2396'. [ 319.522174][T10509] netlink: 'syz.4.2398': attribute type 3 has an invalid length. [ 319.547328][T10509] netlink: 11 bytes leftover after parsing attributes in process `syz.4.2398'. May 18 03:33:35 syzkaller kern.warn kernel: [ 319.499298][T10507] netlink: 180 bytes leftover after parsing attributes in process `syz.3.2396'. May 18 03:33:35 syzkaller kern.warn kernel: [ 319.522174][T10509] netlink: 'syz.4.2398': attribute type 3 has an invalid length. May 18 03:33:35 syzkaller kern.warn kernel: [ 319.547328][T10509] netlink: 11 bytes leftover after parsing attributes in process `syz.4.2398'. [ 321.061916][T10597] xt_l2tp: unknown flags: 19 May 18 03:33:37 syzkaller kern.info kernel: [ 321.061916][T10597] xt_l2tp: unknown flags: 19 [ 321.881763][ T29] kauditd_printk_skb: 206 callbacks suppressed [ 321.881782][ T29] audit: type=1400 audit(2000000018.313:1001): avc: denied { mounton } for pid=10639 comm="syz.2.2462" path="/468/file0" dev="tmpfs" ino=2371 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 May 18 03:33:38 syzkaller kern.warn kernel: [ 321.881763][ T29] kauditd_printk_skb: 206 callbacks suppressed May 18 03:33:38 syzkaller kern.notice kernel: [ 321.881782][ T29] audit: type=1400 audit(2000000018.313:1001): avc: denied { mounton } for[ 321.953601][ T29] audit: type=1400 audit(2000000018.313:1002): avc: denied { create } for pid=10641 comm="syz.4.2463" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 pid=10639 comm="syz.2.2462" path="/468/file0" dev="tmpfs" ino=2371 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tm May 18 03:33:38 syzkaller kern.notice kernel: [ 321.953601][ T29] audit: type=1400 audit(2000000018.313:1002): avc: denied { create } for pid=10641 comm="syz.4.2463" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permis [ 322.038607][ T29] audit: type=1400 audit(2000000018.364:1003): avc: denied { read } for pid=4653 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 18 03:33:38 syzkaller kern.notice kernel: [ 322.038607][ T29] audit: type=1400 audit(2000000018.364:1003): avc: denied { read } for pid=4653 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 322.116428][ T29] audit: type=1400 audit(2000000018.364:1004): avc: denied { read } for pid=4653 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 322.116495][ T29] audit: type=1400 audit(2000000018.364:1005): avc: denied { read write } for pid=5221 comm="syz-executor" name="loop4" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 322.116560][ T29] audit: type=1400 audit(2000000018.385:1006): avc: denied { read write } for pid=5220 comm="syz-executor" name="loop3" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 322.116623][ T29] audit: type=1400 audit(2000000018.415:1007): avc: denied { read write } for pid=5223 comm="syz-executor" name="loop1" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 322.116695][ T29] audit: type=1400 audit(2000000018.425:1008): avc: denied { read write } for pid=5232 comm="syz-executor" name="loop2" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 322.116756][ T29] audit: type=1400 audit(2000000018.436:1009): avc: denied { read } for pid=4653 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 322.116816][ T29] audit: type=1400 audit(2000000018.466:1010): avc: denied { read write } for pid=10646 comm="syz.4.2465" name="video7" dev="devtmpfs" ino=868 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l_device_t tclass=chr_file permissive=0 [ 322.322052][ C1] vkms_vblank_simulate: vblank timer overrun [ 322.516768][ C1] vkms_vblank_simulate: vblank timer overrun May 18 03:33:38 syzkaller kern.notice kernel: [ 322.116428][ T29] audit: type=1400 audit(2000000018.364:1004): avc: denied { read } for pid=4653 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= May 18 03:33:38 syzkaller kern.notice kernel: [ 322.116495][ T29] audit: type=1400 audit(2000000018.364:1005): avc: denied { read write } for pid=5221 comm="syz-executor" name="loop4" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi May 18 03:33:38 syzkaller kern.notice kernel: [ 322.116560][ T29] audit: type=1400 audit(2000000018.385:1006): avc: denied { read write } for pid=5220 comm="syz-executor" name="loop3" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi May 18 03:33:38 syzkaller kern.notice kernel: [ 322.116623][ T29] audit: type=1400 audit(2000000018.415:1007): avc: denied { read write } for pid=5223 comm="syz-executor" name="loop1" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi May 18 03:33:38 syzkaller kern.notice kernel: [ 322.116695][ T29] audit: type=1400 audit(2000000018.425:1008): avc: denied { read write } for pid=5232 comm="syz-executor" nam[ 322.681651][T10679] __vm_enough_memory: pid: 10679, comm: syz.0.2481, bytes: 4503599627366400 not enough memory for the allocation e="loop2" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi May 18 03:33:38 syzkaller kern.notice kernel: [ 322.116756][ T29] audit: type=1400 audit(2000000018.436:1009): avc: denied { read } for pid=4653 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= May 18 03:33:38 syzkaller kern.notice kernel: [ 322.116816][ T29] audit: type=1400 audit(2000000018.466:1010): avc: denied { read write } for pid=10646 comm="syz.4.2465" name="video7" dev="devtmpfs" ino=868 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4 May 18 03:33:38 syzkaller kern.warn kernel: [ 322.322052][ C1] vkms_vblank_simulate: vblank timer overrun May 18 03:33:38 syzkaller kern.warn kernel: [ 322.516768][ C1] vkms_vblank_simulate: vblank timer overrun May 18 03:33:39 syzkaller kern.warn kernel: [ 322.681651][T10679] __vm_enough_memory: pid: 10679, comm: syz.0.2481, bytes: 4503599627366400 not enough memory for the allocation [ 323.871001][T10742] vhci_hcd vhci_hcd.0: pdev(4) rhport(0) sockfd(3) [ 323.878040][T10742] vhci_hcd vhci_hcd.0: devid(0) speed(3) speed_str(high-speed) May 18 03:33:40 syzkaller kern.info kernel: [ 323.871001][T10742] vhci_hcd vhci_hcd.0: pdev(4) rhport(0) sockfd(3) May 18 03:33:40 syzkaller kern.info kernel: [ 323.878040][T10742] vhci_hcd vhci_hcd.0: devid(0) speed(3) speed_str(high-speed) [ 323.922913][T10742] vhci_hcd vhci_hcd.0: Device attached May 18 03:33:40 syzkaller kern.info kernel: [ 323.922913][T10742] vhci_hcd vhci_hcd.0: Device attached [ 323.999870][T10743] vhci_hcd: connection closed [ 324.003919][ T61] vhci_hcd: stop threads [ 324.031614][ T61] vhci_hcd: release socket May 18 03:33:40 syzkaller kern.info kernel: [ 323.999870][T10743] vhci_hcd: connection closed May 18 03:33:40 syzkaller kern.info kernel: [ 324.003919][ T61] vhci_hcd: stop threads May 18 03:33:40 syzkaller kern.info kernel: [ 324.031614][ T61] vhci_hcd: release socket [ 324.071793][ T61] vhci_hcd: disconnect device May 18 03:33:40 syzkaller kern.info kernel: [ 324.071793][ T61] vhci_hcd: disconnect device [ 324.113455][ T5274] vhci_hcd: vhci_device speed not set May 18 03:33:40 syzkaller kern.err kernel: [ 324.113455][ T5274] vhci_hcd: vhci_device speed not set [ 326.346231][T10882] kAFS: unable to lookup cell '.,c¾ûL' May 18 03:33:42 syzkaller kern.err kernel: [ 326.346231][T10882] kAFS: unable to lookup cell '.,c¾ûL' [ 326.499954][T10892] netlink: 'syz.3.2585': attribute type 11 has an invalid length. May 18 03:33:43 syzkaller kern.warn kernel: [ 326.499954][T10892] netlink: 'syz.3.2585': attribute type 11 has an invalid length. [ 326.840888][ T29] kauditd_printk_skb: 217 callbacks suppressed [ 326.840910][ T29] audit: type=1400 audit(2000000023.343:1228): avc: denied { read write } for pid=5221 comm="syz-executor" name="loop4" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 18 03:33:43 syzkaller kern.warn kernel: [ 326.840888][ T29] kauditd_printk_skb: 217 callbacks suppressed May 18 03:33:43 syzkaller kern.notice kernel: [ 326.840910][ T29] audit: type=1400 audit(2000000023.343:1228): avc: denied { read write } for pid=5221 comm="syz-executor" name="loop4" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 326.949518][ T29] audit: type=1400 audit(2000000023.394:1229): avc: denied { read write } for pid=5222 comm="syz-executor" name="loop0" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 18 03:33:43 syzkaller kern.notice kernel: [ 326.949518][ T29] audit: type=1400 audit(2000000023.394:1229): avc: denied { read write } for pid=5222 comm="syz-executor" name="loop0" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:[ 326.998296][ T29] audit: type=1400 audit(2000000023.404:1230): avc: denied { create } for pid=10911 comm="syz.3.2595" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=0 fi May 18 03:33:43 syzkaller kern.notice kernel: [ [ 327.022673][ T29] audit: type=1400 audit(2000000023.404:1231): avc: denied { read } for pid=4653 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 326.998296][ [ 327.045842][ C1] vkms_vblank_simulate: vblank timer overrun T29] audit: type=1400 audit(2000000023.404:1230): avc: denied { create } for pid=10911 comm="syz.3.2595" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=0 May 18 03:33:43 syzkaller kern.notice kernel: [ 32[ 327.074818][ T29] audit: type=1400 audit(2000000023.404:1232): avc: denied { read } for pid=4653 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 7.022673][ T29] audit: type=1400 audit(2000000023.404:1231): avc: denied { read } for pid=4653 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= May 18 03:33:43 syzkaller kern.warn kernel: [ 327.045842][ C1] vkms_vblank_simulate: vblank timer overrun May 18 03:33:43 syzkaller kern.notice kernel: [ 327.074818][ T29] audit: type=1400 audit(2000000023.404:1232): avc: denied { read } for pid=4653 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 327.155880][ T29] audit: type=1400 audit(2000000023.414:1233): avc: denied { read write } for pid=5223 comm="syz-executor" name="loop1" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 18 03:33:43 syzkaller kern.notice kernel: [ 327.155880][ T29] audit: type=1400 audit(2000000023.414:1233): avc: denied { read write } for pid=5223 com[ 327.200463][ T29] audit: type=1400 audit(2000000023.445:1234): avc: denied { read write } for pid=5232 comm="syz-executor" name="loop2" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 m="syz-executor" name="loop1" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi May 18 03:33:43 syzkaller kern.notice kernel: [ 327.200463][ T29] audit: type=1400 audit(2000000023.445:1234): avc: denied { read write } for pid=5232 comm="syz-executor" name="loop2" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontex[ 327.256259][ T29] audit: type=1400 audit(2000000023.495:1235): avc: denied { read } for pid=4653 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 t=system_u:object_r:fi May 18 03:33:43 syzkaller kern.notice kernel: [ 327.256259][ [ 327.286244][ T29] audit: type=1400 audit(2000000023.495:1236): avc: denied { map_create } for pid=10915 comm="syz.1.2598" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 T29] audit: type=1400 audit(2000000023.495:1235): avc: denied { read } for pid=4653 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= May 18 03:33:43 syzkaller kern.notice kernel: [ 327.286244][ T29] audit: type=1400 audit(2000000023.495:1236): avc: denied { map_create } for pid=10915 comm="syz.1.2598" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 327.364182][ T29] audit: type=1400 audit(2000000023.505:1237): avc: denied { read write } for pid=10916 comm="syz.0.2597" name="raw-gadget" dev="devtmpfs" ino=734 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 May 18 03:33:43 syzkaller kern.notice kernel: [ 327.364182][ T29] audit: type=1400 audit(2000000023.505:1237): avc: denied { read write } for pid=10916 comm="syz.0.2597" name="raw-gadget" dev="devtmpfs" ino=734 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_ [ 330.502354][T11070] netlink: 24 bytes leftover after parsing attributes in process `syz.0.2675'. May 18 03:33:47 syzkaller kern.warn kernel: [ 330.502354][T11070] netlink: 24 bytes leftover after parsing attributes in process `syz.0.2675'. [ 331.166322][T11097] trusted_key: encrypted_key: master key parameter 'user:' is invalid May 18 03:33:47 syzkaller kern.info kernel: [ 331.166322][T11097] trusted_key: encrypted_key: master key parameter 'user:' is invalid [ 331.206986][T11018] syz.4.2648 (11018): drop_caches: 2 May 18 03:33:47 syzkaller kern.info kernel: [ 331.206986][T11018] syz.4.2648 (11018): drop_caches: 2 [ 331.615179][T11120] CIFS: VFS: Malformed UNC in devname May 18 03:33:48 syzkaller kern.err kernel: [ 331.615179][T11120] CIFS: VFS: Malformed UNC in devname [ 331.818363][ T29] kauditd_printk_skb: 171 callbacks suppressed [ 331.818382][ T29] audit: type=1400 audit(2000000028.391:1409): avc: denied { read } for pid=11130 comm="syz.0.2704" dev="nsfs" ino=4026533277 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 May 18 03:33:48 syzkaller kern.warn kernel: [ 331.818363][ T29] kauditd_printk_skb: 171 callbacks suppressed May 18 03:33:48 syzkaller kern.notice kernel: [ 331.818382][ T29] audit: type=1400 audit(2000000028.391:1409): avc: denied { read } for pid=11130 comm="syz.0.2704" dev="nsfs" ino=4026533277 scontext=root:sysadm_r:sysa[ 331.874254][ T29] audit: type=1400 audit(2000000028.401:1410): avc: denied { read } for pid=4653 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 dm_t tcontext=system_u:object_r:nsfs_t tclass=file [ 331.909083][ T29] audit: type=1400 audit(2000000028.401:1411): avc: denied { read write } for pid=5221 comm="syz-executor" name="loop4" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 18 03:33:48 syzkaller kern.notice kernel: [ 331.874254][ T29] audit: type=1400 audit(2000000028.401:1410): avc: denied { read } for pid=4653 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= May 18 03:33:48 syzkaller kern.notice kernel: [ 331.909083][ T29] audit: type=1400 audit(2000000028.401:1411): avc: denied { read write } for pid=5221 comm="syz-executor" name="loop4" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 331.988853][ T29] audit: type=1400 audit(2000000028.422:1412): avc: denied { read } for pid=4653 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 18 03:33:48 syzkaller kern.notice kernel: [ 331.988853][ T29] audit: type=1400 audit(2000000028.422:1412): avc: denied { read } for pid=4653 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 332.076930][ T29] audit: type=1400 audit(2000000028.432:1413): avc: denied { read write } for pid=5232 comm="syz-executor" name="loop2" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 18 03:33:48 syzkaller kern.notice kernel: [ 332.076930][ T29] audit: type=1400 audit(2000000028.432:1413): avc: denied { read write } f[ 332.114015][ T29] audit: type=1400 audit(2000000028.472:1414): avc: denied { read } for pid=4653 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 or pid=5232 comm="syz-executor" name="loop2" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=sy[ 332.145729][ T29] audit: type=1400 audit(2000000028.482:1415): avc: denied { read write } for pid=5223 comm="syz-executor" name="loop1" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 stem_u:object_r:fi May 18 03:33:48 syzkaller kern.notice kernel: [ 332.114015][ T29] audit: type=1400 audit(2000000028.472:1[ 332.180823][ T29] audit: type=1400 audit(2000000028.512:1416): avc: denied { read } for pid=4653 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 414): avc: denied { read } for pid=4653 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= May 18 03:33:48 syzkaller kern.notice kernel: [ 332.145729][ T29] audit: type=1400 audit(2000000028.482:1415): avc: denied { read write } for pid=5223 comm="syz-executor" name="loop1" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi May 18 03:33:48 syzkaller kern.notice kernel: [ 332.180823][ T29] audit: type=1400 audit(2000000028.512:1416): avc: denied { read } for pid=4653 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 332.285308][ T29] audit: type=1400 audit(2000000028.533:1417): avc: denied { read write } for pid=5220 comm="syz-executor" name="loop3" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 332.344996][ T29] audit: type=1400 audit(2000000028.553:1418): avc: denied { read write } for pid=5221 comm="syz-executor" name="loop4" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 18 03:33:48 syzkaller kern.notice kernel: [ 332.285308][ T29] audit: type=1400 audit(2000000028.533:1417): avc: denied { read write } for pid=5220 comm="syz-executor" name="loop3" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi May 18 03:33:48 syzkaller kern.notice kernel: [ 332.344996][ T29] audit: type=1400 audit(2000000028.553:1418): avc: denied { read write } for pid=5221 comm="syz-executor" name="loop4" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 332.901596][T11180] veth1_macvtap: left promiscuous mode May 18 03:33:49 syzkaller kern.info kernel: [ 332.901596][T11180] veth1_macvtap: left promiscuous mode [ 334.418776][T11273] --map-set only usable from mangle table May 18 03:33:51 syzkaller kern.info kernel: [ 334.418776][T11273] --map-set only usable from mangle table [ 335.330096][T11325] ebt_among: wrong size: 1048 against expected 710676, rounded to 710680 May 18 03:33:51 syzkaller kern.err kernel: [ 335.330096][T11325] ebt_among: wrong size: 1048 against expected 710676, rounded to 710680 [ 336.788685][ T29] kauditd_printk_skb: 198 callbacks suppressed [ 336.788704][ T29] audit: type=1400 audit(2000000033.393:1617): avc: denied { read write } for pid=5220 comm="syz-executor" name="loop3" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 18 03:33:53 syzkaller kern.warn kernel: [ 336.788685][ T29] kauditd_printk_skb: 198 callbacks suppressed May 18 03:33:53 syzkaller kern.notice kernel: [ 336.788704][ T29] audit: type=1400 audit(2000000033.393:1617): avc: denied { read write } for pid=5220 comm="syz-executor" name="loop3" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 336.870948][ T29] audit: type=1400 audit(2000000033.413:1618): avc: denied { read write } for pid=5232 comm="syz-executor" name="loop2" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 18 03:33:53 syzkaller kern.notice kernel: [ 336.870948][ T29] audit: type=1400 audit(2000000033.413:1618): avc: denied { read write } for pid=5232 comm="syz-executor" name="loop2" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 336.960915][ T29] audit: type=1400 audit(2000000033.433:1619): avc: denied { create } for pid=11406 comm="syz.4.2841" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 May 18 03:33:53 syzkaller kern.notice kernel: [ 336.960915][ T29] audit: type=1400 audit(2000000033.433:1619): avc: denied { create } for pid=11406 comm="syz.4.2841" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tcla[ 337.008409][ T29] audit: type=1400 audit(2000000033.443:1620): avc: denied { read } for pid=4653 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ss=netlink_netfilter_socket permis May 18 03:33:53 syzkaller kern.notice kernel: [ 337.008409][ T29] audit: type=1400 audit(2000000033.443:1620): avc: denied { read } for pid=4653 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 337.066979][ T29] audit: type=1400 audit(2000000033.443:1621): avc: denied { read } for pid=4653 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 18 03:33:53 syzkaller kern.notice kernel: [ 337.066979][ T29] audit: type=1400 audit(2000000033.443:1621): avc: denied { read } for pid=4653 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 337.134219][ T29] audit: type=1400 audit(2000000033.514:1622): avc: denied { read } for pid=4653 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 337.183053][ T29] audit: type=1400 audit(2000000033.514:1623): avc: denied { read write } for pid=5221 comm="syz-executor" name="loop4" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 18 03:33:53 syzkaller kern.notice kernel: [ 337.134219][ T29] audit: type=1400 audit(2000000033.514:1622): avc: denied { read } for pid=4653 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= May 18 03:33:53 syzkaller kern.notice kernel: [ 337.183053][ T29] audit: type=1400 audit(2000000033.514:1623): avc: denied { read write } for pid=5221 comm="syz-executor" name="loop4" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 337.286094][ T29] audit: type=1400 audit(2000000033.564:1624): avc: denied { read write } for pid=5223 comm="syz-executor" name="loop1" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 18 03:33:53 syzkaller kern.notice kernel: [ 337.286094][ T29] audit: type=1400 audit(2000000033.564:1624): avc: denied { read write } for pid=5223 comm="syz-executor" name="loop1" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 337.342361][ T29] audit: type=1400 audit(2000000033.564:1625): avc: denied { read write } for pid=5220 comm="syz-executor" name="loop3" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 18 03:33:53 syzkaller kern.notice kernel: [ 337.342361][ T29] audit: type=1400 audit(2000000033.564:1625): avc: denied { read write } for pid=5220 comm="syz-executor" name="loop3" dev="devtmpfs" ino[ 337.397697][T11436] ip6t_srh: unknown srh invflags 7863 =652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 337.431583][ T29] audit: type=1400 audit(2000000033.574:1626): avc: denied { read write } for pid=5232 comm="syz-executor" name="loop2" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 18 03:33:54 syzkaller kern.info kernel: [ 337.397697][T11436] ip6t_srh: unknown srh invflags 7863 May 18 03:33:54 syzkaller kern.notice kernel: [ 337.431583][ T29] audit: type=1400 audit(2000000033.574:1626): avc: denied { read write } for pid=5232 comm="syz-executor" name="loop2" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 337.549638][T11445] netlink: 'syz.0.2861': attribute type 5 has an invalid length. May 18 03:33:54 syzkaller kern.warn kernel: [ 337.549638][T11445] netlink: 'syz.0.2861': attribute type 5 has an invalid length. [ 339.868324][T11574] netdevsim netdevsim0 €: renamed from netdevsim0 (while UP) May 18 03:33:56 syzkaller kern.info kernel: [ 339.868324][T11574] netdevsim netdevsim0 €^O: renamed from netdevsim0 (while UP) [ 341.415336][T11664] bridge0: port 3(veth0_to_bridge) entered blocking state [ 341.436148][T11664] bridge0: port 3(veth0_to_bridge) entered disabled state May 18 03:33:58 [ 341.454290][T11664] veth0_to_bridge: entered allmulticast mode syzkaller kern.info kernel: [ 341.415336][T11664] bridge0: port 3(veth0_to_bridge) entered blocking state May 18 03:33:58 syzk[ 341.471533][T11664] veth0_to_bridge: entered promiscuous mode aller kern.info kernel: [ 341.436148][T11664] b[ 341.480308][T11664] bridge0: adding interface veth0_to_bridge with same address as a received packet (addr:aa:aa:aa:aa:aa:1b, vlan:0) ridge0: port 3(veth0_to_bridge) entered disabled state May 18 03:33:58 syzkalle[ 341.500051][T11664] bridge0: port 3(veth0_to_bridge) entered blocking state r kern.info kern[ 341.508113][T11664] bridge0: port 3(veth0_to_bridge) entered forwarding state el: [ 341.454290][T11664] veth0_to_bridge: entered allmulticast mode May 18 03:33:58 syzkaller kern.info kernel: [ 341.471533][T11664] veth0_to_bridge: entered promiscuous mode May 18 03:33:58 syzkaller kern.warn kernel: [ 341.480308][T11664] bridge0: adding interface veth0_to_bridge with same address as a received packet (addr:aa:aa:aa:aa:aa:1b, vlan:0) May 18 03:33:58 syzkaller kern.info kernel: [ 341.500051][T11664] bridge0: port 3(veth0_to_bridge) entered blocking state May 18 03:33:58 syzkaller kern.info kernel: [ 341.508113][T11664] bridge0: port 3(veth0_to_bridge) entered forwarding state [ 341.776300][ T29] kauditd_printk_skb: 201 callbacks suppressed [ 341.776318][ T29] audit: type=1400 audit(2000000038.414:1828): avc: denied { create } for pid=11679 comm="syz.4.2975" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 May 18 03:33:58 syzkaller kern.warn kernel: [ 341.776300][ T29] kauditd_printk_skb: 201 callbacks suppressed May 18 03:33:58 syzkaller kern.notice kernel: [ 341.776318][ T29] audit: type=1400 audit(2000000038.414:1828): avc: denied { create } for pid=11679 comm="syz.4.2975" scontext=root:sysad[ 341.829566][ T29] audit: type=1400 audit(2000000038.434:1829): avc: denied { read } for pid=4653 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 m_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permis May 18 03:33:58 syzkaller kern.notice kernel: [ 341.829566][ T29] audit: type=1400 audit(2000000038.434:1829): avc: denied { read } for pid=4653 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 341.902571][ T29] audit: type=1400 audit(2000000038.434:1830): avc: denied { create } for pid=11682 comm="syz.0.2976" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 May 18 03:33:58 syzkaller kern.notice kernel: [ 341.902571][ T29] audit: type=1400 audit(2000000038.434:1830): avc: denied { create } for pid=11682 comm="syz.0.2976" scon[ 341.945903][ T29] audit: type=1400 audit(2000000038.454:1831): avc: denied { read } for pid=4653 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 text=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permis May 18 03:33:58 syzkaller kern.notice kernel: [ 341.945903][ T29] audit: type=1400 audit(2000000038.454:1831): avc: denied { read } for pid=4653 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 342.004253][ T29] audit: type=1400 audit(2000000038.484:1832): avc: denied { read write } for pid=5221 comm="syz-executor" name="loop4" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 18 03:33:58 syzkaller kern.notice kernel: [ 342.004253][ T29] audit: type=1400 audit(2000000038.484:1832): avc: denied { read write } for pid=5221 comm="syz-executor" name="loop4" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 342.128746][ T29] audit: type=1400 audit(2000000038.494:1833): avc: denied { read write } for pid=5222 comm="syz-executor" name="loop0" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 18 03:33:58 syzkaller kern.notice kernel: [ 342.128746][ T29] audit: type=1400 audit(2000000038.494:1833): avc: denied { read write } for pid=5222 comm="syz-executor" name="loop0" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 342.225560][ T29] audit: type=1400 audit(2000000038.504:1834): avc: denied { create } for pid=11681 comm="syz.1.2974" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=0 May 18 03:33:58 syzkaller kern.notice kernel: [ 342.225560][ T29] audit: type=1400 audit(2000000038.504:1834): avc: denied { create } for pid=11681 comm="[ 342.260821][ T29] audit: type=1400 audit(2000000038.504:1835): avc: denied { read } for pid=4653 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syz.1.2974" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tcla[ 342.289287][ T29] audit: type=1400 audit(2000000038.504:1836): avc: denied { read write } for pid=5220 comm="syz-executor" name="loop3" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 ss=netlink_tcpdiag_socket permissi May 18 03:33:58 syzkaller kern.notice kernel: [ 342.260821][ T29] audit: type=1400 audit(2000000038.504:1835): avc: denied { read } for pid=4653 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= May 18 03:33:58 syzkaller kern.notice kernel: [ 342.289287][ T29] audit: type=1400 audit(2000000038.504:1836): avc: denied { read write } for pid=[ 342.354466][ T29] audit: type=1400 audit(2000000038.544:1837): avc: denied { read } for pid=11685 comm="syz.4.2979" dev="nsfs" ino=4026532858 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 5220 comm="syz-executor" name="loop3" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi May 18 03:33:59 syzkaller kern.notice kernel: [ 342.354466][ T29] audit: type=1400 audit(2000000038.544:1837): avc: denied { read } for pid=11685 comm="syz.4.2979" dev="nsfs" ino=4026532858 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file [ 342.552880][T11714] netdevsim netdevsim4: loading /lib/firmware/. failed with error -22 [ 342.576914][T11714] netdevsim netdevsim4: Direct firmware load for . failed with error -22 May 18 03:33:59 syzkaller kern.warn kernel: [ 342.552880][T11714] netdevsim net[ 342.594503][T11714] netdevsim netdevsim4: Falling back to sysfs fallback for: . devsim4: loading /lib/firmware/. failed with error -22 May 18 03:33:59 syzkaller kern.warn kernel: [ 342.576914][T11714] netdevsim netdevsim4: Direct firmware load for . failed with error -22 May 18 03:33:59 syzkaller kern.warn kernel: [ 342.594503][T11714] netdevsim netdevsim4: Falling back to sysfs fallback for: . [ 342.663659][T11718] vlan0: entered promiscuous mode May 18 03:33:59 syzkaller kern.info kernel: [ 342.663659][T11718] vlan0: entered promiscuous mode [ 342.760364][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 342.773288][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 342.785926][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 342.798595][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 342.811429][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 342.824133][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 342.836748][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 342.849372][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 342.861992][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 342.874673][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:33:59 syzkaller kern.warn kernel: [ 342.760364][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:33:59 syzkaller kern.warn kernel: [ 342.773288][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:33:59 syzkaller kern.warn kernel: [ 342.785926][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:33:59 syzkaller kern.warn kernel: [ 342.798595][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:33:59 syzkaller kern.warn kernel: [ 342.811429][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:33:59 syzkaller kern.warn kernel: [ 342.824133][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:33:59 syzkaller kern.warn kernel: [ 342.836748][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:33:59 syzkaller kern.warn kernel: [ 342.849372][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:33:59 syzkaller kern.warn kernel: [ 342.861992][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:33:59 syzkaller kern.warn kernel: [ 342.874673][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 344.856344][T11777] netlink: 20 bytes leftover after parsing attributes in process `syz.3.3022'. May 18 03:34:01 syzkaller kern.warn kernel: [ 344.856344][T11777] netlink: 20 bytes leftover after parsing attributes in process `syz.3.3022'. [ 345.429189][T11793] netlink: 'syz.0.3030': attribute type 29 has an invalid length. [ 345.490509][T11793] netlink: 4 bytes leftover after parsing attributes in process `syz.0.3030'. May 18 03:34:02 syzkaller kern.warn kernel: [ 345.429189][T11793] netlink: 'syz.0.3030': attribute type 29 has an invalid length. May 18 03:34:02 syzkaller kern.warn kernel: [ 345.490509][T11793] netlink: 4 bytes leftover after parsing attributes in process `syz.0.3030'. [ 346.772808][ T29] kauditd_printk_skb: 126 callbacks suppressed [ 346.772827][ T29] audit: type=1400 audit(2000000043.436:1964): avc: denied { read write } for pid=5222 comm="syz-executor" name="loop0" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 18 03:34:03 syzkaller kern.warn kernel: [ 346.772808][ T29] kauditd_printk_skb: 126 callbacks suppressed May 18 03:34:03 syzkaller kern.notice kernel: [ 346.772827][ T29] audit: type=1400 audit(2000000043.436:1964): avc: denied { read write } for pid=5222 comm="syz-executor" name="loop0" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 346.957857][ T29] audit: type=1400 audit(2000000043.496:1965): avc: denied { read } for pid=4653 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 18 03:34:03 syzkaller kern.notice kernel: [ 346.957857][ T29] audit: type=1400 audit(2000000043.496:1965): avc: denied { read } for pid=4653 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 347.122110][ T29] audit: type=1400 audit(2000000043.496:1966): avc: denied { read } for pid=4653 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 18 03:34:03 syzkaller kern.notice kernel: [ 347.122110][ T29] audit: type=1400 audit(2000000043.496:1966): avc: denied { read } for pid=4653 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 347.296844][ T29] audit: type=1400 audit(2000000043.526:1967): avc: denied { read } for pid=11830 comm="syz.3.3049" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 May 18 03:34:03 syzkaller kern.notice kernel: [ 347.296844][ T29] audit: type=1400 audit(2000000043.526:1967): avc: denied { read } for pid=11830 comm="syz.3.3049" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t [ 347.465988][ T29] audit: type=1400 audit(2000000043.556:1968): avc: denied { read write } for pid=5232 comm="syz-executor" name="loop2" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 18 03:34:04 syzkaller kern.notice kernel: [ 347.465988][ T29] audit: type=1400 audit(2000000043.556:1968): avc: denied { read write } for pid=5232 comm="syz-executor" name="loop2" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 347.655552][ T29] audit: type=1400 audit(2000000043.596:1969): avc: denied { read write } for pid=5221 comm="syz-executor" name="loop4" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 May 18 03:34:04 syzkaller kern.notice kernel: [ 347.655552][ T29] audit: type=1400 audit(2000000043.596:1969): avc: denied { read write } for pid=5221 comm="syz-executor" name="loop4" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 347.745578][ C1] net_ratelimit: 8073 callbacks suppressed [ 347.745601][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 347.764160][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 347.778277][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 347.778840][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 347.779549][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 347.780090][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 347.780795][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 347.781380][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 347.782118][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 347.782605][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 347.860879][ T29] audit: type=1400 audit(2000000043.646:1970): avc: denied { read } for pid=4653 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 18 03:34:04 syzkaller kern.warn kernel: [ 347.745578][ C1] net_ratelimit: 8073 callbacks suppressed May 18 03:34:04 syzkaller kern.warn kernel: [ 347.745601][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:34:04 syzkaller kern.warn kernel: [ 347.764160][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:34:04 syzkaller kern.warn kernel: [ 347.778277][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:34:04 syzkaller kern.warn kernel: [ 347.778840][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:34:04 syzkaller kern.warn kernel: [ 347.779549][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:34:04 syzkaller kern.warn kernel: [ 347.780090][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:34:04 syzkaller kern.warn kernel: [ 347.780795][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:34:04 syzkaller kern.warn kernel: [ 347.781380][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:34:04 syzkaller kern.warn kernel: [ 347.782118][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:34:04 syzkaller kern.warn kernel: [ 347.782605][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 352.740411][ C1] net_ratelimit: 7724 callbacks suppressed [ 352.740435][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 352.758926][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 352.771573][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 352.784177][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 352.797003][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 352.809683][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 352.822533][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 352.835170][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 352.847897][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 352.860454][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:34:04 syzkaller kern.notice kernel: [ 347.860879][ T29] audit: type=1400 audit(2000000043.646:1970): avc: denied { read } for pid=4653 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= May 18 03:34:09 syzkaller kern.warn kernel: [ 352.740411][ C1] net_ratelimit: 7724 callbacks suppressed May 18 03:34:09 syzkaller kern.warn kernel: [ 352.740435][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:34:09 syzkaller kern.warn kernel: [ 352.758926][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:34:09 syzkaller kern.warn kernel: [ 352.771573][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:34:09 syzkaller kern.warn kernel: [ 352.784177][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:34:09 syzkaller kern.warn kernel: [ 352.797003][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:34:09 syzkaller kern.warn kernel: [ 352.809683][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:34:09 syzkaller kern.warn kernel: [ 352.822533][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:34:09 syzkaller kern.warn kernel: [ 352.835170][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:34:09 syzkaller kern.warn kernel: [ 352.847897][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 353.944755][ T29] audit: type=1400 audit(2000000043.666:1971): avc: denied { read } for pid=11832 comm="syz.1.3050" dev="nsfs" ino=4026532905 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 May 18 03:34:09 syzkaller kern.warn kernel: [ 352.860454][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) May 18 03:34:10 syzkaller kern.notice kernel: [ 353.944755][ T29] audit: type=1400 audit(2000000043.666:1971): avc: denied { read } for pid=11832 comm="syz.1.3050" dev="nsfs" ino=4026532905 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file [ 357.739681][ C1] net_ratelimit: 7975 callbacks suppressed [ 357.739706][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 357.758214][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 357.770799][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 357.783426][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 357.796082][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 357.808740][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 357.821311][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 357.833996][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 357.834603][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 357.835235][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 360.275361][ T29] audit: type=1400 audit(2000000043.687:1972): avc: denied { read write } for pid=5220 comm="syz-executor" name="loop3" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 360.275435][ T29] audit: type=1400 audit(2000000043.707:1973): avc: denied { prog_load } for pid=11834 comm="syz.0.3051" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 360.275495][ T29] audit: type=1400 audit(2000000043.817:1974): avc: denied { read } for pid=4653 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 360.275557][ T29] audit: type=1400 audit(2000000043.847:1975): avc: denied { read write } for pid=5223 comm="syz-executor" name="loop1" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 360.275618][ T29] audit: type=1400 audit(2000000043.857:1976): avc: denied { read write } for pid=5222 comm="syz-executor" name="loop0" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 360.275683][ T29] audit: type=1400 audit(2000000043.947:1977): avc: denied { read write } for pid=5232 comm="syz-executor" name="loop2" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 360.275745][ T29] audit: type=1400 audit(2000000043.988:1978): avc: denied { read } for pid=4653 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 360.275805][ T29] audit: type=1400 audit(2000000044.048:1979): avc: denied { read write } for pid=5221 comm="syz-executor" name="loop4" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 360.275868][ T29] audit: type=1400 audit(2000000044.168:1980): avc: denied { read } for pid=4653 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 360.275929][ T29] audit: type=1400 audit(2000000044.188:1981): avc: denied { read write } for pid=5220 comm="syz-executor" name="loop3" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 362.741914][ C1] net_ratelimit: 8025 callbacks suppressed [ 362.741938][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 362.742460][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 362.743074][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 362.743781][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 362.744296][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 362.744925][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 362.745634][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 362.746149][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 362.746739][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 362.747439][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 367.745871][ C1] net_ratelimit: 8167 callbacks suppressed [ 367.745895][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 367.746526][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 367.747043][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 367.747639][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 367.748338][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 367.748934][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 367.749488][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 367.750081][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 367.750754][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 367.751343][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 372.751988][ C1] net_ratelimit: 8081 callbacks suppressed [ 372.752010][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 372.752732][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 372.753366][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 372.753928][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 372.754502][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 372.755183][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 372.755823][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 372.756348][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 372.756974][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 372.757693][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 377.758678][ C1] net_ratelimit: 7914 callbacks suppressed [ 377.758702][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 377.759411][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 377.760002][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 377.760521][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 377.761137][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 377.761836][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 377.762433][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 377.762979][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 377.763611][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 377.764278][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 379.769299][ T1266] ieee802154 phy0 wpan0: encryption failed: -22 [ 379.787797][ T1266] ieee802154 phy1 wpan1: encryption failed: -22 [ 382.767065][ C1] net_ratelimit: 8023 callbacks suppressed [ 382.767089][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 382.768009][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 382.768783][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 382.769632][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 382.770618][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 382.771464][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 382.772234][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 382.773146][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 382.774076][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 382.774927][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 387.775003][ C1] net_ratelimit: 6998 callbacks suppressed [ 387.775027][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 387.775888][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 387.776934][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 387.777813][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 387.778825][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 387.779689][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 387.780496][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 387.781397][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 387.782345][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 387.783240][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 391.772889][ T29] kauditd_printk_skb: 38 callbacks suppressed [ 391.772912][ T29] audit: type=1400 audit(2000000088.470:2020): avc: denied { execmem } for pid=11863 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 392.197719][ T29] audit: type=1400 audit(2000000088.860:2021): avc: denied { read write } for pid=5220 comm="syz-executor" name="loop3" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 392.783826][ C1] net_ratelimit: 7719 callbacks suppressed [ 392.783850][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 392.784516][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 392.785269][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 392.786127][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 392.786885][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 392.787546][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 392.788307][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 392.789159][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 392.789923][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 392.790586][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 397.792877][ C1] net_ratelimit: 8059 callbacks suppressed [ 397.792901][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 397.793544][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 397.794230][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 397.794837][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 397.795823][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 397.796441][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 397.797128][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 397.797769][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 397.798309][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 397.798944][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 402.802657][ C1] net_ratelimit: 7595 callbacks suppressed [ 402.802681][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 402.803398][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 402.804057][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 402.804599][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 402.805255][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 402.805959][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 402.806585][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 402.807156][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 402.807942][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 402.808664][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 407.240223][ T29] audit: type=1400 audit(2000000103.962:2022): avc: denied { execmem } for pid=11868 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 407.811914][ C1] net_ratelimit: 7805 callbacks suppressed [ 407.811939][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 407.812590][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 407.813301][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 407.813921][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 407.814498][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 407.815126][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 407.815825][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 407.816481][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 407.817021][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 407.817678][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 412.821806][ C1] net_ratelimit: 7761 callbacks suppressed [ 412.821831][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 412.822358][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 412.822976][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 412.823647][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 412.824279][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 412.824796][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 412.825392][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 412.826109][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 412.826814][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 412.827345][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 417.831559][ C1] net_ratelimit: 7932 callbacks suppressed [ 417.831583][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 417.832291][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 417.832942][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 417.833489][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 417.834115][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 417.834846][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 417.835469][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 417.836050][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 417.836670][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 417.837394][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 422.593950][ T29] audit: type=1400 audit(2000000119.273:2023): avc: denied { execmem } for pid=11869 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 422.841322][ C1] net_ratelimit: 7820 callbacks suppressed [ 422.841346][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 422.841874][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 422.842464][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 422.843138][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 422.843733][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 422.844281][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 422.844908][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 422.845580][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 422.846169][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 422.846688][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 427.851006][ C1] net_ratelimit: 7715 callbacks suppressed [ 427.851030][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 427.851663][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 427.852348][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 427.852948][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 427.853474][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 427.854078][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 427.854795][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 427.855431][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 427.855973][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 427.856576][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 432.861160][ C1] net_ratelimit: 8089 callbacks suppressed [ 432.861184][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 432.861711][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 432.862324][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 432.863013][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 432.863619][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 432.864153][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 432.864760][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 432.865443][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 432.866054][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 432.866579][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 437.871162][ C1] net_ratelimit: 8448 callbacks suppressed [ 437.871186][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 437.871891][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 437.872494][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 437.873063][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 437.873687][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 437.874462][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 437.875159][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 437.875701][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 437.876314][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 437.877029][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 440.851419][ T1266] ieee802154 phy0 wpan0: encryption failed: -22 [ 440.874906][ T1266] ieee802154 phy1 wpan1: encryption failed: -22 [ 442.881018][ C1] net_ratelimit: 8397 callbacks suppressed [ 442.881043][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 442.881648][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 442.882337][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 442.882975][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 442.883532][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 442.884140][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 442.884878][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 442.885480][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 442.886012][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 442.886677][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 447.890968][ C1] net_ratelimit: 8457 callbacks suppressed [ 447.890992][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 447.891523][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 447.892164][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 447.892844][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 447.893475][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 447.894052][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 447.894653][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 447.895369][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 447.895977][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 447.896500][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 452.900778][ C1] net_ratelimit: 8142 callbacks suppressed [ 452.900802][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 452.901321][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 452.901951][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 452.902619][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 452.903234][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 452.903754][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 452.904344][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 452.905019][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 452.905836][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 452.906388][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 457.910997][ C1] net_ratelimit: 7691 callbacks suppressed [ 457.911020][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 457.911665][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 457.912417][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 457.913100][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 457.913693][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 457.914328][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 457.915042][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 457.915711][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 457.916264][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 457.916926][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 462.920707][ C1] net_ratelimit: 8407 callbacks suppressed [ 462.920731][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 462.921420][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 462.922058][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 462.922588][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 462.923248][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 462.923942][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 462.924549][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 462.925074][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 462.925680][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 462.926357][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 467.931179][ C1] net_ratelimit: 8320 callbacks suppressed [ 467.931214][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 467.931750][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 467.932433][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 467.933213][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 467.933863][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 467.934391][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 467.934998][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 467.935722][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 467.936338][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 467.936880][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 472.940913][ C1] net_ratelimit: 7653 callbacks suppressed [ 472.940937][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 472.941692][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 472.942344][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 472.943092][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 472.943932][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 472.944678][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 472.945332][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 472.946089][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 472.946929][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 472.947675][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 477.951056][ C1] net_ratelimit: 7891 callbacks suppressed [ 477.951081][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 477.951619][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 477.952224][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 477.952943][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 477.953585][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 477.954109][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 477.954722][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 477.955406][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 477.956007][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 477.956571][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 482.960954][ C1] net_ratelimit: 8393 callbacks suppressed [ 482.960979][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 482.961591][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 482.962157][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 482.962766][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 482.963480][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 482.964091][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 482.964616][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 482.965233][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 482.965951][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 482.966585][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 487.970911][ C1] net_ratelimit: 7756 callbacks suppressed [ 487.970954][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 487.971569][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 487.972277][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 487.972871][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 487.973414][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 487.974040][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 487.974720][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 487.975321][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 487.975869][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 487.976465][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 492.981077][ C1] net_ratelimit: 7930 callbacks suppressed [ 492.981101][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 492.981713][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 492.982401][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 492.983000][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 492.983613][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 492.984215][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 492.984979][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 492.985588][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 492.986113][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 492.986750][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 497.991014][ C1] net_ratelimit: 7883 callbacks suppressed [ 497.991037][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 497.991699][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 497.992297][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 497.992813][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 497.993516][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 497.994188][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 497.994842][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 497.995361][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 497.995958][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 497.996625][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 502.506862][ T1266] ieee802154 phy0 wpan0: encryption failed: -22 [ 502.530343][ T1266] ieee802154 phy1 wpan1: encryption failed: -22 [ 503.001139][ C1] net_ratelimit: 7772 callbacks suppressed [ 503.001164][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 503.001719][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 503.002352][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 503.003066][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 503.003697][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 503.004244][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 503.004872][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 503.005579][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 503.006218][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 503.006776][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 508.011098][ C1] net_ratelimit: 8319 callbacks suppressed [ 508.011125][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 508.011747][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 508.012432][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 508.013040][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 508.013604][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 508.014210][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 508.014922][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 508.015529][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 508.016054][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 508.016694][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 513.021036][ C1] net_ratelimit: 8074 callbacks suppressed [ 513.021062][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 513.021705][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 513.022394][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 513.023010][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 513.023537][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 513.024145][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 513.024862][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 513.025493][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 513.026026][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 513.026630][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 518.030773][ C1] net_ratelimit: 8300 callbacks suppressed [ 518.030797][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 518.031412][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 518.031938][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 518.032555][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 518.033240][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 518.033876][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 518.034411][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 518.035012][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 518.035700][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 518.036316][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 523.040738][ C1] net_ratelimit: 8220 callbacks suppressed [ 523.040762][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 523.041398][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 523.042106][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 523.042738][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 523.043281][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 523.043909][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 523.044621][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 523.045244][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 523.045795][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 523.046448][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 528.050892][ C1] net_ratelimit: 7556 callbacks suppressed [ 528.050916][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 528.051597][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 528.052156][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 528.052820][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 528.053542][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 528.054178][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 528.054731][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 528.055402][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 528.056162][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 528.056802][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 533.061088][ C1] net_ratelimit: 7701 callbacks suppressed [ 533.061111][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 533.061866][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 533.062538][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 533.063079][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 533.063713][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 533.064510][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 533.065118][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 533.065728][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 533.066320][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 533.066997][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 538.070956][ C1] net_ratelimit: 7742 callbacks suppressed [ 538.070980][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 538.071748][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 538.072443][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 538.073085][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 538.073773][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 538.074579][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 538.075272][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 538.075889][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 538.076576][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 538.077440][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 543.081042][ C1] net_ratelimit: 7586 callbacks suppressed [ 543.081066][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 543.081842][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 543.082497][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 543.083071][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 543.083725][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 543.084485][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 543.085144][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 543.085762][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 543.086421][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 543.087168][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 548.090872][ C1] net_ratelimit: 8204 callbacks suppressed [ 548.090895][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 548.091433][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 548.092072][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 548.092754][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 548.093361][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 548.093886][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 548.094526][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 548.095210][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 548.095845][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 548.096374][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 553.101198][ C1] net_ratelimit: 7941 callbacks suppressed [ 553.101222][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 553.101833][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 553.102357][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 553.102962][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 553.103697][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 553.104298][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 553.104857][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 553.105479][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 553.106158][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 553.106797][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 558.111036][ C1] net_ratelimit: 7946 callbacks suppressed [ 558.111061][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 558.111797][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 558.112443][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 558.113182][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 558.120873][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 558.121562][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 558.122157][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 558.122846][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 558.123615][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 558.124290][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 560.848945][ T29] audit: type=1400 audit(2000000257.563:2024): avc: denied { execmem } for pid=11876 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 561.159366][ T29] audit: type=1400 audit(2000000257.843:2025): avc: denied { execmem } for pid=11878 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 563.120901][ C1] net_ratelimit: 7704 callbacks suppressed [ 563.120925][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 563.121525][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 563.122214][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 563.122870][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 563.123391][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 563.123997][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 563.124711][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 563.125312][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 563.125870][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 563.126469][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 563.407500][ T1266] ieee802154 phy0 wpan0: encryption failed: -22 [ 563.426163][ T1266] ieee802154 phy1 wpan1: encryption failed: -22 [ 567.012143][ T29] audit: type=1400 audit(2000000263.673:2026): avc: denied { execmem } for pid=11880 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 568.131108][ C1] net_ratelimit: 7934 callbacks suppressed [ 568.131132][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 568.131747][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 568.132549][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 568.133171][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 568.133708][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 568.134326][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 568.135044][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 568.135656][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 568.136263][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 568.136880][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 573.140650][ C1] net_ratelimit: 8108 callbacks suppressed [ 573.140675][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 573.141309][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 573.141851][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 573.142460][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 573.143141][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 573.143765][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 573.144293][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 573.144912][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 573.145600][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 573.146212][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 578.151161][ C1] net_ratelimit: 7974 callbacks suppressed [ 578.151185][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 578.151799][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 578.152357][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 578.152997][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 578.153675][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 578.154310][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 578.154840][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 578.155441][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 578.156192][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 578.156799][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 583.161064][ C1] net_ratelimit: 7968 callbacks suppressed [ 583.161089][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 583.161732][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 583.162414][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 583.163024][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 583.163585][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 583.164188][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 583.164873][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 583.165505][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:89:e2:24:6d:fa, vlan:0) [ 583.166036][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 583.166638][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 584.738733][ T30] INFO: task kworker/u8:10:2982 blocked for more than 143 seconds. [ 584.738779][ T30] Not tainted 6.11.0-rc5-syzkaller-00057-g86987d84b968 #0 [ 584.738796][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 584.738806][ T30] task:kworker/u8:10 state:D stack:23536 pid:2982 tgid:2982 ppid:2 flags:0x00004000 [ 584.738855][ T30] Workqueue: events_unbound linkwatch_event [ 584.738895][ T30] Call Trace: [ 584.738906][ T30] [ 584.738918][ T30] __schedule+0xe37/0x5490 [ 584.738955][ T30] ? __pfx___lock_acquire+0x10/0x10 [ 584.738988][ T30] ? __pfx___lock_acquire+0x10/0x10 [ 584.739018][ T30] ? __pfx___schedule+0x10/0x10 [ 584.739048][ T30] ? schedule+0x298/0x350 [ 584.739077][ T30] ? __pfx_lock_release+0x10/0x10 [ 584.739106][ T30] ? __mutex_lock+0x5b3/0x9c0 [ 584.739148][ T30] ? __mutex_trylock_common+0x78/0x250 [ 584.739180][ T30] schedule+0xe7/0x350 [ 584.739211][ T30] schedule_preempt_disabled+0x13/0x30 [ 584.739246][ T30] __mutex_lock+0x5b8/0x9c0 [ 584.739282][ T30] ? linkwatch_event+0x51/0xc0 [ 584.739311][ T30] ? __pfx___mutex_lock+0x10/0x10 [ 584.739346][ T30] ? __pfx_lock_acquire+0x10/0x10 [ 584.739376][ T30] ? __pfx_lock_release+0x10/0x10 [ 584.739405][ T30] ? linkwatch_event+0x51/0xc0 [ 584.739433][ T30] ? rtnl_lock+0x9/0x20 [ 584.739461][ T30] linkwatch_event+0x51/0xc0 [ 584.739490][ T30] ? __pfx_linkwatch_event+0x10/0x10 [ 584.739519][ T30] ? rcu_is_watching+0x12/0xc0 [ 584.739551][ T30] process_one_work+0x9c5/0x1b40 [ 584.739587][ T30] ? __pfx_lock_acquire+0x10/0x10 [ 584.739616][ T30] ? __pfx_process_one_work+0x10/0x10 [ 584.739650][ T30] ? assign_work+0x1a0/0x250 [ 584.739679][ T30] worker_thread+0x6c8/0xed0 [ 584.739714][ T30] ? __pfx_worker_thread+0x10/0x10 [ 584.739746][ T30] kthread+0x2c1/0x3a0 [ 584.739769][ T30] ? _raw_spin_unlock_irq+0x23/0x50 [ 584.739800][ T30] ? __pfx_kthread+0x10/0x10 [ 584.739824][ T30] ret_from_fork+0x45/0x80 [ 584.739860][ T30] ? __pfx_kthread+0x10/0x10 [ 584.739884][ T30] ret_from_fork_asm+0x1a/0x30 [ 584.739922][ T30] [ 584.739969][ T30] [ 584.739969][ T30] Showing all locks held in the system: [ 584.739984][ T30] 1 lock held by khungtaskd/30: [ 584.740000][ T30] #0: ffffffff8ddb5d20 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x75/0x340 [ 584.740099][ T30] 4 locks held by kworker/1:1/46: [ 584.740124][ T30] 4 locks held by kworker/u8:5/941: [ 584.740148][ T30] 2 locks held by kworker/u8:7/1296: [ 584.740175][ T30] 3 locks held by kworker/u8:10/2982: [ 584.740192][ T30] #0: ffff888015889148 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_one_work+0x1277/0x1b40 [ 584.740265][ T30] #1: ffffc90009edfd80 ((linkwatch_work).work){+.+.}-{0:0}, at: process_one_work+0x921/0x1b40 [ 584.740336][ T30] #2: ffffffff8fa238e8 (rtnl_mutex){+.+.}-{3:3}, at: linkwatch_event+0x51/0xc0 [ 584.740404][ T30] 5 locks held by kworker/u8:11/3013: [ 584.740421][ T30] 3 locks held by syslogd/4653: [ 584.740437][ T30] 3 locks held by udevd/4671: [ 584.740453][ T30] 2 locks held by getty/4973: [ 584.740469][ T30] #0: ffff88802b8cd0a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x24/0x80 [ 584.740544][ T30] #1: ffffc9000311b2f0 (&ldata->atomic_read_lock){+.+.}-{3:3}, at: n_tty_read+0xfc8/0x1490 [ 584.767154][ T30] 3 locks held by kworker/1:3/5219: [ 584.767173][ T30] 1 lock held by syz-executor/5220: [ 584.767190][ T30] 1 lock held by syz-executor/5221: [ 584.767206][ T30] #0: ffffffff8fa238e8 (rtnl_mutex){+.+.}-{3:3}, at: tun_chr_close+0x3e/0x230 [ 584.767283][ T30] 1 lock held by syz-executor/5222: [ 584.767298][ T30] #0: ffffffff8fa238e8 (rtnl_mutex){+.+.}-{3:3}, at: tun_chr_close+0x3e/0x230 [ 584.767373][ T30] 2 locks held by syz-executor/5223: [ 584.767389][ T30] #0: ffffffff8fa238e8 (rtnl_mutex){+.+.}-{3:3}, at: tun_chr_close+0x3e/0x230 [ 584.767462][ T30] #1: ffffffff8ddc14b8 (rcu_state.exp_mutex){+.+.}-{3:3}, at: exp_funnel_lock+0x1a4/0x3b0 [ 584.767538][ T30] 1 lock held by syz-executor/5232: [ 584.767555][ T30] #0: ffffffff8fa238e8 (rtnl_mutex){+.+.}-{3:3}, at: tun_chr_close+0x3e/0x230 [ 584.767633][ T30] 2 locks held by kworker/0:3/5272: [ 584.767650][ T30] 2 locks held by kworker/1:5/5307: [ 584.767666][ T30] 4 locks held by kworker/0:7/7156: [ 584.767683][ T30] 2 locks held by kworker/u8:12/7577: [ 584.767700][ T30] 3 locks held by kworker/u8:16/7591: [ 584.767716][ T30] #0: ffff88802b1fb948 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: process_one_work+0x1277/0x1b40 [ 584.767789][ T30] #1: ffffc900042ffd80 ((work_completion)(&(&net->ipv6.addr_chk_work)->work)){+.+.}-{0:0}, at: process_one_work+0x921/0x1b40 [ 584.767863][ T30] #2: ffffffff8fa238e8 (rtnl_mutex){+.+.}-{3:3}, at: addrconf_verify_work+0x12/0x30 [ 584.767939][ T30] 3 locks held by kworker/0:9/11875: [ 584.767955][ T30] 1 lock held by udevd/11879: [ 584.767971][ T30] 2 locks held by kworker/0:12/11883: [ 584.767988][ T30] 4 locks held by syz-executor/11884: [ 584.768004][ T30] [ 584.768011][ T30] ============================================= [ 584.768011][ T30] [ 584.768033][ T30] NMI backtrace for cpu 0 [ 584.768045][ T30] CPU: 0 UID: 0 PID: 30 Comm: khungtaskd Not tainted 6.11.0-rc5-syzkaller-00057-g86987d84b968 #0 [ 584.768075][ T30] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 584.768089][ T30] Call Trace: [ 584.768099][ T30] [ 584.768109][ T30] dump_stack_lvl+0x116/0x1f0 [ 584.768143][ T30] nmi_cpu_backtrace+0x27b/0x390 [ 584.768177][ T30] ? __pfx_nmi_raise_cpu_backtrace+0x10/0x10 [ 584.768211][ T30] nmi_trigger_cpumask_backtrace+0x29c/0x300 [ 584.768245][ T30] watchdog+0xf0c/0x1240 [ 584.768278][ T30] ? __pfx_watchdog+0x10/0x10 [ 584.768309][ T30] ? lockdep_hardirqs_on+0x7c/0x110 [ 584.768341][ T30] ? __kthread_parkme+0x148/0x220 [ 584.768377][ T30] ? __pfx_watchdog+0x10/0x10 [ 584.768406][ T30] kthread+0x2c1/0x3a0 [ 584.768429][ T30] ? _raw_spin_unlock_irq+0x23/0x50 [ 584.768459][ T30] ? __pfx_kthread+0x10/0x10 [ 584.768482][ T30] ret_from_fork+0x45/0x80 [ 584.768516][ T30] ? __pfx_kthread+0x10/0x10 [ 584.768539][ T30] ret_from_fork_asm+0x1a/0x30 [ 584.768575][ T30] [ 584.768585][ T30] Sending NMI from CPU 0 to CPUs 1: [ 584.768623][ C1] NMI backtrace for cpu 1 [ 584.768634][ C1] CPU: 1 UID: 0 PID: 3013 Comm: kworker/u8:11 Not tainted 6.11.0-rc5-syzkaller-00057-g86987d84b968 #0 [ 584.768663][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 584.768677][ C1] Workqueue: bat_events batadv_dat_purge [ 584.768708][ C1] RIP: 0010:unwind_next_frame+0x2b4/0x23a0 [ 584.768733][ C1] Code: 83 c5 01 4a 8d 3c ad bc 60 5b 91 48 89 fa 48 c1 ea 03 89 44 24 28 48 b8 00 00 00 00 00 fc ff df 0f b6 14 02 48 89 f8 83 e0 07 <83> c0 03 38 d0 7c 09 84 d2 74 05 e8 6c c1 aa 00 44 8b 74 24 28 42 [ 584.768756][ C1] RSP: 0018:ffffc90000a17eb8 EFLAGS: 00000202 [ 584.768773][ C1] RAX: 0000000000000004 RBX: ffffc90000a17f38 RCX: ffffffff813ce13d [ 584.768789][ C1] RDX: 0000000000000000 RSI: ffffffff813ce14b RDI: ffffffff917b129c [ 584.768805][ C1] RBP: 0000000000000002 R08: 0000000000000004 R09: 000000000007ec77 [ 584.768820][ C1] R10: 00000000000a4000 R11: 0000000000000000 R12: ffffffff88ec776c [ 584.768835][ C1] R13: 000000000007ec78 R14: 000000000007ec77 R15: ffffc90000a17f6d [ 584.768850][ C1] FS: 0000000000000000(0000) GS:ffff8880b9300000(0000) knlGS:0000000000000000 [ 584.768873][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 584.768890][ C1] CR2: 00007fd80cc21441 CR3: 000000000db7c000 CR4: 00000000003506f0 [ 584.768905][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 584.768919][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 584.768934][ C1] Call Trace: [ 584.768941][ C1] [ 584.768948][ C1] ? show_regs+0x8c/0xa0 [ 584.768981][ C1] ? nmi_cpu_backtrace+0x1d8/0x390 [ 584.769011][ C1] ? nmi_cpu_backtrace_handler+0xc/0x20 [ 584.769041][ C1] ? nmi_handle+0x1a9/0x5c0 [ 584.769061][ C1] ? unwind_next_frame+0x2b4/0x23a0 [ 584.769083][ C1] ? default_do_nmi+0x6a/0x160 [ 584.769106][ C1] ? exc_nmi+0x170/0x1e0 [ 584.769128][ C1] ? end_repeat_nmi+0xf/0x53 [ 584.769151][ C1] ? __netif_receive_skb_core.constprop.0+0xa3c/0x4330 [ 584.769187][ C1] ? unwind_next_frame+0x23d/0x23a0 [ 584.769208][ C1] ? unwind_next_frame+0x24b/0x23a0 [ 584.769230][ C1] ? unwind_next_frame+0x2b4/0x23a0 [ 584.769252][ C1] ? unwind_next_frame+0x2b4/0x23a0 [ 584.769274][ C1] ? unwind_next_frame+0x2b4/0x23a0 [ 584.769296][ C1] [ 584.769303][ C1] [ 584.769310][ C1] ? __netif_receive_skb_core.constprop.0+0xa3d/0x4330 [ 584.769344][ C1] ? __pfx_stack_trace_consume_entry+0x10/0x10 [ 584.769368][ C1] arch_stack_walk+0x100/0x170 [ 584.769399][ C1] ? __netif_receive_skb_core.constprop.0+0xa3d/0x4330 [ 584.769434][ C1] stack_trace_save+0x95/0xd0 [ 584.769455][ C1] ? __pfx_stack_trace_save+0x10/0x10 [ 584.769477][ C1] ? __pfx_ip6_mc_input+0x10/0x10 [ 584.769509][ C1] ? lock_acquire+0x1b1/0x560 [ 584.769535][ C1] ? find_held_lock+0x2d/0x110 [ 584.769567][ C1] kasan_save_stack+0x33/0x60 [ 584.769592][ C1] ? kasan_save_stack+0x33/0x60 [ 584.769615][ C1] ? kasan_save_track+0x14/0x30 [ 584.769638][ C1] ? __kasan_slab_alloc+0x89/0x90 [ 584.769664][ C1] ? kmem_cache_alloc_noprof+0x121/0x2f0 [ 584.769690][ C1] ? skb_clone+0x190/0x3f0 [ 584.769713][ C1] ? deliver_clone+0x3f/0xa0 [ 584.769744][ C1] ? maybe_deliver+0xa7/0x120 [ 584.769775][ C1] ? br_flood+0x17e/0x5c0 [ 584.769806][ C1] ? br_handle_frame_finish+0xda5/0x1c80 [ 584.769830][ C1] ? br_nf_hook_thresh+0x303/0x410 [ 584.769853][ C1] ? br_nf_pre_routing_finish_ipv6+0x76a/0xfb0 [ 584.769879][ C1] ? br_nf_pre_routing_ipv6+0x3ce/0x8c0 [ 584.769904][ C1] ? br_nf_pre_routing+0x860/0x15b0 [ 584.769927][ C1] ? br_handle_frame+0x9eb/0x1490 [ 584.769949][ C1] ? __netif_receive_skb_core.constprop.0+0xa3d/0x4330 [ 584.769990][ C1] kasan_save_track+0x14/0x30 [ 584.770015][ C1] __kasan_slab_alloc+0x89/0x90 [ 584.770041][ C1] kmem_cache_alloc_noprof+0x121/0x2f0 [ 584.770068][ C1] ? skb_clone+0x190/0x3f0 [ 584.770092][ C1] skb_clone+0x190/0x3f0 [ 584.770115][ C1] deliver_clone+0x3f/0xa0 [ 584.770147][ C1] maybe_deliver+0xa7/0x120 [ 584.770179][ C1] br_flood+0x17e/0x5c0 [ 584.770212][ C1] br_handle_frame_finish+0xda5/0x1c80 [ 584.770238][ C1] ? __pfx_br_handle_frame_finish+0x10/0x10 [ 584.770263][ C1] ? __pfx_nf_conntrack_icmpv6_error+0x10/0x10 [ 584.770292][ C1] ? ip6t_do_table+0xd20/0x1d40 [ 584.770320][ C1] ? __local_bh_enable_ip+0xa4/0x120 [ 584.770353][ C1] ? ip6t_do_table+0xd50/0x1d40 [ 584.770383][ C1] ? nf_hook_slow+0x132/0x200 [ 584.770419][ C1] br_nf_hook_thresh+0x303/0x410 [ 584.770442][ C1] ? __pfx_br_handle_frame_finish+0x10/0x10 [ 584.770467][ C1] ? __pfx_br_nf_hook_thresh+0x10/0x10 [ 584.770492][ C1] ? __pfx_br_handle_frame_finish+0x10/0x10 [ 584.770516][ C1] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 584.770545][ C1] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 584.770578][ C1] br_nf_pre_routing_finish_ipv6+0x76a/0xfb0 [ 584.770603][ C1] ? __pfx_br_handle_frame_finish+0x10/0x10 [ 584.770628][ C1] br_nf_pre_routing_ipv6+0x3ce/0x8c0 [ 584.770656][ C1] ? __pfx_br_nf_pre_routing_ipv6+0x10/0x10 [ 584.770682][ C1] ? __pfx_lock_release+0x10/0x10 [ 584.770707][ C1] ? __pfx_br_nf_pre_routing_finish_ipv6+0x10/0x10 [ 584.770739][ C1] br_nf_pre_routing+0x860/0x15b0 [ 584.770766][ C1] br_handle_frame+0x9eb/0x1490 [ 584.770792][ C1] ? __pfx_br_handle_frame+0x10/0x10 [ 584.770817][ C1] ? __pfx_br_handle_frame_finish+0x10/0x10 [ 584.770844][ C1] ? mark_lock+0xb5/0xc60 [ 584.770868][ C1] ? __pfx_br_handle_frame+0x10/0x10 [ 584.770893][ C1] __netif_receive_skb_core.constprop.0+0xa3d/0x4330 [ 584.770931][ C1] ? kfree_skbmem+0x1a4/0x1f0 [ 584.770962][ C1] ? __pfx___netif_receive_skb_core.constprop.0+0x10/0x10 [ 584.770996][ C1] ? hlock_class+0x4e/0x130 [ 584.771028][ C1] ? __lock_acquire+0xbdd/0x3cb0 [ 584.771061][ C1] ? lock_acquire+0x1b1/0x560 [ 584.771089][ C1] ? process_backlog+0x3f1/0x15f0 [ 584.771120][ C1] __netif_receive_skb_one_core+0xb1/0x1e0 [ 584.771155][ C1] ? __pfx___netif_receive_skb_one_core+0x10/0x10 [ 584.771191][ C1] ? process_backlog+0x3f1/0x15f0 [ 584.771223][ C1] ? __pfx_lock_release+0x10/0x10 [ 584.771253][ C1] ? mark_held_locks+0x9f/0xe0 [ 584.771281][ C1] ? process_backlog+0x3f1/0x15f0 [ 584.771313][ C1] __netif_receive_skb+0x1d/0x160 [ 584.771348][ C1] process_backlog+0x443/0x15f0 [ 584.771389][ C1] __napi_poll.constprop.0+0xb7/0x550 [ 584.771427][ C1] net_rx_action+0xa92/0x1010 [ 584.771462][ C1] ? tmigr_handle_remote+0x153/0xdd0 [ 584.771497][ C1] ? __pfx_net_rx_action+0x10/0x10 [ 584.771531][ C1] ? __pfx_tmigr_handle_remote+0x10/0x10 [ 584.771565][ C1] ? run_timer_base+0x119/0x190 [ 584.771598][ C1] ? run_timer_base+0x11e/0x190 [ 584.771625][ C1] ? __pfx_run_timer_base+0x10/0x10 [ 584.771654][ C1] handle_softirqs+0x216/0x8f0 [ 584.771696][ C1] ? __pfx_handle_softirqs+0x10/0x10 [ 584.771731][ C1] ? __batadv_dat_purge.part.0+0x279/0x3a0 [ 584.771766][ C1] ? __pfx_batadv_dat_to_purge+0x10/0x10 [ 584.771799][ C1] do_softirq+0xb2/0xf0 [ 584.771832][ C1] [ 584.771840][ C1] [ 584.771848][ C1] __local_bh_enable_ip+0x100/0x120 [ 584.771883][ C1] __batadv_dat_purge.part.0+0x279/0x3a0 [ 584.771920][ C1] batadv_dat_purge+0x4b/0xa0 [ 584.771954][ C1] process_one_work+0x9c5/0x1b40 [ 584.771987][ C1] ? __pfx_batadv_bla_periodic_work+0x10/0x10 [ 584.772020][ C1] ? __pfx_process_one_work+0x10/0x10 [ 584.772053][ C1] ? assign_work+0x1a0/0x250 [ 584.772081][ C1] worker_thread+0x6c8/0xed0 [ 584.772114][ C1] ? __kthread_parkme+0x148/0x220 [ 584.772149][ C1] ? __pfx_worker_thread+0x10/0x10 [ 584.772179][ C1] kthread+0x2c1/0x3a0 [ 584.772200][ C1] ? _raw_spin_unlock_irq+0x23/0x50 [ 584.772231][ C1] ? __pfx_kthread+0x10/0x10 [ 584.772253][ C1] ret_from_fork+0x45/0x80 [ 584.772287][ C1] ? __pfx_kthread+0x10/0x10 [ 584.772309][ C1] ret_from_fork_asm+0x1a/0x30 [ 584.772345][ C1] [ 584.794162][ T30] Kernel panic - not syncing: hung_task: blocked tasks [ 584.794180][ T30] CPU: 0 UID: 0 PID: 30 Comm: khungtaskd Not tainted 6.11.0-rc5-syzkaller-00057-g86987d84b968 #0 [ 584.794212][ T30] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 584.794227][ T30] Call Trace: [ 584.794236][ T30] [ 584.794246][ T30] dump_stack_lvl+0x3d/0x1f0 [ 584.794278][ T30] panic+0x6dc/0x7c0 [ 584.794304][ T30] ? __pfx_panic+0x10/0x10 [ 584.794331][ T30] ? __irq_work_queue_local+0x136/0x440 [ 584.794362][ T30] ? __pfx_nmi_raise_cpu_backtrace+0x10/0x10 [ 584.794396][ T30] ? irq_work_queue+0x2a/0x80 [ 584.794423][ T30] ? watchdog+0xd76/0x1240 [ 584.794454][ T30] ? watchdog+0xd69/0x1240 [ 584.794483][ T30] watchdog+0xd87/0x1240 [ 584.794516][ T30] ? __pfx_watchdog+0x10/0x10 [ 584.794547][ T30] ? lockdep_hardirqs_on+0x7c/0x110 [ 584.794579][ T30] ? __kthread_parkme+0x148/0x220 [ 584.794614][ T30] ? __pfx_watchdog+0x10/0x10 [ 584.794644][ T30] kthread+0x2c1/0x3a0 [ 584.794665][ T30] ? _raw_spin_unlock_irq+0x23/0x50 [ 584.794695][ T30] ? __pfx_kthread+0x10/0x10 [ 584.794716][ T30] ret_from_fork+0x45/0x80 [ 584.794749][ T30] ? __pfx_kthread+0x10/0x10 [ 584.794771][ T30] ret_from_fork_asm+0x1a/0x30 [ 584.794808][ T30] [ 584.795031][ T30] Kernel Offset: disabled